Counterintelligence and Cyber News and Views
Total Page:16
File Type:pdf, Size:1020Kb
Counterintelligence and Cyber News and Views Counterintelligence and Cyber News and Views April 2013 Volume 2 Issue 2 INSIDE THIS ISSUE: PG. 1 CURRENT TREND ANALYSIS PG. 2 REVIEW OF COUNTERINTELLIGENCE/CYBER SECURITY SEMINAR PG. 7 ARRESTS, TRIALS, CONVICTIONS PG. 7 NAVY SPY DELISLE SENTENCED TO 20 YEARS IN PRISON PG. 7 FOREIGN ECONOMIC ESPIONAGE INVESTIGATION LEADS TO ARREST PG. 8 IRANIAN CITIZEN SENTENCED IN PLOT TO EXPORT AIRCRAFT PARTS TO IRAN Corporate Headquarters PG. 9 US DEFENCE CONTRACTOR, 59, 222 North Sepulveda Boulevard, Suite 1780 'GAVE CLASSIFIED INFORMATION TO 27 -YEAR-OLD CHINESE LOVER IN El Segundo, California 90245 (310) 536-9876 HONEYTRAP' www.advantagesci.com PG. 12 FORMER U.S. CONSULATE GUARD SENTENCED TO NINE YEARS IN PRISON FOR ATTEMPTING TO COMMUNICATE NATIONAL DEFENSE CI TRENDS INFORMATION TO CHINA In this issue of Counterintelligence and Cyber News and Views we would like to focus on recent arrests and PG. 13 ALASKA-BASED SOLDIER GETS convictions related to counterintelligence (CI). Most of the stories that follow occurred between January and 16 YEARS IN SPY CASE April 2013. Most of the persons discussed within this article represent the type of targets Hostile Intelligence PG. 14 METHODS AND TECHNIQUES Services (HOIS) will attempt to recruit or compromise. You will see, from within these stories, a pattern of methodology used by our foes to compromise individuals, gain access to our technology and use it to our PG. 14 5 LESSONS FROM THE FBI INSIDER THREAT PROGRAM disadvantage. Additionally, stories of greed, revenge and fraud round out some of the methods CI professionals find daily in their struggles to protect classified, sensitive, and export controlled information. PG. 15 ATTORNEY GENERAL ERIC HOLDER SPEAKS AT THE Our first story, represents, in our opinion (let’s wait for the trial before we call anybody guilty) a classic case of ADMINISTRATION TRADE SECRET the so called ―honeypot,‖ where an older male has been, apparently, seduced by a younger woman, and STRATEGY ROLLOUT passes on to her US government classified information. PG. 17 CYBER RELATED THREATS This is the apparent story of ―Benjamin Pierce Bishop, 59, a former U.S. Army officer who works as a civilian REPORTED IN THE DHS DAILY OPEN SOURCE INFRASTRUCTURE REPORT employee of a defense contractor at U.S. Pacific Command (USPACOM) in Hawaii, "Bishop…(was) …‖arrested on charges of communicating classified national defense information to a person not entitled to PG. 20 VIRUS ALERT EMAIL NOT receive such information.‖ The US Attorney for Honolulu’s press release regarding this case is reprinted in its REALLY FROM FBI entirety later in this newsletter. PG. 20 LOOKING FOR LOVE? BEWARE OF ONLINE DATING SCAMS In summary, a 27-year-old female citizen of the PRC has, in all likelihood, seduced a retired U.S. Army Lieutenant Colonel into allegedly ―telling his 27-year-old Chinese girlfriend top secret details about the U.S.’s PG. 21 STATEMENT TO HOUSE nuclear capabilities and defense protocols.‖ COMMITTEE ON THE JUDICIARY, SUBCOMMITTEE ON CRIME, We will continue to follow this story with great interest and will keep readers of this newsletter apprised of any TERRORISM, AND HOMELAND SECURITY updates. PG. 23 DEPUTY ATTORNEY GENERAL (Continued on pg. 3) JAMES M. COLE SPEAKS AT THE ADMINISTRATION EVENT TO HIGHLIGHT PRIORITIES FOR CYBERSECURITY POLICY NOTE: Much of the Information contained within this newsletter originates from websites maintained by PG. 24 EXECUTIVE ORDER -- IMPROVING agencies of the U.S. Federal Government. The original web address from which material has been derived is CRITICAL INFRASTRUCTURE CYBERSECURITY posted at the beginning of reproduced articles. Readers are always encouraged to visit the web address from where the article has been derived from, in order to view the article in the original form in which it PG. 28 THE FBI IN POPULAR FICTION was presented. This newsletter also contains commentary from the editor of the newsletter. Such (COMIC BOOKS) commentary is solely the opinion of the newsletter editor and does not represent the views of the U.S. PG. 28 TRAVEL APP INFORMATION Government, nor the agency originally presenting this information on the internet. Questions, comments, PG. 29 ADVANTAGE SCI PRODUCTS, and subscription requests may be directed to the editor at [email protected] or to Richard Haidle SERVICES, TRAINING at 310-536-9876 x237 1 Counterintelligence and Cyber News and Views Counterintelligence/Cyber Security Seminar: Lively Discussions, Enlightening Views Advantage SCI hosted its first CI/Cyber Security Seminar on Wednesday, February 27th 2013. With more than 35 attendees, a diverse mix of cleared defense contractors, government, and municipal employees was in attendance. Advantage SCI CEO and President, Elsa Lee, welcomed our guests, and provided a brief overview of the company. Our first presentation of the day was provided by Mike Hartman (pictured at right) of the Aerospace Corporation. Mike retired from the FBI Los Angeles as the Assistant Special Agent in Charge for Counterintelligence before moving onto the Aerospace Corporation in the early 2000s. Mike discussed the art of counterintelligence and its current state. He delineated case examples and current legal precedents affecting counterintelligence. Finally, he pointed out trends and issues the discipline faces going forward. Following Mike was Brian Smith from Advantage SCI (pictured at right, middle photo). Brian is a retired Lieutenant Colonel from the USAF. Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence. Next, Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke. Deb retired from the USAF as an OSI agent, then worked at Boeing before joining Disney. Deb discussed the protection of intellectual property and some of the inherent challenges. Our final presenter of the day was Jason Smolanoff of Stroz Friedberg. Jason was a Supervisory Special Agent with the FBI, heading up one of the FBI Los Angeles Cyber squads prior to joining Stroz Friedberg. Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world. Our seminar was a great success. Our guests provided great reviews of the day’s presentations. With the favorable reviews and positive comments, another seminar will be planned for the late summer or early fall. 2 Counterintelligence and Cyber News and Views (Continued from pg. 1) Sensitive technologies that are supposed to be China, was sentenced to nine years in prison in The next arrest of interest is outlined In this brief strictly limited by U.S. export control laws are connection with his efforts to sell for personal extract from the Washington Examiner at web link: essential to U.S. space defense programs, but financial gain classified photographs, information http://washingtonexaminer.com/watchdog-alert-fbi Wolf said they could also apply to ―unmanned and access related to the U.S. Consulate to -arrests-nasa-contract-employer-trying-to-flee-to- aerial vehicles and other aerospace/aeronautic China’s Ministry of State Security (MSS), china/article/2524691 where the arrest of Chinese technologies.‖ announced Lisa Monaco, Assistant Attorney national Bo Jiang is reported: General for the Justice Department’s National There is little information publicly available Security Division; Ronald C. Machen Jr., U.S. ―Jiang was employed by the National Institute of regarding this case beyond what we have Attorney for the District of Columbia; Valerie Aerospace, a Hampton, VA-based NASA included here. Parlave, Assistant Director in Charge of the FBI’s contractor. The position afforded Jiang virtually Washington Field Office; and Gregory B. Starr, unlimited, unescorted access to the NASA Located at http://www.federalnewsradio.com/pdfs/ Director of the U.S. State Department’s Diplomatic Langley facility, which is the location for classified jiang_affadavit.pdf the FBI affidavit for this case Security Service. research programs related to U.S. space defense implies the existence of a great deal of sensitive, technologies. possibly export controlled or classified information Underwood pleaded guilty Aug. 30, 2012, in the that Bo Jiang was trying to take with him to China. U.S. District Court for the District of Columbia to Ronda Squizzero, an FBI Special Agent said in one count of attempting to communicate national documents Wolf made available today concerning Again, we anxiously await further details on this defense information to a foreign government with Jiang’s arrest that he ―was leaving the United sensitive case. intent or reason to believe that the documents, States abruptly to return to China on a one-way photographs or information in question were to be ticket.‖ Our next case of interest involves one Hua Jun used to the injury of the United States or to the Zhao. ―On March 29, 2013, special agents in the advantage of a foreign nation. He was sentenced The FBI is ―investigating conspiracies and Milwaukee Division of the FBI arrested Hua Jun by the Honorable Ellen S. Huvelle. Upon substantive violations of the Arms Export Control Zhao, age 42. Zhao is charged via a criminal completion of his prison term, Underwood will be Act,‖ according to the FBI’s arrest warrant. complaint for knowingly engaging in economic placed on two years of supervised release. espionage benefiting a foreign government, Jiang also is charged with making a false foreign instrumentality, or foreign agent, in Significant about this case is that Underwood, statement to federal law enforcement agents, violation of Title 18, United States Code, Section having experienced financial pitfalls, apparently including his attempt to conceal a ―laptop, and old 1831 (a) (1)(2)(3)‖. decided to sell out the US Government to recoup hard drive and a SIM card,‖ according to the FBI his losses. Through good fortune, he was never agent.