İSTİHBARATIN TEŞKİLATLANMA Ve YÖNETİM SORUNSALI: A.B.D. ÖRNEĞİ

Total Page:16

File Type:pdf, Size:1020Kb

İSTİHBARATIN TEŞKİLATLANMA Ve YÖNETİM SORUNSALI: A.B.D. ÖRNEĞİ T.C. İSTANBUL ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ SİYASET BİLİMİ VE KAMU YÖNETİMİ ANABİLİM DALI YÜKSEK LİSANS TEZİ İSTİHBARATIN TEŞKİLATLANMA ve YÖNETİM SORUNSALI: A.B.D. ÖRNEĞİ Fatih TÜRK 2501110836 TEZ DANIŞMANI DOÇ. DR Pelin Pınar GİRİTLİOĞLU İSTANBUL - 2019 ÖZ İSTİHBARATIN TEŞKİLATLANMA ve YÖNETİM SORUNSALI: A.B.D. ÖRNEĞİ Fatih TÜRK Günümüzde teknolojinin gelişimi ve küreselleşme dünyayı uçtan uca değiştirdi. Toplumlar ve ülkeler birbiri ile etkileşime geçtikçe bireysel özgürlükler ve demokrasi konusunda hassas alanlar giderek artmaktadır. Bu etkileşim ülkelerin güvenliğini ve bireysel özgürlük alanlarınıda etkilemektedir. Bu hızlı değişime karşın ülkeler geçmişin soğuk savaş anlayışı ve güvenlik hassasiyetlerini de aynı zamanda taşımaya devam etmektedirler. Gelişmiş demokrasilere sahip ülkelerin başında gelen Amerika Birleşik Devletleri’nde (ABD) mevcut güvenlik ve istihbarat anlayışı, faaliyetleri ve denetimi işte bu çatışmanın uzun sürede meydana geldiği denge üzerine kuruludur. ABD açısından istihbarat teşkilatlanma süreci yeni problemler, hak arayışları, çatışma ve çözümler doğurmaktadır. Tüm bunların ışığında bu tezin temel amacı istihbarat problemlerini ABD istihbarat teşkilatlanma süreci üzerinden analiz edip karşılaşılan problemleri neden sonuç ilişkisi içerisinde tespit etmektir. Bu çalışmada Amerika Birleşik Devletleri’nde istihbaratın yönetim modeli, teşkilatlanması ve hukuki alt yapısı incelenmiştir. Birinci bölümde kavramsal anlamda istihbarat incelemesi literatüre önemli bir katkı olarak görülebilir. İkinci bölümde ABD istihbarat teşkilatlanması ve yasal çerçevedeki gelişim arasındaki ilişki ortaya konmaktadır. Üçüncü bölümde ABD istihbaratının yönetim, organizasyon ve denetimine ilişkin temel problemler tartışılmıştır. Sonuç olarak tespit edilen en büyük problem büyüyen kurum yapıları arasında koordinasyon eksikliğinden kaynaklanmaktadır. Etkin bir istihbarat teşkilatlanmasının öncülü olarak insan faktörünün ve doğru bilginin karar vericiler için hızlı ve etkin şekilde rafine edildiği istihbarat süreçlerinin gerekliliği öne sürülmüştür. Anahtar Kelimeler: İstihbarat, Güvenlik, İstihbaratın Denetimi, Teknolojik İstihbarat, İnsan İstihbaratı iii ABSTRACT ORGANIZATION AND MANAGEMENT OF INTELLIGENCE: U.S.A AS AN EXAMPLE Fatih TÜRK Today, the development of technology and globalization has changed the world from end to end. As societies and countries interact with each other, sensitive areas for individual freedoms and democracy increase. This interaction affects countries' on security and individual freedom. Despite this rapid change, countries continue to carry the cold war understanding and security sensitivities of the past at the same time. In the United States (USA), one of the leading countries with advanced democracies, the current security and intelligence agreement, its activities and supervision is based on the long-term balance of this conflict. For the US, the intelligence organization process creates new problems, seeking rights, conflicts and solutions. In the light of all these, the main purpose of this thesis is to analyze the intelligence problems through the US intelligence organization process and to identify the problems encountered in the cause and effect relationship. In this study, the management model, organization and legal infrastructure of intelligence in the United States have been examined. In the first section, intelligence analysis can be seen as an important contribution to the literature. The second section sets out the relationship between the US intelligence organization and the development of the legal framework. In the third section, the main problems related to the administration, organization and supervision of the US intelligence are discussed. As a result, the biggest problem identified is the lack of coordination among the growing corporate structures. As the precursor of an effective intelligence organization, it has been suggested that intelligence processes, where human factor and correct information are refined for decision makers in a fast and efficient manner. Key words: Intelligence, Security, Intelligence Control, Technological Intelligence, Human Intelligence iv ÖNSÖZ Gelişmiş bir demokrasi olan ve bireysel özgürlüklerin hayatın ekseninde yer aldığı Birleşik Devletlerdeki güvenlik anlayışı, özgürlük ve dünyanın önde gelen aktör devletinin gücünün istihbarat öğelerinin şekillendirdiği bir yönetim anlayışı içerisinde istihbaratın yönetim modelini özellikle 11 Eylül saldırıları sonrası reorganizasyonu ve bunun sonuçları incelenerek ülkemizin ve ulusumuzun yarınları adına bir katkı sağlamayı amaçladık. Çalışma süresince değerli katkılarını esirgemeyen danışmanım Doç. Dr. Pelin Pınar Giritlioğlu’na sonsuz teşekkürlerimi sunarım. Ayrıca bu süreç boyunca yanımda olarak desteğini esirgemeyen arkadaşlarıma ve aileme teşekkürlerimi sunmayı bir borç bilirim. İSTANBUL-2019 Fatih TÜRK v İÇİNDEKİLER ÖZ ............................................................................................................................... iii ABSTRACT ............................................................................................................... iv İÇİNDEKİLER ......................................................................................................... vi TABLOLAR LİSTESİ ............................................................................................ viii ŞEKİLLER LİSTESİ ................................................................................................ ix KISALTMALAR LİSTESİ ....................................................................................... x GİRİŞ .......................................................................................................................... 2 BİRİNCİ BÖLÜM İSTİHBARAT 1.1. İstihbarat Nedir .............................................................................................. 7 1.2. İstihbarat Döngüsü ...................................................................................... 12 1.3. İstihbarat Ürünü ........................................................................................... 16 1.4. İstihbaratın Sınıflandırılması ....................................................................... 17 1.4.1. İşlevlerine Göre İstihbarat Türleri ........................................................ 18 1.4.2. ABD’de Organizasyonel Seviyelere Göre İstihbarat ........................... 19 1.4.3. ABD’de İstihbarat Grupları.................................................................. 20 1.4.4. İstihbarat Disiplinleri (INTs)................................................................ 23 1.4.5. İstihbarat Veri Entegresyonu................................................................ 27 İKİNCİ BÖLÜM ABD’DE İSTİHBARATI YETKİLENDİREN YASALAR ve GELİŞMELER 2.1. Tarihsel Arkaplan ............................................................................................ 31 2.1.1 Birinci Dünya Savaşı............................................................................ 32 2.1.2 İkinci Dünya Savaşı ................................................................................. 33 2.2. Yeni Yapılanma Çalışmaları ve Komisyonlar ............................................ 34 2.3 İstihbarat’a Yönelik Suistimaller-Skandallar ............................................... 37 2.4. SSCB Sonrası Dönem ..................................................................................... 41 vi 2.5. Yeni Sorunsal- Terör ve WMD (Kitle İmha Silahı)........................................ 42 2.6. 11 Eylül Saldırısı ve Reorganizasyon ............................................................. 44 ÜÇÜNCÜ BÖLÜM ABD’DE İSTİHBARATIN YÖNETİMİ, ORGANİZASYONU ve DENETİMİ 3.1. Birleşik Devletler İstihbarat Topluluğu (IC) ............................................... 53 3.1.1. İstihbarat Topluluğu Üyelerinin Görevleri........................................... 60 3.1.2. İstihbarat Topluluğu (IC) Programları ................................................. 67 3.1.3. ABD’de İstihbaratın Kurumlararası İşbirliği ....................................... 68 3.1.4. ABD İstihbarat Bütçesi ........................................................................ 68 3.1.5. ABD’de İstihbarat Teknolojileri ve Sistemleri .................................... 75 3.2. İstihbaratın Denetimi ................................................................................... 84 3.2.1. ABD’de İstihbaratın Denetimi ............................................................. 84 SONUÇ ...................................................................................................................... 91 KAYNAKÇA ............................................................................................................ 98 vii TABLOLAR LİSTESİ Tablo 1 . İşlevsel İstihbarat Türleri ............................................................................ 18 Tablo 2 . İstihbaratın Üç Seviyesi .............................................................................. 20 Tablo 3 . Ulusal Güvenlik İstihbaratı ve Alt Kategorileri .......................................... 21 Tablo 4 . Yerel Güvenlik İstihbaratı ve Alt Kategorileri ........................................... 21 Tablo 5 . Savunma istihbaratı ve Alt Kategorileri ..................................................... 22 Tablo 6 . Yabancı İstihbarat ve Alt Kategorileri ........................................................ 22 Tablo 7 . İstihbarat Disiplinleri .................................................................................
Recommended publications
  • Listener Feedback #171
    Security Now! Transcript of Episode #411 Page 1 of 40 Transcript of Episode #411 Listener Feedback #171 Description: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-411.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-411-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. We've got questions from our audience. We're going to answer those, talk a little bit about the math around NSA's 5ZB, also some more revelations on SSL security. It's all coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 411, recorded July 3rd, 2013: Your questions, Steve's answers, #171. It's time for Security Now!, the show that protects you and your loved ones online, your privacy, and also gives you deep insight into how computers work, how technology works, how the Internet works, with this guy here. Yeah, he's the Explainer in Chief, Mr. Steve Gibson. Hello, Steven. Steve Gibson: You know, Leo, I wondered whether maybe we'd gone a little, you know, there's the expression "jump the shark," or off, over the top or something last week.
    [Show full text]
  • Exhibit a Case 3:16-Cr-00051-BR Document 545-2 Filed 05/11/16 Page 2 of 86
    Case 3:16-cr-00051-BR Document 545-2 Filed 05/11/16 Page 1 of 86 Exhibit A Case 3:16-cr-00051-BR Document 545-2 Filed 05/11/16 Page 2 of 86 Executive Order 12333 United States Intelligence Activities (As amended by Executive Orders 13284 (2003), 13355 (2004) and 134 70 (2008)) PREAMBLE Timely, accurate, and insightful information about the activities, capabilities, plans, and intentions of foreign powers , organizations, and persons, and their agents, is essential to the national security of the United States. All reasonable and lawful means must be used to ensure that the United States will receive the best intelligence possible. For that purpose, by virtue of the authority vested in me by the Constitution and the laws of the United States of America, including the National Security Act of 1947, as amended, (Act) and as President of the United States of America, in order to provide for the effective conduct of United States intelligence activities and the protection of constitutional rights, it is hereby ordered as follows: PART 1 Goals, Directions, Duties, and Responsibilities with Respect to United States Intelligence Efforts 1.1 Goals. The United States intelligence effort shall provide the President, the National Security Council, and the Homeland Security Council with the necessary information on which to base decisions concerning the development and conduct of foreign, defense, and economic policies, and the protection of United States national interests from foreign security threats. All departments and agencies shall cooperate fully to fulfill this goal. (a} All means, consistent with applicable Federal law and this order, and with full consideration of the rights of United States persons, shall be used to obtain reliable intelligence information to protect the United States and its interests.
    [Show full text]
  • What Is Xkeyscore, and Can It 'Eavesdrop on Everyone, Everywhere'? (+Video) - Csmonitor.Com
    8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com The Christian Science Monitor ­ CSMonitor.com What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) XKeyscore is apparently a tool the NSA uses to sift through massive amounts of data. Critics say it allows the NSA to dip into people's 'most private thoughts' – a claim key lawmakers reject. This photo shows an aerial view of the NSA's Utah Data Center in Bluffdale, Utah. The long, squat buildings span 1.5 million square feet, and are filled with super­ powered computers designed to store massive amounts of information gathered secretly from phone calls and e­mails. (Rick Bowmer/AP/File) By Mark Clayton, Staff writer / August 1, 2013 at 9:38 pm EDT Top­secret documents leaked to The Guardian newspaper have set off a new round of debate over National Security Agency surveillance of electronic communications, with some cyber experts saying the trove reveals new and more dangerous means of digital snooping, while some members of Congress suggested that interpretation was incorrect. The NSA's collection of "metadata" – basic call logs of phone numbers, time of the call, and duration of calls – is now well­known, with the Senate holding a hearing on the subject this week. But the tools discussed in the new Guardian documents apparently go beyond mere collection, allowing the agency to sift through the www.csmonitor.com/layout/set/print/USA/2013/0801/What-is-XKeyscore-and-can-it-eavesdrop-on-everyone-everywhere-video 1/4 8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com haystack of digital global communications to find the needle of terrorist activity.
    [Show full text]
  • Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities
    University of Central Florida STARS HIM 1990-2015 2013 Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities Mark Berrios-Ayala University of Central Florida Part of the Legal Studies Commons Find similar works at: https://stars.library.ucf.edu/honorstheses1990-2015 University of Central Florida Libraries http://library.ucf.edu This Open Access is brought to you for free and open access by STARS. It has been accepted for inclusion in HIM 1990-2015 by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Berrios-Ayala, Mark, "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities" (2013). HIM 1990-2015. 1519. https://stars.library.ucf.edu/honorstheses1990-2015/1519 BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES by MARK KENNETH BERRIOS-AYALA A thesis submitted in partial fulfillment of the requirements for the Honors in the Major Program in Legal Studies in the College of Health and Public Affairs and in The Burnett Honors College at the University of Central Florida Orlando, Florida Fall Term 2013 Thesis Chair: Dr. Abby Milon ABSTRACT Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter.
    [Show full text]
  • Drowning in Data 15 3
    BRENNAN CENTER FOR JUSTICE WHAT THE GOVERNMENT DOES WITH AMERICANS’ DATA Rachel Levinson-Waldman Brennan Center for Justice at New York University School of Law about the brennan center for justice The Brennan Center for Justice at NYU School of Law is a nonpartisan law and policy institute that seeks to improve our systems of democracy and justice. We work to hold our political institutions and laws accountable to the twin American ideals of democracy and equal justice for all. The Center’s work ranges from voting rights to campaign finance reform, from racial justice in criminal law to Constitutional protection in the fight against terrorism. A singular institution — part think tank, part public interest law firm, part advocacy group, part communications hub — the Brennan Center seeks meaningful, measurable change in the systems by which our nation is governed. about the brennan center’s liberty and national security program The Brennan Center’s Liberty and National Security Program works to advance effective national security policies that respect Constitutional values and the rule of law, using innovative policy recommendations, litigation, and public advocacy. The program focuses on government transparency and accountability; domestic counterterrorism policies and their effects on privacy and First Amendment freedoms; detainee policy, including the detention, interrogation, and trial of terrorist suspects; and the need to safeguard our system of checks and balances. about the author Rachel Levinson-Waldman serves as Counsel to the Brennan Center’s Liberty and National Security Program, which seeks to advance effective national security policies that respect constitutional values and the rule of law.
    [Show full text]
  • Defeating Invisible Enemies:Firmware Based
    Defeating Invisible Enemies: Firmware Based Security in OpenPOWER Systems — Linux Security Summit 2017 — George Wilson IBM Linux Technology Center Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation Agenda Introduction The Case for Firmware Security What OpenPOWER Is Trusted Computing in OpenPOWER Secure Boot in OpenPOWER Current Status of Work Benefits of Open Source Software Conclusion Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 2 Introduction Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 3 Disclaimer These slides represent my views, not necessarily IBM’s All design points disclosed herein are subject to finalization and upstream acceptance The features described may not ultimately exist or take the described form in a product Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 4 Background The PowerPC CPU has been around since 1990 Introduced in the RS/6000 line Usage presently spans embedded to server IBM PowerPC servers traditionally shipped with the PowerVM hypervisor and ran AIX and, later, Linux in LPARs In 2013, IBM decided to open up the server architecture: OpenPOWER OpenPOWER runs open source firmware and the KVM hypervisor with Linux guests Firmware and software designed and developed by the IBM Linux Technology Center “OpenPOWER needs secure and trusted boot!” Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 5 The Case for Firmware Security Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 6 Leaks Wikileaks Vault 7 Year 0 Dump NSA ANT Catalog Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 7 Industry Surveys UEFI Firmware Rootkits: Myths and Reality – Matrosov Firmware Is the New Black – Analyzing Past Three Years of BIOS/UEFI Security Vulnerabilities – Branco et al.
    [Show full text]
  • Suspect Until Proven Guilty, a Problematization of State Dossier Systems Via Two Case Studies: the United States and China
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations Fall 2009 Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Kenneth N. Farrall University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian Studies Commons, Communication Technology and New Media Commons, International and Intercultural Communication Commons, and the Social Influence and oliticalP Communication Commons Recommended Citation Farrall, Kenneth N., "Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China" (2009). Publicly Accessible Penn Dissertations. 51. https://repository.upenn.edu/edissertations/51 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/51 For more information, please contact [email protected]. Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Abstract This dissertation problematizes the "state dossier system" (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS - comprising interconnecting subsystems of records and identification - damage individual autonomy and self-determination, impacting not only human rights, but also the viability of the social system. The research, a hybrid of case-study and cross-national comparison, was guided in part by a theoretical model of four primary SDS driving forces: technology, political economy, law and public sentiment. Data sources included government documents, academic texts, investigative journalism, NGO reports and industry white papers. The primary analytical instrument was the juxtaposition of two individual cases: the U.S.
    [Show full text]
  • Utah Data Center, As Well As Any Search Results Pages
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 84688A 2 May 2017 JOHN GREENEWALD Dear Mr. Greenewald : This responds to your Freedom of Information Act (FOIA) request of 14 June 2016 for Intellipedia pages on Boundless Information and/or BOUNDLESS INFORMANT and/or Bull Run and/or BULLRUN and/or Room 641A and/ or Stellar Wind and/ or Tailored Access Operations and/ or Utah Data Center, as well as any search results pages. A copy of your request is enclosed. As stated in our previous response, dated 15 June 2016, your request was assigned Case Number 84688. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. There are no assessable fees for this request. Your request has been processed under the FOIA. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD.
    [Show full text]
  • National Programmes for Mass Surveillance of Personal Data in Eu Member States and Their Compatibility with Eu Law
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS NATIONAL PROGRAMMES FOR MASS SURVEILLANCE OF PERSONAL DATA IN EU MEMBER STATES AND THEIR COMPATIBILITY WITH EU LAW STUDY Abstract In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this study makes an assessment of the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of surveillance practices at stake, which represent a reconfiguration of traditional intelligence gathering, the study contends that an analysis of European surveillance programmes cannot be reduced to a question of balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The study argues that these surveillance programmes do not stand outside the realm of EU intervention but can be engaged from an EU law perspective via (i) an understanding of national security in a democratic rule of law framework where fundamental human rights standards and judicial oversight constitute key standards; (ii) the risks presented to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners, and (iii) the potential spillover into the activities and responsibilities of EU agencies.
    [Show full text]
  • COMITÉ DE TRANSPARENCIA ACTA DE LA SESIÓN ORDINARIA 17/2020 DEL 28 DE MAYO DE 2020 a Las Trece Horas Del Veintiocho De Mayo De
    COMITÉ DE TRANSPARENCIA ACTA DE LA SESIÓN ORDINARIA 17/2020 DEL 28 DE MAYO DE 2020 A las trece horas del veintiocho de mayo de dos mil veinte, participan en la presente sesión a través de medios electrónicos de comunicación, Erik Mauricio Sánchez Medina, Director Jurídico; Víctor Manuel De La Luz Puebla, Director de Seguridad y Organización de la Información; y Rodrigo Villa Collins, Gerente de Análisis y Promoción de Transparencia, en su carácter de integrante suplente del Titular de la Unidad de Transparencia; todos ellos integrantes del Comité de Transparencia de este Instituto Central, así como Sergio Zambrano Herrera, Gerente de Gestión de Transparencia, en su carácter de Secretario de este órgano colegiado, de conformidad con los párrafos segundo, tercero, cuarto y quinto de la Quinta de las Reglas de Operación del Comité de Transparencia del Banco de México, publicadas en el Diario Oficial de la Federación el siete de mayo de dos mil veinte (Reglas). Acto seguido, quien ejerce en este acto las funciones de Secretariado del Comité de Transparencia manifestó que existe quórum para la celebración de la presente sesión, de conformidad con lo previsto en los artículos 43 de la Ley General de Transparencia y Acceso a la Información Pública (LGTAIP); 64, párrafos segundo y tercero, de la Ley Federal de Transparencia y Acceso a la Información Pública (LFTAIP); 83 de la Ley General de Protección de Datos Personales en Posesión de Sujetos Obligados (LGPDPPSO); 4o. del Reglamento Interior del Banco de México (RIBM); así como Quinta y Sexta de las Reglas. Por lo anterior, se procedió en los términos siguientes: ---------------------------------------------------------------------------------------------------------------------------- APROBACIÓN DEL ORDEN DEL DÍA.
    [Show full text]
  • Annual Review 2013
    Cert-IST annual review for 2013 regarding flaws and attacks 1) Introduction ...................................................................................................................................... 1 2) The most significant events for 2013 ............................................................................................... 2 2.1 The Snowden Affair changes the perception for « cyber-espionage » risk ............................. 2 2.2 Hardware attacks are becoming a real threat ......................................................................... 3 2.3 Offensive security is increasingly present ............................................................................... 3 3) Vulnerabilities and attacks seen in 2013 ......................................................................................... 5 3.1 Figures about Cert-IST 2013 production ................................................................................. 5 3.2 Alerts and Potential Dangers released by Cert-IST ................................................................ 6 3.3 Zoom on a few flaws and attacks ............................................................................................ 7 4) How to protect companies ............................................................................................................... 9 4.1 Advanced Persistent Threats (APT) ........................................................................................ 9 4.2 Opportunistic attacks ............................................................................................................
    [Show full text]
  • Sok: “Plug & Pray” Today – Understanding USB Insecurity In
    SoK: “Plug & Pray” Today – Understanding USB Insecurity in Versions 1 through C Dave (Jing) Tian∗, Nolen Scaife∗, Deepak Kumary, Michael Baileyy, Adam Batesy, Kevin R. B. Butler∗ ∗University of Florida fdaveti, scaife, butlerg@ufl.edu yUniversity of Illinois at Urbana-Champaign fdkumar11, mdbailey, [email protected] Abstract—USB-based attacks have increased in complexity in systematizing the defenses present in the USB ecosystem, we recent years. Modern attacks now incorporate a wide range of find that most defenses often focus on protecting a single layer, attack vectors, from social engineering to signal injection. To which proves ineffective against a suite of attacks that appear address these challenges, the security community has responded with a growing set of fragmented defenses. In this work, at many communication layers. In addition, misaligned goals we survey and categorize USB attacks and defenses, unifying between industry and academia further fragment the defense observations from both peer-reviewed research and industry. space. Commercial solutions focus on the prevention of data Our systematization extracts offensive and defensive primitives loss and anti-malware without regard for emerging attack that operate across layers of communication within the USB vectors, while research prototypes vary and are hamstrung by ecosystem. Based on our taxonomy, we discover that USB attacks often abuse the trust-by-default nature of the ecosystem, and the lack of built-in security building blocks in the existing transcend different layers within a software stack; none of USB specifications. As a result, research solutions often rely the existing defenses provide a complete solution, and solutions on new host and peripheral architectures that are unlikely to expanding multiple layers are most effective.
    [Show full text]