A Framework for Supporting Active Cyber Defense Advances in Information Security

Total Page:16

File Type:pdf, Size:1020Kb

A Framework for Supporting Active Cyber Defense Advances in Information Security Advances in Information Security 64 Kristin E. Heckman Frank J. Stech Roshan K. Thomas Ben Schmoker Alexander W. Tsow Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defense Advances in Information Security Volume 64 Series Editor Sushil Jajodia, Center for Secure Information Systems, George Mason University, Fairfax, VA 22030-4444, USA More information about this series at http://www.springer.com/series/5576 Kristin E. Heckman • Frank J. Stech Roshan K. Thomas • Ben Schmoker Alexander W. Tsow Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defense Kristin E. Heckman Frank J. Stech The MITRE Corporation The MITRE Corporation McLean, VA, USA McLean, VA, USA Roshan K. Thomas Ben Schmoker The MITRE Corporation The MITRE Corporation McLean, VA, USA McLean, VA, USA Alexander W. Tsow The MITRE Corporation McLean, VA, USA ISSN 1568-2633 Advances in Information Security ISBN 978-3-319-25131-8 ISBN 978-3-319-25133-2 (eBook) DOI 10.1007/978-3-319-25133-2 Library of Congress Control Number: 2015953440 Springer Cham Heidelberg New York Dordrecht London © Springer International Publishing Switzerland 2015 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper Springer International Publishing AG Switzerland is part of Springer Science+Business Media (www.springer.com) Preface The field of cyber security has evolved over the last three decades and today is at a critical juncture. Computer network defense (CND) has reached the limits of what traditional perimeter defenses such as boundary controllers and firewalls, as well as intrusion detection systems, can do to increase an organization’s overall security posture. Sophisticated, well-organized attackers collectively known as the advanced persistent threat (APT) continue to bypass these traditional defense mechanisms by exploiting zero-day vulnerabilities. Trying to block access by intruders in many cases is futile: it is more realistic to assume that the defense perimeter is porous and that stealthy adversaries may have established a semi-persistent presence in the defender’s network. Both researchers and practitioners acknowledge, at least tacitly, that they need more advanced and active defense security techniques. Such tech- niques would not merely monitor, detect, and block intrusions, but would actively engage adversaries and study their tactics, techniques, and procedures (TTPs) and craft customized responses and mitigation strategies. Throughout history, denial, deception, and counterdeception have proven effec- tive force multipliers when used in conflict. As the challenges to U.S. national secu- rity increasingly move into the cyber domain, the field of cyber security needs an analogous force multiplier to defend effectively against computer network attacks, intrusions, and pervasive electronic espionage. What role can cyber denial and deception (cyber-D&D) play in such a paradigm? That is the subject of this book. A significant opportunity exists for advancing CND by adapting and applying classical D&D theory and techniques to CND operations. Such adaptation and application entail connecting classical D&D theory and techniques to cyber defense in order to develop a framework that facilitates greater use of D&D in routine CND operations. As adversaries’ attack techniques evolve, defenders’ cyber systems must also evolve to provide the best continuous defense. This will usher in a new paradigm, consisting of a highly customized network defense based on understand- ing the specifics of adversary attacks. By knowing how to engineer cyber systems to better detect and counter the deception aspects of advanced cyber threats, and how to apply D&D against the APT and other threats, cyber defenders will force v vi Preface ­adversaries to move more slowly, expend more resources, and take greater risks, while themselves possibly avoiding or at least better fighting through cyber degradation. A review of the cyber security research literature indicates that the use of denial, deception, and counterdeception in the cyber domain is in its infancy when com- pared to D&D use in the physical world and kinetic warfare.1 Training in govern- ment and academic settings rarely integrates classical deception theory with cyber security. As a result, many computer network defenders have limited familiarity with D&D theory or approaches, let alone how to apply them. This, coupled with disjoint terminology, theory, and lack of a cohesive framework, may have contrib- uted to fewer empirical and operational applications of D&D in cyber security. Given this, we wished to introduce a wide audience to the role that cyber-D&D can play as part of a larger and more comprehensive active CND scheme. However, this book is not intended as a technical manual for crafting cyber-D&D techniques. Viewing cyber-D&D primarily as a technical initiative or problem would lead to low adoption and failure to counter cyber threats. Instead, concepts for cyber-D&D must be conceived, championed, managed, and matured within the larger organiza- tional, business, and cyber defense context. This book represents our attempt to lay out a blueprint for these broader considerations. Mc Lean, VA, USA Kristin E. Heckman Frank J. Stech Roshan K. Thomas Ben Schmoker Alexander W. Tsow 1 Frank Stech, Kristin E. Heckman, Phil Hilliard, and Janice R. Ballo. “Scientometrics of Deception, Counter-deception, and Deception Detection in Cyber-space,” PsychNology Journal, v. 9, no. 2, pp. 79–122, 2011. Acknowledgments The authors, our significant others, as is their habit, have overestimated their capa- bilities and underestimated their responsibilities, and the time and resources needed to meet them. Hence we undertook to acknowledge everyone who contributed to the creation of this book, beginning with ourselves. The authors basically ignored fam- ily and friends, and, we suspect, other duties and obligations, in order to produce this volume. The authors have expressed their deep gratitude and appreciation for our forbearance, patience, and assistance. We shan’t let them forget that. Nevertheless, we believe the end justifies their negligence. We are proud of the product and of the authors. Having had to listen to the authors’ tales of inadequate cyber security and com- puter systems compromises of all forms, we became aware of the promise of cyber deceptions in active defense of computer systems. But many defenses obviously are still needed, and many horses have left too many barns, so these Acknowledgments will tend to use first names and last initials. The individuals involved are probably already known to foreign intelligence services, but we need not make connecting the dots any easier for them. Those thanked know who they are. Without question, this book is dedicated to the late Dr. Barton S. Whaley (1928— 2013), America’s foremost scholar of all matters of deception, and authority on the literature and research on deception and counterdeception. He was a dear friend of Frank and Kristin. His influence permeates this book and will influence deception and counterdeception, in the cyber realm and elsewhere, for years to come. This volume is very much a product of the MITRE Corporation’s dedication to cutting-edge and meaningful research and development. MITRE’s support for deception and counterdeception research predates the work reflected in this volume by over a decade. Thanks for such support are due to Richard G., Dave L., Steve H., Anne C., Rod H., and Robert N. (a bit of a deception scholar himself). Similarly, supporting the connection between deception and counterdeception research and MITRE’s long-standing efforts to enhance cyber defenses reflects the vision and foresight of Vipin S., Mark M., Gary G., Marion M., Marnie S., Rich B., Rick S., Kerry B., and MITRE’s Engineering Council. vii viii Acknowledgments Many at MITRE have partnered with the authors in various deception and coun- terdeception research projects and other activities. Thanks to Janice B., Phil H., Margaret M., Chris E., Mike T., Mark B., Charles W., Barry C., Lisa C., Frank D., Blake S., Adam P., Mark G., Dave K., Marc B., Irv L., Todd O., Michael W., Stephen D., Audra H., Justin A., and Justin L. All scholars stand on the shoulders of others. The footnotes and references in this volume reflect the influence and contributions made by the communities of research- ers of deception and counterdeception, and the growing cadre of researchers
Recommended publications
  • A Younger Perspective Seniors Share Their Thoughts on the Presidential Election, Pg
    october 26, 2012 Volume 76, Issue 3 1650 Ridgeview rd., uA, oH 43221 upper ArlIngton HIgH scHool a younger perspective seniors share their thoughts on the presidential election, pg. 17 differing districts student shares experience transferring from columbus to ua schools, pg. 6 Marching in the spotlight ua alum slated to take her bow in script ohio during final game of the OSU season, pg. 27 Media picks survey reveals students’ favorite aspects of social networking, pg. 25 www.arlingtonian.com advertisements Thanks to President Obama and Senator Sherrod Brown, • Pell Grant funding was doubled and a college tax credit was established, putting higher education within reach for millions more Americans. • The President successfully fought to prevent federal student loan interest rates from doubling for over 7 million students, and he capped federal student loan repayments. Mitt Romney’s plan to cut middle-class investments could slash Pell Grants for nearly 9.6 million students and would eliminate the President’s college tax credit. Romney would also roll back the President’s student loan reform - reforms that have saved over $60 billion and allowed investments in Pell Grants, community colleges and deficit reduction. He said that students who were unable to afford college or to start a business on their own should just “borrow money from your parents.” Thanks to President Obama and Senator Sherrod Brown, • Employers cannot deny you or your family members health care coverage due to pre-existing health conditions. • You will enjoy health coverage on your parents’ policy until age 26. • Your family will not be denied health coverage because you’ve reached a lifetime limit due to a family member’s chronic disease.
    [Show full text]
  • The Pennsylvania State University
    The Pennsylvania State University The Graduate School REMEMBERING JIMMY CARTER THE RHETORICAL EVOCATIONS OF PRESIDENTIAL MEMORIES A Thesis in Communication Arts and Sciences by Brandon M. Johnson 2020 Brandon M. Johnson Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts August 2020 The thesis of Brandon M. Johnson was reviewed and approved by the following: Mary E. Stuckey Professor, Communication Arts and Sciences Thesis Advisor Stephen H. Browne Liberal Arts Professor of Communication Arts and Sciences Michael J. Steudeman Assistant Professor of Rhetoric and Director of CAS100A Denise H. Solomon Head and Liberal Arts Professor of Communication Arts and Sciences iii ABSTRACT This thesis is an analysis of the public memory of Jimmy Carter and the way the historical resources of his presidency (including his perceived moral character) are interpreted and evoked as a shorthand for presidential failure by associating him with a rhetoric of weakness. Broadly, I consider the nature of presidential memory, asking how a presidency passes from history to memory. I suggest that presidential histories serve as inventional resources in the present, with rhetors evoking interpretations of the past as rhetorical appeals. These appeals are acts of memory, and analyzing how they function discursively and are deployed strategically draws out how presidential memory works and what implications it has to presidential rhetoric. The different strategies used in remembering the presidency of Jimmy Carter are useful texts for rhetorically critiquing this process because Carter is often deployed as a rhetorical shorthand, providing a representative example of interpreting presidential pasts. I begin by considering the evolving scholarship and historiography on Carter and conceptualizing how presidential pasts can be interpreted in the present through acts of remembering.
    [Show full text]
  • International Spy Museum
    International Spy Museum Searchable Master Script, includes all sections and areas Area Location, ID, Description Labels, captions, and other explanatory text Area 1 – Museum Lobby M1.0.0.0 ΚΑΤΆΣΚΟΠΟΣ SPY SPION SPIJUN İSPİYON SZPIEG SPIA SPION ESPION ESPÍA ШПИОН Language of Espionage, printed on SCHPION MAJASUSI windows around entrance doors P1.1.0.0 Visitor Mission Statement For Your Eyes Only For Your Eyes Only Entry beyond this point is on a need-to-know basis. Who needs to know? All who would understand the world. All who would glimpse the unseen hands that touch our lives. You will learn the secrets of tradecraft – the tools and techniques that influence battles and sway governments. You will uncover extraordinary stories hidden behind the headlines. You will meet men and women living by their wits, lurking in the shadows of world affairs. More important, however, are the people you will not meet. The most successful spies are the unknown spies who remain undetected. Our task is to judge their craft, not their politics – their skill, not their loyalty. Our mission is to understand these daring professionals and their fallen comrades, to recognize their ingenuity and imagination. Our goal is to see past their maze of mirrors and deception to understand their world of intrigue. Intelligence facts written on glass How old is spying? First record of spying: 1800 BC, clay tablet from Hammurabi regarding his spies. panel on left side of lobby First manual on spy tactics written: Over 2,000 years ago, Sun Tzu’s The Art of War. 6 video screens behind glass panel with facts and images.
    [Show full text]
  • Engaging Iran Australian and Canadian Relations with the Islamic Republic Engaging Iran Australian and Canadian Relations with the Islamic Republic
    Engaging Iran Australian and Canadian Relations with the Islamic Republic Engaging Iran Australian and Canadian Relations with the Islamic Republic Robert J. Bookmiller Gulf Research Center i_m(#ÆAk pA'v@uB Dubai, United Arab Emirates (_}A' !_g B/9lu( s{4'1q {xA' 1_{4 b|5 )smdA'c (uA'f'1_B%­'=¡(/ *_D |w@_> TBMFT!HSDBF¡CEudA'sGu( XXXHSDBFeCudC­'?B uG_GAE#­'c`}A' i_m(#ÆAk pA'v@uB9f1s{5 )smdA'c (uA'f'1_B%­'cAE/ i_m(#ÆAk pA'v@uBª E#'Gvp*E#'B!v,¢#'E#'1's{5%­''tDu{xC)/_9%_(n{wGL­i_m(#ÆAk pA'v@uAc8mBmA' , ¡dA'E#'c>EuA'&_{3A'B¢#'c}{3'(E#'c j{w*E#'cGuG{y*E#'c A"'E#'c CEudA%'eC_@c {3EE#'{4¢#_(9_,ud{3' i_m(#ÆAk pA'v@uBB`{wB¡}.0%'9{ymA'E/B`d{wA'¡>ismd{wd{3 *4#/b_dA{w{wdA'¡A_A'?uA' k pA'v@uBuCc,E9)1Eu{zA_(u`*­E @1_{xA'!'1"'9u`*1's{5%­''tD¡>)/1'==A'uA'f_,E i_m(#ÆA Gulf Research Center 187 Oud Metha Tower, 11th Floor, 303 Sheikh Rashid Road, P. O. Box 80758, Dubai, United Arab Emirates. Tel.: +971 4 324 7770 Fax: +971 3 324 7771 E-mail: [email protected] Website: www.grc.ae First published 2009 i_m(#ÆAk pA'v@uB Gulf Research Center (_}A' !_g B/9lu( Dubai, United Arab Emirates s{4'1q {xA' 1_{4 b|5 )smdA'c (uA'f'1_B%­'=¡(/ © Gulf Research Center 2009 *_D All rights reserved. No part of this publication may be reproduced, stored in |w@_> a retrieval system, or transmitted in any form or by any means, electronic, TBMFT!HSDBF¡CEudA'sGu( XXXHSDBFeCudC­'?B mechanical, photocopying, recording or otherwise, without the prior written permission of the Gulf Research Center.
    [Show full text]
  • Q: It Is November 14Th, 2012
    The Association of Diplomatic Studies and Training Foreign Affairs Oral History Project KATHLEEN STAFFORD Interviewed by: Marilyn Greene Initial interview date: November 14th, 2012 Copyright 2019 ADST and Kathleen Stafford TABLE OF CONTENTS Spouse (Joseph D. Stafford) Entered the Foreign Service 1978 Tehran, Iran—Worked in Consular Section 1979 The embassy takeover Escaping The cook helps out The Iranian government falls Getting help from the Canadians Relationship with the hostages The movie Argo and inaccuracies The role of the media Living in hiding The CIA’s escape plan Final escape and the after-effects The remaining hostages CIA Officer Tony Mendez Palermo, Italy—Student at the Accademia di Belle Arti 1980-1982 Tunis, Tunisia 1982-1983 Cairo, Egypt 1983–1986 Kuwait 1986-1988 Son born Status of women and religion Iran-Iraq war Washington, D.C. 1988-1989 Algiers, Algeria 1989-1990 Washington, D.C. 1990-1993 1 Studying at Marymount Nouakchott, Mauritania—School Teacher 1993-1996 Ethnic conflict Fairfax County, Virginia—School Teacher 1996-1998 Tunis, Tunisia 1998-2001 Painting Abidjan, Côte d'Ivoire 2001-2004 Banjul, The Gambia 2004-2007 National problems Washington, D.C. 2007-2008 Spouse taught at the National War College Lagos, Nigeria 2010-2012 American community Printmaking workshop Khartoum, Sudan 2012-2014 The evacuation and Benghazi Family life in the Foreign Service Her son’s education INTERVIEW Q: It is November 14th, 2012. I am Marilyn Greene and this is part two of our interview with Mrs. Kathleen Stafford, whose husband Joseph is chargé d’affaires of the U.S. embassy in Khartoum, Sudan.
    [Show full text]
  • Round 3 Round 3 First Quarter
    Middle School National Bowl 2018-2019 Round 3 Round 3 First Quarter (1) One of these political parties sponsored Marie-S´egol`eneRoyal for President in 2007. This type of political party gained power in France in 1981 under Francois Mitterand and regained power in 2012 under Francois Hollande; Hollande's platform included a \Robin Hood" tax and an expansion of public housing. For ten points, name this political ideology that, generally, seeks shared ownership of capital, often conflated with communism. ANSWER: Socialist Party (accept word forms; prompt on descriptions of French political parties until \France" is read) (2) This project was proposed to Congress by Asa Whitney and funded by Collis Huntington, Mark Hopkins, and the rest of the Big Four. This project was completed when Leland Stanford drove a golden spike at Promontory Summit. The Union Pacific and Central Pacific were heavily involved in, for ten points, what 1863 project that linked Nebraska with the West Coast for the first time by rail? ANSWER: first transcontinental railroad (3) This country's neighbors have recently implemented the THAAD system to defend against it. A world leader threatened this country with “fire and fury like the world has never seen" in a controversial 2017 press conference. This country, which claims to have ICBMs, tested a hydrogen bomb at Punggye-ri in 2017. For ten points, name this East Asian country led by Supreme Leader Kim Jong-un. ANSWER: North Korea (or Democratic People's Republic of Korea; accept DPRK; prompt on Korea; do not accept or prompt on Republic of Korea) (4) Six people who escaped this event were rescued by Tony Mendez in the Canadian Caper.
    [Show full text]
  • War with Iraq
    WAR WITH IRAQ WAR WITH IRAQ CANADA’S STRATEGY IN THE PERSIAN GULF 1990–2002 Sean M. Maloney Centre for International Relations, Queen’s University Kingston, Ontario, Canada 2002 National Library of Canada Cataloguing in Publication Maloney, Sean M. (Sean Michael), 1967- War with Iraq: Canada’s strategy in the Persian Gulf, 1990-2002 / Sean M. Maloney. (Martello papers, ISSN 1183-3661 ; 24) Translation of: La France, est-elle encore une grande puissance? ISBN 0-88911-892-2 1. Canada--Foreign relations--Iraq. 2. Iraq--Foreign relations--Canada. 3. Canada--Foreign relations--Persian Gulf Region. 4. Persian Gulf Region-- Foreign relations--Canada. 5. United Nations. Special Commission on Iraq. 6. Canada--Military policy. I. Queen’s University (Kingston, Ont.). Centre for International Relations. II. Title. III. Series. DS79.755.M34 2002 327.710567 C2002-905069-3 © Copyright 2002 The Martello Papers The Queen’s University Centre for International Relations (QCIR) is pleased to present the twenty-fourth in its series of security studies, the Martello Papers. Taking their name from the distinctive towers built during the nineteenth century to defend Kingston, Ontario, these papers cover a wide range of topics and issues relevant to contemporary international strategic relations. “War with Iraq,” whether as a call to arms, a slogan of dissent or a matter for more detached speculation, has been the dominant motif of international debate in the latter half of 2002. The casual observer might be excused for concluding from this that we are not already at war. Sean Maloney reminds us here that, in the absence of Iraq’s full compliance with the arms control regime and other condi- tions of the 1991 ceasefire which ended Desert Storm, a de facto state of war has continued to the present, albeit in a sporadic and inconsistent way.
    [Show full text]
  • Military History Anniversaries 16 Thru 31 January
    Military History Anniversaries 16 thru 31 January Events in History over the next 15 day period that had U.S. military involvement or impacted in some way on U.S military operations or American interests JAN 16 1776 – Amrican Revolutionary War: African-American Soldiers » It was an uncomfortable fact for many in the colonies that at the same time they were fighting the British for their liberty and freedom they were depriving slaves of that same opportunity. African-American soldiers, in fact, had participated in major Revolutionary War battles from its very start: around 5% of American forces at the battle of Bunker Hill were black. New England units were completely integrated with soldiers receiving the same pay regardless of color. Still, fears of a rebellion of armed slaves tempered official American recognition of the contribution of blacks. On this date General George Washington allowed for the first time for free blacks with military experience to enlist in the revolutionary army. A year later, as the American need for manpower increased, Washington dropped the military experience requirement, allowing any free black who so wishes to enlist. The Continental Congress tried to recruit more African-Americans by offering to purchase them from the Southern slaveholders. Unsurprisingly, few agreed. But enterprising states like Rhode Island made an end run around the slaveholders, announcing any slave who enlisted would immediately be freed. (Rhode Island compensated the slaveholder for the market value of their slave.) The “1st Rhode Island Regiment” was comprised mostly of those freed slaves, becoming the only Continental Army unit to have segregated units for blacks.
    [Show full text]
  • Iran Hostage Crisis
    Iran Hostage Crisis Summarize ½ pages Background In subsequent decades, this foreign intervention—along with issues like unequal development, political repression, corruption, pro-Israeli policies, and the un-Islamic opulent Western lifestyle of the Iranian elite—united radical Islamists and leftists, spurring the overthrow of the Shah's regime in the Iranian revolution. The Shah was exiled in January 1979. Following the Shah's overthrow, the U.S. attempted to mitigate the damage by finding a new relationship with the de facto Iranian government, but on October 22, 1979, the Shah, ailing from cancer, was admitted to the U.S. for medical treatment. This caused widespread anger in Iran. Furious at what he called "evidence of American plotting," revolutionary leader Ayatollah Khomeini intensified rhetoric against "Great Satan," i.e. the United States. Events Muslim student followers of the Imam's line burn the American flag on the wall of the American Embassy in Tehran, shortly after seizing the compound.PlanningThe original idea to seize the American embassy was contrived by Ebrahim Asgharzadeh in September of 1979. The heads of the Islamic associations of the main universities of Tehran, including University of Tehran, Sharif University of Technology, Amirkabir University of Technology (polytechnic of Tehran), and the Iran University of Science and Technology, gathered. The students have denied that Ayatollah Ruhollah Khomeini was involved.[ They wanted to inform him of their plan through Ayatollah Musavi Khoeyniha, but Musavi Khoeyniha couldn't inform him before the hostages were taken, so he only became aware of the action when hostages were taken. Later, Ruhollah Khomeini supported the seizure and called it, "The second revolution: The take-over of the American spy den in Tehran." Public opinion in Iran following the admission of the Shah to the United States on November 1, 1979, Iran's new Supreme Leader, the Islamic radical Ayatollah Ruhollah Khomeini urged his people to demonstrate against United States and Israeli interests.
    [Show full text]
  • The Iranian Revolution at 30
    Viewpoints Special Edition The Iranian Revolution at 30 The Middle East Institute Washington, DC Middle East Institute The mission of the Middle East Institute is to promote knowledge of the Middle East in Amer- ica and strengthen understanding of the United States by the people and governments of the region. For more than 60 years, MEI has dealt with the momentous events in the Middle East — from the birth of the state of Israel to the invasion of Iraq. Today, MEI is a foremost authority on contemporary Middle East issues. It pro- vides a vital forum for honest and open debate that attracts politicians, scholars, government officials, and policy experts from the US, Asia, Europe, and the Middle East. MEI enjoys wide access to political and business leaders in countries throughout the region. Along with information exchanges, facilities for research, objective analysis, and thoughtful commentary, MEI’s programs and publications help counter simplistic notions about the Middle East and America. We are at the forefront of private sector public diplomacy. Viewpoints are another MEI service to audiences interested in learning more about the complexities of issues affecting the Middle East and US rela- tions with the region. To learn more about the Middle East Institute, visit our website at http://www.mideasti.org Cover photos, clockwise from the top left hand corner: Shahram Sharif photo; sajed.ir photo; sajed.ir photo; ? redo photo; sajed. ir photo; Maryam Ashoori photo; Zongo69 photo; UN photo; and [ john ] photo. 2 The Middle East Institute Viewpoints: The Iranian Revolution at 30 • www.mideasti.org Viewpoints Special Edition The Iranian Revolution at 30 The Middle East Institute Viewpoints: The Iranian Revolution at 30 • www.mideasti.org 3 Viewpoints: 1979 The year 1979 was among the most tumultuous, and important, in the history of the modern Middle East.
    [Show full text]
  • A Classic Case of Deception
    Studies in Intelligence Winter (1999-2000) A Classic Case of Deception CIA Goes Hollywood Antonio J. Mendez Background: Exfiltration and the CIA When briefing the CIA's Directorate of Operations (DO) or other components of the Intelligence Community (IC) about the Office of Technical Services' (OTS) exfiltration capability, I always made a point to remind them that "readiness" is the key. This is one of the full-time concerns of my former OTS office, the Graphics and Authentication Division (GAD). In arranging for the escape of refugees and other people of potential intelligence value who are subject to political persecution and hostile pursuit, prior planning is not always possible because they show up at odd hours in out-of-the-way places. Current surveys and collection of up-to- date intelligence regarding travel controls and procedures are vital. OTS engages in this activity worldwide. The readiness to move clandestine agents out of harm's way using quasi- legal methods is equally important. CIA's policy and practice are to bring its valuable human assets in from the cold when they can no longer remain in place. Sometimes this includes their families. Public Law 110 gives the IC the authority to resettle these people in the United States as US persons when the time comes and the quota allows. OTS/GAD and its successor components have serviced these kinds of / p operations since OSS days. The "authentication" of operations officers and their agents by providing them with personal documentation and disguise, cover legends and supporting data, "pocket litter," and so forth is fundamental deception tradecraft in clandestine operations.
    [Show full text]
  • Intelligence Oversight: the Controversy Behind the FY 1991 Intelligence Authorization Act/William E
    INTELLIGENCE OVERSIGHT nm C ONTROVERSY BEHIND THE FY 1991 INTI lllCrNCE AUTHOR IZATION ACT William E. Conner, a former Naval intelligence ofliccr, i ~ currently Law Clerk to the Honorable Robert H. Hodges, Jr. of the United States Court of Federal Claims in Washington, D.C. He is a graduate of the George Washington University's National Law Center where he specialized in national security law and government contracts law. While on active duty, Mr. Conner served as: intelligence briefing officer to the Chairman, Joint Chiefs of Staff; White House Social Aide; naval and air anaylst in the Pentagon's National Military Intelligence Center during th" Iran-Iraq War; imagery analyst at the National Photographi Interpretation Center; and conducted two deployments aboard th e USS Enterprise as intelligence officer with Fighter Squadron 114. Mr. Conner earned an M.S. degree in Strategic Intelligence in 1989 from the Defense Intelligence College. A Publication of @ WILLIAM E. CONNER IHE INll 11 IC~ I NCr PRO FESSION SERIES The Association of Former Intelligence Officers NUMBER ELEVEN ISBN 1-884314-10-4 THE IN TLLLIGL NCE PROFESSION SERIES NUMBER ELEVEN INTELLIGENCE OVERSIGHT The Controversy Behind The FY 1991 Intelligence Authorization Act William E. Conner Published by The Association of Former Intelligence Officers CONTENTS Author's Acknowledgements Introduction Intelligence And The Intelligence Community 3 Copyright 1993 by Congressional Oversight of Intelligence 7 The Association of Former Intelligence Officers Activities Intelligence Oversight On The Eve Of 11 The Iran-Contra Affair All rights reserved. No part of this book may be reproduced or The Impact Of The Iran-Contra Affair 19 transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the The First Attempt: Politics Thwarts Reform 27 Publisher.
    [Show full text]