Hack Moscow Secret Code Russian Spies Used Kaspersky AV to Hack NSA Staffer, Swipe Exploit Code – New Claim

Total Page:16

File Type:pdf, Size:1020Kb

Hack Moscow Secret Code Russian Spies Used Kaspersky AV to Hack NSA Staffer, Swipe Exploit Code – New Claim hack moscow secret code Russian spies used Kaspersky AV to hack NSA staffer, swipe exploit code – new claim. Russian government spies used Kaspersky Lab software to extract top-secret software exploits from an NSA staffer's home PC, anonymous sources have claimed. The clumsy snoop broke regulations by taking the classified code, documentation, and other materials home to work on using his personal computer, which was running Kaspersky's antivirus, sources told the Wall Street Journal. It is alleged Kremlin hackers exploited the security package in one way or another to identify those sensitive files and exfiltrate them. In effect, it means the Russian government has copies of the NSA's tools used to exploit vulnerabilities in computer systems and equipment to spy on other nations and targets. It also means Russia can turn the cyber-weapons on American corporations, government agencies and other networks, and steal secrets, cause merry havoc, and so on. The theft, reported today, is said to have occurred in 2015, but apparently wasn't discovered until earlier this year. The allegedly stolen NSA code and dossiers sound an awful lot like the Shadow Brokers archive of stolen agency spyware. The brokers' pilfered exploits dates back to 2013, though. And this case is not thought to be related to the former Booz Allen Hamilton contractor Harold Thomas Martin III who stashed classified NSA materials at his home to study. Martin was indicted in February and faces prison time for removing top-secret files from his employer's workplace, if convicted. He denies any wrongdoing. "Whether the information is credible or not, NSA's policy is never to comment on affiliate or personnel matters," an NSA spokesperson said. Like almost all security software, Kaspersky's software scans files on computers to look for anything matching known malware, or programs that behave in a way that looks like malicious code. It may be that the antivirus package sent the employee's NSA code back to a cloud service to inspect, which set off internal alarms and attracted the attention of Russian spies, or the product was tampered with to open a backdoor to the PC, or the software was remotely exploited to gain access. Homeland Security drops the hammer on Kaspersky Lab with preemptive ban. The WSJ's sources didn't say if Kaspersky was actively involved in helping hack the staffer's computer, nor whether President Putin's spies exploited vulnerabilities in the security software to silently swipe the exposed documents. Don't forget, there are a lot of exploitable holes in antivirus packages for hackers to abuse. It is also possible, under Russian law, the Kremlin instructed staff within Kaspersky to hijack the mark's computer and extract its contents. The software maker is denying any wrongdoing or direct involvement in the exploit theft. “Kaspersky Lab has not been provided any evidence substantiating the company’s involvement in the alleged incident reported by the Wall Street Journal on October 5, 2017, and it is unfortunate that news coverage of unproven claims continue to perpetuate accusations about the company," the Moscow-based biz told The Register in a statement. “As a private company, Kaspersky Lab does not have inappropriate ties to any government, including Russia, and the only conclusion seems to be that Kaspersky Lab is caught in the middle of a geopolitical fight. “Kaspersky Lab products adhere to the cybersecurity industry’s strict standards and have similar levels of access and privileges to the systems they protect as any other popular security vendor in the US and around the world.” The organization's founder Eugene Kaspersky was more blunt, tweeting the following before today's revelations hit the 'net: New conspiracy theory, anon sources media story coming. Note we make no apologies for being aggressive in the battle against cyberthreats — Eugene Kaspersky (@e_kaspersky) October 5, 2017. Kaspersky has repeatedly offered its source code to government officials to review for backdoors after allegations that it was working with Russian intelligence surfaced a year or so ago. No evidence has ever been made public about such claims of compromised code. That didn’t stop the US government banning Kaspersky code from federal computers last month. American box-shifter Best Buy followed suit. However the exploits leaked, let's not forget it was sparked by another NSA worker taking classified materials home. "It's a lot harder to beat your opponent when they're reading your playbook, and it's even worse when someone on your team gives it to them. If these reports are true, Russia has pulled that off," said US Senator Ben Sasse (R-NE), who is on the Senate Armed Services committee. "The men and women of the US Intelligence Community are patriots; but, the NSA needs to get its head out of the sand and solve its contractor problem. Russia is a clear adversary in cyberspace and we can't afford these self-inflicted injuries." Matthew Hickey, cofounder of British security shop Hacker House, told The Register Kaspersky could well be blameless and that the security software was simply doing its job. The Russian software maker has been detecting NSA malware in the wild since 2014, and this could be where the connection lies. The antivirus may have identified Uncle Sam's powerful exploit code samples on the home PC, and flagged them up to Kaspersky's customers, possibly all the way to the FSB, Russia's security services. Following this alert, Russians agents could have tracked down the NSA employee's machine and remotely commandeered it. In a blog post today, Eugene said all his customers are warned when new software nasties are discovered by his antivirus tools: Re: Kaspersky and NSA exploit leak story. @e_kaspersky says detected malware is flagged up to *all* clients. All. https://t.co/bt0h7hvmVE pic.twitter.com/5CImW1t6PF — The Register (@TheRegister) October 6, 2017. Kaspersky also provides real-time analysis to the FSB, meaning the software may have automatically tipped off the Kremlin to the presence of the highly guarded Western attack code on the NSA worker's home PC. "It's likely that the Kaspersky detection of NSA tools was somehow responsible for FSB targeting the contractor's home computer, but it doesn't mean the company was complicit," Hickey told us. "Kaspersky have detected many of the NSA tools being used in the wild, the FSB would surely know that, and target the company for that reason alone. The Kaspersky statement holds no punches and makes it clear they don't cooperate with governments. I'm inclined to believe them, their software is top grade at detection of new threats, and is notoriously difficult to bypass." Hickey said the alternative is that Kaspersky deliberately backdoored its own software, and handed over the keys to Putin"s snoops, putting billions of dollars of business at risk to do a favor for Russian intelligence. Occam's razor would suggest this is unlikely. Meanwhile, cybersecurity expert Matt "Pwn all the Things" Tait said the focus should be on the embarrassing claims that yet more dangerous NSA tools have escaped Uncle Sam's highly secretive surveillance agency: Tbh, this sounds less like Kaspersky doing surveillance for the Russian government, and more like them doing basic tracking of APTs. — Pwn ██ ██ ███ (b)(5) (@pwnallthethings) October 5, 2017. But if it's just signatures on NSA implants and NSA exploits, then this is Kaspersky just doing its job, and not at all a Kaspersky-Russia thing. — Pwn ██ ██ ███ (b)(5) (@pwnallthethings) October 5, 2017. In either case, how dumb must you be to A) remove NSA tools and take em home B) to your internet connected computer C) Running cloud-AV D) Which is Kaspersky — Pwn ██ ██ ███ (b)(5) (@pwnallthethings) October 5, 2017. A bit confused that this story is running more as a "Kaspersky Russia something something" story and not a "YET ANOTHER contractor theft from NSA" story — Pwn ██ ██ ███ (b)(5) (@pwnallthethings) October 5, 2017. Senator Jeanne Shaheen (D-NH), one of Kaspersky's most vocal critics in Congress, has few doubts on the matter, though. In a strongly worded statement, she condemned the company and called for the Trump administration to declassify and release the evidence it has in this case. "The strong ties between Kaspersky and the Kremlin are extremely alarming and have been well documented for some time," she said today. "It's astounding and deeply concerning that the Russian government continues to have this tool at their disposal to harm the United States." ® PS: The Washington Post says the NSA bod was an employee – and not a contractor as first thought – and was a US citizen born in Vietnam. He was on the NSA's ace hacking team, Tailored Access Operations, and was working to replace the exploits compromised by the Snowden leaks. He was fired in 2015, and is now under a federal investigation. The Real Russian Mole Inside NSA. The media has finally noticed that the National Security Agency has a problem with Kremlin penetration. A helicopter view of the National Security Agency January 28, 2016 in Fort Meade, Maryland. (Photo: BRENDAN SMIALOWSKI/AFP/Getty Images) Moles—that is, long-term penetration agents—are every intelligence service’s worst nightmare. Though rarer in reality than in spy movies and novels, moles exist and can do enormous damage to a country’s secrets and espionage capabilities. They’re what keep counterintelligence experts awake at night. The recent appearance on the Internet of top secret hacking tools from the National Security Agency has shined yet another unwanted spotlight on that hard-luck agency, which has been reeling for three years from Edward Snowden’s defection to Moscow after stealing more than a million classified documents from NSA.
Recommended publications
  • ENGINEERING HISTORY PAPER #92 “150 Years of Canadian Engineering: Timelines for Events and Achievements”
    THE ENGINEERING INSTITUTE OF CANADA and its member societies L'Institut canadien des ingénieurs et ses sociétés membres EIC’s Historical Notes and Papers Collection (Compilation of historical articles, notes and papers previously published as Articles, Cedargrove Series, Working Papers or Journals) ENGINEERING HISTORY PAPER #92 “150 Years of Canadian Engineering: Timelines for Events and Achievements” by Andrew H. Wilson (previously produced as Cedargrove Series #52/2019 – May 2019) *********************** EIC HISTORY AND ARCHIVES *********************** © EIC 2019 PO Box 40140, Ottawa ON K1V 0W8 +1 (613) 400-1786 / [email protected] / http://www.eic-ici.ca THE CEDARGROVE SERIES OF DISCOURSES, MEMOIRS AND ESSAYS #52/2019 150 YEARS OF CANADIAN ENGINEERING: TIMELINES FOR EVENTS AND ACHIEVEMENTS by Andrew H. Wilson May 2019 Abstract The research for this paper was done as part of a sesquicentennial project on 150 Years of Canadian Engineering. Some of its material has also been presented orally. This paper covers briefly and selectively Canadian engineering events and achievements in four time periods: one up to the time of Confederation in 1867, and three others between then and 2017. Associated with the three later periods are corresponding economic/political/social timelines to help put the engineering in context. There are no comments in it on the quality of the design, construction/manufacture, origins and uses of the items listed. This paper took a whole lot longer than expected to research and write, so that it carries a date in 2019 rather than late in 2017, when the chronological material in it ends. There are no maps or photographs.
    [Show full text]
  • Jim Flaherty Fast Rob Fonberg
    THE HILL TIMES • 2013 • $8.95 STEPHEN HARPER Christian Paradis BEVERLEY MCLACHLIN JJimOHN Flaherty BAIRD Jason Kenney Rob ALLISOFonberNg JAMES MOORE REDFORD WJenniayne WoutersByrne MICHAEL HORGAN PETER Andrew MACKAY MacDougall 101 LEONA Tony AGLUKKAQ Clement JUSTIN MOST Morris TRUDEAU INFLUENTIAL Rosenberg CHRIS STEPHEN WOODCOCK PEOPLE IN CARTER MICHAEL FERGUSON GOVERNMENT RAY Rona & POLITICS NOVASergeK Amb Dupont rose John TOM Knubley MULCAIR Raoul BRAD Gébert WALL TOM LAW SON Ted MICHELLEArthur Hamilton D’AURAY Men Nathaziesn Ed ISSN 1929-2473 Simon Kennedy Fast Yaprak Baltacioglu Cullen 12 Top 100 list 8 The Top 25 30 The politicians 46 The political staffers Contents 49 The public servants 56 The lobbyists & consultants 59 The media 62 Other public fi gures 63 Energy & environment 66 MPs and art 70 Château Laurier Hotel 73 MPs’ tattoos 76 Best parties 79 Best watering holes 8 Stephen Harper He’s the central fi gure of the most centralized federal government in the country’s history. 10 Jim Flaherty So far, he’s Canada’s untouchable Finance minister. 10 Jason Kenney He’s the Prime Minister Stephen Harper and Immigration and Citizenship Laureen Harper, pictured on June 7, 2012, minister with the killer in Paris after a bilateral meeting with political instincts. 8 French President François Hollande. 11 John Baird He’s Prime Minister Stephen Harper’s Photograph courtesy of the PMO go-to guy on just about everything. 11 Tony Clement This Treasury Board president is 74 one fi erce partisan player. 13 Ed Fast International Trade minister has a big job, but stays below the radar.
    [Show full text]
  • Law, Privacy and Surveillance in Canada in the Post-Snowden Era
    Law, Privacy and Surveillance in Canada in the Post-Snowden Era Edited by Michael Geist University of Ottawa Press LAW, PRIVACY AND SURVEILLANCE IN CANADA IN THE POST-SNOWDEN ERA Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 1 15-05-19 14:18 Page left blank intentionally 15-05-19 14:18 Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 2 LAW, PRIVACY AND SURVEILLANCE IN CANADA IN THE POST-SNOWDEN ERA EDITED BY Michael Geist University of Ottawa Press 2015 Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 3 15-05-19 14:18 The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program and by the University of Ottawa. Copy editing: Joanne Muzak Proofreading: Susan James Typesetting: Édiscript enr. Cover design: Llama Communications and Édiscript enr. Library and Archives Canada Cataloguing in Publication Law, privacy, and surveillance in Canada in the post-Snowden era / edited by Michael Geist. (Law, technology and media) Includes bibliographical references. Issued in print and electronic formats. ISBN 978-0-7766-2207-1 (paperback). ISBN 978-0-7766-2183-8 (pdf). ISBN 978-0-7766-2182-1 (epub) 1. Electronic surveillance — Law and legislation — Canada. 2. Privacy, Right of — Canada. 3. Technology and law — Canada. I. Geist, Michael, 1968-, author, editor II. Series: Law, technology and media KE9328.L34 2015 345.71’052 C2015-903727-1 KF9670.L34 2015 C2015-903728-X © Michael Geist, 2015 under Creative Commons License Attribution — Non Commercial Share Alike 3.0 (CC BY-NC-SA 3.0) Printed in Canada Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 4 15-05-19 14:18 T able of Contents Acknowledgements ..........................................................................
    [Show full text]
  • Favoritedfavorite ʇuıɐs ʞɔopuooq™ @Th3j35t3r '
    ʇuıɐs ʞɔopuooq™ (th3j35t3r) on Twitter https://twitter.com/th3j35t3r FavoritedFavorite 3h ʇuıɐs ʞɔopuooq™ @th3j35t3r 'http://cryptocomb.org ' sitting on a shared server, with 463 other domains. Pressure on hosting provider to boot them? #dontdropSEALinfoes from New York, NY from New York, NY Reply RetweetedRetweet Delete FavoritedFavorite 3h ʇuıɐs ʞɔopuooq™ @th3j35t3r 'http://cryptocomb.org ' - TANGO DOWN - for ORIGINALLY leaking retired SEAL ID for Fox to pick up on, allowing Al-Qaeda to call for his death. from New York, NY from New York, NY Reply RetweetedRetweet Delete FavoritedFavorite 4h ʇuıɐs ʞɔopuooq™ @th3j35t3r @fixedgear808 I have much disappoint w/ Fox. But wasn't them originally leaked it. Was 'http://cryptocomb.org ' & they're on the list. #tick View conversation Hide conversation Reply RetweetedRetweet Delete FavoritedFavorite 4h ʇuıɐs ʞɔopuooq™ @th3j35t3r 5 of 13 8/26/2012 8:16 PM CRYPTOCOMB http://webcache.googleusercontent.com/search?q=cache:wTfQw... This is Google's cache of http://cryptocomb.org/. It is a snapshot of the page as it appeared on Aug 26, 2012 05:02:15 GMT. The current page could have changed in the meantime. Learn more Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar. Text-only version Support Cryptocomb Cryptocomb Articles/Blog Updated August 25, 2012 Truthout publishes U.S Army "Inside the Wire Threats - Afghanistan Green on Blue" NARA sends email correspondence between NARA and USPS, RE: Document/Records Scheduling - January 2011 to July 2012 Crocked Crocker Fox News outs Navy Seal who penned "No Easy Day" Matthew S.
    [Show full text]
  • Dancing with the Dragon As China Surges to New Heights, Can Canada Keep Step?
    Juggling with genes PAGE 6 $6.50 Vol. 21, No. 3 April 2013 Paul Evans Dancing with the Dragon As China surges to new heights, can Canada keep step? ALSO IN THIS ISSUE Kate Taylor Identity crisis at the museum Wesley Wark Treason for cheap John Burns, Ikechi Mgbeoji and more Writing aboriginal peoples back into Canada PLUS: non-fiction Michael Valpy on the spectre of grassroots racism + Ramsay Cook on Maclean’s and the imperial dream + Terry Fenge on Arctic sovereignty and the Nunavut agreement + Robin Fisher on Canadian anthropology’s New Zealand godfather + Douglas Wright on a post- WWI mathematical peacemaker + Florin Diacu on measuring the heavens fiction Merilyn Simonds reviews Blood Secrets by Nadine McInnis + David Penhale reviews Publications Mail Agreement #40032362 Husk by Corey Redekop Return undeliverable Canadian addresses to LRC, Circulation Dept. poetry Caitlin Elizabeth Thomson + Robin Richardson + Alice Major + Denise Desautels + PO Box 8, Station K Toronto, ON M4P 2G1 Leslie Timmins + Anne Swannell + Seymour Mayne + Dave Margoshes + Allan Peterkin NEW FROM UNIVERSITY OF TORONTO PRESS Autonomous stAte tHe greAt reVersAl InHerItIng A CAnoe PADDle the epic struggle for a Canadian Car Industry How We let technology take Control of the the Canoe in Discourses of english-Canadian from oPeC to Free trade Planet nationalism by Dimitry Anastakis by David Edward Tabachnick by Misao Dean In this engrossing book, Dimitry Anastakis The Great Reversal takes the reader back to misao Dean explores the canoe paddle as a chronicles Canadian auto industry’s evolution Aristotle’s warning that humanity should never national symbol – integral to historical tales from the 1973 oPeC embargo to the 1989 allow technical thinking to cloud our judgment of exploration and trade, central to Pierre Canada–us Free trade Agreement and its about what makes for a good life.
    [Show full text]
  • Key Events on September 20, 2018 the Canadian Association for Security and Intelligence Studies (CASIS) Vancouver Hosted Its
    Lessons Learned in Intelligence Analysis Date: September 20th, 2018 Disclaimer: This briefing note contains the encapsulation of views presented throughout the evening and does not exclusively represent the views of the speaker or the Canadian Association for Security and Intelligence Studies. Key Events On September 20, 2018 the Canadian Association for Security and Intelligence Studies (CASIS) Vancouver hosted its eighth roundtable meeting which covered “Lesson Learned in Intelligence Analysis.” The following presentation was hosted by John Pyrik, a former intelligence officer, and the first analytical methodologist for the Canadian Security Intelligence Service (CSIS). The subsequent roundtable discussion focused on examining the notion of whether Canada has been excessively lenient towards individuals who have been convicted of espionage, with particular regards to the selling of classified information. Nature of Discussion The presentation focused on first defining intelligence and what are the basic requirements of obtaining intelligence. Which continued to an examination of intelligence failures, such as the Cuban missile crisis, the Iranian revolution, and the 9/11 attacks. Moreover, the importance of analysists using structured analytical techniques when producing intelligence products was also discussed. With a particular focus on how these techniques can potentially improve the quality of intelligence analysis. Furthermore, the potentially increased role of AI in intelligence collection and analysis, and the fundamental importance of the human analyst was also covered in the presentation. CASIS-Vancouver Page 2 Background The presentation began with a general introduction asking, what is intelligence? Despite the term intelligence being widely used, it was explained the police, military and national intelligence services will have difference uses for intelligence, and thus will define intelligence differently.
    [Show full text]
  • INTELLIGENCE and CORRUPTION Andrew Dalip, Jr. LL.B
    INTELLIGENCE AND CORRUPTION Andrew Dalip, Jr. LL.B (Hons.), L.E.C., M.Sc. (Dist.), C.A.M.S., C.G.S.S. The Journal of Intelligence, Conflict, and Warfare is pleased to publish the following thought piece from one of our esteemed Speakers from the 2020 West Coast Security Conference. The author, Mr. Dalip, is a lawyer working in the financial crime and corruption sphere. From 2015 to 2018, Mr. Dalip was a chairman at the Steering Group Planning Committee for the Caribbean Financial Action Task Force (CFATF); and from 2014 to 2018, he was a special legal advisor to the Ministry of Attorney General Trinidad and Tobago. Keywords: corruption, intelligence, financial intelligence, FATF, money laundering, sanctions. Abstract The intersection between corruption and intelligence is gaining increased focus. Foreign intelligence services have an anti-corruption role at the strategic level through Intelligence Risk Assessments and at the operational level during post- conflict operations. Intelligence assessments of the effectiveness of non-kinetic tools on target countries also guide implementation and policy changes. The roles of security intelligence and foreign intelligence services are, however, no longer always discrete, particularly in the context of non-state actors. Foreign intelligence services would benefit from the skill sets of security intelligence agencies in detecting corruption related predicate offences, both in performing their core roles and supporting law enforcement operations. This includes the use of financial intelligence as well as other key open source intelligence resulting from anti-money laundering frameworks, the development of which has been driven globally by the Financial Action Task Force.
    [Show full text]
  • Counterintelligence and Cyber News and Views
    Counterintelligence and Cyber News and Views Counterintelligence and Cyber News and Views April 2013 Volume 2 Issue 2 INSIDE THIS ISSUE: PG. 1 CURRENT TREND ANALYSIS PG. 2 REVIEW OF COUNTERINTELLIGENCE/CYBER SECURITY SEMINAR PG. 7 ARRESTS, TRIALS, CONVICTIONS PG. 7 NAVY SPY DELISLE SENTENCED TO 20 YEARS IN PRISON PG. 7 FOREIGN ECONOMIC ESPIONAGE INVESTIGATION LEADS TO ARREST PG. 8 IRANIAN CITIZEN SENTENCED IN PLOT TO EXPORT AIRCRAFT PARTS TO IRAN Corporate Headquarters PG. 9 US DEFENCE CONTRACTOR, 59, 222 North Sepulveda Boulevard, Suite 1780 'GAVE CLASSIFIED INFORMATION TO 27 -YEAR-OLD CHINESE LOVER IN El Segundo, California 90245 (310) 536-9876 HONEYTRAP' www.advantagesci.com PG. 12 FORMER U.S. CONSULATE GUARD SENTENCED TO NINE YEARS IN PRISON FOR ATTEMPTING TO COMMUNICATE NATIONAL DEFENSE CI TRENDS INFORMATION TO CHINA In this issue of Counterintelligence and Cyber News and Views we would like to focus on recent arrests and PG. 13 ALASKA-BASED SOLDIER GETS convictions related to counterintelligence (CI). Most of the stories that follow occurred between January and 16 YEARS IN SPY CASE April 2013. Most of the persons discussed within this article represent the type of targets Hostile Intelligence PG. 14 METHODS AND TECHNIQUES Services (HOIS) will attempt to recruit or compromise. You will see, from within these stories, a pattern of methodology used by our foes to compromise individuals, gain access to our technology and use it to our PG. 14 5 LESSONS FROM THE FBI INSIDER THREAT PROGRAM disadvantage. Additionally, stories of greed, revenge and fraud round out some of the methods CI professionals find daily in their struggles to protect classified, sensitive, and export controlled information.
    [Show full text]
  • Annual Report 2018
    National Security and Intelligence Committee of Parliamentarians Annual Report 2018 (Revised version pursuant to subsection 21(5) of the NSICOP Act ) Submitted to the Prime Minister on December 21, 2018 pursuant to subsection 21(2) of the National Security and Intelligence Committee of Parliamentarians Act © Her Majesty the Queen in Right of Canada (2019) All rights reserved. Ottawa, ON National Security and Intelligence Committee of Parliamentarians Annual Report 2018 (Revised version pursuant to subsection 21(5) of the NSICOP Act) CP100 (Print) CP100E-PDF (Online) ISSN 2562-5101 (Print) ISSN 2562-511X (Online) ANNUAL REPORT 2018 The National Security and Intelligence Committee of Parliamentarians The Honourable David McGuinty, P.C., M.P. Chair April 2019 Revis ions Consistent with sub-section 21(1) of the National Security and Intelligence Committee of Parliamentarians Act (NSICOP Act), the Committee must submit an annual report to the Prime Minister. Consistent with subsection 21(5) of the Act, the Prime Minister may, after consulting the Chair of the Committee, direct the Committee to submit to him or her a revised version of the annual report that does not conta in information the Prime Minister believes the disclosure of which would be injurious to national security, national defence or international relations or is information that is protected by solicitor-client privilege. This document is a revised version of the report provided to the Prime Minister on 21 December 2018. Revisions were made to remove information the disclosure of which the Prime Minister believes would be injurious to national defence, national security or international relations , or which constitutes solicitor-client privilege.
    [Show full text]
  • Counterintelligence and Cyber News and Views
    Counterintelligence and Cyber News and Views Counterintelligence and Cyber News and Views October-November 2012 Volume 1 Issue 7 Inside this issue: Pg. 1 THE SPIES AMONG US: THE NEVERENDING CYCLE AND THE PLAYERS NEVER SEEM TO CHANGE Pg. 2 FOREIGN TRAVEL BRIEFING SOURCE Pg. 4 CHI MAK CONVICTION UPHELD Pg. 4 FORMER CIA OFFICER JOHN KIRAKOU PLEADS GUILTY TO DISCLOSING CLASSIFIED INFORMATION Pg. 5 TWO CHINESE NATIONALS CHARGED WITH STEALING TRADE SECRETS Pg. 6 U.S. CONSULATE GUARD PLEADS GUILTY TO ATTEMPTING TO COMMUNICATE NATIONAL DEFENSE INFORMATION TO CHINA Corporate Headquarters Pg. 7 RUSSIAN AGENT AND 10 OTHER MEMBERS OF 222 North Sepulveda Boulevard, Suite 1780 PROCUREMENT NETWORK FOR RUSSIAN MILITARY AND INTELLIGENCE OPERATING IN THE U.S. AND El Segundo, California 90245 (310) 536-9876 RUSSIA INDICTED www.advantagesci.com Pg. 9 DEFENSE CONTRACTOR ALLEGED TO HAVE TAKEN COMPETITOR‟S BID INFORMATION PAYS $1.15 MILLION Pg. 10 TAIWANESE NATIONAL SENTENCED TO PRISON FOR ILLEGALLY EXPORTING MILITARY SENSITIVE ITEMS FROM THE UNITED STATES CI TRENDS Pg. 11 CHINESE NATIONAL ARRESTED AFTER ATTEMPTING TO ILLEGALLY EXPORT AEROSPACE- THE SPIES AMONG US: A NEVERENDING CYCLE AND THE PLAYERS NEVER SEEM GRADE CARBON FIBER TO CHINA TO CHANGE Pg. 12 FORMER EMPLOYEE OF NEW JERSEY In this months newsletter the reader will see at least nine news releases detailing arrests, trials, convictions or DEFENSE CONTRACTOR CONVICTED OF EXPORTING SENSITIVE MILITARY TECHNOLOGY TO CHINA appellate rulings pertaining to individuals charged with violations of the espionage statutes, economic espio- nage, theft of trade secrets, export violations, and related criminal violations. Pg. 13 FORMER CME GROUP SOFTWARE ENGINEER PLEADS GUILTY TO STEALING GLOBEX COMPUTER Perhaps of interest to the reader is the list of countries for which these alleged or convicted individuals were TRADE SECRETS working, or on behalf of, or to which they were seeking to sell secrets .
    [Show full text]
  • Youth Dialogue on Emerging International Security Challenges
    CANADA IN THE WORLD: YOUTH DIALOGUE ON EMERGING INTERNATIONAL SECURITY CHALLENGES The NATO Association of Canada L’Association Canadienne Pour L’OTAN ©2015 The NATO Association of Canada Canada in the World: Youth Dialogue on Emerging International Security Challenges ©2015 Editor: Corinne Stancescu Contributing Authors: Kelsey Berg Vanessa Hayford Victoria Heath Kevin Hempstead Usman Javed Stefan Konrad Colin McEwen Paul Pryce Trevor Schenk Sandra Song Jeff Tian Series Editor: Julie Lindhout The views and opinions expressed in this publication are those of the contributing authors and do not necessarily represent those of the NATO Association of Canada. The NATO Association of Canada Chairman of the Board: Hon. Hugh Segal, CM. President: Julie Lindhout The NATO Association of Canada is an independent, non-profit, non-governmental organization dedicated to the idea that the transatlantic relationship between Canada and the United States, and the nations of Europe, is of criti- cal importance to Canadians in cultural, economic, and security terms. The NAOC's mandate is to promote a broader and deeper understanding of international peace and security issues relating to NATO. The NATO Association of Canada 60 Harbour Street. 4th Floor, Toronto, ON, Canada, M5J 1B7 Phone: (416) 979-1875 Email: [email protected] TABLE OF CONTENTS Introduction 4 What Happens When We Keep Our Eyes Shut?: Climate Change and the Coming Human Security Crisis 5 A Defining Threat: Water Security 7 How Europe Can Get Off Russian Energy 8 By Land, Sea, Air,
    [Show full text]
  • Romanian Intelligence Studies Review
    RRSI, no. 14/2015 1 ROMANIAN INTELLIGENCE STUDIES REVIEW No. 14 December 2015 Journal with scientific prestige acknowledged by the National Council for the Validation of University Titles, Diplomas and Certificates (CNADTCU), indexed in the international databases CEEOL and EBSCO Bucharest - 2015 - RRSI, no. 14/2015 2 Senior Editors Eduard HELLVIG – director of the Romanian Intelligence Service George Cristian MAIOR – professor, PhD, “Mihai Viteazul” National Intelligence Academy and The National School of Political and Administrative Studies Christopher DONNELLY – senior fellow Defence Academy United Kingdom, director of the Institute for Statecraft and Governance, Oxford, Great Britain Mark PHYTHIAN - professor, University of Leicester, Great Britain Ioan Mirce – professor, PhD, The National School of Political and Administrative Studies Vasile DÂNCU – $#11-0Q&Q,'4#01'27-$3!&0#12Q #-Bolyai University Michael ANDREGG – professor, PhD, St. Thomas University, USA Elaine PRESSMAN – senior fellow, Paterson School of International Affairs, Carleton University, Canada Jan GOLDMAN – professor, Tiffin University, USA Gheorghe TOMA – professor, PhD, “Mihai Viteazul” National Intelligence Academy Sergiu MEDAR – professor, PhD, “Lucian Blaga” University, Sibiu Niculae IANCU – senior lecturer, PhD, “Mihai Viteazul” National Intelligence Academy Cristiana MATEI – Lecturer, Center for Civil-Military Relations din Monterey, SUA Iulian CHIFU – senior lecturer, PhD, National University of Political Studies and Public Administration Iulian FOTA – senior lecturer, PhD, “Mihai Viteazul” National Intelligence Academy Marian SEBE – professor, PhD, “Mihai Viteazul” National Intelligence Academy Irena CHIRU – professor, PhD, “Mihai Viteazul” National Intelligence Academy Valentin FILIP – PhD, „Mihai Viteazul” National Intelligence Academy Board of Editors Editor in Chief: PhD Valentin NICULA Editors: PhD Mihaela TEODOR PhD Irena CHIRU PhD 0', PhD Cristina IVAN PhD Aitana BOGDAN PhD 0'12', PhD Codru LUCINESCU PhD Valentin STOIAN Teodora DOBRE Cover: *#,2',-,3 RRSI, no.
    [Show full text]