National Security Threat Awareness Monthly Bulletin

Total Page:16

File Type:pdf, Size:1020Kb

National Security Threat Awareness Monthly Bulletin UNCLASSIFIED (U) FBI Tampa Division National Security Threat Awareness Monthly Bulletin APRIL 2014 (U) Administrative Note: This product reflects the views of the FBI-Tampa Division and has not been vetted by FBI Headquarters. (U) Handling notice: Although UNCLASSIFIED, this information is property of the FBI and may be distributed only to members of organizations receiving this bulletin. Dissemination outside of your agency or company is only authorized with prior approval of the FBI. Further publication is not authorized in any manner; however dissemination within your agency to appropriate individuals is appropriate. Precautions should be taken to ensure this information is stored and/or destroyed in a manner that precludes unauthorized access. (U) The FBI Tampa Division National Security Threat Awareness Monthly Bulletin provides a summary of previously reported US government press releases, publications, and news articles from wire services and news organizations relating to counterintelligence, cyber and terrorism threats. The information in this bulletin represents the views and opinions of the cited sources for each article, and the analyst comment is intended only to highlight items of interest to organizations in Florida. This bulletin is provided solely to inform our Domain partners of news items of interest, and does not represent FBI information. (U) If you are a security officer, foreign sales representative, or employee of a business or company in Florida, you may receive unsolicited, suspicious emails from a foreign company or individual asking specific and detailed questions about your products, or inquires about starting a joint-venture or other commercial relationship. Your company or agency may also host foreign visitors or delegations that ask specific questions about or seeks access to technology or information outside the scope of their visit. If you have incidents like these to report, please contact FBI Strategic Partnership Coordinator, James “Pat” Laflin, 813-253-1029, e-mail [email protected] .Please note, defense contractors are required under the NISPOM to submit suspicious contact reports to their Defense Security Service (DSS) representative. In the 10 APR 2014 Issue: Article Title Page NATIONAL SECURITY THREAT NEWS FROM GOVERNMENT AGENCIES: Naval Espionage - Stopping a Dangerous Insider Threat p. 2 COUNTERINTELLIGENCE/ECONOMIC ESPIONAGE THREAT ITEMS FROM THE PRESS: Hawaii Man Pleads Guilty to Communicating Classified National Defense Information to An p. 3 Unauthorized Person Two Individuals and Company Found Guilty in Conspiracy to Sell Trade Secrets to Chinese p. 4 Companies; First Federal Jury Conviction Under Economic Espionage Act of 1996 Reston Man Pleads Guilty to Exporting Unlicensed Goods to Iran; Defendant Shipped over p. 7 $250,000 in High-Tech Items Through United Arab Emirates Former Winchester Brake Pad Engineer Pleads Guilty to Theft of Trade Secrets Charge p. 7 Analyst at Canadian Anti-Terrorism Agency Stripped of Position after Meeting Russian Diplomats p. 8 at Social Events Former Employee of Navy Contractor Pleads Guilty in International Navy Bribery Scandal p. 8 The Black Box of China’s Military; Beijing is Spending Hundreds of Billions of Dollars on Defense, p. 9 but No One Quite Knows What They're up to CYBERSECURITY SPECIAL FOCUS FOR INDUSTRY: How do the FBI and Secret Service Know Your Network Has Been Breached Before You Do? They p. 11 Work Hard to Find Evidence of Stolen Data, but Companies Don't Always Appreciate the Effort Big Threats for Small Businesses; Five Reasons Your Small or Midsize Business is a Prime Target p. 12 for Cybercriminals CYBER THREAT ITEMS FROM THE PRESS: Cyber-War: In Deed and Desire, Iran Emerging as a Major Power p. 14 A Cyber History of the Ukraine Conflict p. 14 Hack Attack - Russia's First Targets in Ukraine: Its’ Cell Phones and Internet Lines p. 15 UNCLASSIFIED 1 UNCLASSIFIED Hacking Critical Infrastructure Companies -- A Pen Tester's View p. 16 IT Leaders Share Tips on Managing Security Risks p. 17 Three Ways to Raise Infosec Awareness among Non-Security Executives p. 18 Major Companies, like Target, Often Fail to Act on Malware Alerts; Target Paid the Price for its p. 19 Apparent Failure; Other Big Firms Follow the Same Pattern and Could Face the Same Fate, Analysts Say 4 Lessons CIOs Can Learn From the Target Breach p. 20 Healthcare Industry Advised to do More Thorough Risk Analyses p. 21 Pre-Installed Malware Turns Up on New Phones; A Fake Version of Netflix that Steals Personal p. 21 Data and Sends it to Russia Has Been Found on Several Phone Models Sophisticated Scam Targeting Verizon Wireless Customers p. 22 COUNTERTERRORISM THREAT ITEMS FROM THE PRESS: San Joaquin County Man Arrested at Canadian Border on Charges of Attempting to Provide p. 22 Material Support to Foreign Terrorist Organization Dearborn Resident Charged with Attempting to Support a Foreign Terrorist Organization p. 23 US House of Representatives - Joint Subcommittee Hearing entitled: Iran’s Support for Terrorism p. 24 Worldwide Authorities Identify Third Suspect in Bulgarian Bus Bombing Linked to Canadian Member of p. 26 Hezbollah Al-Qaeda Unveils New Magazine Aimed at Western Jihadis p. 26 Al Qaeda's Latest Magazine: Notes from Dead American Terrorists p. 26 Officials: Al-Qaida Plots Comeback in Afghanistan p. 27 Nigeria: Al-Qaeda Takes Over Boko Haram p. 27 AP Interview: Jihadi Head Says Gaza Groups Growing p. 27 Militant Islamist Website Calls for Attacks on France And Hollande – SITE p. 28 Al-Qaeda Threat to United States Risked In Afghanistan Exit, General Says p. 28 (U) NATIONAL SECURITY THREAT NEWS FROM GOVERNMENT AGENCIES: (U) Naval Espionage - Stopping a Dangerous Insider Threat (FBI News Blog, 07 MAR 2014) (U) As a sailor with a top secret clearance, a sensitive job on a submarine, and 20 years of service in the Navy, Robert Hoffman possessed a tremendous amount of knowledge about the US nuclear fleet and its operations—knowledge he was willing to sell to the Russians. (U) “It’s almost impossible to say why someone would become a spy,” said Special Agent James Dougherty, who investigated the case from our Norfolk Division, but Hoffman represents a classic example of the insider threat. “When a US citizen with classified information threatens to betray his country,” Dougherty explained, “the resulting damage to national security and loss of American lives can be catastrophic.” (U) Special Agent James Dougherty has a dozen years of experience investigating spies, and in almost all of the cases he has worked, the subjects’ families, friends, or colleagues had concerns but failed to report them to authorities. “The FBI needs the public’s help to fight the insider threat,” Dougherty said, “and we are willing to pay for that help.” (U) Individuals who provide information leading to the arrest and conviction of a spy—or to the prevention of espionage—are eligible for a $500,000 reward. To report suspicious activities, contact your local FBI office or submit an anonymous tip online. “There will always be espionage cases,” Dougherty said. “This is a war that can’t be won—it can only be fought. But we can never give up the fight.” UNCLASSIFIED 2 UNCLASSIFIED (U) Investigators speculate that Hoffman may have blamed his divorce on the Navy, along with his failure to gain promotion. The FBI and the Naval Criminal Investigative Service (NCIS) became concerned in 2011 when, nearing retirement, Hoffman told friends he was going on a “man-cation” to Belarus to see Russian women he had previously met when he was stationed in Bahrain—even though he knew the women would not be there. (U) “He had some sort of motivation to travel to Belarus that didn’t seem logical,” said Dougherty. In addition, Hoffman ignored the requirement to alert military security officers that he would be traveling out of the country, and he failed to adhere to other security rules of reporting any suspicious incidents while overseas. However, Hoffman did post items on social media channels saying he met the president of Belarus. “All of that added to our suspicion,” Dougherty noted. (U) Using court-authorized surveillance, wiretaps, and other investigative tools, FBI and NCIS investigators began monitoring Hoffman’s movements at his home in Virginia Beach following his retirement from the Navy in late 2011. Soon after, our undercover operatives made contact with him to assess his intentions. Then, in September 2012, a female FBI undercover agent posing as a Russian operative knocked on Hoffman’s door and delivered a message ostensibly from Russian intelligence officials. “He received instructions from the woman, who asked him to respond by e-mail within one week,” Dougherty said. “We didn’t want to pressure him. We wanted him to make a conscious decision, knowing he would be dealing with the Russian intelligence service.” (U) Hoffman didn’t wait a week—he responded within hours. He agreed to answer a series of questions on an encrypted thumb drive that was to be left in a hollow tree in a park—a hiding place known in the spy world as a dead drop. On the third such drop, Hoffman divulged top secret national defense information. “American lives could have been lost based on the information he was willing to give up,” Dougherty said. “He had access to things that were highly, highly sensitive.” (U) In August 2013, a jury in Norfolk found Hoffman guilty of attempted espionage; last month, the 40-year-old was sentenced to 30 years in prison. “The insider threat is very real,” said Dougherty, explaining that in these types of cases, there are often people who are suspicious of a friend or colleague’s statements or behavior but who don’t act on those suspicions. “One of the things we teach in insider threat training,” Dougherty said, “is that if you see something, say something.
Recommended publications
  • Chinabrief in a Fortnight
    ChinaBrief Volume XIV s Issue 21 s November 7, 2014 VOLUME XIV s ISSUE 21 s NOVEMBER 7, 2014 In This Issue: IN A FORTNIGHT By Nathan Beauchamp-Mustafaga 1 CHINA’S ESPIONAGE AGAINST TAIWAN (PART I): ANALYSIS OF RECENT OPERATIONS By Peter Mattis 4 Chinese and Indian troops conduct a joint counter- REGIONAL MANEUVERING PRECEDES OBAMA-XI MEETING AT APEC SUMMIT terrorism exercise in 2008. By Richard Weitz 8 (Credit: Xinhua) A FAMILY DIVIDED: THE CCP’S CENTRAL ETHNIC WORK CONFERENCE By James Leibold 12 China Brief is a bi-weekly jour- SINO-INDIAN JOINT MILITARY EXERCISES: OUT OF STEP nal of information and analysis covering Greater China in Eur- By Sudha Ramachandran 16 asia. China Brief is a publication of The Jamestown Foundation, a private non-profit organization In a Fortnight based in Washington D.C. and is edited by Nathan Beauchamp- CHINA CYNICAL OVER U.S. MIDTERM ELECTIONS, BUT EXPECTS Mustafaga. POLICY CONTINUITY The opinions expressed in By Nathan Beauchamp-Mustafaga China Brief are solely those of the authors, and do not n Tuesday, November 4, the United States held its 2014 midterm elections necessarily reflect the views of The Jamestown Foundation. Oand voted the Republican Party into the majority in the U.S. Senate, giving them control of both houses in Congress and, as Chinese analysts noted, a major political victory. The overall Chinese response was cynical about the lack of real democracy in the elections and dismissive of U.S. President Barack Obama’s influence in the last two years of his presidency. Despite some concerns for U.S.- China relations with a more hawkish Republican Congress, Chinese commentators remain optimistic about the future of the bilateral relationship and look forward For comments and questions about China Brief, please con- to President Obama’s visit to Beijing for the Asia-Pacific Economic Cooperation tact us at Summit (APEC) later this month (see “Regional Maneuvering” in this issue).
    [Show full text]
  • Asian Americans: Collateral Damage in the New Cold War with China? Increasingly, the Media Has Reported on Warnings by Top U.S
    NAPABA Conference - Chicago November 10, 2018 Moderator: Asian Aryani Ong Americans: Panelists: Collateral Mara Hvistendahl Damage in the Andrew Kim new Cold War Patrick Toomey with China? Sean Vitka Chinese American Scientists, Not Spies Dr. Wen Ho Lee Guoqing Cao (left front), Xiaorong Wang (left back), Sherry Chen (middle), Shuyi Li (right front), Xiaoxing Xi (right back) U.S. views on Chinese intelligence Thousand Grains of Sand Distributed View Multiple Chinese China targets government agencies, Chinese Americans actors. Independent actors incentivized by financial gain. 1990’s Present Day CLE Materials Compiled by Mara Hvistendahl . Changing views of Chinese intelligence . Paul Moore, “Chinese Culture and the Practice of ‘Actuarial’ Intelligence,” conference presentation from 1996 . Peter Mattis, “Beyond Spy vs. Spy: The Analytical Challenge of Understanding Chinese Intelligence Services,” Studies in Intelligence Vol. 56, No. 3 (September 2012) Economic Espionage Act cases,1996-2015 Study by Andrew Kim Published by Committee of 100 • # of EEA defendants with Chinese names tripled between 2009-2015, from 1996 to 2008 • 50% of EEA cases alleged theft of secrets for a US entity, 33% for China, none for Russia • Convicted defendants of Asian heritage received sentences twice as severe • 1 in 5 accused ”spies” of Asian heritage may be innocent CLE Materials Compiled by Andrew Kim . Prosecuting Chinese “Spies:” An Empirical Analysis of the Economic Espionage Act, Executive Summary Presented by Committee of 100, May 17, 2018, Washington, D.C. Authored by Andrew Kim . Economic Espionage and Trade Secrets: Asian Americans in the Crosshairs – Power point Presentation by Andrew Kim Xiaoxing Xi et al. v. United States et al.
    [Show full text]
  • Preventing Loss of Academic Research
    COUNTERINTELLIGENCE STRATEGIC PARTNERSHIP FBI INTELLIGENCE NOTE (S PIN) SPIN - 15- 006 J U N E 2 0 1 5 Preventing Loss of Academic Research INTRODUCTION US Colleges and Universities are known for innovation, collaboration, and knowledge-sharing. These qualities help form the bedrock of US economic success. These same qualities also make US universities prime targets for theft of patents, trade secrets, Intellectual Property (IP), research, and sensitive information. Theft of patents, designs and proprietary informa- tion have resulted in the bankruptcy of US businesses and loss of research funding to US universities in the past. When a foreign company uses stolen data to create products, at a reduced cost, then compete against American products, this can have direct harmful conse- quences for US universities that might receive revenue through patents and technology trans- fer. Foreign adversaries and economic competitors can take advantage of the openness and col- laborative atmosphere that exists at most learning institutions in order to gain an economic and/or technical edge through espionage. Espionage tradecraft is the methodology of gathering or acquiring such information. Most foreign students, professors, researchers, and dual-nationality citizens studying or working in the United States are in the US for legitimate reasons. Very few of them are actively working at the behest of another government or competing organiza- tion. However, some foreign governments pressure legitimate students and expatriates to report valuable information to intel- ligence officials, often using the promise of favors or threats to family members back home. The goal of this SPIN is to provide an overview of the threats economic espionage poses to the academic and business com- munities.
    [Show full text]
  • Fbi Tampa Ci Strategic Partnership Newsletter
    FBI TAMPA CI STRATEGIC PARTN ERSHIP NEWSLETTER June 1, 2011 Volume 3 Issue 6 Federal Bureau of Investigation 11000 Wilshire Boulevard, Suite 1700 Los Angeles, California 90024, 310.477.6565 INSIDE THIS ISSUE: NOTE: In 2 COUNTERINTELLIGENCE TRENDS accordance with Title 17 2 The Insider Threat; Safeguarding Trade Secrets Proprietary Information and U.S.C. Section Research 107, this material is distributed 12 ARRESTS, TRIALS AND CONVICTIONS without profit 12 China's spying seeks secret US info or payment for 19 Sailor pleads guilty to espionage charges in Norfolk non-profit news reporting 21 Former L-3 Worker Indicted For Data Breach and 22 THREE INDIVIDUALS AND TWO COMPANIES INDICTED FOR CONSPIRING TO educational EXPORT MILLIONS OF DOLLARS WORTH OF COMPUTER-RELATED EQUIPMENT TO purposes only. IRAN Use does not reflect official 25 Broomfield man charged with giving defense data to South Korea endorsement 26 California man gets 25 years for missile-smuggling plot by the FBI. 27 Fired Gucci Network Engineer Charged for Taking Revenge on Company Reproduction for private use 28 Belgians charged with smuggling aircraft parts or gain is subject 29 TECHNIQUES, METHODS, TARGETS to original copyright 29 How a networking immigrant became a spy restrictions. 35 Shriver Case Highlights Traditional Chinese Espionage Individuals 42 Condé Nast got hooked by $8 million spear-phishing scam interested in 44 Exclusive: Inside Area 51, the Secret Birthplace of the U2 Spy Plane subscribing to this 47 Helping an Attorney Prove an Employee Theft/Theft of Trade
    [Show full text]
  • Testimony Before the U.S.-China Economic and Security Review Commission: Chinese Human Intelligence Operations Against the United States
    Testimony before the U.S.-China Economic and Security Review Commission: Chinese Human Intelligence Operations against the United States Peter Mattis Fellow, The Jamestown Foundation June 9, 2016 China’s intelligence services are among the world’s most active against the United States, but the Chinese approach to human intelligence (HUMINT) remains misunderstood. Observers have conflated the operations of the intelligence services with the amateur clandestine collectors (but professional scientists/engineers/businesspeople) who collect foreign science and technology. The Chinese intelligence services have a long professional history, dating nearly to the dawn of the Chinese Communist Party, and intelligence has long been the province of professionals. The intelligence services were not immune to the political purges and the red vs. expert debates, and the Cultural Revolution destroyed much of the expertise in clandestine agent operations.1 As China’s interests abroad have grown and the blind spots created by the country’s domestic-based intelligence posture have become more acute, the Chinese intelligence services are evolving operationally and becoming more aggressive in pursuit of higher-quality intelligence. * * * The principal intelligence services conducting HUMINT operations, both clandestine and overt, against the United States are the Ministry of State Security (MSS) and Joint Staff Department’s Intelligence Bureau (JSD/IB) in the People’s Liberation Army (PLA). Prior to the military reforms announced in November 2015, the latter was known as the General Staff Department’s Second Department (commonly abbreviated 2PLA). Because the full ramifications of the PLA’s reform effort have unclear implications for intelligence, the testimony below will reflect what was known about 2PLA rather than the JSD/IB, unless specifically noted.
    [Show full text]
  • Scholars Or Spies: Foreign Plots Targeting America's Research and Development
    SCHOLARS OR SPIES: FOREIGN PLOTS TARGETING AMERICA’S RESEARCH AND DEVELOPMENT JOINT HEARING BEFORE THE SUBCOMMITTEE ON OVERSIGHT & SUBCOMMITTEE ON RESEARCH AND TECHNOLOGY COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HOUSE OF REPRESENTATIVES ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION APRIL 11, 2018 Serial No. 115–54 Printed for the use of the Committee on Science, Space, and Technology ( Available via the World Wide Web: http://science.house.gov U.S. GOVERNMENT PUBLISHING OFFICE 29–781PDF WASHINGTON : 2018 COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HON. LAMAR S. SMITH, Texas, Chair FRANK D. LUCAS, Oklahoma EDDIE BERNICE JOHNSON, Texas DANA ROHRABACHER, California ZOE LOFGREN, California MO BROOKS, Alabama DANIEL LIPINSKI, Illinois RANDY HULTGREN, Illinois SUZANNE BONAMICI, Oregon BILL POSEY, Florida AMI BERA, California THOMAS MASSIE, Kentucky ELIZABETH H. ESTY, Connecticut JIM BRIDENSTINE, Oklahoma MARC A. VEASEY, Texas RANDY K. WEBER, Texas DONALD S. BEYER, JR., Virginia STEPHEN KNIGHT, California JACKY ROSEN, Nevada BRIAN BABIN, Texas JERRY MCNERNEY, California BARBARA COMSTOCK, Virginia ED PERLMUTTER, Colorado BARRY LOUDERMILK, Georgia PAUL TONKO, New York RALPH LEE ABRAHAM, Louisiana BILL FOSTER, Illinois DANIEL WEBSTER, Florida MARK TAKANO, California JIM BANKS, Indiana COLLEEN HANABUSA, Hawaii ANDY BIGGS, Arizona CHARLIE CRIST, Florida ROGER W. MARSHALL, Kansas NEAL P. DUNN, Florida CLAY HIGGINS, Louisiana RALPH NORMAN, South Carolina SUBCOMMITTEE ON OVERSIGHT RALPH LEE ABRAHAM, LOUISIANA, Chair FRANK D. LUCAS, Oklahoma DONALD S. BEYER, Jr., Virginia BILL POSEY, Florida JERRY MCNERNEY, California THOMAS MASSIE, Kentucky ED PERLMUTTER, Colorado BARRY LOUDERMILK, Georgia EDDIE BERNICE JOHNSON, Texas ROGER W. MARSHALL, Kansas CLAY HIGGINS, Louisiana RALPH NORMAN, South Carolina LAMAR S. SMITH, Texas SUBCOMMITTEE ON RESEARCH AND TECHNOLOGY HON.
    [Show full text]
  • China: the Risk to Academia
    FEDERAL BUREAU OF INVESTIGATION CHINA: THE RISK TO ACADEMIA As of March 2018, more than 1.4 million international stu- dents and professors were participating in America’s open The annual cost to the U.S. and collaborative academic environment. The inclusion of these international scholars at U.S. colleges and universi- economy of counterfeit goods, pirated ties entails both substantial benefit—and notable risk. Many software, and theft of trade secrets is of these visitors contribute to the impressive successes and achievements enjoyed by these institutions, which produce $225–$600 BILLION advanced research, cutting-edge technology, and insightful scholarship. However, this open environment also puts ac- ademia at risk for exploitation by foreign actors who do not follow our rules or share our values. The vast majority of the 1.4 million international scholars on U.S. campuses pose no threat to their host institutions, fellow classmates, or research fields. On the contrary, these international visitors represent valuable contributors to their cam- puses’ achievements, providing financial benefits, diversity of ideas, sought expertise, and opportunities for cross-cultural exchange. Any research institution hoping to be—and to remain—among the best in the world must attract and retain the best people in the world, wherever they are from. The FBI recognizes, and values, this unique package of benefits these international students and professors provide. However, some foreign actors, particularly foreign state adversaries, seek to illicitly or illegitimately acquire U.S. academic research and information to advance their scientific, economic, and military development goals. By doing so, they can save their countries significant time, money, and resources while achieving generational advances in technology.
    [Show full text]
  • Margaret K. Lewis* the Department of Justice Launched the China
    LEWIS 8/25/20 12:12 PM CRIMINALIZING CHINA Margaret K. Lewis* 111 J. CRIM. L. & CRIMINOLOGY __ (Forthcoming December 2020) Draft: August 25, 2020 The Department of Justice launched the China Initiative in November 2018 to counter national security threats emanating from the People’s Republic of China (PRC). By June 2020, the Federal Bureau of Investigation had approximately two thousand active investigations under the Initiative. People and entities with connections to the PRC’s governing party-state structure have engaged in trade secret theft and other crimes under U.S. law. The Department of Justice is not making up a threat. It is, however, framing that threat in a problematic way. This Article argues that using “China” as the glue connecting cases prosecuted under the Initiative’s umbrella creates an overinclusive conception of the threat and attaches a criminal taint to entities that possess “China-ness” even if they do not have a nexus to the PRC party-state. The Article further contends that, when assessed in light of the goals of deterrence, incapacitation, rehabilitation, and retribution, it is worrisome that the prosecution and punishment of people and entities rests in part on a connection with “China.” A better path is to discard the “China Initiative” framing, focus on cases’ individual characteristics, and enhance the Department of Justice’s interactions with non-governmental experts. * Professor of Law, Seton Hall University School of Law. Thank you to Lauren Russo, Patrick Dwyer, and Richard Connors for their excellent research assistance. This article has benefited greatly from the comments of Ira Belkin, Donald Clarke, Jerome Cohen, Mark Cohen, Nelson Dong, Brian Murray, and participants in the NYU School of Law, U.S.-Asia Law Institute workshop and Seton Hall Law faculty scholarship workshop.
    [Show full text]
  • Too Many Resources? It's Unclear Why the Situation in Upstate New York Is
    Too Many Resources? It's unclear why the situation in upstate New York is more serious than in other parts of the country, including areas with high border traffic volumes, like Detroit and northeastern Washington State. Some university officials and immigration lawyers suspect that Customs and Border Protection's Rochester station has been given more resources than it knows what to do with, reportedly expanding from seven to 27 agents since May 2008. There are no ports of entry in its jurisdiction, which lacks a land boundary with Canada. "Basically they have nothing to do, so they've come up with a really easy way to arrest a lot of people through internal enforcement," says Nancy Morawetz, ofthe New York University School ofLaw, who has represented individuals caught up in the sweeps and procured arrest information from Customs and Border Protection via the Freedom of Information Act. The records have shown that less than 1 percent of those arrested on buses and trains in the Rochester area had entered the country within the past three days, and that none of them could be shown to have entered from Canada, she says. "I think that data is incredibly powerful," Ms. Morawetz says, "because it shows that all this aggravation and hardship has essentially nothing to do with the Border Patrol mission" of securing the border. "In a country where 5 percent of the population lacks status, it's not hard to pick up bodies by going into any crowded station and asking people where they were born," she says. "This isn't about securing our borders.
    [Show full text]
  • The Analytic Challenge of Understanding Chinese Intelligence Services
    Beyond Spy vs. Spy The Analytic Challenge of Understanding Chinese Intelligence Services Peter Mattis Introduction an important task for the US Intelli- gence Community, but clear under- Scholars of intelligence and com- standing of Chinese intelligence parative politics have tended to serves more than the CI mission. At overlook intelligence services as the core, analysis of Beijing’s intelli- bureaucratic organizations and as gence institutions is about trying to components of government informa- understand systematically how the tion-processing systems. As a conse- Chinese government uses informa- quence, conventionally trained Clear understanding of tion to inform its policy formula- “ analysts and most journalists tend to tion, guidance to diplomats and Chinese intelligence overlook the role of intelligence and security officials, and the execution serves more than the CI security services in extending and of its policies. mission. maintaining state power and interna- tional policy goals. Just as importantly, China’s civil- ian intelligence and security agen- In the case of China, the intense cies are empowered to arrest and to focus of writers on the ups and ” operate inside and outside China. downs of US-Chinese relations sel- The distinction between intelligence dom leads to efforts to more deeply and internal security policy is mini- understand China and the sources of mal, institutionally speaking. This its government’s behavior, and, in makes these services not just part of particular, the effects that Chinese a policy staff
    [Show full text]
  • TRTR 2017 Lance English Defensive Counterintelligence
    NRC’s Defensive Counterintelligence Program and CI Awareness Briefing TRTR Conference – San Diego, CA September 17-21, 2017 Mr. Lance English - CI PM 1 Introduction Welcome to the Defensive Counterintelligence and Awareness briefing. The purpose of this briefing is to acquaint you with the NRC’s Defensive Counterintelligence (DCI) Program and provide an introduction to Economic or “Academic Espionage” - Inform you about the threat economic espionage poses to the academic and business community 2 Objectives By the end of this briefing you will be able to: • Define “counterintelligence” & “academic espionage” • Identify who targets academic staff and research, and how • Explain how to recognize, mitigate, and report potential espionage activities • Know what steps to take to prevent loss of academic research 5 Agenda • Authority for Counterintelligence Program at NRC • Definition of Counterintelligence (CI) • Discuss The NRC’s CI Program • Targets and Impact of Foreign Intelligence Services (FIS) • FIS Methodology; Spot, Assess, Develop, Recruit, Handle and Terminate • Discuss Academic Solicitation • Examples of Academic Espionage • How to Report possible Espionage 5 Authority for CI Program: SECY-10-0158 The Staff Requirements Memorandum (SRM) SECY-10-0158, “Staff Options for a Potential Counterintelligence Program for Licensees Who Possess Uranium Enrichment Technologies and U.S. Nuclear Regulatory Staff,” dated February 1, 2011, and a Chairman Tasking Memorandum, dated March 28, 2012, required the creation of a counterintelligence awareness training program at the NRC. Counterintelligence programs aim to identify intelligence threats from state and non-state actors. As a defensive counterintelligence program participant, you can help the NRC focus efforts on preventing foreign actors from penetrating your institution and protect your research from foreign actors.
    [Show full text]
  • Assessing Hard-Target Espionage in the Cyber Era Kyle S. Cunliffe Thesis Submitt
    An existential crisis and a golden opportunity? Assessing hard-target espionage in the cyber era Kyle S. Cunliffe Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University January 18th 2021 Summary Cyberspace is transforming global society. Its effects on states, intelligence, and national security are the subject of much comment, but its relationship with espionage, or human intelligence, remains under-researched to an alarming degree. At a time when the British-US intelligence community is making headway in cyberspace, necessitated by emerging threats and rising nation-state agendas, this is a glaring omission. The strategic imperatives of Russia and China have provoked a reorientation by the British SIS and the US CIA, turning resources back towards nation-state ‘hard targets’. Yet these hard target states are investing resources in innovative surveillance practices, tools that fundamentally threaten intelligence officers’ ability to travel freely or acquire the increasingly important human sources (agents) of espionage. As the operations of British-US intelligence personnel become more threatened in physical terms, espionage agencies now focus their attention towards cyberspace, where innovation opens up new opportunities in tradecraft. By turning to cyberspace to conduct tradecraft, particularly in the recruitment and handling of spies, espionage’s success and failure is now entwined with the value of innovation, and as consequence, cyber-enabled tradecraft is entwined with the present and future of Western security. However, the value of cyberspace to espionage’s sources and methods remains ambiguous, receiving only limited study. Views put forward by a small cadre of mostly seasoned practitioners, express both powerful enthusiasm and debilitating cynicism, reflecting a dichotomy of opinions that have not yet been addressed.
    [Show full text]