Counterintelligence and Cyber News and Views
Total Page:16
File Type:pdf, Size:1020Kb
Counterintelligence and Cyber News and Views Counterintelligence and Cyber News and Views October-November 2012 Volume 1 Issue 7 Inside this issue: Pg. 1 THE SPIES AMONG US: THE NEVERENDING CYCLE AND THE PLAYERS NEVER SEEM TO CHANGE Pg. 2 FOREIGN TRAVEL BRIEFING SOURCE Pg. 4 CHI MAK CONVICTION UPHELD Pg. 4 FORMER CIA OFFICER JOHN KIRAKOU PLEADS GUILTY TO DISCLOSING CLASSIFIED INFORMATION Pg. 5 TWO CHINESE NATIONALS CHARGED WITH STEALING TRADE SECRETS Pg. 6 U.S. CONSULATE GUARD PLEADS GUILTY TO ATTEMPTING TO COMMUNICATE NATIONAL DEFENSE INFORMATION TO CHINA Corporate Headquarters Pg. 7 RUSSIAN AGENT AND 10 OTHER MEMBERS OF 222 North Sepulveda Boulevard, Suite 1780 PROCUREMENT NETWORK FOR RUSSIAN MILITARY AND INTELLIGENCE OPERATING IN THE U.S. AND El Segundo, California 90245 (310) 536-9876 RUSSIA INDICTED www.advantagesci.com Pg. 9 DEFENSE CONTRACTOR ALLEGED TO HAVE TAKEN COMPETITOR‟S BID INFORMATION PAYS $1.15 MILLION Pg. 10 TAIWANESE NATIONAL SENTENCED TO PRISON FOR ILLEGALLY EXPORTING MILITARY SENSITIVE ITEMS FROM THE UNITED STATES CI TRENDS Pg. 11 CHINESE NATIONAL ARRESTED AFTER ATTEMPTING TO ILLEGALLY EXPORT AEROSPACE- THE SPIES AMONG US: A NEVERENDING CYCLE AND THE PLAYERS NEVER SEEM GRADE CARBON FIBER TO CHINA TO CHANGE Pg. 12 FORMER EMPLOYEE OF NEW JERSEY In this months newsletter the reader will see at least nine news releases detailing arrests, trials, convictions or DEFENSE CONTRACTOR CONVICTED OF EXPORTING SENSITIVE MILITARY TECHNOLOGY TO CHINA appellate rulings pertaining to individuals charged with violations of the espionage statutes, economic espio- nage, theft of trade secrets, export violations, and related criminal violations. Pg. 13 FORMER CME GROUP SOFTWARE ENGINEER PLEADS GUILTY TO STEALING GLOBEX COMPUTER Perhaps of interest to the reader is the list of countries for which these alleged or convicted individuals were TRADE SECRETS working, or on behalf of, or to which they were seeking to sell secrets . Pg. 13 TOP EXECUTIVES AT KOLON INDUSTRIES INDICTED FOR STEALING DUPONT‟S KEVLAR TRADE Readers of this newsletter, similar newsletters, media publications and viewers of newscasts have seen the SECRETS same countries involved, year after year. Only the naïve trust our foreign competitors and hostile foreign gov- Pg. 15 RUSSIAN MOLE HAD ACCESS TO WEALTH OF ernments to act ethically and within the boundaries of the law. CSIS, RCMP, PRIVY COUNCIL FILES I remember sitting around the FBI counterintelligence bullpens of the early to mid 1990s, and seeing all the cut Pg. 16 „SO DEAD INSIDE‟: HOW THE MOUNTIES CRACKED JEFFREY DELISLE backs in counterintelligence resources and personnel. Back then, the discussion always focused on the topic of ―Well now the cold war is over. Now the Russians are our friends.‖ Or around 1996, when the political Pg. 18 CHINESE SUSPECTED OF SPYING ON U.S. campaigns of that year were well underway and money was flowing into US politicians through actions such STRATEGIC MISSILE BASE IN WYOMING as described here from Wikipedia: Pg. 18 WHY A YOUNG AMERICAN WANTS TO BE A RUSSIAN SPY The issue first received public attention in early 1997, with news that a Justice Department investiga- Pg. 19 TALIBAN POSE AS 'ATTRACTIVE WOMEN' ON tion had uncovered evidence that agents of China sought to direct contributions to the Democratic FACEBOOK FOR SPYING National Committee (DNC) in violation of U.S. laws regarding foreign political contributions. The Chi- Pg. 20 DETER DETECT DEFEND IDENTITY THEFT nese government denied all accusations. Twenty-two people were eventually convicted of fraud or for funneling Asian funds into the United States elections, and others fled U.S. jurisdiction. Pg. 21 SMARTPHONE USERS SHOULD BE AWARE OF (continued on page 3) MALWARE TARGETING MOBILE DEVICES Pg. 22 LAWYERS‟ IDENTITIES BEING USED FOR FAKE WEBSITES AND SOLICITATIONS NOTE: Much of the Information contained within this newsletter originates from websites maintained by agencies of the U.S. Federal Government. The original web address from which material has been derived is Pg. 22 OUR UNIVERSITIES ARE LEAKING SECRETS posted at the beginning of reproduced articles. Readers are always encouraged to visit the web address Pg. 23 CYBER RELATED THREATS REPORTED from where the article has been derived from, in order to view the article in the original form in which it Pg. 29 OUR BRAVE COUNTERINTELLIGENCE FORCES was presented. This newsletter also contains commentary from the editor of the newsletter. Such IN ACTION commentary is solely the opinion of the newsletter editor and does not represent the views of the U.S. Pg. 30 ADVANTAGE SCI PRODUCTS, SERVICES, Government, nor the agency originally presenting this information on the internet. Questions, TRAINING comments, and subscription requests may be directed to the editor at [email protected] or to Richard Haidle at 310-536-9876 x237 1 Counterintelligence and Cyber News and Views iTravelSafe™ Avoid Cultural Missteps Protect Your Business Secrets Avoid Crime and Scams Travelers Face iTravelSafe™ The Advantage SCI Avoid getting “scammed” when traveling overseas. Read about App frauds and scams related to international travel. Do you have elderly relatives traveling overseas? Gift them a copy of this Sitting in the plane, holding your iPhone, App so they can be aware of scams targeting the elderly. thinking about your trip to Brazil… ―Hmmm. My phone is in ―Airplane Mode‖ with no internet connection. I really wish I had read a bit more detailed information about traveling to Brazil, what I could do safely. But with no internet connection, I guess I can‘t do that, can I?‖ ―Wait a second!! I have the iTravelSafe™ app on my iPhone. All of the data I need is on my phone now. I can read it all even with no internet or cellular connection! Wow, that is really cool! Oh my, look here! I better not Are you a parent with a child go on that hiking trip near Brazil‘s border spending a semester in an regions, I might get kidnapped. Oh no, my overseas study course? planned charitable journey to Rio‘s shanty town is too dangerous. I‘ll have to call it off. Driving overseas? Read about driving in many It‘s a good thing I had iTravelSafe™ with Make sure your children read the “Tips for Students” section of the more than 200 countries this App in- me to tip me off to the danger!‖ of the iTravelSafe™ App. cludes. iTravelSafe™ gives an organization an app for its employees traveling outside the Advantage SCI‟s New Smartphone App: iTravelSafe™ U.S. to use as a ―self-briefing‖ travel tool. Read about hotel safety. Study up on tips Everything you see pictured here is a screenshot from the iTravelSafe™ App. about which business travelers need to be ―savvy.‖ An Android version of this App is available for immediate purchase at the Google Play Store https:// play.google.com/store/search?q=itravelsafe&c=apps, or an iPhone version at the iTunes Store http:// itunes.apple.com/us/app/itravelsafe/id521506480?ls=1&mt=8. Keep up to date with the latest Travel Alerts pushed out to iTravelSafe™ users immediately from the U.S. State Department. Example of the screenshot, appropriate for the country to which it applies, will be sent to your device as soon as the U.S. State Department pushes out the notification of any Travel Alert NOW INCLUDING SECURITY TIP OF THE WEEK ! For volume sales, please contact Richard Haidle at 310-536-9876 x237 or email [email protected]. 2 Counterintelligence and Cyber News and Views (continued from page 1) The five South Korean directors and employees of A trite cliché to close this article, but nevertheless, The thought was, well how can we know? Isn‘t Kolon Industries of South Korea must not have very true. China our friend? We‘ve cut back resources, so read the memo about don‘t bite the hand of he who is feeding you when they conspired to steal this must not be a problem. No foreign nation would seek to influence our political process, the technology behind DuPont‘s Kevlar Trade would they? Secrets. And of course, no US citizen would reveal Well, over the course of time, wiser heads prevailed, and appropriate resources and classified information to the media that could manpower were restored to the cause potential harm. Unless of course, you are counterintelligence arena. former CIA Officer John Kiriakou, 48, of Arlington, Virginia, who pleaded guilty to disclosing to a When this happened, and over the course of the journalist the name of a covert CIA officer and to John Kiriakou last ten or 15 years, the spies and economic disclosing information revealing the role of thieves and corrupt insiders trading in classified another CIA employee in classified activities. information and trade secrets were caught, increasingly before doing harm. And no US company would try to steal trade secrets or proprietary information from another US The fine work of special agents from the FBI, from company, would they? Not unless they were a the Immigration and Customs Enforcement offices defense contractor based in Aurora, Colorado, that agreed to pay $1,150,000 to settle allegations of the Department of Homeland Security, the Kolon Industries Department of Commerce, the Naval Criminal that it improperly obtained bid and proposal Investigative Service, the Air Force Office of information from a competitor on contracts for the Special Investigations, the Defense Criminal National Reconnaissance Office (NRO). Investigative Service and other Federal Agencies and Task Forces has resulted in detecting, What conclusions can we draw from this litany of deterring, preventing or arresting those that would illegal activity? steal our national and commercial secrets. Well, first, the theft of trade secrets and economic The hard work and dedication of these special espionage activity could not have been stopped agents, from all of these agencies, is represented through use of criminal statutes until October of in the arrests, etc.