Espionage Vestigations
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Building a Secure Workforce
Federal Government Services Building a Secure Workforce Guard against insider threat Michael G. Gelles David L. Brant Brian Geffert Building a Secure Workforce Guard Against Insider Threat Table of Contents Introduction 1 Asset Loss and Insider Threat Defined 2 Other Potential Results of Asset Loss Caused by Insider Threats 3 Understanding the Insider Threat 4 Summary of Findings: Insider Threat 4 Risk Indicators and Characteristics 5 Competing Loyalties 5 Risk of Increased Computing and Networking 6 Risk of Public Information in Private Hands 6 Mitigating Asset Loss: A Series of Interventions and Action Plans 7 Establishing a Workforce Culture to Mitigate Risk 7 The Employee Assistance Program (EAP) a Tactical Mitigation Strategy 8 The Workforce as a Monitor: “Operationalizing” Security Awareness Training 8 Leveraging Human Resources as a Risk Mitigator 9 Risk Management Through Information Access Management 9 Case Reviews 10 Project Initiation 10 Establish a Baseline: The “As-Is State” 10 Case Sampling and Methodology for Review 10 Conduct a Gap Analysis and Profile the “To-Be State” 10 Recommendations for Future Study and Change 11 Appendix A 12 Enterprise Risk Framework and the Insider Threat 12 Risk Equation 13 Appendix B 14 Information Management Framework and the Insider Threat 14 References 16 Contacts 17 i Building a Secure Workforce Guard Against Insider Threat Introduction In today’s evolving and changing global environment, business in the public sector is increasingly more challenging. There is an ongoing need to adapt a more balanced and integrated approach to protecting information and other assets. As the world becomes a virtual community of competitors and predators, an organization’s assets are at greater risk than in the past, when the world was more localized, compartmentalized, and siloed. -
US Counterintelligence and Security Concerns Feb 1987.P65
Union Calendar No. 3 100TH CONGRESS HOUSE OF REPRESENTATIVES REPORT 1st Session 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS1986 REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE HOUSE OF REPRESENTATIVES FEBRUARY 4, 1987.Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 68-440 WASHINGTON : 1987 Union Calendar No. 3 100TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS-1986 FEBRUARY 4, 1987-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. STOKES, from the Permanent Select Committee on Intelligence, submitted the following REPORT EXECUTIVE SUMMARY Over the past several years, a dangerous upward trend in successful espionage operations against the United States has occurred. Present and former U.S. Gov- ernment employees with access to sensitive classified information have played the key roles in each operation. Damage to U.S. national security has been signifi- cant and is still being estimated. Deeply concerned over these developments, the House Permanent Select Com- mittee on Intelligence has spent a great deal of time investigating this alarming situation. This report represents one outcome of the investigation. From its early days, the Administration has focused considerable attention and effort on improving the effectiveness of U.S. counterintelligence. Concomitantly, the House and Senate Intelligence Committees have authorized significantly in- creased funding for counterintelligence and urged that counterintelligence con- cerns assume a higher priority within the Intelligence Community. These efforts have elevated the morale, status and numbers of counterintelligence personnel, helped cope with security investigation backlogs and encouraged new initiatives in some operational and policy areas. -
Espionage Against the United States by American Citizens 1947-2001
Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. -
National Reconnaissance Office (NRO) Office of Inspector General (OIG) Work Plan for Fiscal Years 2007-2012
Description of document: National Reconnaissance Office (NRO) Office of Inspector General (OIG) Work Plan for Fiscal Years 2007-2012 Requested date: 25-May-2012 Released date: 29-September-2017 Posted date: 16-October-2017 Source of document: FOIA Request National Reconnaissance Office OCIO/Information Review and Release Group 14675 Lee Road Chantilly, VA 20151-1715 Fax: 703-227-9198 Online FOIA Request Form Email: [email protected] The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. NATIONAL RECONNAISSANCE OFFICE 14675 Lee Road Chantilly, VA 20151-1715 29 September 2017 REF: FOIA Case F12-0103 This is in response to your request dated 25 May 2012 and received in the National Reconnaissance Office (NRO) on 5 June 2012. -
CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2
COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS Corporate Headquarters 222 North Sepulveda Boulevard, Suite 1780 El Segundo, California 90245 (310) 536-9876 www.advantagesci.com COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS MARCH 2012 VOLUME 1 ISSUE 3 Inside this Issue CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2 Suspect Counterfeit Electronic 2 In last month’s newsletter, we had only illustrative of one of the oldest techniques Parts Can Be Found on scraped the surface of espionage and used in espionage. The fine art of Front Companies: Who Is the 7 End User? national security related crimes occurring seduction has been used throughout DARPA’s Shredder Challenge 9 within the Los Angeles area. As one of the history to obtain classified information purposes of this newsletter includes serving from males and females. In the cases of Threats To Nanotechnology 10 as an educational tool, the use of actual Data Exfiltration and Output 11 Richard Miller and J.J. Smith, both were Devices - An Overlooked cases to illustrate how espionage has seduced, and then they betrayed the How spies used Facebook to 14 occurred in the past serves to meet this confidences placed in them by the U.S. steal Nato chiefs’ details purpose. Government. Extracts from Wikipedia pertaining to Miller and Smith (not a Retired agent suspected of 16 Everyone likes to hear “spy stories”, except Espionage spying for China: definitive source, but very illustrative for when they hit closest to home. Then the these two cases) follow: ARRESTS, TRIALS, 17 stories are not so fun to hear. -
American Intelligence Journal Vol 34
AMERICAN INTELLIGENCE JOURNAL THE MAGAZINE FOR INTELLIGENCE PROFESSIONALS The Cyber Threat: The Future of Intelligence in a Wired World __NMIF__________________________ Vol. 34, No. 1, 2017 American THE MAGAZINE FOR INTELLIGENCE PROFESSIONALS Intelligence Journal Vol. 34, No. 1 2017 ISSN 0883-072X NMIF Board of Directors LTG (USA, Ret) Mary A. Legere, Chair Col (USAF, Ret) John Clark, President Col (USAF, Ret) William Arnold, Vice President Col (USAF, Ret) Michael Grebb, Treasurer Col (USAF, Ret) Carla Bass, Director LTC (USA, Ret) Steve Iwicki, Director Mr. Don Bolser, Director Dr. (Col, USAF, Ret) Eva S. Jenkins CDR (USNR, Ret) Calland Carnes, Director Capt (USNR, Ret) Stephanie Leung, Director Mr. Dennis DeMolet, Director Kel McClanahan, Esq., Director Lt Col (USAF, Ret) James Eden, Director Brad Moss, Esq., Director COL (USA, Ret) Michael Ferguson, Director Capt (USNR) Rick Myllenbeck, Director Col (USAF, Ret) Owen Greenblatt CDR (USNR) Louis Tucker, Director COL (USA, Ret) David Hale, Director COL (USA, Ret) Gerald York, Director Editor - COL (USA, Ret) William C. Spracher, Ed.D. Production Manager - Ms. Debra Hamby-Davis Brig Gen (USAF, Ret) Scott Bethel, Director Emeritus Dr. Forrest R. Frank, Director Emeritus MajGen (USMC, Ret) Michael Ennis, Director Emeritus LTG (USA, Ret) Patrick M. Hughes, Director Emeritus Col (USAF, Ret) William Huntington, Director Emeritus The American Intelligence Journal (AIJ) is published by the National Military Intelligence Foundation (NMIF), a non-profit, non-political foundation supporting American intelligence professionals and the U.S. Intelligence Community, primarily through educational means. NMIF believes in the power of the intelligence mission to inspire young people to join the intelligence profession as a career of service to the nation. -
Spy-Traitors
INSTITUTE FOR THE STUDY OF WESTERN CIVILIZATION SUMMER SERIES OF THE HISTORY OF ESPIONAGE LECTURE 9: SPY-TRAITORS TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Richard Sorge 1895-1944 TuesdayAugust 27, 2019 The Cambridge Five: Cairncross, Blunt, Burgess, Philby, Maclean TuesdayAugust 27, 2019 Alger Hiss 1904-1996 TuesdayAugust 27, 2019 Julius Rosenberg 1918-1953 TuesdayAugust 27, 2019 Klaus Fuchs 1911-1988 TuesdayAugust 27, 2019 Theodore Hall 1925-1999 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John le Carre TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Richard Miller, FBI TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Surveillance photo: Richard Miller and Svetlana Ogorodnikova TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Betty Pack “Cynthia” TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John Profumo and Christine Keeler TuesdayAugust 27, 2019 “Hi brucet, the hottest man in the world! My name is Nastya and I’m from Russia, but currently I live in the USA. I just wanted you to know that I liked you from your photos and would like to know more about you. Let me know if you would like to get in touch, here is my email [email protected]. Cheers, Nastya.” —Suspicious invitation from a suspected Russian agent, recently received by Bruce Thompson TuesdayAugust 27, 2019 Bruce T. Paul N. TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 “The hottest man in the world,” or the target of a Russian “honey trap”? TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Ronald Pelton, NSA b. -
Australian Law Reform Commission
Keeping Secrets REPORT The Protection of Classified and Security Sensitive Information REPORT 98 May 2004 © Commonwealth of Australia 2004 This work is copyright. You may download, display, print and reproduce this material in whole or part, subject to acknowledgement of the source, for your personal, non- commercial use or use within your organisation. Apart from any use as permitted under the Copyright Act 1968, all other rights are reserved. Requests for further authorisation should be directed to the Commonwealth Copyright Administration, Intellectual Property Branch, Department of Communications, Information Technology and the Arts, GPO Box 2154, Canberra ACT 2601 or by email to [email protected]. ISBN 0-9750600-5-8 Commission Reference: ALRC 98 The Australian Law Reform Commission was established on 1 January 1975 by the Law Reform Commission Act 1973 and reconstituted by the Australian Law Reform Commission Act 1996. The office of the ALRC is at Level 25, 135 King Street, Sydney NSW 2000, Australia. Telephone: within Australia (02) 8238 6333 International +61 2 8238 6333 TTY: (02) 8238 6379 Facsimile: within Australia (02) 8238 6363 International +61 2 8238 6363 E-mail: [email protected] ALRC homepage: www.alrc.gov.au Printed by The SOS Printing Group (Australia) Pty Ltd The Hon Philip Ruddock MP Attorney-General of Australia Suite MF 21 Parliament House Canberra ACT 2600 31 May 2004 Dear Attorney-General, The Protection of Classified and Security Sensitive Information On 2 April 2003, the Commission received a reference from the then Attorney- General, the Hon Daryl Williams AM QC MP, pursuant to the Australian Law Reform Commission Act 1996, to undertake a review of the handling and protection of classified and security sensitive information in legal proceedings. -
A Look at Insider Threats: Tradecraft, Motivations and Personalities of Some of the Most Notorious Traitors in History
A Look at Insider Threats: Tradecraft, Motivations and Personalities of Some of the Most Notorious Traitors in History Subtitle: Moles I Have Known Outline • Insider Definitions. • Other Insiders. • Career Experience. • Soviet Tradecraft. • Insider Motivations. • Insiders –John A. Walker, Jr., Aldrich H. Ames, Robert Hanssen, Jonathon Jay Pollard. • Traitors Among Us. • Insider Threat Detection Programs. Insider Definitions • An entity with authorized access that has the potential to harm an information system or enterprise through destruction, disclosure, modification of data, and/or denial of service. • Trusted insiders with the intent to do harm can exploit their access to compromise vast amounts of sensitive and classified information as part of a personal ideology or at the direction of a foreign government. • An employee of an IC organization with access and clearances who volunteers to give national defense information to a hostile or foreign intelligence service. (The “CI Insider” –Traitor.) Other Insiders • CIA: Philip Agee, David Barnett, Virginia Baynes, Wu‐Tai Chin, Douglas Groat, Edward Lee Howard, William Kampiles, Kara & Hana Koecher, Edwin Moore, Harold Nicholson, Susan Scranage, Glen Shriver • FBI: Katrina Leung, Richard Miller, Nada Prouty, Earl Pitts, James Smith, Douglas Tsou, u/i KGB source. • NSA: David Boone, Jack Dunlap, Kenneth Ford, Victor Hamilton, Robert Lipka, William Martin, Bernon Mitchell, Ronald Pelton, Joseph Petersen, William Weisband. • DIA: Waldo Dubberstein, Frederick Hamilton, Ronald Montaperto, -
Sex, Love and Espionage: the Honeypot Phenomenon
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/257265947 Behind Closed Doors: Sex, Love and Espionage: The Honeypot Phenomenon Article · February 2012 CITATIONS READS 0 200 1 author: James Welch Walden University 17 PUBLICATIONS 2 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, Available from: James Welch letting you access and read them immediately. Retrieved on: 27 October 2016 American Military University Behind Closed Doors: Sex, Love and Espionage: The Honeypot Phenomenon James P. Welch – Graduate Program Intelligence 507: Intelligence Operations. Professor: Dr. Jose Mora. 2012 American Military University “Behind Closed Doors” “As long as there is espionage, there will be Romeos seducing unsuspecting [targets] with access to secrets.” Markus Wolf. Prostitution and espionage are often referred to as the world’s oldest two professions. While this might seem simplistic, there is much based on truth. Historically, both women and men have used charm and charisma as tools for enticing and entrapping their vulnerable counterparts. In no other domain has this been more so, than that of espionage and intelligence. It would be excusable to imagine that in today’s highly evolved and developed society that these last vestiges of the Cold War have disappeared. Nothing could actually be further from the truth. It appears that the older forms of espionage, particularly that of human intelligence (HUMINT) are enjoying a return. Part of this resurgence is due to the ironic fact that increased and enhanced technology while having created protection for western states, has forced its enemies to return to older less subtle, and more vulnerable methods of penetration. -
Evaluating Due Process Challenges to the Federal Death Penalty Act
DePaul Law Review Volume 53 Issue 4 Summer 2004: Symposium - Race to Article 16 Execution Death Denies Due Process: Evaluating Due Process Challenges to the Federal Death Penalty Act Joshua Herman Follow this and additional works at: https://via.library.depaul.edu/law-review Recommended Citation Joshua Herman, Death Denies Due Process: Evaluating Due Process Challenges to the Federal Death Penalty Act, 53 DePaul L. Rev. 1777 (2004) Available at: https://via.library.depaul.edu/law-review/vol53/iss4/16 This Comments is brought to you for free and open access by the College of Law at Via Sapientiae. It has been accepted for inclusion in DePaul Law Review by an authorized editor of Via Sapientiae. For more information, please contact [email protected]. DEATH DENIES DUE PROCESS: EVALUATING DUE PROCESS CHALLENGES TO THE FEDERAL DEATH PENALTY ACT Who was it? A friend? A good man? Someone who sympathized? Someone who wanted to help? Was it one person only? Or was it mankind? Was help at hand? Were there arguments in his favor that had been overlooked? Of course there must be. Logic is doubtless unshakable, but it cannot withstand a man who wants to go on liv- ing. Where was the Judge whom he had never seen? Where was the high Court, to which he had never penetrated? He raised his hands and spread out all his fingers. 1 -Franz Kafka, The Trial INTRODUCTION In a three-month span in 2002, two district courts declared the Fed- eral Death Penalty Act (FDPA) unconstitutional. 2 United States v. Quinones3 and United States v. -
Security Along the Border: the Insider Threat Building a Secure Workforce 2 Table of Contents
Security along the Border: The Insider Threat Building a secure workforce 2 Table of contents 5 Introduction 6 Attempting to understand the insider threat 6 Summary findings: Insider threat 8 Asset loss and insider threat defined 10 Risk indicators and characteristics 10 Risk of increased computing and networking 10 Risk from changing workforce demographics 11 Risk of competing loyalties 12 Mitigating asset loss: a series of interventions and action plans 12 Develop an integrated approach to a secure workforce to mitigate assets loss 12 Develop the workforce as a security sensor and collector 13 Leverage human resources as a risk mitigaor 13 Use predictive analytics to assess workforce 15 Manage risk through cyber security and information access management 17 Why now? Building a secure workforce Guarding against insider threat on the border 3 Introduction People are an organization’s greatest resource, yet, at necessary equation for protecting against asset loss. The times, they pose a significant threat to its mission and third part of the equation, managing a secure workforce operations. For an organization executing a complex and and mitigating the threat posed by the vetted employee or politically visible mission, the potential loss of confidence the ‘insider’ is often the most critical variable. in public support at the hands of an employee undermines the agency’s ability to execute the mission, recruit staff, The ‘insider threat’ for border security is real and well and develop sustainable partnerships with other U.S. and documented. In a March 2010 Senate briefing, officials international agencies. The 58,000 employees of the from the U.S.