The Australian Intelligence Community in 2020
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
National Insider Threat Task Force Mission Fact Sheet
NATIONAL INSIDER THREAT TASK FORCE MISSION FACT SHEET _________________________________ Why was the NITTF established? The National Insider Threat Task Force (NITTF) was established after the WikiLeaks release of thousands of classified documents through the global media and internet. Its mission is to deter, detect, and mitigate actions by employees who may represent a threat to national security by developing a national insider threat program with supporting policy, standards, guidance, and training. Who runs the task force, and which agencies are involved? Under Executive Order (E.O.) 13587, the NITTF is co-chaired by the U.S. Attorney General and the Director of National Intelligence. They, in turn, designated the Federal Bureau of Investigation (FBI) and the National Counterintelligence Executive to co-direct the daily activities of the NITTF. The NITTF comprises employees and contractors from a variety of federal departments and agencies (D/A), and its work impacts more than 99 federal D/As that handle classified material. Currently, the following D/As have representatives on the NITTF: FBI, National Counterintelligence and Security Center (NCSC), Defense Intelligence Agency (DIA), Central Intelligence Agency (CIA), and Transportation Security Administration. The NITTF responds directly to the Senior Information Sharing and Safeguarding Steering Committee, which was also established under E.O. 13587. The steering committee comprises representatives from largely Intelligence Community agencies with extensive access to classified networks and materials, including the Departments of State, Energy, Justice, Defense, and Homeland Security, CIA, FBI, Office of the Director of National Intelligence, NCSC, National Security Agency, DIA, the Program Manager—Information Sharing Environment, Office of Management and Budget, the National Security Council Staff, and the Information Security Oversight Office. -
Inside Russia's Intelligence Agencies
EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat. -
Swire. “The Declining Half-Life of Secrets”
CYBERSECURITY INITIATIVE New America Cybersecurity Fellows Paper Series - Number 1 THE DECLINING HALF -LIFE OF SECRETS And the Future of Signals Intelligence By Peter Swire July 2015 © 2015 NEW AMERICA This report carries a Creative Commons license, which permits non-commercial re-use of New America content when proper attribution is provided. This means you are free to copy, display and distribute New America’s work, or in- clude our content in derivative works, under the following conditions: ATTRIBUTION. NONCOMMERCIAL. SHARE ALIKE. You must clearly attribute the work You may not use this work for If you alter, transform, or build to New America, and provide a link commercial purposes without upon this work, you may distribute back to www.newamerica.org. explicit prior permission from the resulting work only under a New America. license identical to this one. For the full legal code of this Creative Commons license, please visit creativecommons.org. If you have any questions about citing or reusing New America content, please contact us. ABOUT THE AUTHOR Peter Swire, Nancy J. and Lawrence P. Huang Professor of Law and Ethics, Scheller College of Business, Georgia Institute of Technology; Senior Counsel, Alston & Bird LLP; and New America Cybersecurity Fellow ABOUT THE CYBERSECURITY INITIATIVE ACKNOWLEDGEMENTS The Internet has connected us. Yet the policies and debates that sur- Many thanks to Ross Anderson, Ashkan round the security of our networks are too often disconnected, disjoint- Soltani and Lee Tien for assistance with ed, and stuck in an unsuccessful status quo. This is what New Ameri- this draft, and to the fellow members ca’s Cybersecurity Initiative is designed to address. -
Council Decision (Cfsp)
L 246/12 EN Offi cial Jour nal of the European Union 30.7.2020 COUNCIL DECISION (CFSP) 2020/1127 of 30 July 2020 amending Decision (CFSP) 2019/797 concerning restrictive measures against cyber-attacks threatening the Union or its Member States THE COUNCIL OF THE EUROPEAN UNION, Having regard to the Treaty on European Union, and in particular Article 29 thereof, Having regard to the proposal from the High Representative of the Union for Foreign Affairs and Security Policy, Whereas: (1) On 17 May 2019 the Council adopted Decision (CFSP) 2019/797 (1). (2) Targeted restrictive measures against cyber-attacks with a significant effect which constitute an external threat to the Union or its Member States are among the measures included in the Union’s framework for a joint diplomatic response to malicious cyber-activities (the cyber diplomacy toolbox) and are a vital instrument to deter and respond to such activities. Restrictive measures can also be applied in response to cyber-attacks with a significant effect against third States or international organisations, where deemed necessary to achieve common foreign and security policy objectives set out in the relevant provisions of Article 21 of the Treaty on European Union. (3) On 16 April 2018 the Council adopted conclusions in which it firmly condemned the malicious use of information and communications technologies, including in the cyber-attacks publicly known as ‘WannaCry’ and ‘NotPetya’, which caused significant damage and economic loss in the Union and beyond. On 4 October 2018 the Presidents of the European Council and of the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy (the ‘High Representative’) expressed serious concerns in a joint statement about an attempted cyber-attack to undermine the integrity of the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands, an aggressive act which demonstrated contempt for the solemn purpose of the OPCW. -
Offensive Capabilities
GCHQ and UK Mass Surveillance Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and its allies, including the UK’s GCHQ.i The global surveillance infrastructure and hacking tools described in the previous chapters are not only used for obtaining information to be fed into intelligence reports and tracking terrorists. The agencies are also developing cyber-warfare capabilities, with the NSA taking the lead within the US armed forces. This militarisation of the internet saw U.S. intelligence services carried out 231 offensive cyber-operations in 2011ii. The UK's National Strategic Defence and Security Review from 2010 made hostile attacks upon UK cyberspace a major priorityiii. It is fair to assume that many countries are following suit and building cyber-warfare capabilities. Der Spiegel terms the development of these aggressive hacking tools as Digital Weapons. In their view D weapons which should join the ABC (Atomic, Biological and Chemical) weapons of the 20th century because of their indiscriminate nature. Here lies a fundamental problem. The modern world with connected global communications networks means that non-state actors such as civilians and businesses are now affected by the agencies’ activities much more frequently than before. The internet is used by everyone – cyberspace is mainly a civilian space – and the opportunity for collateral damage is huge. The papers leaked to Der Spiegel appear to show that signal agencies have little regard for the security and wellbeing of anyone who gets caught in the path of their operations. -
Unclassified Summary Special Study of NSA Controls to Comply With
NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE INSPECTOR GENERAL REPORT Unclassified Summary Special Study of NSA Controls to Comply with Signals Intelligence Retention Requirements 12 December 2019 OFFICE OF THE INSPECTOR GENERAL Pursuant to the Inspector General Act of 1978, as amended, and in accordance with NSA/CSS Policy 1-60, the NSA/CSS Office of the Inspector General (OIG) conducts independent oversight that promotes Agency respect for Constitutional rights, adherence to laws, rules, and regulations, and the wise use of public resources. Through investigations and reviews, we detect and deter waste, fraud, abuse, and misconduct and promote the economy, the efficiency, and the effectiveness of Agency operations. AUDIT The Audit Division comprises three sections: Cybersecurity and Technology, Financial Audits, and Mission and Mission Support. The Division’s audits and evaluations examine the economy, efficiency, and effectiveness of NSA programs and operations; assess Agency compliance with laws, policies, and regulations; review the operation of internal information technology and controls; and determine whether the Agency’s financial statements and other fiscal reporting are fairly and accurately presented. Audits are conducted in accordance with auditing standards established by the Comptroller General of the United States. INSPECTIONS The Inspections Division performs organizational inspections and functional evaluations to assess adherence to regulations and policies and to promote the effective, efficient, and economical management of an organization, site, or function. OIG inspection reports recommend improvements and identify best practices across a broad range of topics, to include mission operations, security, facilities, and information technology systems. The Inspections Division also partners with Inspectors General of the Service Cryptologic Elements and other Intelligence Community (IC) entities to jointly inspect consolidated cryptologic facilities. -
Policy Directive 28: Signals Intelligence Activities
PRIVACY & CIVIL LIBERTIES OVERSIGHT BOARD (U) Report to the President on the Implementation of Presidential Policy Directive 28: Signals Intelligence Activities TABLE OF CONTENTS (U) Part I Introduction .............................................................. .............................................. 1 (U) Part II Significant Changes in Practice due to the Issuance of PPD-28 .......................... 5 (U) Part III Analysis and Recommendations ........................................................................... 12 (U) Part IV Conclusion .. ... ... ............. ......................................................................................... 18 (U) Annexes: (U) A. Separate Statement by Board Members Rachel Brand and Elise beth Collins ............ 20 (U) B. Separate Statement by Board Members James Dempsey and Patricia Wald .. ........... 23 I. (U) Introduction (U) On January 17, 2014, President Obama signed Presidential Policy Directive- 28, Signals Intelligence Activities ("PPD-28"), which provides principles to guide "why, whether, when, and how the United States conducts signals intelligence activities[.]"l The directive recognizes both that "[t]he collection of signals intelligence is necessary for the United States to advance its national security and foreign policy interests and to protect its citizens (U) See Presidential Policy Directive - 28, Signals Intelligence Activities (January 17, 2014) (h ereinafter "PPD-28"), available at https:/ j www.whitehouse.gov / the-press- office / 2014/ 01/ 17j presidential-policy-directive-signals-intelligence-activities. -
Mass Surveillance
Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof. -
CBEST Threat Intelligence-Led Assessments
Implementation guide CBEST Threat Intelligence-Led Assessments January 2021 CBEST Threat Intelligence-Led Assessments 1 Forward Operational disruption can impact financial stability, threaten the viability of individual firms and financial market infrastructures (FMIs), or cause harm to consumers and other market participants in the financial system. Firms and FMIs need to consider all of these risks when assessing the appropriate levels of resilience within their respective businesses. Dealing with cyber risk is an important element of operational resilience and the CBEST framework is intelligence-led penetration testing which aims to address this risk. CBEST is part of the Bank of England and Prudential Regulation Authority’s (PRA’s) supervisory toolkit to assess the cyber resilience of firms’ important business services. This prioritised and focused assessment allows us and firms to better understand weaknesses and vulnerabilities and take remedial actions, thereby improving the resilience of systemically important firms and by extension, the wider financial system. Continued use of CBEST has confirmed its use as a highly effective regulatory assessment tool, which can now also be conducted on a cross-jurisdictional basis, in collaboration with other international regulators and frameworks. This latest version of the CBEST Implementation Guide builds upon the previous framework and contains improvements learned from the extensive testing which has taken place. In particular, we have analysed and implemented changes with the aim of clarifying CBEST roles and responsibilities as well as regulatory expectations for different CBEST activities. While the underlying intelligence-led penetration testing approach remains the same, we have reviewed and updated the technical guidance for most activities, prepared new templates (eg Penetration Testing Report) and incorporated important references to cross-jurisdictional assessments. -
Wikileaks.Org
U.S. Intelligence planned to destroy WikiLeaks WikiLeaks release: March 15, 2010 keywords: WikiLeaks, U.S. intelligence, U.S. Army, National Ground Intelligence Center, NGIC, classified, SE- CRET, NOFORN restraint: Classified SECRET/NOFORN (US) title: Wikileaks.org - An Online Reference to Foreign Intelligence Services, Insurgents, Or Terrorist Groups? date: March 18, 2008 group: United States Army Counterintelligence Center, Cyber Counterintelligence Assessments Branch; De- partment of Defence Intelligence Analysis Program author: Michael D. Horvath link: http://wikileaks.org/file/us-intel-wikileaks.pdf pages: 32 Description By Julian Assange ([email protected]) This document is a classifed (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks. “The possibility that current employees or moles within DoD or elsewhere in the U.S. government are providing sensitive or classified information to Wikileaks.org cannot be ruled out”. It concocts a plan to fatally marginalize the organization. Since WikiLeaks uses “trust as a center of gravity by protecting the anonymity and identity of the insiders, leakers or whisteblowers”, the report recommends “The identification, exposure, termination of employment, criminal prosecution, legal action against current or former insiders, leakers, or whistlblowers could potentially damage or destroy this center of gravity and deter others considering similar actions from using the Wikileaks.org Web site”. [As two years have passed since the date of the report, with no WikiLeaks’ source exposed, it appears that this plan was ineffective]. As an odd justificaton for the plan, the report claims that “Several foreign countries including China, Israel, North Kora, Russia, Vietnam, and Zimbabwe have denounced or blocked access to the Wikileaks.org website”. -
Defense Primer: National and Defense Intelligence
Updated December 30, 2020 Defense Primer: National and Defense Intelligence The Intelligence Community (IC) is charged with providing Intelligence Program (NIP) budget appropriations, which insight into actual or potential threats to the U.S. homeland, are a consolidation of appropriations for the ODNI; CIA; the American people, and national interests at home and general defense; and national cryptologic, reconnaissance, abroad. It does so through the production of timely and geospatial, and other specialized intelligence programs. The apolitical products and services. Intelligence products and NIP, therefore, provides funding for not only the ODNI, services result from the collection, processing, analysis, and CIA and IC elements of the Departments of Homeland evaluation of information for its significance to national Security, Energy, the Treasury, Justice and State, but also, security at the strategic, operational, and tactical levels. substantially, for the programs and activities of the Consumers of intelligence include the President, National intelligence agencies within the DOD, to include the NSA, Security Council (NSC), designated personnel in executive NGA, DIA, and NRO. branch departments and agencies, the military, Congress, and the law enforcement community. Defense intelligence comprises the intelligence organizations and capabilities of the Joint Staff, the DIA, The IC comprises 17 elements, two of which are combatant command joint intelligence centers, and the independent, and 15 of which are component organizations military services that address strategic, operational or of six separate departments of the federal government. tactical requirements supporting military strategy, planning, Many IC elements and most intelligence funding reside and operations. Defense intelligence provides products and within the Department of Defense (DOD). -
MISSILE DEFENSE Further Collaboration with the Intelligence Community Would Help MDA Keep Pace With
United States Government Accountability Office Report to Congressional Committees December 2019 MISSILE DEFENSE Further Collaboration with the Intelligence Community Would Help MDA Keep Pace with Emerging Threats GAO-20-177 December 2019 MISSILE DEFENSE Further Collaboration with the Intelligence Community Would Help MDA Keep Pace with Highlights of GAO-20-177, a report to Emerging Threats congressional committees Why GAO Did This Study What GAO Found MDA is developing missile defense The Missile Defense Agency (MDA) is experiencing delays getting the threat capabilities to defend the United assessments needed to inform its acquisition decisions. Officials from the States, deployed forces, and regional defense intelligence community—intelligence organizations within the allies from missile attacks. However, Department of Defense (DOD)—told GAO this is because they are currently missile threats continue to emerge, as overextended due to an increased demand for threat assessments from a adversaries continue to improve and recent upsurge in threat missile activity, as well as uncertainties related to their expand their missile capabilities. transition to new threat processes and products. The delays are exacerbated The National Defense Authorization because MDA does not collectively prioritize the various types of threat Act for Fiscal Year 2012 included a assessment requests submitted to the defense intelligence community or provision that GAO annually assess provide resources for unique requests, as other major defense acquisition and report on the extent to which MDA programs are generally required to do. Without timely threat assessments, has achieved its acquisition goals and MDA risks making acquisition decisions for weapon systems using irrelevant objectives, and include any other or outdated threat information, which could result in performance shortfalls.