Darpa Starts Sleuthing out Disloyal Troops

Total Page:16

File Type:pdf, Size:1020Kb

Darpa Starts Sleuthing out Disloyal Troops UNCLASSIFIED (U) FBI Tampa Division National Security Threat Awareness Monthly Bulletin APRIL 2012 (U) Administrative Note: This product reflects the views of the FBI- Tampa Division and has not been vetted by FBI Headquarters. (U) Handling notice: Although UNCLASSIFIED, this information is property of the FBI and may be distributed only to members of organizations receiving this bulletin, or to cleared defense contractors. Precautions should be taken to ensure this information is stored and/or destroyed in a manner that precludes unauthorized access. 10 APR 2012 (U) The FBI Tampa Division National Security Threat Awareness Monthly Bulletin provides a summary of previously reported US government press releases, publications, and news articles from wire services and news organizations relating to counterintelligence, cyber and terrorism threats. The information in this bulletin represents the views and opinions of the cited sources for each article, and the analyst comment is intended only to highlight items of interest to organizations in Florida. This bulletin is provided solely to inform our Domain partners of news items of interest, and does not represent FBI information. In the APRIL 2012 Issue: Article Title Page NATIONAL SECURITY THREAT NEWS FROM GOVERNMENT AGENCIES: FBI Director Delivers Statement on Key National Security Threats and Crime Problems p. 2 Congressional Commission Release Report on Chinese Capabilities for Computer Network p. 8 Operations and Cyber Espionage COUNTERINTELLIGENCE/ECONOMIC ESPIONAGE THREAT ITEMS FROM THE PRESS: FBI Traces Trail of Spy Ring to China p. 10 Former DuPont Scientist Pleads Guilty To Economic Espionage p. 14 Ex-Marine Accused of Attempting to Export Sensitive Military Items p. 14 Australian Indicted in Plot to Export Restricted Military and Other US Technology to Iran p. 16 Iranian Convicted In Arms Smuggling Case Deported p. 17 As Security Threats Evolve, Justice Department’s Pelak Focuses on Illegal Exports p. 18 Noted Scientist Sentenced to Prison for Attempted Espionage, Fraud and Tax Charges p. 20 China Suspected of Facebook Attack on NATO's Supreme Allied Commander p. 22 Attackers Leverage Iran Nuclear Tensions in Targeted Attack Against US Military Staff p. 24 Chinese Universities Send Big Signals to Foreigners p. 25 Chinese Spies Target Taiwan's US-Made Defenses p. 27 Iran Hacks BBC Persian TV p. 29 CYBERSECURITY SPECIAL FOCUS FOR INDUSTRY The Bright Side of Being Hacked p. 30 Study: Senior Executives Lack Awareness of IT Security and Privacy p. 32 CYBER THREAT ITEMS FROM THE PRESS: FBI Director Warns Cyber Crime on Par with Terrorism p. 33 Don't Underestimate Cyber Terrorism Threat, Security Experts Say p. 34 How to Catch a Cyber Thief: Devoted Cyber-Sleuths Fight Industrial Espionage and Botnets p. 34 New Interest in Hacking as Threat to Security p. 35 Cyber-Criminals Change Tactics as Network Security Improves p. 37 New Verizon Breach Data Shows Outside Threat Dominated 2011 p. 38 Ransomware: The Latest Trend in Malware p. 39 US Cyber Chief: We are Fighting a “Tide of Criminality” p. 40 US Nukes Face Up to 10 Million Cyber Attacks Daily p. 41 Report: Hackers Seized Control of Computers in NASA’s Jet Propulsion Lab p. 42 US Secret Service’s “Operation Open Market” Nets 19 Arrests p. 43 UNCLASSIFIED 1 UNCLASSIFIED Anonymous Vandalizes US Prison Contractors' Site p. 44 Interpol Says Suspected Anonymous Hackers Arrested p. 44 Anonymous Shuts Interpol Site in Revenge p. 44 Anonymous Takes Down Security Firm's Website, Vows to Fight on After Arrests p. 46 Unsecured Email Led to Leak of FBI and Scotland Yard Call p. 47 Malicious Code in the IT Supply Chain Threatens Federal Operations p. 48 COUNTERTERRORISM THREAT ITEMS FROM THE PRESS: High School Grad Guilty in Terror Case is Cited in Report on Future of Islamist Extremism p. 48 NYC Man Gets 27 Years in Homegrown Terror Case p. 51 Maryland Teen Plans Guilty Plea in Pennsylvania Terror Case p. 51 Philadelphia Man Charged with Aiding Islamic Terror Group p. 52 Iran Diplomats Cased NYC Landmarks, Police Official Says p. 53 Authorities Probing Possible Terrorist Links to People Taking Photos Of NYC Landmarks p. 54 Azerbaijan Arrests 22 Suspected of Plotting US, Israel Embassy Attacks on Iran's Behalf p. 55 Former US Army Soldier Indicted for Attempting to Provide Material Support to Al-Shabaab p. 56 (U) NATIONAL SECURITY THREAT NEWS FROM GOVERNMENT AGENCIES: (U) FBI Director Robert Mueller Delivers Statement on Key National Security Threats and Crime Problems to the House Appropriations Committee, Subcommittee on Commerce, Justice, Science, and Related Agencies (07 MAR 2012) (U) The FBI remains focused on defending the United States against terrorism, foreign intelligence, and cyber threats; upholding and enforcing the criminal laws of the United States; protecting civil rights and civil liberties; and providing leadership and criminal justice services to federal, state, municipal, and international agencies and partners. Our continued ability to carry out this complex and demanding mission reflects the support and oversight provided by this subcommittee. (U) More than 10 years after the terrorist attacks of 9/11, the FBI continues to be a threat-focused, intelligence-driven organization that is guided by clear operational strategies. And we remain firmly committed to carrying out these strategies under guidelines established by the attorney general that protect the civil liberties of those entrusting us with the authorities to carry out our mission. (U) As our nation‘s national security and criminal adversaries constantly adapt and evolve, so must the FBI be able to respond with new or revised strategies and operations to counter these threats. The FBI continues to shift to be more predictive, preventative, and actively engaged with the communities we serve. The FBI‘s evolution has been made possible by greater use of technology to gather, analyze, and share information on current and emerging threats; expansion of collaboration with new partners, both domestically and internationally; and investments in training, developing, and maximizing our workforce. The FBI continues to be successful in maintaining this momentum of transformation even during these challenging times. Here is a brief summary of key national security threats and crime problems. (U) National Security Threats (U) Terrorism (U) The terrorist threat facing the United States remains complex and ever-changing. We are seeing more groups and individuals engaged in terrorism, a wider array of terrorist targets, greater cooperation among terrorist groups, and continued evolution and adaptation in tactics and communication. UNCLASSIFIED 2 UNCLASSIFIED (U) While Osama bin Laden and certain other key leaders have been removed, al Qaeda and its affiliates and adherents continue to represent the top terrorism threat to the United States abroad and at home. Core al Qaeda remains committed to high-profile attacks against the United States. Additionally, al Qaeda affiliates and surrogates, such as al Qaeda in the Arabian Peninsula, represent significant threats to our nation. These groups have attempted several attacks against the homeland and our citizens and interests abroad, including the failed Christmas Day airline bombing in 2009 and the attempted bombing of US- bound cargo planes in October 2010. (U) In addition to al Qaeda and its affiliates, the United States faces a terrorist threat from self-radicalized individuals. Self-radicalized extremists, often acting on their own, are among the most difficult to detect and stop. For example, in February, the FBI arrested Amine El Khalifi, a 29-year-old Moroccan immigrant, for the suspected attempt to detonate a bomb in a suicide attack on the US Capitol building. According to court documents, Khalifi believed he was conducting the terrorist attack on behalf of al Qaeda and had become radicalized even though he was not directly affiliated with any group. The Khalifi case exemplifies the need for the FBI to continue to enhance our intelligence capabilities, to get critical information to the right people at the right time, before any harm is done. (U) The basis from which acts of terrorism are committed, from organizations to affiliates/surrogates to self-radicalized individuals, continue to evolve and expand. Of particular note is al Qaeda‘s use of online chat rooms and websites to recruit and radicalize followers to commit acts of terrorism. And they are not hiding in the shadows of cyber space: al Qaeda in the Arabian Peninsula has produced a full-color, English-language online magazine. Terrorists are not only sharing ideas; they are soliciting information and inviting communication. Al Shabaab, the al Qaeda affiliate in Somalia, uses Twitter to taunt its enemies, in English, and encourage terrorist activity. (U) To date, terrorists have not used the Internet to launch a full-scale cyber attack, but we cannot underestimate their intent. Terrorists have shown interest in pursuing hacking skills. And they may seek to train their own recruits or hire outsiders, with an eye toward pursuing cyber attacks. These adaptations of the terrorist threat make the FBI‘s counterterrorism mission that much more difficult and challenging. (U) Foreign Intelligence (U) While foreign intelligence services continue traditional efforts to target political and military intelligence, counterintelligence threats now include efforts to obtain technologies and trade secrets from corporations and universities. The loss of critical research and
Recommended publications
  • Israel: Background and U.S
    Israel: Background and U.S. Relations Casey L. Addis Analyst in Middle Eastern Affairs February 14, 2011 Congressional Research Service 7-5700 www.crs.gov RL33476 CRS Report for Congress Prepared for Members and Committees of Congress Israel: Background and U.S. Relations Summary On May 14, 1948, the State of Israel declared its independence and was immediately engaged in a war with all of its neighbors. Armed conflict has marked every decade of Israel’s existence. Despite its unstable regional environment, Israel has developed a vibrant parliamentary democracy, albeit with relatively fragile governments. The most recent national elections were held on February 10, 2009, ahead of schedule. Although the Kadima Party placed first, parties holding 65 seats in the 120-seat Knesset supported opposition Likud party leader Benjamin “Bibi” Netanyahu, who was designated to form a government. Netanyahu’s coalition includes his own Likud, Yisrael Beiteinu (Israel Our Home), Shas, Habayet Hayehudi (Jewish Home), the United Torah Judaism (UTJ), and the new Ha’atzmout (Independence) party. The coalition controls 66 of 120 Knesset seats. Israel has an advanced industrial, market economy with a large government role. Israel’s foreign policy is focused largely on its region, Europe, and the United States. Israel’s foreign policy agenda begins with Iran, which it views as an existential threat due to Tehran’s nuclear ambitions and support for terrorism. Achieving peace with its neighbors is next. Israel concluded peace treaties with Egypt in 1979 and Jordan in 1994, but not with Syria and Lebanon. Recent unrest in Egypt is rekindling latent anxiety in Israel about the durability of the peace treaty Egypt and Israel have relied upon for 30 years.
    [Show full text]
  • Dod OIG Semiannual Report to the Congress April 1, 2012 Through
    Department of Defense Department of Defense Inspector General Inspector General 4800 Mark Center Drive 4800 Mark Center Drive Alexandria, VA 22350-1500 Alexandria, VA 22350-1500 www.dodig.mil www.dodig.mil Defense Hotline 1.800.424.9098 Defense Hotline 1.800.424.9098 INSPECTOR GENERAL DEPARTMENT OF DEFENSE 4800 MARK CENTER DRIVE ALEXANDRIA, VIRGINIA 22350-1500 I am pleased to present the Department of Defense Inspector General Semiannual Report to Congress for the reporting period April 1 through September 30, 2012. We are dedicated to detecting and preventing fraud, waste, and abuse while improving the effectiveness of DoD programs and operations. Our statutory authority places us in a unique position to directly impact DoD programs and operations to sustain mission-essential activities. To this end, we conduct oversight to help ensure that the warfighter and DoD personnel are best equipped to fullfil the critical mission of defending our country. This report highlights our work related to operations in Afghanistan and warrior care, along with some of our most significant audits, investigations, and inspections. To accomplish our important mission, we work jointly with our counterpart agencies within the Defense oversight community, including the Army Audit Agency, Naval Audit Service, Air Force Audit Agency, Army Criminal Investigation Command, Naval Criminal Investigative Service, Air Force Office of Special Investigations, and the Defense Contract Audit Agency. We thank them for their contributions to this report. We issued 79 reports that identified $2.8 billion in potential monetary benefits during this reporting period. The Defense Criminal Investigative Service, working closely with our counterpart law enforcement agencies, conducted investigations that resulted in 72 arrests, 167 criminal convictions, Principal Deputy 37 suspensions, and 136 debarments, generating a return of $3.3 billion to the U.S.
    [Show full text]
  • LESSON,S LE,. RNED FI ,C M the CLEMEI',Atine MISSION
    NASA/CR- y ...-. 207442 /_/_--_ _:(-,/- "_ _','_ /,_-z2- c,,<.. LESSON,S LE,. RNED FI_,C_M THE CLEMEI',aTINE MISSION COPY JUL 2 2 199T LANGLEYRESEARCHCENIER LIBRARYNASA SPACE STUDIESBOARD HAMPTON,VIRGINIA NATIONAL RESEARCHCOUNCIL Lessons Learned from the Clementine Mission Committee on Planetary and Lunar Exploration Space Studies Board Commission on Physical Sciences, Mathematics, and Applications National Research Council 'LIBRARY JUL221997 LANGLEYRESEARCHCENTER LIBRARY NASA HAMPTON, VIRGINIA NATIONAL ACADEMY PRESS Washington, D.C. 1997 NOTICE: The project that is the subject of this report was approved by the Governing Board of the National Research Council, whose members are drawn from the councils of the National Academy of Sciences, the National Academy of Engineering, and the Institute of Medicine. The members of the committee responsible for the report were chosen for their special competences and with regard for appropriate balance. This report has been reviewed by a group other than the authors according to procedures approved by a Report Review Committee consisting of members of the National Academy of Sciences, the National Academy of Engineering, and the Institute of Medicine. The National Academy of Sciences is a private, nonprofit, self-perpetuating society of distinguished scholars engaged in scientific and engineering research, dedicated to the furtherance of science and technology and to their use for the general welfare. Upon the authority of the charter granted to it by the Congress in 1863, the Academy has a mandate that requires it to advise the federal government on scientific and technical matters. Dr. Bruce Alberts is president of the National Academy of Sciences.
    [Show full text]
  • To All the Craft We've Known Before
    400,000 Visitors to Mars…and Counting Liftoff! A Fly’s-Eye View “Spacers”Are Doing it for Themselves September/October/November 2003 $4.95 to all the craft we’ve known before... 23rd International Space Development Conference ISDC 2004 “Settling the Space Frontier” Presented by the National Space Society May 27-31, 2004 Oklahoma City, Oklahoma Location: Clarion Meridian Hotel & Convention Center 737 S. Meridian, Oklahoma City, OK 73108 (405) 942-8511 Room rate: $65 + tax, 1-4 people Planned Programming Tracks Include: Spaceport Issues Symposium • Space Education Symposium • “Space 101” Advanced Propulsion & Technology • Space Health & Biology • Commercial Space/Financing Space Space & National Defense • Frontier America & the Space Frontier • Solar System Resources Space Advocacy & Chapter Projects • Space Law and Policy Planned Tours include: Cosmosphere Space Museum, Hutchinson, KS (all day Thursday, May 27), with Max Ary Oklahoma Spaceport, courtesy of Oklahoma Space Industry Development Authority Oklahoma City National Memorial (Murrah Building bombing memorial) Omniplex Museum Complex (includes planetarium, space & science museums) Look for updates on line at www.nss.org or www.nsschapters.org starting in the fall of 2003. detach here ISDC 2004 Advance Registration Form Return this form with your payment to: National Space Society-ISDC 2004, 600 Pennsylvania Ave. S.E., Suite 201, Washington DC 20003 Adults: #______ x $______.___ Seniors/Students: #______ x $______.___ Voluntary contribution to help fund 2004 awards $______.___ Adult rates (one banquet included): $90 by 12/31/03; $125 by 5/1/04; $150 at the door. Seniors(65+)/Students (one banquet included): $80 by 12/31/03; $100 by 5/1/04; $125 at the door.
    [Show full text]
  • ASEC REPORT Malicious Code Trend 5 6 Vol.17 Security Trend Web Security Trend
    Disclosure to or reproduction for others without the specific written authorization of AhnLab is prohibited. ASEC Copyright (c) AhnLab, Inc. All rights reserved. REPORT VOL.17 | 2011.6 AhnLab Monthly Security Report AhnLab ASEC (AhnLab Security Emergency Response Center) is a Security global security response group consisting of virus analysts and CONTENTS Emergency security experts. This monthly report is published by ASEC, response and it focuses on the most significant security threats and the latest security technologies to guard against these threats. For 01. Malicious Code Trend 02. Security Trend Center further information about this report, please refer to AhnLab, a. Malicious Code Statistics 05 a. Security Statistics 14 Inc.’s homepage (www.ahnlab.com). - Top 20 Malicious Code Reports - Microsoft Security Updates- May 2011 - Top 20 Malicious Code Variant Reports b. Malicious Code Issues 16 - Breakdown of Primary Malicious Code Types - Comparison of Malicious Codes with - Zeus Source Code Leaked and Spyeye Trend Previous Month - Coreflood, a Banking Trojan - Monthly Malicious Code Reports - Online Banking Hacking Scam - Top 20 New Malicious Code Reports - Breakdown of New Malicious Code Types 03. Web Security Trend b. Malicious Code Issues 10 a. Web Security Statistics 17 - 'Dislike' Button Scam - Web Security Summary - AntiVirus AntiSpyware 2011 Scam - Monthly Blocked Malicious URLs - Scam Emails From Bobijou Inc. - Monthly Reported Types of Malicious Code - Spam Promising Nude Photo Spreads Malware - Monthly Domains with Malicious Code - Osama Bin Laden Themed Malware - Monthly URLs with Malicious Code - Distribution of Malicious Codes by Type - Top 10 Distributed Malicious Codes b. Web Security Issues 20 - May 2011 Malicious Code Intrusion: Website ASEC REPORT Malicious Code Trend 5 6 Vol.17 Security Trend Web Security Trend 01.
    [Show full text]
  • Homeland Threats and Agency Responses”
    STATEMENT OF ROBERT S. MUELLER, III DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED “HOMELAND THREATS AND AGENCY RESPONSES” PRESENTED SEPTEMBER 19, 2012 Statement of Robert S. Mueller, III Director Federal Bureau of Investigation Before the Committee on Homeland Security and Governmental Affairs United States Senate At a Hearing Entitled “Homeland Threats and Agency Responses” Presented September 19, 2012 Good morning, Chairman Lieberman, Ranking Member Collins, and Members of the Committee. Thank you for the opportunity to appear before the Committee today and for your continued support of the men and women of the FBI. As you know, the Bureau has undergone unprecedented transformation in recent years. Since the attacks of September 11th, we have refocused our efforts to address and prevent emerging terrorist threats. The terrorist threat is more diverse than it was 11 years ago, but today, we in the FBI are better prepared to meet that threat. We also face increasingly complex threats to our nation’s cyber security. Nation-state actors, sophisticated organized crime groups, and hackers for hire are stealing trade secrets and valuable research from America’s companies, universities, and government agencies. Cyber threats also pose a significant risk to our nation’s critical infrastructure. As these threats continue to evolve, so too must the FBI change to counter those threats. We must continue to build partnerships with our law enforcement and private sector partners, as well as the communities we serve. Above all, we must remain firmly committed to carrying out our mission while protecting the civil rights and civil liberties of the people we serve.
    [Show full text]
  • Pirates of the Isps: Tactics for Turning Online Crooks Into International Pariahs
    21st CENTURY DEFENSE INITIATIVE CyBER SECuRITy #1 July 2011 Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman 1775 Massachusetts Ave., NW Washington, D.C. 20036 brookings.edu Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman CyberSeCurity #1 July 2011 21st CENTURY DEFENSE INITIATIVE Acknowledgements every research paper is a group effort, no mat- My Wired.com colleagues—ryan Singel, kevin ter what it says on the byline. this project relied Poulsen, kim Zetter and David kravets—cover more on outside assistance than most. brookings the cybersecurity beat better than anyone. this Senior fellows Peter Singer and ken lieberthal paper would have been impossible without them, were the ones who convinced me to explore the and without brian krebs, master investigator of broad topic of cybersecurity. the panel they as- the online underworld. sembled gave me new insight with every meeting; my colleague allan friedman was an especially bill Woodcock, rick Wesson, Jeff Cooper, tyler invaluable tutor and remarkably generous with Moore, audrey Plonk, Jim lewis, Dmitri alpero- his time. heather Messera and robert o’brien vitch, Paul Nicholas, Jessica herrera-flannigan, provided important research and logistical sup- Jart armin, richard bejtlich, Steve Schleien, Jona- port. My research assistant, adam rawnsley, was than Zittrain and many, many others steered me tireless in his exploration of the minutiae of ev- away from my worst ideas and towards those few erything from tort law to pirate havens. not-so-bad ones. for that, i am deeply in their debt. brookings recognizes that the value it provides to any supporter is in its absolute commitment to quality, independence and impact.
    [Show full text]
  • Forensics 2Ème Partie
    actu l’ACTUSÉCU est un magazine numérique rédigé et éditésécu par les consultants du cabinet de conseil XMCO 34MAI 2013 SPÉCIAL INVESTIGATIONS Forensics 2ème partie Investigations Forensics Les étapes et réflexes essentiels pour la réalisation d’une mission forensics. APT1 Résumé et analyse de l’étude menée par Mandiant. Conférences BlackHat, JSSI et HITB. Actualité du moment Analyses du malware Dervec, de la vulnérabilité Java (CVE-2013-0422) et des at- - taques 0day ciblant ColdFusion. buildscharac Et toujours… les logiciels et nos Twitter favoris ! 1 Ce document est la propriété du cabinet XMCO. Toute reproduction est strictement interdite. ® we deliver security expertise www.xmco.fr 2 Ce document est la propriété du cabinet XMCO. Toute reproduction est strictement interdite. édito MAI 2013 [ 45 millions de dollars.... 5 millions chacun ] Ils sont neuf. Ils ont agi dans 27 pays et sont allés jusqu’à retirer 2,4 millions dans des distributeurs automatiques de billets : plus de 40 000 retraits en espèces !!! Bref, un job à plein temps, particulièrement bien rémunéré, mais qui comporte quand même quelques risques... Voici, en synthèse, la news qui est tombée le 10 mai 2013. Comment ne pas la reprendre dans le deuxième numéro de l’ActuSécu consacré au Forensic ? Attention, n’y voyez aucune espèce d’opération marketing conjointe : nous n’avons pas mandaté ces cybercriminels pour promouvoir l’activité de recherche de preuve ! Plusieurs anomalies, dont cette phrase, se trouvent dans cet édito. J’ai fait cela parce que personne ne fait jamais aucun retour sur mon unique contribution à notre magazine. Mais il faut bien admettre que cette information vient confirmer un phénomène de plus en plus constaté : la reconversion d’une partie de la criminalité vers la cybercriminalité.
    [Show full text]
  • An Interdisciplinary Introduction
    Index # See OMB and, 82, 83–84 2-factor authentication, 57, 295, 296 Paperwork Reduction Act, 82 9/11/2001. September 11, 2001 supply chain security, 166, 170 60-Day Cyberspace Policy Review, 100–101, 130, 259 active responses to threats, 207–208, 237–238 256-bit encryption, 193 acts of law, 263 300A and 300B reports, 170 actual cost (AC), 152–154, 156, 299–300, 302 414s (hackers), 6 ACWP (actual cost of work performed), 152 1930s IT infrastructure, 185 “adequate security,” 171 1940s IT infrastructure, 75 Administrative Procedure Act (APA), 266 1950s IT infrastructure, 75–76, 185¬ advanced notices of proposed rulemaking (ANPR), 260, 1960s cybersecurity issues, 4, 76–77, 95 266 1970s cybersecurity issues, 5, 179 advanced persistent threats (APTs), 203–204, 276,- 277 1980s cybersecurity issues, 4–9, 77–81, 82, 185 Advanced Research Projects Agency (ARPA), 4 1990s cybersecurity issues, 9, 81–90, 223–225, 276 Advanced Research Projects Agency Network (AR 2000s cybersecurity issues, 9, 89, 90–101, 220, 276 agenciesPANET), 4, 179 A2010s cybersecurity issues, 10, 101–104, 221–222, 276 African Network Information Centre (AfriNIC), 278 A circulars. See under civilian.audits, 241 See civilian agencies OMB budgets, 260 AC (actual cost), 152–154, 156, 299–300, 302 acceptable levels of risk, 36 classified/unclassified protective markings, 79 acceptable quality level (AQL), 145 compliance standards, 168–169 accepting risks, 16, 20, 22, 60–61 creation of, 266 access codes, 236 cybersecurity policy role, 69–70 access points, 233, 258 Federal Register rules publication, 260 accessibility of systems intelligence.FISMA requirements, See intelligence 97–98, agencies 171 corporate systems, 233 impact on projects, 123 health care systems, 224 military.
    [Show full text]
  • Indias Strategic Options in a Changing Cyberspace
    India’s Strategic Options in a Changing Cyberspace India’s Strategic Options in a Changing Cyberspace Cherian Samuel Munish Sharma INSTITUTE FOR DEFENCE STUDIES & ANALYSES NEW DELHI PENTAGON PRESS LLPLLP India’s Strategic Options in a Changing Cyberspace Cherian Samuel and Munish Sharma First Published in 2019 Copyright © Institute for Defence Studies and Analyses, New Delhi ISBN 978-93-86618-66-5 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without first obtaining written permission of the copyright owner. Disclaimer: The views expressed in this book are those of the authors and do not necessarily reflect those of the Institute for Defence Studies and Analyses, or the Government of India. Published by PENTAGON PRESS LLP 206, Peacock Lane, Shahpur Jat New Delhi-110049 Phones: 011-64706243, 26491568 Telefax: 011-26490600 email: [email protected] website: www.pentagonpress.in In association with Institute for Defence Studies and Analyses No. 1, Development Enclave, New Delhi-110010 Phone: +91-11-26717983 Website: www.idsa.in Printed at Avantika Printers Private Limited. Contents Acknowledgements vii Abbreviations ix Introduction xi 1. Concepts and Definitions 1 2. Cyber Deterrence: The Emerging Landscape 12 3. The Geopolitics of Norms Building in Cyberspace 51 4. Active Cyber Defence: An Analysis 81 5. Critical Information Infrastructure Protection: National Practices and Perspectives 97 6. India’s Technology Challenges: Encryption, Quantum Computing and Artificial Intelligence 115 7. Public-Private Partnership in Cybersecurity: Opportunities and Challenges 143 8. India’s Strategic Options in a Changing Cyberspace 157 Recommendations 165 Index 169 Acknowledgements The seed for this publication was planted in the final meeting of the Project Review & Steering Group when Brig.
    [Show full text]
  • Location, Event&Q
    # from what/ where which how why who for MOBILE versi on click here when who who where when index source "location, event" "phys, pol, med, doc" detail physical detail political name "9/11 Truth Interactive Spreadsheet Click on dow n arrow to sort / filter, click again to undo." Top 100 / compilations entity entity detail country / state date Item .. right-click on li nk to open in new tab 1 "Francis, Stephen NFU" WTC physical Controlled demolition Explosive experts "Overwhelming evidence indicates that a combination of n uclear, thermitic and conventional explosives were used in a controlled demoliti on of the WTC on 9/11. Nanothermite contributed but does not have sufficient det onation velocity to pulverize the WTC into dust. Architects & Engineers for 9/11 Truth is leading gatekeeper trying to deflect Israel's role. See Cozen O'Connor 9/11 lawsuit." pic "9/11 Truth, anti-Zionists" Engineers / Scie ntists "U.S., Israel, SA, Britain" 2 "Francis, Stephen NFU" "WTC, Pentagon, PA" political False flag Cabal "The cabal: U.S., Britain, Saudi Arabia and Israel execu ted the 9/11 false flag attack in order to usher in a new 'war on terror' along with the Iraq and Afghanistan wars and fullfil the PNAC's 'Full Spectrum Dominan ce' of the Middle East and its resources ... all have roots that go back to Zion ist / Nazi Germany, the Cold War ... 9/11 was a planned step." lnk Intel ag encies "Cabal: US, UK, Israel & SA" Mossad / Sayeret Matkal "U.S., Israel, S A, Britain" 3 "Fox, Donald" WTC 1-2 physical "Mini Neutron, Fissionless Fusio n" Controlled demolition "VeteransToday: Fox, Kuehn, Prager, Vike n,Ward, Cimono & Fetzer on mini neutron bombs discuss all major WTC theories micr o nuke (neutron) most promising comparatively low blast effects, a quick blast o f radiation that doesn't linger, a series of shape charged mini-neutron bombs we re detonated from top to bottom to simulate a free fall collapse.
    [Show full text]
  • CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2
    COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS Corporate Headquarters 222 North Sepulveda Boulevard, Suite 1780 El Segundo, California 90245 (310) 536-9876 www.advantagesci.com COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS MARCH 2012 VOLUME 1 ISSUE 3 Inside this Issue CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2 Suspect Counterfeit Electronic 2 In last month’s newsletter, we had only illustrative of one of the oldest techniques Parts Can Be Found on scraped the surface of espionage and used in espionage. The fine art of Front Companies: Who Is the 7 End User? national security related crimes occurring seduction has been used throughout DARPA’s Shredder Challenge 9 within the Los Angeles area. As one of the history to obtain classified information purposes of this newsletter includes serving from males and females. In the cases of Threats To Nanotechnology 10 as an educational tool, the use of actual Data Exfiltration and Output 11 Richard Miller and J.J. Smith, both were Devices - An Overlooked cases to illustrate how espionage has seduced, and then they betrayed the How spies used Facebook to 14 occurred in the past serves to meet this confidences placed in them by the U.S. steal Nato chiefs’ details purpose. Government. Extracts from Wikipedia pertaining to Miller and Smith (not a Retired agent suspected of 16 Everyone likes to hear “spy stories”, except Espionage spying for China: definitive source, but very illustrative for when they hit closest to home. Then the these two cases) follow: ARRESTS, TRIALS, 17 stories are not so fun to hear.
    [Show full text]