Download the Full Agenda

Total Page:16

File Type:pdf, Size:1020Kb

Download the Full Agenda April 5-7 | In Person In Collaboration With: April 5th, 2021 HALL A 09:00-12:30 CYBER IN A WORLD OF CHANGE Host: Rachel Pether, CFA, Cybertech MC, Presenter, Moderator and Award Host, UAE 09:00-09:05 OPENING REMARKS Amir Rapaport, Founder of Cybertech, Israel H.E. Yousuf Hamad Al Shaibani, Director General, Dubai Electronic Security Center (DESC), UAE 09:05-09:20 ONE-ON-ONE: Nadav Zafrir, Former Commander of Unit 8200, Managing Partner, Team8, Israel, ADM Michael S. Rogers, Former NSA Director, Operating Partner, Team8, USA 09:20-09:32 LESSONS LEARNED AND OPPORTUNITIES IN THE CYBER PROTECTION OF NUCLEAR INFRASTRUCTURE AND POWER GRIDS IN THE UAE H.E. Mohamed Al Hammadi, Chief Executive Officer, Emirates Nuclear Energy Corporation (ENEC), UAE 09:32-09:47 LOOKING PAST THE PANDEMIC: FUTURE-PROOFING YOUR SECURITY POSTURE Ann S. Johnson, Corporate Vice President of Security, Compliance & Identity (SCI) Business Development, Microsoft, USA 09:47-09:57 ANYONE IS A TARGET FOR A NATION-STATE CYBER ATTACK – EVEN YOU Brig. Gen. (Ret.) Ran Shahor, CEO and Co-Founder, HolistiCyber, Israel 09:57-10:09 POST-COVID CYBERSECURITY Dr. Marwan Alzarouni, Director of Information Services Department, Dubai Electronic Security Center (DESC), UAE 10:09-10:21 RESILIENCE AS THE MASTER-KEY FOR MODERN CYBERSECURITY Esti Peshin, General Manager, Cyber Division, Israel Aerospace Industries Ltd, Israel 10:21-10:31 PHANTOM ATTACKS AGAINST ADVANCED DRIVING ASSISTANCE SYSTEMS (ADAS) Prof. Yuval Elovici, Director, Head of Cyber Security Research Center, Ben-Gurion University of the Negev, Israel 10:31-10:41 RESPONDING TO HEAVYWEIGHT RANSOM ATTACKS – A VIEW FROM THE CYBER FRONTLINE Dr. Yaniv Harel, SVP Cyber Defense, Sygnia; CSO Cyber Center Tel-Aviv University, Israel 10:41-10:53 SECURING IDENTITY – LEAST PRIVILEGE IN MODERN IT Udi Mokady, Founder, Chairman & CEO, CyberArk, Israel 10:53-11:03 CYBER RESILIENCE ENABLEMENT FROM TRAINING TO VERIFICATION AND CERTIFICATION: THE LEONARDO CYBER RANGE PLATFORM Andrea Teschioni, Senior International Business Developer, Cyber Security Division, Leonardo, Italy 11:03-11:18 ONE-ON-ONE: BUILDING A RESILIENT CYBERSPACE H.E. Dr. Mohamed Al-Kuwaiti, Head of Cyber Security, United Arab Emirates Government, UAE Yigal Unna, Director General, Israel National Cyber Directorate, Israel 11:18-11:33 THOUGHTS ON THE FUTURE OF CYBER AND INTELLIGENCE FROM THE NATIONAL LEVEL PERSPECTIVE Interviewer: Zori Kor, VP, ASERO Worldwide, Israel Brig. Gen. (Ret.) Pinhas Buchris, Former Managing Director of the Israeli Ministry of Defense, Former Director of Unit 8200; Co-Founder & General Partner, State of Mind Ventures, Israel 11:33-11:53 A SPECIAL ONE-ON-ONE BETWEEN GIANTS - CYBERSECURITY, LEADERSHIP AND DECISION-MAKING IN CRISIS Gen. (Ret.) David H. Petraeus, Former Director of the CIA, USA, Tamir Pardo, Former Head of the Mossad and Chairman, XM Cyber, Israel 11:53-12:03 INFORMATION SECURITY IN HOSPITALS Prof. Zeev Rotstein, Director General, Hadassah Medical Organization, Israel 12:03-12:15 SPECIAL ADDRESS FROM CISA: CYBER IN A WORLD OF CHANGE Brandon Wales, Acting Director, Cybersecurity and Infrastructure Security Agency (CISA), USA 12:30-14:00 EXHIBITION AND LUNCH BREAK HALL A HALL B 13:40-14:40 MARITIME AND LOGISTICS IN THE CYBERSPACE 14:00-14:30 SPECIAL PANEL DISCUSSION: INTERNATIONAL COLLABORATION 13:40-14:10 PANEL DISCUSSION: THREATS AND CHALLENGES IN THE MARITIME AND Moderator: Iddo Moed, Head of Bureau, African Affairs Division, MFA, LOGISTICS DOMAINS Israel Moderator: Daniel van Otterdijk, Chief Communications Officer, DP World, UAE Jakub Boratynski, Directorate-General, Head of Cybersecurity and Edwin Reina Barsallo, Former CISO and CIO, Panama Canal Authority, Panama Digital Privacy Policy Unit, European Commission, EU Andy Powell, CISO and VP/Head of Cyber Security, Maersk, UK Dr. Prachya Chalermwat, Secretary General, National Cyber Security Shlomi Fogel, Co-Owner, Israel Shipyards Industries, Israel Agency, Thailand David Espie, Director of Security, Facility Security Officer (FSO), Maryland Port Administration, USA Dr. Arvind Gupta, Former Deputy National Security Advisor, National Simone Fortin, Global Head, Cyber Security, MSC Cruises, Switzerland Security Council Secretariat; Director, Vivekananda International 14:10-14:40 PANEL DISCUSSION: WHERE ARE WE HEADING IN THE MARITIME AND LOGISTICS Foundation, India DOMAINS? OPTIONAL CYBERSECURITY SOLUTIONS Moderator: Daniel van Otterdijk, Chief Communications Officer, DP World, UAE Ibrahim Al Najjar, IT Director, DP World, UAE Lt. Col. (Res.) Tamir Goren, Director, Special Technologies, Israel National Cyber Directorate, Israel Gil Hazaz, VP Sales, XM Cyber, Israel Jochanan Sommerfeld, Group CEO, 7Ci, Israel SPECIAL PANEL DISCUSSION: FAKE NEWS AND FOREIGN 14:40-15:30 AI IN THE CYBER ERA - TRENDS, CHALLENGES AND SOLUTIONS 14:30-15:10 INTERFERENCE IN THE CYBERSPACE 14:40-14:55 ONE-ON-ONE: ARTIFICIAL INTELLIGENCE RESILIENCIES TO CYBER ATTACKS Moderator: Zori Kor, VP, ASERO Worldwide, Israel Prof. Yuval Elovici, Director, Head of Cyber Security Research Center, Ben-Gurion University of the Assaf Danby, VP of Global Sales, Cyabra, Israel Negev, Israel Leah Tedrow, Owner and Managing Director, Evoke International and Prof. Ernesto Damiani, Director, Information Security Center, Khalifa University Center for Cyber- Public Relations, Strategic Communications & Media Specialist, UAE Physical Systems (C2PS), UAE 14:55-15:02 POST-COVID NATIONAL STRATEGIES OF EUROPE AND THE UNITED NATIONS ON AI IN CYBERSECURITY Hon. Mattia Fantinati, Member of OECD Parliamentary Group on AI; Member of the House of Representatives, Italian Parliament, Italy 15:02-15:09 THE FUTURE OF CYBERSECURITY AI ONTOLOGIES: FROM STATIC REPOSITORIES TO DYNAMIC LOGICAL SEMANTIC SYSTEMS ANALYZERS Prof. Elizabetta Zuanelli, University of Roma TorVergata; UN Expert on AI, Italy 15:09-15:16 LEVERAGING THE USE OF AI IN DIGITAL INTELLIGENCE Paul Friedberg, Senior Director, Business and Accounts Development, Cellebrite, Israel 15:16-15:28 CYBERSECURITY IN THE AGE OF INFODEMIC: AI DEPENDS ON US USING LESS DATA, NOT MORE Eyal Balicer, Senior Vice President, Global Cyber Partnerships & Product Innovation, Citi, Israel SPECIAL PANEL DISCUSSION: SECRETS OF UNIT 8200 –INCUBATOR 15:30-16:10 PANEL DISCUSSION: CLOUD CHALLENGES AND OPPORTUNITIES IN 15:10-16:00 FORGING ENTREPRENEURS AND INNOVATORS A POST-COVID WORLD Led by: 8200 Alumni Association (By invitation only) Moderator: Yodfat Harel Buchris, Managing Director, Blumberg Capital, Israel Moderator: Nir Lempert, CEO, MER-Group; Chairman of the 8200 Alumni Dr. Bushra AlBlooshi, Head of Research and Innovation, Dubai Electronic Security Center (DESC), Association, Israel UAE Brig. Gen. (Ret.) Pinhas Buchris, Former Managing Director of the Ronen Yehoshua, CEO, Morphisec, Israel Israeli Ministry of Defense, Former Director of Unit 8200; Co-Founder & Matan Hart, Co-Founder & CEO, Cymptom, Israel General Partner, State of Mind Ventures, Israel Owen Connolly, CEO, 7Ci GCC, UAE Yariv Nornberg, Partner at Intellion; Treasurer of the 8200 Alumni Association, Israel 16:10-17:00 LESSONS LEARNED FROM THE LATEST DRAMATIC ATTACKS: SECURING THE SUPPLY CHAIN Mor Bikovsky, Director of Channel Presales, Claroty, Israel 16:10-16:20 THE MISSING SIDE OF THE SUPPLY CHAIN EQUATION Yosi Shneck, Founder YSICONS; Senior Consultant, Leading the Cyber Entrepreneurship and Business Development, Israel Electric Corporation (IEC), Israel 16:20-17:00 PANEL DISCUSSION: Moderator: Dr. Yaniv Harel, SVP Cyber Defense, Sygnia; CSO Cyber Center Tel-Aviv University, Israel Klaus Glatz, Chief Digital Officer, Andritz, Austria Gal Nir, VP Sales & Business Development, Valire Software, Israel Ofir Hason, CEO & Co-Founder, CyberGym, Israel 19:00-20:30 CYBERTECH GLOBAL UAE-DUBAI INTERNATIONAL FORMAL COCKTAIL RECEPTION (By Invitation Only) April 6th, 2021 HALL A HALL B 09:30-10:00 SECHACK365: TRAINING YOUNG SECURITY INNOVATORS CYBER FOR THE NATIONAL LEVEL AND INTELLIGENCE IN THE CYBER ERA 09:00-10:10 Special demonstration of students from Japan. 09:00-09:12 THE CYBER CURSE: IS THERE A CURE? 10:00-11:00 SPECIAL EVENT: BUILDING AN INNOVATIVE AND CYBER ECOSYSTEM General (Ret.) Wesley K. Clark, Former NATO Supreme Allied Commander Europe, USA 09:12-09:20 COUNTER-TERRORISM IN THE CYBER DOMAIN - A PERSPECTIVE FROM UN CTED Moderator: Uzy Zwebner, Basecamp Founder & CEO; Co-Founder of High-Tech Park, Beer Sheva, Michele Coninsx, Assistant Secretary General & Executive Director, Counter-Terrorism Committee Israel Executive Directorate (CTED), UN, USA H.E. Ramón Martínez De La Guardia, Minister, Commerce and Industries, Panama 09:20-09:30 GERMANY'S NEW IT-SECURITY ACT 2.0 – CYBER FOR THE NATIONAL LEVEL AND NATIONAL Dr. Christos Dimas, Deputy Minister of Development & Investments, Research, Innovation and SECURITY IN THE CYBER ERA Technology, Member of the Hellenic Parliament, Greece Andreas Könen, Director General for Cyber and Information Security, Federal Ministry of the Interior, Adv. Adel Badir, Mayor of Kfar Qasem, Israel Building and Community (BMI), Germany Prof. Rivka Carmi, Former President, Ben-Gurion University of the Negev, Israel 09:30-09:40 CYBER RESILIENCE – KEY OBJECTIVE FOR THE NATIONAL SECURITY IN A DIGITAL DECADE Erez Shachar, Co-Founder, Qumra Capital, Israel Daniel Markic, Director General, Security and Intelligence Agency (SOA), Croatia Dr. Orna Berry, Recognized Entrepreneur, Scientist, Policy Maker and Industry Executive, Israel 09:40-09:50 NATIONAL LEVEL CYBERSECURITY: THE NEXT ERA Shri Anil Agrawal, Joint Secretary,
Recommended publications
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • Trend Analysis the Israeli Unit 8200 an OSINT-Based Study CSS
    CSS CYBER DEFENSE PROJECT Trend Analysis The Israeli Unit 8200 An OSINT-based study Zürich, December 2019 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Trend analysis: The Israeli Unit 8200 – An OSINT-based study Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group, Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, S. (2019). Trend Analysis: The Israeli Unit 8200 – An OSINT-based study. Center for Security Studies (CSS), ETH Zürich. 1 Trend analysis: The Israeli Unit 8200 – An OSINT-based study . Table of Contents 1 Introduction 4 2 Historical Background 5 2.1 Pre-independence intelligence units 5 2.2 Post-independence unit: former capabilities, missions, mandate and techniques 5 2.3 The Yom Kippur War and its consequences 6 3 Operational Background 8 3.1 Unit mandate, activities and capabilities 8 3.2 Attributed and alleged operations 8 3.3 International efforts and cooperation 9 4 Organizational and Cultural Background 10 4.1 Organizational structure 10 Structure and sub-units 10 Infrastructure 11 4.2 Selection and training process 12 Attractiveness and motivation 12 Screening process 12 Selection process 13 Training process 13 Service, reserve and alumni 14 4.3 Internal culture 14 5 Discussion and Analysis 16 5.1 Strengths 16 5.2 Weaknesses 17 6 Conclusion and Recommendations 18 7 Glossary 20 8 Abbreviations 20 9 Bibliography 21 2 Trend analysis: The Israeli Unit 8200 – An OSINT-based study selection tests comprise a psychometric test, rigorous Executive Summary interviews, and an education/skills test.
    [Show full text]
  • The Truth of the Capture of Adolf Eichmann (Pdf)
    6/28/2020 The Truth of the Capture of Adolf Eichmann » Mosaic THE TRUTH OF THE CAPTURE OF ADOLF EICHMANN https://mosaicmagazine.com/essay/history-ideas/2020/06/the-truth-of-the-capture-of-adolf-eichmann/ Sixty years ago, the infamous Nazi official was abducted in Argentina and brought to Israel. What really happened, what did Hollywood make up, and why? June 1, 2020 | Martin Kramer About the author: Martin Kramer teaches Middle Eastern history and served as founding president at Shalem College in Jerusalem, and is the Koret distinguished fellow at the Washington Institute for Near East Policy. Listen to this essay: Adolf Eichmann’s Argentinian ID, under the alias Ricardo Klement, found on him the night of his abduction. Yad Vashem. THE MOSAIC MONTHLY ESSAY • EPISODE 2 June: The Truth of the Capture of Adolf Eichmann 1x 00:00|60:58 Sixty years ago last month, on the evening of May 23, 1960, the Israeli prime minister David Ben-Gurion made a brief but dramatic announcement to a hastily-summoned session of the Knesset in Jerusalem: A short time ago, Israeli security services found one of the greatest of the Nazi war criminals, Adolf Eichmann, who was responsible, together with the Nazi leaders, for what they called “the final solution” of the Jewish question, that is, the extermination of six million of the Jews of Europe. Eichmann is already under arrest in Israel and will shortly be placed on trial in Israel under the terms of the law for the trial of Nazis and their collaborators. In the cabinet meeting immediately preceding this announcement, Ben-Gurion’s ministers had expressed their astonishment and curiosity.
    [Show full text]
  • Secrecy and Human Capital Management in US NSA and Israel Unit 8200
    LOOSE LIPS BUILD SHIPS? Secrecy and Human Capital Management in US NSA and Israel Unit 8200 A THESIS SUBMITTED TO THE INTERSCHOOL HONORS PROGRAM IN INTERNATIONAL SECURITY STUDIES CENTER FOR INTERNATIONAL SECURITY AND COOPERATION FREEMAN SPOGLI INSTITUTE FOR INTERNATIONAL STUDIES STANFORD UNIVERSITY By: Lisa Catherine Wallace June 2014 Advisors: Mariano-Florentino Cuéllar Colonel Joseph Felter Abstract ! How do intelligence organizations attract and make use of top talent? This paper approaches this question through a comparative case study of the labor ecosystems surrounding both the US’ National Security Agency and IDF’s signals intelligence branch, Unit 8200. As the cyber realm continues to assume a growing role in modern national security threat environments, intelligence organizations must grow and adapt to accommodate these new objectives. This inevitably involves the question of how to attract and make use of top talent in order to solve difficult and highly technical national security problems. Israel and the United States share similar national security interests, and both possess burgeoning and impressive high-technology clusters. This paper claims that a growing, public network of Unit 8200 and other Intelligence Corps alumni is extant in Israel’s high-technology sector. Furthermore, affiliation with Unit 8200 has a positive signaling and social capital value. By contrast, this paper argues that alumni from the NSA do not possess as strong of a signaling or social capital value in the US. This paper argues that the NSA is hindered by the ontology, secrecy, and culture of the organization itself, as well as US public understanding of national security organizations and cyber threats.
    [Show full text]
  • We Only Spy on Foreigners": the Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance
    Chicago Journal of International Law Volume 18 Number 2 Article 3 1-1-2018 "We Only Spy on Foreigners": The Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance Asaf Lubin Follow this and additional works at: https://chicagounbound.uchicago.edu/cjil Recommended Citation Lubin, Asaf (2018) ""We Only Spy on Foreigners": The Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance," Chicago Journal of International Law: Vol. 18: No. 2, Article 3. Available at: https://chicagounbound.uchicago.edu/cjil/vol18/iss2/3 This Article is brought to you for free and open access by Chicago Unbound. It has been accepted for inclusion in Chicago Journal of International Law by an authorized editor of Chicago Unbound. For more information, please contact [email protected]. “We Only Spy on Foreigners”: The Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance Asaf Lubin Abstract The digital age brought with it a new epoch in global political life, one neatly coined by Professor Philip Howard as the “pax technica.” In this new world order, government and industry are “tightly bound” in technological and security arrangements that serve to push forward an information and cyber revolution of unparalleled magnitude. While the rise of information technologies tells a miraculous story of triumph over the physical constraints that once shackled mankind, these very technologies are also the cause of grave concern. Intelligence agencies have been recently involved in the exercise of global indiscriminate surveillance, which purports to go beyond their limited territorial jurisdiction and sweep in “the telephone, internet, and location records of whole populations.” Today’s political leaders and corporate elites are increasingly engaged in these kinds of programs of bulk interception, collection, mining, analysis, dissemination, and exploitation of foreign communications data that are easily susceptible to gross abuse and impropriety.
    [Show full text]
  • Spy Culture and the Making of the Modern Intelligence Agency: from Richard Hannay to James Bond to Drone Warfare By
    Spy Culture and the Making of the Modern Intelligence Agency: From Richard Hannay to James Bond to Drone Warfare by Matthew A. Bellamy A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (English Language and Literature) in the University of Michigan 2018 Dissertation Committee: Associate Professor Susan Najita, Chair Professor Daniel Hack Professor Mika Lavaque-Manty Associate Professor Andrea Zemgulys Matthew A. Bellamy [email protected] ORCID iD: 0000-0001-6914-8116 © Matthew A. Bellamy 2018 DEDICATION This dissertation is dedicated to all my students, from those in Jacksonville, Florida to those in Port-au-Prince, Haiti and Ann Arbor, Michigan. It is also dedicated to the friends and mentors who have been with me over the seven years of my graduate career. Especially to Charity and Charisse. ii TABLE OF CONTENTS Dedication ii List of Figures v Abstract vi Chapter 1 Introduction: Espionage as the Loss of Agency 1 Methodology; or, Why Study Spy Fiction? 3 A Brief Overview of the Entwined Histories of Espionage as a Practice and Espionage as a Cultural Product 20 Chapter Outline: Chapters 2 and 3 31 Chapter Outline: Chapters 4, 5 and 6 40 Chapter 2 The Spy Agency as a Discursive Formation, Part 1: Conspiracy, Bureaucracy and the Espionage Mindset 52 The SPECTRE of the Many-Headed HYDRA: Conspiracy and the Public’s Experience of Spy Agencies 64 Writing in the Machine: Bureaucracy and Espionage 86 Chapter 3: The Spy Agency as a Discursive Formation, Part 2: Cruelty and Technophilia
    [Show full text]
  • Location, Event&Q
    # from what/ where which how why who for MOBILE versi on click here when who who where when index source "location, event" "phys, pol, med, doc" detail physical detail political name "9/11 Truth Interactive Spreadsheet Click on dow n arrow to sort / filter, click again to undo." Top 100 / compilations entity entity detail country / state date Item .. right-click on li nk to open in new tab 1 "Francis, Stephen NFU" WTC physical Controlled demolition Explosive experts "Overwhelming evidence indicates that a combination of n uclear, thermitic and conventional explosives were used in a controlled demoliti on of the WTC on 9/11. Nanothermite contributed but does not have sufficient det onation velocity to pulverize the WTC into dust. Architects & Engineers for 9/11 Truth is leading gatekeeper trying to deflect Israel's role. See Cozen O'Connor 9/11 lawsuit." pic "9/11 Truth, anti-Zionists" Engineers / Scie ntists "U.S., Israel, SA, Britain" 2 "Francis, Stephen NFU" "WTC, Pentagon, PA" political False flag Cabal "The cabal: U.S., Britain, Saudi Arabia and Israel execu ted the 9/11 false flag attack in order to usher in a new 'war on terror' along with the Iraq and Afghanistan wars and fullfil the PNAC's 'Full Spectrum Dominan ce' of the Middle East and its resources ... all have roots that go back to Zion ist / Nazi Germany, the Cold War ... 9/11 was a planned step." lnk Intel ag encies "Cabal: US, UK, Israel & SA" Mossad / Sayeret Matkal "U.S., Israel, S A, Britain" 3 "Fox, Donald" WTC 1-2 physical "Mini Neutron, Fissionless Fusio n" Controlled demolition "VeteransToday: Fox, Kuehn, Prager, Vike n,Ward, Cimono & Fetzer on mini neutron bombs discuss all major WTC theories micr o nuke (neutron) most promising comparatively low blast effects, a quick blast o f radiation that doesn't linger, a series of shape charged mini-neutron bombs we re detonated from top to bottom to simulate a free fall collapse.
    [Show full text]
  • National Security Agency
    Coordinates: 39°6′32″N 76°46′17″W National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United National Security Agency States Department of Defense, under the authority of the Director of National Intelligence. The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems.[8][9] The NSA relies on a variety of measures to accomplish its Seal of the National Security Agency mission, the majority of which are clandestine.[10] Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become the largest of the U.S. intelligence organizations in terms of Flag of the National Security Agency personnel and budget.[6][11] The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end.[12] The NSA is also alleged to have been behind such attack software as Stuxnet, which severely damaged Iran's nuclear program.[13][14] The NSA, alongside the Central Intelligence Agency (CIA), maintains a physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a NSA Headquarters, Fort Meade, Maryland highly classified intelligence team) inserts eavesdropping devices in high value targets (such Agency overview as presidential palaces or embassies).
    [Show full text]
  • H Subject: Fw: Sawers / Telegraph Articles
    UNCLASSIFIED U.S. Department of State Case No. F-2014-20439 Doc No. C05795070 Date: 02/13/2016 RELEASE IN PART B1,1.4(B),1.4(D),B6 From: H <[email protected] > Sent: Friday, July 13, 2012 1:46 AM To: '[email protected]' Subject: Re: Sawers / Telegraph articles Classified by DAS, A/GIS, DoS on 02/13/2016 — Class: Gobsmacking! CONFIDENTIAL — Reason: 1.4(B), 1.4(D) — Declassify on: 07/13/2032 From: Sullivan, Jacob 3 [mailto:[email protected]] Sent: Thursday, July 12, 2012 11:18 PM To: H Subject: Fw: Sawers / Telegraph articles See the article down the string. From: Sherman, Wendy R Sent: Thursday, July 12, 2012 09:25 PM To: Nuland, Victoria 3; Murad, Eshel William; Hammer, Michael A; Ventrell, Patrick H; Sullivan, Jacob 3; Einhorn, Robert 3; 'Benjamin_3._Rhodes <Benjamin_l_Rhodes B6 Cc: Grantham, Chris W; Lakhdhir, Kannala S Subject: Re: Sawers / Telegraph articles Yes, Chris Grantham on my staff sent me an Alert Iran that had this story. Most unfortunate on many levels to say the least. Where to begin... From: Nuland, Victoria J Sent: Thursday, July 12, 2012 09:08 PM To: Murad, Eshel William; Hammer, Michael A; Ventrell, Patrick H• Sullivan Jacob 3; Sherman, Wendy R; Einhorn, Robert 3; 'Benjamin J. Rhodes <Benjamin J._Rhodes B6 Subject: Fw: Sawers / Telegraph articles Fysa - this from my UK embassy contact. Sawers heads MI6. From: James.Barbour [mailto B6 Sent: Thursday, July 12, 2012 06:21 PM To: Nuland, Victoria 3 Cc: Toner, Mark C Subject: FW: Sawers / Telegraph articles Toria, 1.4(B) 1.4(D) B1 UNCLASSIFIED U.S.
    [Show full text]
  • S Black Agents Bang-And-Burner 14 “Bang and Burn” Jobs Involve Sabotage, Usually Through Demolitions Or Arson
    night’'s black agents Bang-and-Burner 14 “Bang and burn” jobs involve sabotage, usually through demolitions or arson. This skill set translates with unnerving ease to EOD (explosive ordnance disposal) and arson investigation. Bang- and-burners set and disarm everything from booby traps to car bombs to ship- scuttling charges. Specific Examples: IRA or ETA bomb- builder, Albanian mafia arsonist, Polish Army combat engineer, Special Branch bomb disposal expert. INVESTIGATIVE ABILITIES: Architecture 2, Chemistry 2, Criminology 1, Intimidation 1 GENERAL ABILITIES: Conceal 4, Explosive Devices 8, Infiltration 2, Mechanics 4 Black Bagger A “black bag job” is FBI slang for a breaking-and-entry intrusion, usually intended to copy (or steal) documents or plant bugs or wiretaps. British spies often call break-in artists “box men,” a term originating in Victorian criminal slang. By any name, it’s burglary. Specific Examples: Cat burglar in Naples, Bulgarian NIS officer INVESTIGATIVE ABILITIES: on the Riviera, Bundespolizei handling “renditions” for the CIA. Bureaucracy 1, Forgery 4, museum security specialist, INVESTIGATIVE ABILITIES: Bureaucracy Photography 1 DGSE or Mossad covert entry 2, Cop Talk 1, Criminology Alternates: Cryptography specialist, NSA contractor. 2, Urban Survival 1 GENERAL ABILITIES: Cover 6, INVESTIGATIVE ABILITIES: Data Alternates: Chemistry, Data Digital Intrusion 4, Disguise 2, Recovery 1, Electronic Surveillance 2, Recovery, Electronic Surveillance, Infiltration 4, Mechanics 2 Photography 2, Streetwise 1 Notice, Streetwise Alternates: Architecture, Notice GENERAL ABILITIES: Conceal 6, Cuckoo GENERAL ABILITIES: Conceal 2, Digital Disguise 2, Driving 4, Explosive The cuckoo lays its eggs in another bird’s Intrusion 2, Filch 6, Infiltration 8 Devices 2, Infiltration 2, Stability 2 nest, convincing the stranger to raise its Alternates: Preparedness Alternates: Digital Intrusion chicks.
    [Show full text]
  • SPECIAL REPORT ESPIONAGE November 12Th 2016 Shaken and Stirred
    SPECIAL REPORT ESPIONAGE November 12th 2016 Shaken and stirred 20161012_SR_ESPIONAGE_001.indd 1 27/10/2016 13:41 SPECIAL REPORT ESPIONAGE Shaken and stirred Intelligence services on both sides of the Atlantic have struggled to come to terms with new technology and a new mission. They are not done yet, writes Edward Carr IN THE SPRING thaw of 1992 a KGB archivist called Vasili Mitrokhin CONTENTS walked into the British embassy in Riga. Stashed at the bottom ofhis bag, beneath some sausages, were copies of Soviet intelligence files that he 5 Technology had smuggled out of Russia. Before the year was out MI6, Britain’s for- Tinker, tailor, hacker, spy eign-intelligence service, had spirited away Mitrokhin, his family and six large cases packed with KGB records which he had kept hidden in a milk 7 Governance Standard operating churn and some old trunks under the floor ofhis dacha. procedure The pages of “The Mitrokhin Archive”, eventually published in 1999, are steeped in vodka and betrayal. They tell the stories of notorious 8 Edward Snowden spies like Kim Philby, a British intelligence officer who defected to Russia You’re US government in 1963. And they exposed agents like Melita Norwood, who had quietly property worked for the KGB for 40 years from her home in south-east London, then shot to fame as a great-gran- 10 China and Russia Happenstance and enemy ny. Her unrelenting Marxist refus- action al to shop at Britain’s capitalist su- permarkets earned her the 12 How to do better headline: “The Spy Who Came in The solace of the law from the Co-op”.
    [Show full text]
  • Spy Lingo — a Secret Eye
    A Secret Eye SpyLingo A Compendium Of Terms Used In The Intelligence Trade — July 2019 — A Secret Eye . blog PUBLISHER'S NOTICE: Although the authors and publisher have made every eort to ensure that the information in this book was correct at press time, the authors and publisher do not assume and hereby disclaim any liability to any party for any loss, damage, or disruption caused by errors or omissions, whether such errors or omissions result from negligence, TEXTUAL CONTENT: Textual Content can be reproduced for all non-commercial accident, or any other cause. purposes as long as you provide attribution to the author / and original source where available. CONSUMER NOTICE: You should assume that the author of this document has an aliate relationship and/or another material connection to the providers of goods and services mentioned in this report THIRD PARTY COPYRIGHT: and may be compensated when you purchase from a To the extent that copyright subsists in a third party it provider. remains with the original owner. Content compiled and adapted by: Vincent Hardy & J-F Bouchard © Copyright 9218-0082 Qc Inc July 2019 — Spy Lingo — A Secret Eye Table Of Contents INTRODUCTION 4 ALPHA 5 Ab - Ai 5 Al - As 6 Au - Av 7 Bravo 8 Ba - Bl 8 Bl - Bre 9 Bri - Bu 10 CHARLIE 11 C3 - Can 11 Car - Chi 12 Cho - Cl 13 Cn - Com 14 Comp - Cou 15 Cov 16 Cu 17 DELTA 18 Da - De 18 De - Di 19 Di - Dru 20 Dry - Dz 21 Echo 22 Ea - Ex 22 Ey 23 FOXTROT 24 Fa - Fi 24 Fl - For 25 Fou - Fu 26 GOLF 27 Ga - Go 27 Gr - Gu 28 HOTEL 29 Ha - Hoo 29 Hou - Hv 30 INDIA 31 Ia
    [Show full text]