Espionage Threats at Federal Laboratories: Balancing Scientific Cooperation While Protecting Critical Information

Total Page:16

File Type:pdf, Size:1020Kb

Espionage Threats at Federal Laboratories: Balancing Scientific Cooperation While Protecting Critical Information ESPIONAGE THREATS AT FEDERAL LABORATORIES: BALANCING SCIENTIFIC COOPERATION WHILE PROTECTING CRITICAL INFORMATION HEARING BEFORE THE SUBCOMMITTEE ON OVERSIGHT COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION THURSDAY, MAY 16, 2013 Serial No. 113–28 Printed for the use of the Committee on Science, Space, and Technology ( Available via the World Wide Web: http://science.house.gov U.S. GOVERNMENT PRINTING OFFICE 81–192PDF WASHINGTON : 2013 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HON. LAMAR S. SMITH, Texas, Chair DANA ROHRABACHER, California EDDIE BERNICE JOHNSON, Texas RALPH M. HALL, Texas ZOE LOFGREN, California F. JAMES SENSENBRENNER, JR., DANIEL LIPINSKI, Illinois Wisconsin DONNA F. EDWARDS, Maryland FRANK D. LUCAS, Oklahoma FREDERICA S. WILSON, Florida RANDY NEUGEBAUER, Texas SUZANNE BONAMICI, Oregon MICHAEL T. MCCAUL, Texas ERIC SWALWELL, California PAUL C. BROUN, Georgia DAN MAFFEI, New York STEVEN M. PALAZZO, Mississippi ALAN GRAYSON, Florida MO BROOKS, Alabama JOSEPH KENNEDY III, Massachusetts RANDY HULTGREN, Illinois SCOTT PETERS, California LARRY BUCSHON, Indiana DEREK KILMER, Washington STEVE STOCKMAN, Texas AMI BERA, California BILL POSEY, Florida ELIZABETH ESTY, Connecticut CYNTHIA LUMMIS, Wyoming MARC VEASEY, Texas DAVID SCHWEIKERT, Arizona JULIA BROWNLEY, California THOMAS MASSIE, Kentucky MARK TAKANO, California KEVIN CRAMER, North Dakota ROBIN KELLY, Illinois JIM BRIDENSTINE, Oklahoma RANDY WEBER, Texas CHRIS STEWART, Utah VACANCY SUBCOMMITTEE ON OVERSIGHT HON. PAUL C. BROUN, Georgia, Chair F. JAMES SENSENBRENNER, JR., DAN MAFFEI, New York Wisconsin ERIC SWALWELL, California BILL POSEY, Florida SCOTT PETERS, California DAVID SCHWEIKERT, Arizona EDDIE BERNICE JOHNSON, Texas KEVIN CRAMER, North Dakota LAMAR S. SMITH, Texas (II) C O N T E N T S Date of Hearing Page Witness List ............................................................................................................. 2 Hearing Charter ...................................................................................................... 3 Opening Statements Statement by Representative Paul C. Broun, Chairman, Subcommittee on Oversight, Committee on Science, Space, and Technology, U.S. House of Representatives .................................................................................................... 9 Written Statement ............................................................................................ 10 Statement by Representative Dan Maffei, Ranking Minority Member, Sub- committee on Oversight, Committee on Science, Space, and Technology, U.S. House of Representatives ............................................................................ 11 Written Statement ............................................................................................ 11 Witnesses: Dr. Charles M. Vest, President, National Academy of Engineering Oral Statement ................................................................................................. 12 Written Statement ............................................................................................ 15 Dr. Larry Wortzel, Commissioner, U.S.-China Economic and Security Review Commission Oral Statement ................................................................................................. 30 Written Statement ............................................................................................ 32 Hon. Michelle Van Cleave, Senior Fellow, Homeland Security Policy Institute, George Washington University Oral Statement ................................................................................................. 43 Written Statement ............................................................................................ 45 Mr. David G. Major, Founder and President, The Centre for Counterintel- ligence and Security Studies Oral Statement ................................................................................................. 59 Written Statement ............................................................................................ 62 Discussion ................................................................................................................. 104 Appendix I: Answers to Post-Hearing Questions Dr. Charles M. Vest, President, National Academy of Engineering ................... 116 Dr. Larry Wortzel, Commissioner, U.S.-China Economic and Security Review Commission ........................................................................................................... 120 Hon. Michelle Van Cleave, Senior Fellow, Homeland Security Policy Institute, George Washington University ........................................................................... 125 Mr. David G. Major, Founder and President, The Centre for Counterintel- ligence and Security Studies. .............................................................................. 133 (III) ESPIONAGE THREATS AT FEDERAL LABORATORIES: BALANCING SCIENTIFIC COOPERATION WHILE PROTECTING CRITICAL INFORMATION THURSDAY, MAY 16, 2013 HOUSE OF REPRESENTATIVES, SUBCOMMITTEE ON OVERSIGHT COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY, Washington, D.C. The Subcommittee met, pursuant to call, at 3:00 p.m., in Room 2318 of the Rayburn House Office Building, Hon. Paul Broun [Chairman of the Subcommittee] presiding. (1) 2 LAMAR S. SMITH, Texas EDDIE BERNICE JOHNSON, Texas CHAIRMAN RANKING MEMBER ~ngrrns of the mnlted ~tatcs tlous£ of 'R£pftscntatiots COMMITIEE ON SCIENCE, SPACE, AND TECHNOLOGY 2321 RAyeURN House OFFICE BUILDING WASHINGTON, DC 20515-6301 {202) 225-6371 www.science.houSB.gov .Subcommittee on Oversight Espionage Threats at Federal Laboratories: Balancing Scientific Cooperation while Protecting Critical Information Thursday, May 16,2013 2:00 p.m. to 4:00 p.m. 2318 Rayburn House Office Building Dr. Charles M. Vest, President, National Academy of Engineering Dr. Larry Wortzel, Commissioner, U.S.-China Economic and Security Review Commission Hon. Michelle Van Cleave, Senior Fellow, Homeland Security Policy Institute, George Washington University Mr. David G. Major, Founder and President, The Centre for Counterintelligence and Security Studies 3 U.S. House of Representatives Committee on Science, Space, and Technology Subcommittee on Oversight HEARING CHARTER Espionage Threats at Federal Laboratories: Balancing Scientific Cooperation while Protecting Critical Information Thursday, May 16,2013 2:00 p.m. - 4:00 p.m. 2318 Rayburn House Office Building On May 16, 2013, the Subcommittee on Oversight will hold a hearing titled Espionage Threats at Federal Laboratories: Balancing Scientific Cooperation while Protecting Critical Information. The goal is to gain an understanding of how federally-owned-or-operated laboratories balance scientific openness and international cooperation with the need to protect sensitive information from espionage. This hearing will focus on identifying potential deficiencies, best practices, and to ensure sensible federal policies. Witnesses • Dr. Charles M. Vest, President, National Academy of Engineering; • Dr. Larry WortzeJ, Commissioner, U.S.-China Economic and Security Review Commission; • Hon. Michelle Van Cleave, Senior Fellow, Homeland Security Policy Institute, George Washington University; • Mr. David G. Major, Founder and President, The Centre for Counterintelligence and Security Studies. Background The United States has long been the world leader in higher education, science and technology and a magnet for foreign-born scholars, scientists and engineers. Unfortunately, various actors have sought to exploit our openness to steal American ingenuity and innovation. Such thefts can enable nations to save themselves billions in research and development costs and make technological advances they would be unable to make on their own to gain a competitive industrial advantage or modernize their military and other national capabilities. Historically, restrictions focused mostly on technologies with obvious military applications such as nuclear material, cryptography and biological weapons. The goal of American counterespionage was to prevent a potential adversary from gaining such technological 4 advantage, and during the Cold War, it was generally clear what nations should be guarded against. However, the emergence of transnational terrorist actors and the means of communicating information, including technological innovation, via the Internet, has given rise to a far greater, more diverse and global espionage threat. In the United States, there has long been support for a policy of not restricting publication of federally supported research results, except where classified for national security reasons. This position was best expressed in 1985 by President Ronald Reagan in National Security Decision Directive 189 (NSDD-189), which remains the government policy regarding controls on federally-funded research results. The directive asserts that "to the maximum extent possible, the products of fundamental research remain unrestricted."l Fundamental research is defined within NSDD-189 as: " ... basic and applied research in science and engineering, the results of which ordinarily are published and shared broadly within the scientific community, as distinguished from proprietary
Recommended publications
  • Commercial and Industrial Cyber Espionage in Israel
    Commercial and Industrial Cyber Espionage in Israel Shahar Argaman and Gabi Siboni Cyberspace is especially suited to the theft of business information and to espionage. The accessibility of information, along with the ability to remain anonymous and cover one’s tracks, allows various entities to engage in the theft of valuable information, an act that can cause major damage. Israel, rich in advanced technology and a leader in innovation-based industries that rely on unique intellectual property, is a prime target for cyber theft and commercial cyber attacks. This article examines the scope of cyber theft and cyber industrial espionage globally, and attempts to estimate how much !nancial damage they cause in countries around the world and in Israel. It seeks to raise awareness of the extent of the phenomena among the relevant authorities in Israel and provide recommendations on how to grapple with it. Keywords : Cyber, espionage, industrial espionage, intellectual property, cyber crime, cyber theft, technology “There are two types of companies: companies that have been breached and companies that don’t know they’ve been breached…. The vast majority of companies have been breached.” 1 Shawn Henry The director of the National Security Agency, Gen. Keith Alexander, called cybercrime “the greatest transfer of wealth in history.” The price tag for intellectual property theft from U.S. companies is at least $250 billion a year .2 Shahar Argaman is the director of the National Cyber Sta!. Col. (ret.) Dr. Gabi Siboni is the head of the Military and Strategic A!airs Program and Cyber Security Program at INSS. Military and Strategic Affairs | Volume 6 | No.
    [Show full text]
  • Considering the Creation of a Domestic Intelligence Agency in the United States
    HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Farewell [Blu-Ray]
    Farewell [Blu-ray] Product Information Income Rank: #118520 around Dvd and blu-ray Released on: 2011-04-12 Rating: Unrated Volume of cds: One particular Models: AC-3, Blu- ray, Dolby, Known as, NTSC, Subtitled, Vast screen Unique terminology: People from france Subtitled in: Language Named throughout: Uk Range of cds: One Measurements: .40" they would x Several.30" n a 7.75" m,.Something like 20 excess fat Going time period: 113 units "Farewell" (L'affaire Good bye) is actually a Cold Showdown espionage thriller encouraged by the real-life the event of Vladmir Vetrov, some sort of KGB police officer whom, inside the Eighties, gifted france household intellect company DST referred to as regarding KGB real estate agents in the West who have been linked to business as well as engineering espionage. Whilst you will discover clear characteristics around Vetrov's narrative and therefore from the figures from the picture (e.h. Vetrov approved data through a French electrical engineer connected with his friend), Vetrov was a large amount extra foolhardy, and inebriated, as compared with her similarity within the movie, which was some sort of dangerous flaw. Representative Religious Carion modified a movie script coming from Serguei Kostine's nonfiction publication "Bonjour Adios: L . a . verit� en el tau pe fran�aise du KGB.Inch In 1981, the The french language electrical engineer wor king in Moscow, Pierre Froment (Guillaume Canet), may get deeper on the espionage business when compared with he supposed if a like with the French safety measures company DST sets them talking to the high-ranking KGB official who wishes to move techniques.
    [Show full text]
  • Foreign Economic Espionage in Cyberspace 2018
    Foreign Economic Espionage in Cyberspace 2018 NATIONAL COUNTERINTELLIGENCE AND SECURITY CENTER Contents Executive Summary • 1 Scope Note • 2 I. The Strategic Threat of Cyber Economic Espionage • 4 II. Threats from Foreign Countries • 5 China: Persistent Cyber Activities • 5 Russia: A Sophisticated Adversary • 8 Iran: An Increasing Cyber Threat • 9 Targeted Technologies • 11 III. Emerging Threats • 12 Software Supply Chain Operations • 13 Foreign Laws Could Enable Intellectual Property Theft • 13 Foreign Technology Companies With Links to Host Governments • 14 Annex – Decreasing the Prevalence of Economic or Industrial Espionage in Cyberspace • 15 Executive Summary In the 2011 report to Congress on Foreign Spies Stealing U.S. Economic Secrets in Cyberspace, the Office of the National Counterintelligence Executive provided a baseline assessment of the many dangers facing the U.S. research, development, and manufacturing sectors when operating in cyberspace, the pervasive threats posed by foreign intelligence services and other threat actors, and the industries and technologies most likely at risk of espionage. The 2018 report provides additional insight into the most pervasive nation-state threats, and it includes a detailed breakout of the industrial sectors and technologies judged to be of highest interest to threat actors. It also discusses several potentially disruptive threat trends that warrant close attention. This report focuses on the following issues Foreign economic and industrial espionage against the United States continues to represent a significant threat to America’s prosperity, security, and competitive advantage. Cyberspace remains a preferred operational domain for a wide range of industrial espionage threat actors, from adversarial nation- states, to commercial enterprises operating under state influence, to sponsored activities conducted by proxy hacker groups.
    [Show full text]
  • The Importance of Osthandel: West German-Soviet Trade and the End of the Cold War, 1969-1991
    The Importance of Osthandel: West German-Soviet Trade and the End of the Cold War, 1969-1991 Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of the Ohio State University By Charles William Carter, M.A. Graduate Program in History The Ohio State University 2012 Dissertation Committee: Professor Carole Fink, Advisor Professor Mansel Blackford Professor Peter Hahn Copyright by Charles William Carter 2012 Abstract Although the 1970s was the era of U.S.-Soviet détente, the decade also saw West Germany implement its own form of détente: Ostpolitik. Trade with the Soviet Union (Osthandel) was a major feature of Ostpolitik. Osthandel, whose main feature was the development of the Soviet energy-export infrastructure, was part of a broader West German effort aimed at promoting intimate interaction with the Soviets in order to reduce tension and resolve outstanding Cold War issues. Thanks to Osthandel, West Germany became the USSR’s most important capitalist trading partner, and several oil and natural gas pipelines came into existence because of the work of such firms as Mannesmann and Thyssen. At the same time, Moscow’s growing emphasis on developing energy for exports was not a prudent move. A lack of economic diversification resulted, a development that helped devastate the USSR’s economy after the oil price collapse of 1986 and, in the process, destabilize the communist bloc. Against this backdrop, the goals of some West German Ostpolitik advocates—especially German reunification and a peaceful resolution to the Cold War—occurred. ii Dedication Dedicated to my father, Charles William Carter iii Acknowledgements This project has been several years in the making, and many individuals have contributed to its completion.
    [Show full text]
  • Conflict and Negotiation in Cyberspace
    a report of the technology and public policy program Conflict and Negotiation in Cyberspace February 2013 Author James A. Lewis CHARTING our future a report of the technology and public policy program Conflict and Negotiation in Cyberspace February 2013 Author James A. Lewis CHARTING our future About CSIS—50th Anniversary Year For 50 years, the Center for Strategic and International Studies (CSIS) has developed solutions to the world’s greatest policy challenges. As we celebrate this milestone, CSIS scholars are developing strategic insights and bipartisan policy solutions to help decisionmakers chart a course toward a better world. CSIS is a nonprofit organization headquartered in Washington, D.C. The Center’s 220 full- time staff and large network of affiliated scholars conduct research and analysis and develop policy initiatives that look into the future and anticipate change. Founded at the height of the Cold War by David M. Abshire and Admiral Arleigh Burke, CSIS was dedicated to finding ways to sustain American prominence and prosperity as a force for good in the world. Since 1962, CSIS has become one of the world’s preeminent international institutions focused on defense and security; regional stability; and transnational challenges ranging from energy and climate to global health and economic integration. Former U.S. senator Sam Nunn has chaired the CSIS Board of Trustees since 1999. Former deputy secretary of defense John J. Hamre became the Center’s president and chief executive of- ficer in April 2000. CSIS does not take specific policy positions; accordingly, all views expressed herein should be understood to be solely those of the author(s).
    [Show full text]
  • Cyber-Espionage: a Growing Threat to the American Economy
    Cyber-Espionage: A Growing Threat to the American Economy Gerald O'Harat "It's the great irony of our Information Age-the very technologies that empower us to create and to build also empower those who would disrupt and destroy. "' I. INTRODUCTION The American economy is currently the world's largest and most advanced. 2 It is this status that allows the United States to remain among the most power- ful and influential countries in the world. However, the country's economy is at risk of marginalization in a way that many policymakers could not have en- visioned just a decade ago. The potential result threatens not only the economic standing of the United States in the global economy, but its national security as well. Although threats of economic and industrial espionage have long ex- isted,' the international proliferation of the Internet makes cyber economic and J.D. 2010, The Catholic University of America, Columbus School of Law. The author would like to thank Ed Schellhom and Jenny Childs for their thoughtful suggestions throughout the writing process, as well as the editors and staff of the COMMLAW CONSPEC- TUS for all of their hard work in preparing Volume 19. 1 President Barack Obama, Remarks by the President on Securing Our Nation's Cyber Infrastructure (May 29, 2009), available at http://www.whitehouse.gov/thepress-office/Remarks-by-the-President-on-Securing-Our- Nations-Cyber-Infrastructure/. 2 The World Factbook, CENT. INTELLIGENCE AGENCY, http://www.cia.gov/library/publications/the-world-factbook/geos/us.html (follow "Econ- omy" hyperlink) (last visited Jan.
    [Show full text]
  • Technology and Obsolescence in America Copyright © 2006 by Giles Slade All Rights Reserved Printed in the United States of America
    Made to Break GILES SLADE Harvard University Press Cambridge, Massachusetts I London, England Made To Break Technology and Obsolescence in America Copyright © 2006 by Giles Slade All rights reserved Printed in the United States of America First Harvard University Press paperback edition, 2007 Library of Congress Cataloging-in-Publication Data Slade, Giles. Made to break : technology and obsolescence in America I Giles Slade. p. cm. ISBN-13 978-0-674-02203-4 (cloth: alk. paper) ISBN-10 0-674-02203-3 (cloth: alk. paper) ISBN-13 978-0-674-02572-1 (pbk.) ISBN-10 0-674-02572-5 (pbk.) 1. Technological innovations-United States. I. Title. T173.8.S595 2006 609.73-dc22 2005036315 Introduction 1 1 Repetitive Consumption 9 2 The Annual Model Change 29 3 Hard Times 57 4 Radio, Radio 83 5 The War and Postwar Progress 115 6 The Fifties and Sixties 151 7 Chips 187 8 Weaponizing Planned Obsolescence 227 9 Cell Phones and E-Waste 261 Notes 283 Acknowledgments 313 Index 316 America, I do not call your name without hope -PABLO NERUDA To scrutinize the trivial can be to discover the monumental. Almost any object can serve to unveil the mysteries of engineering and its relation to art, business, and all other aspects of our culture. HENRY PETROSKI, THE PENCIL: A HISTORY (1989) For no better reason than that a century of advertising has condi­ tioned us to want more, better, and fa ster from any consumer good we purchase, in 2004 about 315 million working PCs were retired in North America. Of these, as many as 10 percent would be refurbished and reused, but most would go straight to the trash heap.
    [Show full text]
  • Soviet Agents, Working from Master Shopping Lists, Got Amazing Cooperation from Their Victims in the West
    Soviet agents, working from master shopping lists, got amazing cooperation from their victims in the West. Excerpted from War by Other Means: Economic Espionage in America, by John J. Fialka. © 1997 by John J. Fialka. Reprinted with permission of the publisher, W. W. Norton & Co., Inc. Mr. Fialka, a reporter in the Washington bureau of the Wall Street Journal, has covered defense, intelligence, and national security topics for many years. This is his first article for Air Force Magazine. he Moscow avenue called of Ludmilla sounded accusatory, then T Rublovsky Chosse is a street terror-stricken. Vet rov had pulled a that knows how to keep its secrets. It knife and was trying to kill her. meanders through the most exclusive A man walking nearby heard Lud- suburb of the Russian capital, past milla’s screams. He rapped on the the tall green fences shrouding the car window. Vetrov leaped out and sprawling, forested estates where, in plunged the knife into him. As the years past, powerful Soviet officials dying passerby slumped to the ground, lived in regal splendor. Vetrov fled. Later, he returned, to the The street also has private little astonishment of police, who promptly wooded pockets. In the early 1980s, arrested him. They were shocked to Vladimir Vetrov, a paunchy, well- learn that the killer was a KGB colonel dressed man in his late 40s, used to with a sensitive job in the First Chief park there with his mistress, Lud milla. Directorate, which handles foreign Vetrov had a huge secret, and, in intelligence. November 1982, it almost came out.
    [Show full text]
  • Industrial Espionage from AFIO's the INTELLIGENCER
    Association of Former Intelligence Officers 7700 Leesburg Pike, Suite 324 From AFIO's The Intelligencer Falls Church, Virginia 22043 Journal of U.S. Intelligence Studies Web: www.afio.com, E-mail: [email protected] • A trained foreign agent, who had been in the Volume 22 • Number 1 • $15 single copy price Spring 2016 ©2016, AFIO United States for more than 20 years and had become a citizen, suddenly was “activated” by his controllers in Asia and given a “shopping list” of technical information to obtain, and then proceeded to steal massive amounts of technical information from his company on the next generation of nuclear submarines being constructed for the US Navy. GUIDE TO THE STUDY OF INTELLIGENCE • An employee working for a large US manufac- turing company decided to strike out and form his own company, but first stole all of the nec- essary technical information to manufacture competing high-technology products. • A country that is an enemy (or “strategic com- petitor”) to the United States sent a number of Industrial Espionage “illegals” into various companies to systemat- ically report on all technical developments and strategies of the targeted US companies. by Edward M. Roche, PhD, JD • A major hotel chain vice president decided that he was not being paid enough and took all of No information I received was the result of spying. the records regarding the development of a Everything was given to me in casual conversations new hotel concept to a competitor, where he got without coercion. better pay and a substantial promotion. 1 — Richard Sorge, interrogation at Sugamo Prison.
    [Show full text]
  • Guide to Computer Forensics and Investigations Fourth Edition
    Guide to Computer Forensics and Investigations Fourth Edition Chapter 2 Understanding Computer Investigations Objectives • Explain how to prepare a computer investigation • Apply a systematic approach to an investigation • Describe procedures for corporate high-tech investigations Guide to Computer Forensics and Investigations 2 Objectives (continued) • Explain requirements for data recovery workstations and software • Describe how to conduct an investigation • Explain how to complete and critique a case Guide to Computer Forensics and Investigations 3 Preparing a Computer Investigation • Role of computer forensics professional is to gather evidence to prove that a suspect committed a crime or violated a company policy • Collect evidence that can be offered in court or at a corporate inquiry – Investigate the suspect’s computer – Preserve the evidence on a different computer Guide to Computer Forensics and Investigations 4 Preparing a Computer Investigation (continued) • Follow an accepted procedure to prepare a case • Chain of custody – Route the evidence takes from the time you find it until the case is closed or goes to court Guide to Computer Forensics and Investigations 5 An Overview of a Computer Crime • Computers can contain information that helps law enforcement determine: – Chain of events leading to a crime – Evidence that can lead to a conviction • Law enforcement officers should follow proper procedure when acquiring the evidence – Digital evidence can be easily altered by an overeager investigator • Information on hard disks
    [Show full text]