Cyber Thieves: a Crash Course on Getting to Know Them

Total Page:16

File Type:pdf, Size:1020Kb

Cyber Thieves: a Crash Course on Getting to Know Them Cyber Thieves: A Crash Course on Getting to Know Them Cary E. Moore, CFE, CISSP, EnCE Speaker Cary E. Moore, CFE, CISSP, EnCE • 12 years of Computer Forensic and InfoOps experience • Senior Vice President, Emerging Threats Manager – Cyber Intelligence Analytics Towards Emerging Threats • Formerly – Guidance Software Inc. • Technical Director, Cybersecurity – Special Agent, Air Force Office of Special Investigations • Computer Crime Investigations and Operations • Counterintelligence and Counterespionage Investigations • (Cyber) Technical Surveillance and Countermeasures (TSCM) • First computer: TI-99/4A – With the speech module! Agenda Cyber Thieves: A Crash Course on Getting to Know Them External ✓ 1 Insider Threats 2 Breaking Cyber Barriers Insiders 3 You Never Saw It Coming! 4 Attribution: The Cyber Holy Grail! Customers & Partners Insider Threats Profiles • Traitors – A trusted person – Makes a decision to betray – True motive might be unapparent 1985 CIA—Larry Wu-Tai Chin 1994 CIA—Aldrich “Rick” Ames 1998 CIA—Douglas Groat 2001 NRO—Brian Regan 2001 DIA—Ana Belen Montes 2003 FBI—Robert Hanssen 2006 USN—PO Ariel Weinmann Insider Threats Profiles • Traitors (continued) – Distinct warning signs • Unusual change in work habits – Seeks out sensitive projects – Unusual works hours • Sloppy security habits or scoffs security • Might rationalize inappropriate actions • Change in lifestyle – Living beyond their means Insider Threats Profiles • Zealots (a/k/a Hacktivists) – Ideological – Motivated by their beliefs – Believe their actions are just, no matter how detrimental – Might pass info. to allies, unaware of the intelligence threat Insider Threats Profiles • Spies – Intentionally in a situation or organization to glean intelligence Operation Ghost Stories • Foreign intelligence 2010 Russian Spy Ring • Business intelligence • Competitive intelligence Anna Chapman, June 2010 Insider Threats Profiles • The Browsers – Those who violate the “need-to-know” principal – Persons who have required clearance • But no requirement for the information • Search for information with or without specific intentions Insider Threats Profiles • The Browsers (continued) – Might utilize the activity or information for personal gain • Receiving rewards • Promotion • Contracts • Personal advantage Insider Threats Profiles • The Well-Intentioned • Victim to social engineering – Phishing – Spearphishing – Whaling • The Tinkers – Boredom – Curiosity Insider Threats Profiles • The Well-Intentioned (continued) – Unwittingly give unauthorized access • Carelessness – Unlocked workstations/network rooms • Ignorance – P2P and file sharing software – Dated security practices Insider Threats Case Study 1 • The key findings from “The Insider Threat Study” on Computer System Sabotage in Critical Infrastructure Sectors are: – A negative work-related event triggered most insiders’ actions – 43 percent of the insiders had authorized access to the system/network at the time of the incident Source: www.secretservice.gov/ntac_its.shtml Insider Threats Case Study 1 • Computer System Sabotage in Critical Infrastructure Sectors (continued) – 39 percent of the insiders used one or more relatively sophisticated methods of attack, which included: • A script or program • An autonomous agent • A toolkit Source: www.secretservice.gov/ntac_its.shtml Insider Threats Case Study 1 • Computer System Sabotage in Critical Infrastructure Sectors (continued) – 63 percent of the incidents were detected because of an irregularity in the information or system – 62 percent of the insiders developed plans to harm the organization – 47 percent of the cases involved overt behaviors in preparation for the incident, such as stealing copies of back-ups Source: www.secretservice.gov/ntac_its.shtml Insider Threats Case Study 2 • The key findings from “The Insider Threat Study” on Illicit Cyber Activity in the Banking and Finance Sector are: – Required minimal technical skill to execute – Involved the simple exploitation of inadequate practices, policies, or procedures – 78 percent of the cases involved the modification and/or deletion of information Source: www.secretservice.gov/ntac_its.shtml Insider Impact Mission Impact • Email Servers • Communication Systems • Security Systems • Database Operations • Accounting Operations • Research and Development Everything That Is • Maintenance and Monitoring Systems Connected • Critical Operation Systems Insider Impact Information at Risk • Intellectual Property • Customer Data • Design Documents • Personal Data • Source Code • Credit Card Numbers • Trade Secrets • Customer Financial Data • Government Data • War Plans • Corporate Data • Intelligence • Financial Data • Law Enforcement • Mergers and Acquisition Information • HR Data • Marketing and Sales Insider Detection Insider Indications • Test scripts and/or techniques • Try multitude of tools (i.e., port scanners, network probes, war driving) • Rogue systems • Bogus accounts • Odd hour activity • Undue curiosity • Hiding screen data • Positions screen to hinder view Insider Detection Insider Indications (continued) • Joking and bragging • Installs unauthorized software • Duty associated software • Dreamweaver, Nero, Photoshop, programming software • Unassociated harmless software • WinAmp, ICQ, games • Suspicious Software • L0phtCrack, key generators, rootkits • Escalated privileges • No fear of getting caught Insider Threats Investigation Techniques Logs -Firewall -IDS -A/V -Sniffers -Proxy and -System Account Records Create a Timeline GPS and Print Servers Insider Threats Investigation Indicators and Leads • When indicators arise, review for: – Unusual processes – TCP/UDP connections – Website activity (local/proxy) – Unauthorized devices Insider Threats Investigation Indicators and Leads • When indicators arise, review for: – Remote access sites (Logmein, PCAnywhere, WebEx, etc.) – Unauthorized websites – Use of anonymity sites or installation of >>>TOR<<< – Accounts and their rights Insider Threats Proactive Efforts • Monitor help desk tickets for trends. – Insiders do call for help when their attempts to circumvent security measures messes things up. • Monitor for unusual logon times. • Scan for bogus accounts. Insider Threats Proactive Efforts • Review scans for unauthorized software, file, and folder access and compile trends. • Train security to monitor contractors and visitors and report suspicious activities. • Deactivate access following termination. Insider Threats The Comparative Insider Hacker • Given access • Gains access by whatever means • Uses access to: necessary • Misuse equipment and • Once access is achieved, network access GAME ON! • Escalate privileges • Affect the business operations • Compromise systems and corporate data • Install Malware • Etc. Agenda Cyber Thieves: A Crash Course on Getting to Know Them External 1 Insider Threats ✓ 2 Breaking Cyber Barriers Insiders 3 You Never Saw It Coming! 4 Attribution: The Cyber Holy Grail! Customers & Partners Breaking the Cyber Barriers • 2011 Report to Congress on Foreign Spies Stealing U.S. Economic Secrets in Cyberspace – China and Russia are pursuing American technology and industrial secrets, jeopardizing an estimated $398 billion in U.S. research spending. – In 2010, the FBI prosecuted more Chinese espionage cases than at any time in our nation’s history. Source: www.ncix.gov/issues/economic/index.php Breaking the Cyber Barriers • 2011 Report to Congress on Foreign Spies Stealing U.S. Economic Secrets in Cyberspace – For example, a DuPont chemist in October 2010 pled guilty to stealing research from the company on organic light-emitting diodes. – The chemist intended to commercialize in China with financial help from the Chinese Government. Source: www.ncix.gov/issues/economic/index.php Breaking the Cyber Barriers Governments Under Attack • Solar Sunrise (1998) – Cyber attack on the Pentagon • Under the guidance of an Israeli hacker, he coordinated two kids from California to hack multiple targets, including the Pentagon • Attacking unpatched Solaris Systems • Basic hacking techniques: Recon, Probe, Exploit, Gather Data, Exfiltrate Source: www.wired.com/threatlevel/2008/09/video-solar-sun/ Breaking the Cyber Barriers Governments Under Attack • Moonlight Maze (1998) – U.S. officials accidentally discovered (during Eligible Receiver) a pattern of probing of computer systems at the Pentagon, NASA, Energy Department, private universities, and research labs. – Began in March 1998 and had been going on for nearly two years. Source: www.pbs.org/wgbh/pages/frontline/shows/cyberwar/warnings/ Breaking the Cyber Barriers Governments Under Attack • Moonlight Maze (1998) – Tens of thousands of files included: • Maps of military installations • Troop configurations • Military hardware designs – The DOD traced the attack back to a mainframe computer in the former USSR. – The true attacker is unknown, and Russia denies any involvement. Source: www.pbs.org/wgbh/pages/frontline/shows/cyberwar/warnings/ Breaking the Cyber Barriers Governments Under Attack • Titan Rain (2003–2005) – A group of about 20 hackers, believed to be based in the Chinese province of Guangdong – Thought to have stolen U.S. military secrets, including aviation specifications and flight- planning software – “China has downloaded 10 to 20 terabytes of data from the NIPRNet”–Maj. Gen. William Lord Sources: www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763 http://gcn.com/Articles/2006/08/17/Red-storm-rising.aspx?p=1 Breaking the Cyber Barriers Governments
Recommended publications
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • A Review of FBI Security Programs, March 2002
    U.S. Department of Justice A Review of FBI Security Programs Commission for Review of FBI Security Programs March 2002 Commission for the Review of FBI Security Programs United States Department of Justice 950 Pennsylvania Avenue, NW, Room 1521 Washington, DC 20530 (202) 616-1327 Main (202) 616-3591 Facsimile March 31, 2002 The Honorable John Ashcroft Attorney General United States Department of Justice 950 Pennsylvania Avenue, N.W. Washington, D.C. 20530 Dear Mr. Attorney General: In March 2001, you asked me to lead a Commission to study security programs within the Federal Bureau of Investigation. Your request came at the urging of FBI Director Louis Freeh, who had concluded that an outside review was critical in light of the then recently discovered espionage by a senior Bureau official. In discharging my duties, I turned to six distinguished citizens as fellow Commissioners and to a staff of highly qualified professionals. I want to acknowledge the diligence with which my colleagues pursued the complex matters within our mandate. The Commission took its responsibilities seriously. It was meticulous in its investigation, vigorous in its discussions, candid in sharing views, and unanimous in its recommendations. When I agreed to chair the Commission, you promised the full cooperation and support of the Department of Justice and the FBI. That promise has been fulfilled. I would like to thank the Department’s Security and Emergency Planning Staff for the expert help they gave us, and I especially commend the cooperation of Director Mueller and FBI personnel at every level, who have all been chastened by treachery from within.
    [Show full text]
  • 2017 ANNUAL REPORT 2017 Annual Report Table of Contents the Michael J
    Roadmaps for Progress 2017 ANNUAL REPORT 2017 Annual Report Table of Contents The Michael J. Fox Foundation is dedicated to finding a cure for 2 A Note from Michael Parkinson’s disease through an 4 Annual Letter from the CEO and the Co-Founder aggressively funded research agenda 6 Roadmaps for Progress and to ensuring the development of 8 2017 in Photos improved therapies for those living 10 2017 Donor Listing 16 Legacy Circle with Parkinson’s today. 18 Industry Partners 26 Corporate Gifts 32 Tributees 36 Recurring Gifts 39 Team Fox 40 Team Fox Lifetime MVPs 46 The MJFF Signature Series 47 Team Fox in Photos 48 Financial Highlights 54 Credits 55 Boards and Councils Milestone Markers Throughout the book, look for stories of some of the dedicated Michael J. Fox Foundation community members whose generosity and collaboration are moving us forward. 1 The Michael J. Fox Foundation 2017 Annual Report “What matters most isn’t getting diagnosed with Parkinson’s, it’s A Note from what you do next. Michael J. Fox The choices we make after we’re diagnosed Dear Friend, can open doors to One of the great gifts of my life is that I've been in a position to take my experience with Parkinson's and combine it with the perspectives and expertise of others to accelerate possibilities you’d improved treatments and a cure. never imagine.’’ In 2017, thanks to your generosity and fierce belief in our shared mission, we moved closer to this goal than ever before. For helping us put breakthroughs within reach — thank you.
    [Show full text]
  • Recent Developments in Cybersecurity Melanie J
    American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime
    [Show full text]
  • Anna Chapman and Mikhail Semenko
    Approved: MICHAEL FARBIARZ/GLEN KOPP/JASON SMITH Assistant United States Attorneys KATHLEEN KEDIAN Trial Attorney, Counterespionage Section, National Security Division, Department of Justice Before: HONORABLE RONALD L. ELLIS United States Magistrate Judge Southern District of New York SEALED UNITED STATES OF AMERICA COMPLAINT -v. - Violation of 18 U.S.C. § .371 ANNA CHAPMAN, and MIKHAIL SEMENKO, COUNTY OF OFFENSE: Defendants. NEW YORK SOUTHERN DISTRICT OF NEW YORK, ss. AMIT KACHHIA-PATEL, being duly sworn, deposes and says that he is a Special Agent with the Federal Bureau of Investigation ("FBI") and charges as follows: COUNT ONE Conspiracy to Act as Unregistered Agents of a Foreign Government 1. From in or about the 1990s, up to and including the present, in the Southern District of New York and elsewhere, ANNA CHAPMAN and MIKHAIL SEMENKO, the defendants, and others known and unknown, unlawfully, willfully and knowingly, did combine, conspire, confederate, and agree together and with each other to commit an offense against the United States, to wit, to violate Section 951 of Title 18, United States Code. 2. It was a part and an object of the conspiracy that ANNA CHAPMAN and MIKHAIL SEMENKO, the defendants, and others known and unknown, unlawfully, willfully and knowingly, would and did act in the United States as agents of a foreign government, specifically the Russian Federation, without prior notification to the Attorney General, as required by law, in violation of Title 18, United States Code, Section 951. Overt Acts 3. In furtherance of the conspiracy and to effect the illegal object thereof, the following overt acts, among others, were committed in the Southern District of New York and elsewhere: a.
    [Show full text]
  • The National Security Council Was Briefed on Anna Chapman Before Her Arrest
    THE NATIONAL SECURITY COUNCIL WAS BRIEFED ON ANNA CHAPMAN BEFORE HER ARREST I frankly wasn’t all that interested in the news that Russian spy Anna Chapman was setting a honey trap for an Obama cabinet official… In a documentary broadcast last night, FBI counter-intelligence chief Frank Figliuzzi claimed the glamorous Russian agent got close enough to ‘disturb’ U.S. spy catchers. He said the fear that Miss Chapman was close to seducing a sitting member of the Obama administration spurred agents to swoop on the 10-strong spy ring of which she was a part. Mr Figliuzzi told the Channel 4 documentary the auburn-haired spy got ‘closer and closer to higher and higher ranking leadership… she got close enough to disturb us.’ ‘We were becoming very concerned,’ he said. ‘They were getting close enough to a sitting US cabinet member that we thought we could no longer allow this to continue.’ Until Laura Rozen noted that Peter Orszag left the White House in July 2010. Since most of the cabinet level officials with some base in NY, where Chapman lived and socialized–like Hillary Clinton and Susan Rice–are female, I simply hadn’t thought that much about who her target could have been. Though Orszag presents an interesting possibility (not least because he was personally involved in our cybersecurity efforts at the time). And an even more interesting date, to me, is the day the White House announced his departure: June 22, just 3 days before they started rolling up the Russian spy network. Now, whether or not Orszag was the target (I’ve got some other suspicions, and if he was, Chapman would have been targeting Orszag during the period after he got engaged but before he got married), her comment was enough to get me to refer back to my coverage on Chapman’s arrest.
    [Show full text]
  • Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
    Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi­ cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques­ tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel­ ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath­ letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid­ den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di­ agnose or establish a profile of those who might become a spy.
    [Show full text]
  • Tangled Web : Tales of Digital Crime from the Shadows of Cyberspace
    TANGLED WEB Tales of Digital Crime from the Shadows of Cyberspace RICHARD POWER A Division of Macmillan USA 201 West 103rd Street, Indianapolis, Indiana 46290 Tangled Web: Tales of Digital Crime Associate Publisher from the Shadows of Cyberspace Tracy Dunkelberger Copyright 2000 by Que Corporation Acquisitions Editor All rights reserved. No part of this book shall be reproduced, stored in a Kathryn Purdum retrieval system, or transmitted by any means, electronic, mechanical, pho- Development Editor tocopying, recording, or otherwise, without written permission from the Hugh Vandivier publisher. No patent liability is assumed with respect to the use of the infor- mation contained herein. Although every precaution has been taken in the Managing Editor preparation of this book, the publisher and author assume no responsibility Thomas Hayes for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Project Editor International Standard Book Number: 0-7897-2443-x Tonya Simpson Library of Congress Catalog Card Number: 00-106209 Copy Editor Printed in the United States of America Michael Dietsch First Printing: September 2000 Indexer 02 01 00 4 3 2 Erika Millen Trademarks Proofreader Benjamin Berg All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Que Corporation cannot Team Coordinator attest to the accuracy of this information. Use of a term in this book should Vicki Harding not be regarded as affecting the validity of any trademark or service mark. Design Manager Warning and Disclaimer Sandra Schroeder Every effort has been made to make this book as complete and as accurate Cover Designer as possible, but no warranty or fitness is implied.
    [Show full text]
  • 125Th Street, Harlem, NY
    APOLLO ANNUAL REPORT 2016-17th 125 Street, Harlem, NY 1 TABLE OF CONTENTS APOLLO MUSIC APOLLO COMMUNITY LEADERSHIP Page 10 Page 16 Page 4 APOLLO DANCE APOLLO EDUCATION ELLA FITZGERALD Page 12 Page 18 CENTENNIAL CELEBRATION Page 6 APOLLO THEATER APOLLO IN THE MEDIA Page 13 Page 20 WOMEN OF THE WORLD Page 8 APOLLO SIGNATURE APOLLO CELEBRATIONS Page 14 Page 22 APOLLO PEOPLE STATEMENT OF Page 27 OPERATING ACTIVITY Page 24 APOLLO SUPPORTERS Page 28 STATEMENT OF FINANCIAL POSITION Page 26 JOIN THE APOLLO Page 30 “Since its inception, the Apollo Theater has been home to legendary and FROM OUR up-and-coming artists alike, serving as an ever-changing, driving force in popular music and culture, not only in Harlem but across the world.” LEADERSHIP Jonelle Procope, President and CEO of the Apollo Theater We are delighted to share this Annual Report highlighting It is an incredible honor to bring my voice to the Apollo’s the incredible accomplishments of the Apollo’s season. Key storied legacy and exciting future. My first season at the milestones from the 2016-2017 season include welcoming Apollo has been a whirlwind of inspiring and innovative Kamilah Forbes as the new Executive Producer; presenting performances and programs. I especially want to mention The First Noel, the first multi-week run of an Apollo-Presents the four-day Women of the World Festival, which was show on the iconic Mainstage; and welcoming popular anchored by a special tribute concert to the incomparable Brooklyn-based festival, Afropunk, for their first appearance artist/activist Abbey Lincoln.
    [Show full text]
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Russian Intelligence Services and Special Forces
    BRIEFING PAPER Number CBP 8430, 30 October 2018 Russian intelligence By Ben Smith services and special forces Contents: 1. KGB reborn? 2. GRU 3. Spetsnaz 4. What’s new? www.parliament.uk/commons-library | intranet.parliament.uk/commons-library | [email protected] | @commonslibrary 2 Russian intelligence services and special forces Contents Summary 3 1. KGB reborn? 4 1.1 FSB 4 1.2 SVR 5 1.3 FSO and GUSP 5 2. GRU 7 Cyber warfare 7 NCSC Review 8 3. Spetsnaz 9 4. What’s new? 12 Cover page image copyright: Special operations forces of the Russian Federation by Ministry of Defence of the Russian Federation (Mil.ru). Licensed under the Creative Commons Attribution 4.0 International license / image cropped. 3 Commons Library Briefing, 30 October 2018 Summary The Salisbury incident and its aftermath brought the Russian secret services into the spotlight. Malcolm Chalmers of Royal United Services Institute said Russian security services were going well beyond normal spying practice: “By launching disruptive operations that threaten life in target societies, they blur the line between war and peace”. The main domestic service, the FSB, is a successor to the Communist-era KGB. It is responsible for counter-terrorism and counter espionage and Russian information security. Critics say that it continues the KGB’s work of persecution of ‘dissidents’ and is guilty of torture and other human rights violations, and of extortion and corruption. One estimate put its staff complement at 200,000, and it has grown in power, particularly since the election of Vladimir Putin as President of Russia.
    [Show full text]