Counterintelligence and Cyber News and Views

Total Page:16

File Type:pdf, Size:1020Kb

Counterintelligence and Cyber News and Views Counterintelligence and Cyber News and Views Counterintelligence and Cyber News and Views October-November 2012 Volume 1 Issue 7 Inside this issue: Pg. 1 THE SPIES AMONG US: THE NEVERENDING CYCLE AND THE PLAYERS NEVER SEEM TO CHANGE Pg. 2 FOREIGN TRAVEL BRIEFING SOURCE Pg. 4 CHI MAK CONVICTION UPHELD Pg. 4 FORMER CIA OFFICER JOHN KIRAKOU PLEADS GUILTY TO DISCLOSING CLASSIFIED INFORMATION Pg. 5 TWO CHINESE NATIONALS CHARGED WITH STEALING TRADE SECRETS Pg. 6 U.S. CONSULATE GUARD PLEADS GUILTY TO ATTEMPTING TO COMMUNICATE NATIONAL DEFENSE INFORMATION TO CHINA Corporate Headquarters Pg. 7 RUSSIAN AGENT AND 10 OTHER MEMBERS OF 222 North Sepulveda Boulevard, Suite 1780 PROCUREMENT NETWORK FOR RUSSIAN MILITARY AND INTELLIGENCE OPERATING IN THE U.S. AND El Segundo, California 90245 (310) 536-9876 RUSSIA INDICTED www.advantagesci.com Pg. 9 DEFENSE CONTRACTOR ALLEGED TO HAVE TAKEN COMPETITOR‟S BID INFORMATION PAYS $1.15 MILLION Pg. 10 TAIWANESE NATIONAL SENTENCED TO PRISON FOR ILLEGALLY EXPORTING MILITARY SENSITIVE ITEMS FROM THE UNITED STATES CI TRENDS Pg. 11 CHINESE NATIONAL ARRESTED AFTER ATTEMPTING TO ILLEGALLY EXPORT AEROSPACE- THE SPIES AMONG US: A NEVERENDING CYCLE AND THE PLAYERS NEVER SEEM GRADE CARBON FIBER TO CHINA TO CHANGE Pg. 12 FORMER EMPLOYEE OF NEW JERSEY In this months newsletter the reader will see at least nine news releases detailing arrests, trials, convictions or DEFENSE CONTRACTOR CONVICTED OF EXPORTING SENSITIVE MILITARY TECHNOLOGY TO CHINA appellate rulings pertaining to individuals charged with violations of the espionage statutes, economic espio- nage, theft of trade secrets, export violations, and related criminal violations. Pg. 13 FORMER CME GROUP SOFTWARE ENGINEER PLEADS GUILTY TO STEALING GLOBEX COMPUTER Perhaps of interest to the reader is the list of countries for which these alleged or convicted individuals were TRADE SECRETS working, or on behalf of, or to which they were seeking to sell secrets . Pg. 13 TOP EXECUTIVES AT KOLON INDUSTRIES INDICTED FOR STEALING DUPONT‟S KEVLAR TRADE Readers of this newsletter, similar newsletters, media publications and viewers of newscasts have seen the SECRETS same countries involved, year after year. Only the naïve trust our foreign competitors and hostile foreign gov- Pg. 15 RUSSIAN MOLE HAD ACCESS TO WEALTH OF ernments to act ethically and within the boundaries of the law. CSIS, RCMP, PRIVY COUNCIL FILES I remember sitting around the FBI counterintelligence bullpens of the early to mid 1990s, and seeing all the cut Pg. 16 „SO DEAD INSIDE‟: HOW THE MOUNTIES CRACKED JEFFREY DELISLE backs in counterintelligence resources and personnel. Back then, the discussion always focused on the topic of ―Well now the cold war is over. Now the Russians are our friends.‖ Or around 1996, when the political Pg. 18 CHINESE SUSPECTED OF SPYING ON U.S. campaigns of that year were well underway and money was flowing into US politicians through actions such STRATEGIC MISSILE BASE IN WYOMING as described here from Wikipedia: Pg. 18 WHY A YOUNG AMERICAN WANTS TO BE A RUSSIAN SPY The issue first received public attention in early 1997, with news that a Justice Department investiga- Pg. 19 TALIBAN POSE AS 'ATTRACTIVE WOMEN' ON tion had uncovered evidence that agents of China sought to direct contributions to the Democratic FACEBOOK FOR SPYING National Committee (DNC) in violation of U.S. laws regarding foreign political contributions. The Chi- Pg. 20 DETER DETECT DEFEND IDENTITY THEFT nese government denied all accusations. Twenty-two people were eventually convicted of fraud or for funneling Asian funds into the United States elections, and others fled U.S. jurisdiction. Pg. 21 SMARTPHONE USERS SHOULD BE AWARE OF (continued on page 3) MALWARE TARGETING MOBILE DEVICES Pg. 22 LAWYERS‟ IDENTITIES BEING USED FOR FAKE WEBSITES AND SOLICITATIONS NOTE: Much of the Information contained within this newsletter originates from websites maintained by agencies of the U.S. Federal Government. The original web address from which material has been derived is Pg. 22 OUR UNIVERSITIES ARE LEAKING SECRETS posted at the beginning of reproduced articles. Readers are always encouraged to visit the web address Pg. 23 CYBER RELATED THREATS REPORTED from where the article has been derived from, in order to view the article in the original form in which it Pg. 29 OUR BRAVE COUNTERINTELLIGENCE FORCES was presented. This newsletter also contains commentary from the editor of the newsletter. Such IN ACTION commentary is solely the opinion of the newsletter editor and does not represent the views of the U.S. Pg. 30 ADVANTAGE SCI PRODUCTS, SERVICES, Government, nor the agency originally presenting this information on the internet. Questions, TRAINING comments, and subscription requests may be directed to the editor at [email protected] or to Richard Haidle at 310-536-9876 x237 1 Counterintelligence and Cyber News and Views iTravelSafe™ Avoid Cultural Missteps Protect Your Business Secrets Avoid Crime and Scams Travelers Face iTravelSafe™ The Advantage SCI Avoid getting “scammed” when traveling overseas. Read about App frauds and scams related to international travel. Do you have elderly relatives traveling overseas? Gift them a copy of this Sitting in the plane, holding your iPhone, App so they can be aware of scams targeting the elderly. thinking about your trip to Brazil… ―Hmmm. My phone is in ―Airplane Mode‖ with no internet connection. I really wish I had read a bit more detailed information about traveling to Brazil, what I could do safely. But with no internet connection, I guess I can‘t do that, can I?‖ ―Wait a second!! I have the iTravelSafe™ app on my iPhone. All of the data I need is on my phone now. I can read it all even with no internet or cellular connection! Wow, that is really cool! Oh my, look here! I better not Are you a parent with a child go on that hiking trip near Brazil‘s border spending a semester in an regions, I might get kidnapped. Oh no, my overseas study course? planned charitable journey to Rio‘s shanty town is too dangerous. I‘ll have to call it off. Driving overseas? Read about driving in many It‘s a good thing I had iTravelSafe™ with Make sure your children read the “Tips for Students” section of the more than 200 countries this App in- me to tip me off to the danger!‖ of the iTravelSafe™ App. cludes. iTravelSafe™ gives an organization an app for its employees traveling outside the Advantage SCI‟s New Smartphone App: iTravelSafe™ U.S. to use as a ―self-briefing‖ travel tool. Read about hotel safety. Study up on tips Everything you see pictured here is a screenshot from the iTravelSafe™ App. about which business travelers need to be ―savvy.‖ An Android version of this App is available for immediate purchase at the Google Play Store https:// play.google.com/store/search?q=itravelsafe&c=apps, or an iPhone version at the iTunes Store http:// itunes.apple.com/us/app/itravelsafe/id521506480?ls=1&mt=8. Keep up to date with the latest Travel Alerts pushed out to iTravelSafe™ users immediately from the U.S. State Department. Example of the screenshot, appropriate for the country to which it applies, will be sent to your device as soon as the U.S. State Department pushes out the notification of any Travel Alert NOW INCLUDING SECURITY TIP OF THE WEEK ! For volume sales, please contact Richard Haidle at 310-536-9876 x237 or email [email protected]. 2 Counterintelligence and Cyber News and Views (continued from page 1) The five South Korean directors and employees of A trite cliché to close this article, but nevertheless, The thought was, well how can we know? Isn‘t Kolon Industries of South Korea must not have very true. China our friend? We‘ve cut back resources, so read the memo about don‘t bite the hand of he who is feeding you when they conspired to steal this must not be a problem. No foreign nation would seek to influence our political process, the technology behind DuPont‘s Kevlar Trade would they? Secrets. And of course, no US citizen would reveal Well, over the course of time, wiser heads prevailed, and appropriate resources and classified information to the media that could manpower were restored to the cause potential harm. Unless of course, you are counterintelligence arena. former CIA Officer John Kiriakou, 48, of Arlington, Virginia, who pleaded guilty to disclosing to a When this happened, and over the course of the journalist the name of a covert CIA officer and to John Kiriakou last ten or 15 years, the spies and economic disclosing information revealing the role of thieves and corrupt insiders trading in classified another CIA employee in classified activities. information and trade secrets were caught, increasingly before doing harm. And no US company would try to steal trade secrets or proprietary information from another US The fine work of special agents from the FBI, from company, would they? Not unless they were a the Immigration and Customs Enforcement offices defense contractor based in Aurora, Colorado, that agreed to pay $1,150,000 to settle allegations of the Department of Homeland Security, the Kolon Industries Department of Commerce, the Naval Criminal that it improperly obtained bid and proposal Investigative Service, the Air Force Office of information from a competitor on contracts for the Special Investigations, the Defense Criminal National Reconnaissance Office (NRO). Investigative Service and other Federal Agencies and Task Forces has resulted in detecting, What conclusions can we draw from this litany of deterring, preventing or arresting those that would illegal activity? steal our national and commercial secrets. Well, first, the theft of trade secrets and economic The hard work and dedication of these special espionage activity could not have been stopped agents, from all of these agencies, is represented through use of criminal statutes until October of in the arrests, etc.
Recommended publications
  • ENGINEERING HISTORY PAPER #92 “150 Years of Canadian Engineering: Timelines for Events and Achievements”
    THE ENGINEERING INSTITUTE OF CANADA and its member societies L'Institut canadien des ingénieurs et ses sociétés membres EIC’s Historical Notes and Papers Collection (Compilation of historical articles, notes and papers previously published as Articles, Cedargrove Series, Working Papers or Journals) ENGINEERING HISTORY PAPER #92 “150 Years of Canadian Engineering: Timelines for Events and Achievements” by Andrew H. Wilson (previously produced as Cedargrove Series #52/2019 – May 2019) *********************** EIC HISTORY AND ARCHIVES *********************** © EIC 2019 PO Box 40140, Ottawa ON K1V 0W8 +1 (613) 400-1786 / [email protected] / http://www.eic-ici.ca THE CEDARGROVE SERIES OF DISCOURSES, MEMOIRS AND ESSAYS #52/2019 150 YEARS OF CANADIAN ENGINEERING: TIMELINES FOR EVENTS AND ACHIEVEMENTS by Andrew H. Wilson May 2019 Abstract The research for this paper was done as part of a sesquicentennial project on 150 Years of Canadian Engineering. Some of its material has also been presented orally. This paper covers briefly and selectively Canadian engineering events and achievements in four time periods: one up to the time of Confederation in 1867, and three others between then and 2017. Associated with the three later periods are corresponding economic/political/social timelines to help put the engineering in context. There are no comments in it on the quality of the design, construction/manufacture, origins and uses of the items listed. This paper took a whole lot longer than expected to research and write, so that it carries a date in 2019 rather than late in 2017, when the chronological material in it ends. There are no maps or photographs.
    [Show full text]
  • Hack Moscow Secret Code Russian Spies Used Kaspersky AV to Hack NSA Staffer, Swipe Exploit Code – New Claim
    hack moscow secret code Russian spies used Kaspersky AV to hack NSA staffer, swipe exploit code – new claim. Russian government spies used Kaspersky Lab software to extract top-secret software exploits from an NSA staffer's home PC, anonymous sources have claimed. The clumsy snoop broke regulations by taking the classified code, documentation, and other materials home to work on using his personal computer, which was running Kaspersky's antivirus, sources told the Wall Street Journal. It is alleged Kremlin hackers exploited the security package in one way or another to identify those sensitive files and exfiltrate them. In effect, it means the Russian government has copies of the NSA's tools used to exploit vulnerabilities in computer systems and equipment to spy on other nations and targets. It also means Russia can turn the cyber-weapons on American corporations, government agencies and other networks, and steal secrets, cause merry havoc, and so on. The theft, reported today, is said to have occurred in 2015, but apparently wasn't discovered until earlier this year. The allegedly stolen NSA code and dossiers sound an awful lot like the Shadow Brokers archive of stolen agency spyware. The brokers' pilfered exploits dates back to 2013, though. And this case is not thought to be related to the former Booz Allen Hamilton contractor Harold Thomas Martin III who stashed classified NSA materials at his home to study. Martin was indicted in February and faces prison time for removing top-secret files from his employer's workplace, if convicted. He denies any wrongdoing. "Whether the information is credible or not, NSA's policy is never to comment on affiliate or personnel matters," an NSA spokesperson said.
    [Show full text]
  • Jim Flaherty Fast Rob Fonberg
    THE HILL TIMES • 2013 • $8.95 STEPHEN HARPER Christian Paradis BEVERLEY MCLACHLIN JJimOHN Flaherty BAIRD Jason Kenney Rob ALLISOFonberNg JAMES MOORE REDFORD WJenniayne WoutersByrne MICHAEL HORGAN PETER Andrew MACKAY MacDougall 101 LEONA Tony AGLUKKAQ Clement JUSTIN MOST Morris TRUDEAU INFLUENTIAL Rosenberg CHRIS STEPHEN WOODCOCK PEOPLE IN CARTER MICHAEL FERGUSON GOVERNMENT RAY Rona & POLITICS NOVASergeK Amb Dupont rose John TOM Knubley MULCAIR Raoul BRAD Gébert WALL TOM LAW SON Ted MICHELLEArthur Hamilton D’AURAY Men Nathaziesn Ed ISSN 1929-2473 Simon Kennedy Fast Yaprak Baltacioglu Cullen 12 Top 100 list 8 The Top 25 30 The politicians 46 The political staffers Contents 49 The public servants 56 The lobbyists & consultants 59 The media 62 Other public fi gures 63 Energy & environment 66 MPs and art 70 Château Laurier Hotel 73 MPs’ tattoos 76 Best parties 79 Best watering holes 8 Stephen Harper He’s the central fi gure of the most centralized federal government in the country’s history. 10 Jim Flaherty So far, he’s Canada’s untouchable Finance minister. 10 Jason Kenney He’s the Prime Minister Stephen Harper and Immigration and Citizenship Laureen Harper, pictured on June 7, 2012, minister with the killer in Paris after a bilateral meeting with political instincts. 8 French President François Hollande. 11 John Baird He’s Prime Minister Stephen Harper’s Photograph courtesy of the PMO go-to guy on just about everything. 11 Tony Clement This Treasury Board president is 74 one fi erce partisan player. 13 Ed Fast International Trade minister has a big job, but stays below the radar.
    [Show full text]
  • Law, Privacy and Surveillance in Canada in the Post-Snowden Era
    Law, Privacy and Surveillance in Canada in the Post-Snowden Era Edited by Michael Geist University of Ottawa Press LAW, PRIVACY AND SURVEILLANCE IN CANADA IN THE POST-SNOWDEN ERA Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 1 15-05-19 14:18 Page left blank intentionally 15-05-19 14:18 Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 2 LAW, PRIVACY AND SURVEILLANCE IN CANADA IN THE POST-SNOWDEN ERA EDITED BY Michael Geist University of Ottawa Press 2015 Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 3 15-05-19 14:18 The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program and by the University of Ottawa. Copy editing: Joanne Muzak Proofreading: Susan James Typesetting: Édiscript enr. Cover design: Llama Communications and Édiscript enr. Library and Archives Canada Cataloguing in Publication Law, privacy, and surveillance in Canada in the post-Snowden era / edited by Michael Geist. (Law, technology and media) Includes bibliographical references. Issued in print and electronic formats. ISBN 978-0-7766-2207-1 (paperback). ISBN 978-0-7766-2183-8 (pdf). ISBN 978-0-7766-2182-1 (epub) 1. Electronic surveillance — Law and legislation — Canada. 2. Privacy, Right of — Canada. 3. Technology and law — Canada. I. Geist, Michael, 1968-, author, editor II. Series: Law, technology and media KE9328.L34 2015 345.71’052 C2015-903727-1 KF9670.L34 2015 C2015-903728-X © Michael Geist, 2015 under Creative Commons License Attribution — Non Commercial Share Alike 3.0 (CC BY-NC-SA 3.0) Printed in Canada Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 4 15-05-19 14:18 T able of Contents Acknowledgements ..........................................................................
    [Show full text]
  • Favoritedfavorite ʇuıɐs ʞɔopuooq™ @Th3j35t3r '
    ʇuıɐs ʞɔopuooq™ (th3j35t3r) on Twitter https://twitter.com/th3j35t3r FavoritedFavorite 3h ʇuıɐs ʞɔopuooq™ @th3j35t3r 'http://cryptocomb.org ' sitting on a shared server, with 463 other domains. Pressure on hosting provider to boot them? #dontdropSEALinfoes from New York, NY from New York, NY Reply RetweetedRetweet Delete FavoritedFavorite 3h ʇuıɐs ʞɔopuooq™ @th3j35t3r 'http://cryptocomb.org ' - TANGO DOWN - for ORIGINALLY leaking retired SEAL ID for Fox to pick up on, allowing Al-Qaeda to call for his death. from New York, NY from New York, NY Reply RetweetedRetweet Delete FavoritedFavorite 4h ʇuıɐs ʞɔopuooq™ @th3j35t3r @fixedgear808 I have much disappoint w/ Fox. But wasn't them originally leaked it. Was 'http://cryptocomb.org ' & they're on the list. #tick View conversation Hide conversation Reply RetweetedRetweet Delete FavoritedFavorite 4h ʇuıɐs ʞɔopuooq™ @th3j35t3r 5 of 13 8/26/2012 8:16 PM CRYPTOCOMB http://webcache.googleusercontent.com/search?q=cache:wTfQw... This is Google's cache of http://cryptocomb.org/. It is a snapshot of the page as it appeared on Aug 26, 2012 05:02:15 GMT. The current page could have changed in the meantime. Learn more Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar. Text-only version Support Cryptocomb Cryptocomb Articles/Blog Updated August 25, 2012 Truthout publishes U.S Army "Inside the Wire Threats - Afghanistan Green on Blue" NARA sends email correspondence between NARA and USPS, RE: Document/Records Scheduling - January 2011 to July 2012 Crocked Crocker Fox News outs Navy Seal who penned "No Easy Day" Matthew S.
    [Show full text]
  • Dancing with the Dragon As China Surges to New Heights, Can Canada Keep Step?
    Juggling with genes PAGE 6 $6.50 Vol. 21, No. 3 April 2013 Paul Evans Dancing with the Dragon As China surges to new heights, can Canada keep step? ALSO IN THIS ISSUE Kate Taylor Identity crisis at the museum Wesley Wark Treason for cheap John Burns, Ikechi Mgbeoji and more Writing aboriginal peoples back into Canada PLUS: non-fiction Michael Valpy on the spectre of grassroots racism + Ramsay Cook on Maclean’s and the imperial dream + Terry Fenge on Arctic sovereignty and the Nunavut agreement + Robin Fisher on Canadian anthropology’s New Zealand godfather + Douglas Wright on a post- WWI mathematical peacemaker + Florin Diacu on measuring the heavens fiction Merilyn Simonds reviews Blood Secrets by Nadine McInnis + David Penhale reviews Publications Mail Agreement #40032362 Husk by Corey Redekop Return undeliverable Canadian addresses to LRC, Circulation Dept. poetry Caitlin Elizabeth Thomson + Robin Richardson + Alice Major + Denise Desautels + PO Box 8, Station K Toronto, ON M4P 2G1 Leslie Timmins + Anne Swannell + Seymour Mayne + Dave Margoshes + Allan Peterkin NEW FROM UNIVERSITY OF TORONTO PRESS Autonomous stAte tHe greAt reVersAl InHerItIng A CAnoe PADDle the epic struggle for a Canadian Car Industry How We let technology take Control of the the Canoe in Discourses of english-Canadian from oPeC to Free trade Planet nationalism by Dimitry Anastakis by David Edward Tabachnick by Misao Dean In this engrossing book, Dimitry Anastakis The Great Reversal takes the reader back to misao Dean explores the canoe paddle as a chronicles Canadian auto industry’s evolution Aristotle’s warning that humanity should never national symbol – integral to historical tales from the 1973 oPeC embargo to the 1989 allow technical thinking to cloud our judgment of exploration and trade, central to Pierre Canada–us Free trade Agreement and its about what makes for a good life.
    [Show full text]
  • Key Events on September 20, 2018 the Canadian Association for Security and Intelligence Studies (CASIS) Vancouver Hosted Its
    Lessons Learned in Intelligence Analysis Date: September 20th, 2018 Disclaimer: This briefing note contains the encapsulation of views presented throughout the evening and does not exclusively represent the views of the speaker or the Canadian Association for Security and Intelligence Studies. Key Events On September 20, 2018 the Canadian Association for Security and Intelligence Studies (CASIS) Vancouver hosted its eighth roundtable meeting which covered “Lesson Learned in Intelligence Analysis.” The following presentation was hosted by John Pyrik, a former intelligence officer, and the first analytical methodologist for the Canadian Security Intelligence Service (CSIS). The subsequent roundtable discussion focused on examining the notion of whether Canada has been excessively lenient towards individuals who have been convicted of espionage, with particular regards to the selling of classified information. Nature of Discussion The presentation focused on first defining intelligence and what are the basic requirements of obtaining intelligence. Which continued to an examination of intelligence failures, such as the Cuban missile crisis, the Iranian revolution, and the 9/11 attacks. Moreover, the importance of analysists using structured analytical techniques when producing intelligence products was also discussed. With a particular focus on how these techniques can potentially improve the quality of intelligence analysis. Furthermore, the potentially increased role of AI in intelligence collection and analysis, and the fundamental importance of the human analyst was also covered in the presentation. CASIS-Vancouver Page 2 Background The presentation began with a general introduction asking, what is intelligence? Despite the term intelligence being widely used, it was explained the police, military and national intelligence services will have difference uses for intelligence, and thus will define intelligence differently.
    [Show full text]
  • INTELLIGENCE and CORRUPTION Andrew Dalip, Jr. LL.B
    INTELLIGENCE AND CORRUPTION Andrew Dalip, Jr. LL.B (Hons.), L.E.C., M.Sc. (Dist.), C.A.M.S., C.G.S.S. The Journal of Intelligence, Conflict, and Warfare is pleased to publish the following thought piece from one of our esteemed Speakers from the 2020 West Coast Security Conference. The author, Mr. Dalip, is a lawyer working in the financial crime and corruption sphere. From 2015 to 2018, Mr. Dalip was a chairman at the Steering Group Planning Committee for the Caribbean Financial Action Task Force (CFATF); and from 2014 to 2018, he was a special legal advisor to the Ministry of Attorney General Trinidad and Tobago. Keywords: corruption, intelligence, financial intelligence, FATF, money laundering, sanctions. Abstract The intersection between corruption and intelligence is gaining increased focus. Foreign intelligence services have an anti-corruption role at the strategic level through Intelligence Risk Assessments and at the operational level during post- conflict operations. Intelligence assessments of the effectiveness of non-kinetic tools on target countries also guide implementation and policy changes. The roles of security intelligence and foreign intelligence services are, however, no longer always discrete, particularly in the context of non-state actors. Foreign intelligence services would benefit from the skill sets of security intelligence agencies in detecting corruption related predicate offences, both in performing their core roles and supporting law enforcement operations. This includes the use of financial intelligence as well as other key open source intelligence resulting from anti-money laundering frameworks, the development of which has been driven globally by the Financial Action Task Force.
    [Show full text]
  • Counterintelligence and Cyber News and Views
    Counterintelligence and Cyber News and Views Counterintelligence and Cyber News and Views April 2013 Volume 2 Issue 2 INSIDE THIS ISSUE: PG. 1 CURRENT TREND ANALYSIS PG. 2 REVIEW OF COUNTERINTELLIGENCE/CYBER SECURITY SEMINAR PG. 7 ARRESTS, TRIALS, CONVICTIONS PG. 7 NAVY SPY DELISLE SENTENCED TO 20 YEARS IN PRISON PG. 7 FOREIGN ECONOMIC ESPIONAGE INVESTIGATION LEADS TO ARREST PG. 8 IRANIAN CITIZEN SENTENCED IN PLOT TO EXPORT AIRCRAFT PARTS TO IRAN Corporate Headquarters PG. 9 US DEFENCE CONTRACTOR, 59, 222 North Sepulveda Boulevard, Suite 1780 'GAVE CLASSIFIED INFORMATION TO 27 -YEAR-OLD CHINESE LOVER IN El Segundo, California 90245 (310) 536-9876 HONEYTRAP' www.advantagesci.com PG. 12 FORMER U.S. CONSULATE GUARD SENTENCED TO NINE YEARS IN PRISON FOR ATTEMPTING TO COMMUNICATE NATIONAL DEFENSE CI TRENDS INFORMATION TO CHINA In this issue of Counterintelligence and Cyber News and Views we would like to focus on recent arrests and PG. 13 ALASKA-BASED SOLDIER GETS convictions related to counterintelligence (CI). Most of the stories that follow occurred between January and 16 YEARS IN SPY CASE April 2013. Most of the persons discussed within this article represent the type of targets Hostile Intelligence PG. 14 METHODS AND TECHNIQUES Services (HOIS) will attempt to recruit or compromise. You will see, from within these stories, a pattern of methodology used by our foes to compromise individuals, gain access to our technology and use it to our PG. 14 5 LESSONS FROM THE FBI INSIDER THREAT PROGRAM disadvantage. Additionally, stories of greed, revenge and fraud round out some of the methods CI professionals find daily in their struggles to protect classified, sensitive, and export controlled information.
    [Show full text]
  • Annual Report 2018
    National Security and Intelligence Committee of Parliamentarians Annual Report 2018 (Revised version pursuant to subsection 21(5) of the NSICOP Act ) Submitted to the Prime Minister on December 21, 2018 pursuant to subsection 21(2) of the National Security and Intelligence Committee of Parliamentarians Act © Her Majesty the Queen in Right of Canada (2019) All rights reserved. Ottawa, ON National Security and Intelligence Committee of Parliamentarians Annual Report 2018 (Revised version pursuant to subsection 21(5) of the NSICOP Act) CP100 (Print) CP100E-PDF (Online) ISSN 2562-5101 (Print) ISSN 2562-511X (Online) ANNUAL REPORT 2018 The National Security and Intelligence Committee of Parliamentarians The Honourable David McGuinty, P.C., M.P. Chair April 2019 Revis ions Consistent with sub-section 21(1) of the National Security and Intelligence Committee of Parliamentarians Act (NSICOP Act), the Committee must submit an annual report to the Prime Minister. Consistent with subsection 21(5) of the Act, the Prime Minister may, after consulting the Chair of the Committee, direct the Committee to submit to him or her a revised version of the annual report that does not conta in information the Prime Minister believes the disclosure of which would be injurious to national security, national defence or international relations or is information that is protected by solicitor-client privilege. This document is a revised version of the report provided to the Prime Minister on 21 December 2018. Revisions were made to remove information the disclosure of which the Prime Minister believes would be injurious to national defence, national security or international relations , or which constitutes solicitor-client privilege.
    [Show full text]
  • Youth Dialogue on Emerging International Security Challenges
    CANADA IN THE WORLD: YOUTH DIALOGUE ON EMERGING INTERNATIONAL SECURITY CHALLENGES The NATO Association of Canada L’Association Canadienne Pour L’OTAN ©2015 The NATO Association of Canada Canada in the World: Youth Dialogue on Emerging International Security Challenges ©2015 Editor: Corinne Stancescu Contributing Authors: Kelsey Berg Vanessa Hayford Victoria Heath Kevin Hempstead Usman Javed Stefan Konrad Colin McEwen Paul Pryce Trevor Schenk Sandra Song Jeff Tian Series Editor: Julie Lindhout The views and opinions expressed in this publication are those of the contributing authors and do not necessarily represent those of the NATO Association of Canada. The NATO Association of Canada Chairman of the Board: Hon. Hugh Segal, CM. President: Julie Lindhout The NATO Association of Canada is an independent, non-profit, non-governmental organization dedicated to the idea that the transatlantic relationship between Canada and the United States, and the nations of Europe, is of criti- cal importance to Canadians in cultural, economic, and security terms. The NAOC's mandate is to promote a broader and deeper understanding of international peace and security issues relating to NATO. The NATO Association of Canada 60 Harbour Street. 4th Floor, Toronto, ON, Canada, M5J 1B7 Phone: (416) 979-1875 Email: [email protected] TABLE OF CONTENTS Introduction 4 What Happens When We Keep Our Eyes Shut?: Climate Change and the Coming Human Security Crisis 5 A Defining Threat: Water Security 7 How Europe Can Get Off Russian Energy 8 By Land, Sea, Air,
    [Show full text]
  • Romanian Intelligence Studies Review
    RRSI, no. 14/2015 1 ROMANIAN INTELLIGENCE STUDIES REVIEW No. 14 December 2015 Journal with scientific prestige acknowledged by the National Council for the Validation of University Titles, Diplomas and Certificates (CNADTCU), indexed in the international databases CEEOL and EBSCO Bucharest - 2015 - RRSI, no. 14/2015 2 Senior Editors Eduard HELLVIG – director of the Romanian Intelligence Service George Cristian MAIOR – professor, PhD, “Mihai Viteazul” National Intelligence Academy and The National School of Political and Administrative Studies Christopher DONNELLY – senior fellow Defence Academy United Kingdom, director of the Institute for Statecraft and Governance, Oxford, Great Britain Mark PHYTHIAN - professor, University of Leicester, Great Britain Ioan Mirce – professor, PhD, The National School of Political and Administrative Studies Vasile DÂNCU – $#11-0Q&Q,'4#01'27-$3!&0#12Q #-Bolyai University Michael ANDREGG – professor, PhD, St. Thomas University, USA Elaine PRESSMAN – senior fellow, Paterson School of International Affairs, Carleton University, Canada Jan GOLDMAN – professor, Tiffin University, USA Gheorghe TOMA – professor, PhD, “Mihai Viteazul” National Intelligence Academy Sergiu MEDAR – professor, PhD, “Lucian Blaga” University, Sibiu Niculae IANCU – senior lecturer, PhD, “Mihai Viteazul” National Intelligence Academy Cristiana MATEI – Lecturer, Center for Civil-Military Relations din Monterey, SUA Iulian CHIFU – senior lecturer, PhD, National University of Political Studies and Public Administration Iulian FOTA – senior lecturer, PhD, “Mihai Viteazul” National Intelligence Academy Marian SEBE – professor, PhD, “Mihai Viteazul” National Intelligence Academy Irena CHIRU – professor, PhD, “Mihai Viteazul” National Intelligence Academy Valentin FILIP – PhD, „Mihai Viteazul” National Intelligence Academy Board of Editors Editor in Chief: PhD Valentin NICULA Editors: PhD Mihaela TEODOR PhD Irena CHIRU PhD 0', PhD Cristina IVAN PhD Aitana BOGDAN PhD 0'12', PhD Codru LUCINESCU PhD Valentin STOIAN Teodora DOBRE Cover: *#,2',-,3 RRSI, no.
    [Show full text]