...Case Study 2: Social Engineering Attacks and Counterintelligence Marilyn Washington Dr. Gideon U. Nwatu CIS 502 November 3, 2013 Abstract The topic of this paper is “Social Engineering Attacks and Counterintelligence.” Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Social Engineering Attacks and Counterintelligence Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and Iraq War Logs. WikiLeaks is an open website that reveals classified documents to the general public. Voice of America stated that “WikiLeaks releases 400,000 classified US Military files (Pessin, 2010). WikiLeaks is a serious threat to national security. WikiLeaks is a threat for three reasons: reveals the identities of operatives, defaces the name of the USA to foreign countries, and threatens the safety of the USA. A danger of WikiLeaks is it reveals the identities of operatives both foreign and domestic. WikiLeaks allows the names of many allies and operative missions to be posted on a public website. This type of exposure endangers many oversea...
Words: 1115 - Pages: 5
...Counterintelligence and Chinese wave of spies INTL 408 B001 SPR 15 Professor John Dolan June 29, 2015 Introduction China has set a goal for itself to become a global power; having full dominance in the Pacific region. (Secretary’s International Security Advisory Board ISAB) It wants to dominate the region and the United States with its economy growth, military domination, and technological advancement. To achieve their strategic goal, Chinese leadership is trying to modernize every aspect of their economy and military. On the economic arena this means accelerated growth through technological development. (ISAB) On the military side, it means modernizing its military from a manpower-based land army to a technology advanced and proficient army on a world scale. (ISAB) In order to achieve this level of modernization and growth, China uses every effort and means possible. That means buying new technologies from the West, but it also means using espionage to acquire secret corporate and military intelligence. China utilizes its intelligence security services in these efforts, but also has called upon Chinese immigrants/expats with ties to Chinese heritage that hold key access at important industries such as naval and aviation. This creates an insider threat for United States’ security. Secret data on U.S. military technology is being stolen by a long-term Chinese insider threat that is being...
Words: 1767 - Pages: 8
...Table of Contents Ethical and Social Issues In Information System 1 Chapter one 3 Introduction to the Study 3 Context of the Problem 4 Statement of the Problem 5 Research Questions 6 Introduction 6 Research Question 6 Research Question 7 Research Question 7 Significance of the Study 8 Research Design and Methodology 9 Organization of the study 9 Literature Review 10 Introduction 10 References 14 Chapter one Introduction to the Study Ethical and social issues in information system is a combination of the benefits and disadvantages of using computer and computer related devices, social networks versus our ethics, morals and beliefs. The importance and reliability of computer in our day to day running of human life cannot be over emphasized. Social networking platforms may allow organizations to improve communication and productivity by disseminating information among different groups of employees in a more efficient manner, resulting in increased productivity. While it is not meant to be all-inclusive, there are a lot of problems faced by its usage in younger generations, businesses use, and the even medical field. The social media comes with risks as it opens up the possibility for hackers to commit fraud, launch spam and virus attacks, and also increases the risk...
Words: 3249 - Pages: 13
...immense lack of strategic vision is the biggest problem that needs to be addressed within the counterintelligence field. Jennifer E. Simms and Burton Gerber emphasize three root causes that contribute to the weaknesses in the counterintelligence process in their article, The Way Ahead. Technological change, political culture and confused purposes are among the three contributors discussed in the article. United States counterintelligence can be used to its maximum potential only if these three issues can be controlled and improved upon. As new technologies are introduced, new frustrations and complications for counterintelligence agencies arise. New detection technology forces agencies to adapt to an evolving technological world, causing countless problems. These new technologies however, need to be implemented between intelligence agencies and private industries. When properly collaborated remarkable things can take place; an example of this can be seen in the Circuit City store in New Jersey. The police were notified after an employee had been asked to make copies of an incendiary video. The FBI prevented an attack at Fort Dix due to the information passed down by the police officers. Many civilians have the capability to hack into computer networks and patrol the internet. Atlantic Monthly reported that these individuals use both deception strategies and technical counterintelligence to catch con artists on the web. These hackers need to be aware of possible threats as well...
Words: 1024 - Pages: 5
...engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs “Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures”. (Rouse, 2006) Social engineering is a con game in where a person breaks into a computer network in the efforts to gain the confidence of an authorized user and to get them to reveal information that will compromise their network security. Social engineering relies on the weakest link, which are human beings. Most social engineering attacks happen when attackers send urgent emails or correspondence to an unsuspecting authorized user of an urgent problem that requires immediate network access. According to (Rouse, 2006) these types of social engineering tactics appeal to vanity, a since of authority, or greed. Attackers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it. Security experts believe people are more dependent on information than ever and social engineering will remain the greatest threat to any security system. They also believe that educating people about the value of information, training them to protect it, and increasing people's awareness of how attackers operate is the best weapon. “Counterintelligence is a branch of...
Words: 2232 - Pages: 9
...The Counter Intelligence Community Adequate Efficiency within Our Ranks American Military University Rodolfo Ivan Bustamante Professor Holden, Richard February 26, 2013 Counterintelligence is adequate only to those not directly affected by its lack of efficiency. CI adequacy is difficult to measure and its very status seems to be politically protected in secrecy. The American people are allowed to view things from the outside and cannot accurately provide a direct measure nor possess the slightest understanding of what really goes on behind closed doors. Measuring adequacy and efficiency requires benchmarks and detail accounts of mission failure or success. Classified information cannot be utilized in the equation, but at least the definition of the words can provide a basic understanding and from there begin to analyze unclassified information on various cases. Counterintelligence is defined by law as an embrace of both the collection of information and activities conducted to counter foreign intelligence threats (Cleave, 2007). In other words, it’s the ability to identify, assess, neutralize and exploit foreign intelligence out to cause harm to the United States of America and its citizens. Efficiency in general describes the extent to which time, effort or cost is well used for the intended task or purpose. It is often used with the specific purpose of relaying the capability of a specific application of effort to produce a specific outcome effectively with...
Words: 1735 - Pages: 7
...prevent the planes from taking off. Also, the resistance could have helped with establishing road blocks. Castro’s use of his tanks was a main reason Brigade 2506 were repelled. Had obstacles and barriers on the road been emplaced this could have helped prevent the tanks from advancing. Counterintelligence Failures As useful as HUMINT is there are downfalls. One of the oldest professions in the world is spying. Technology is not needed and in any war both sides usually have the use of HUMINT to make their decisions. This is where counterintelligence comes gets involved. Three things that are helpful are counterintelligence screenings, vetting, and counterintelligence reviews. Castro saw the invasion coming. He more than likely had sources within Brigade 2506 and the Cuban population of Miami where most of the Brigade was recruited. Also, it does not help when “the New York Times ran a front page story under the headline, ‘U.S. HELPS TRAIN AN ANTI-CASTRO FORCE AT SECRET GUATEMALAN BASE.’” (Craughwell, 2009) Castro developed his own intelligence network before he started his revolution in 1959, and continued to use it as he was still fighting guerilla forces. Counterintelligence assets should have conducted screenings of all individuals within Brigade 2506 to try to determine if they had ties to Castro or were one of his operatives. With the recruitment of the resistance forces it is safe to assume Castro would have at least one insider attempt to join. To ensure...
Words: 1868 - Pages: 8
...the intent and goal of the counterintelligence (CI) objective.1 Further, to accomplish the CI objective, information is separated in two categories of credible intelligence, that has been analyzed thoroughly and information that is secondary information. For example, media, local news, or information provided for gain.2 Additionally, information from Prouty’s case steams from supporting documents, revealing that she was not a Hezbollah agent nor collaborated with Foreign Intelligence Services (FIS) or radical organizations.3...
Words: 523 - Pages: 3
...The Federal Bureau of Investigation, or F.B.I., is a federal national security organization that has many responsibilities and is comprised of several departments in order to, “protect and defend the United Sates against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the U.S., and to provide leadership and criminal justice services to federal, state, municipal, and international agencies and partners.” The FBI investigates and oversees many different types of threats against the U.S., including: terrorism, counterintelligence, cyber crime, weapons of mass destruction, civil rights, organized crime, white-collar crime, and public corruption. This federal agency was created on July 26, 1908, and is described...
Words: 1092 - Pages: 5
...for U.S. Government authorized use only. 2. You consent to the following conditions: a. The U.S. Government routinely intercepts and monitors communications on this information system for purposes including, but not limited to, penetration testing, communications security (COMSEC) monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. b. At any time, the U.S. Government may inspect and seize data stored on this information system. c. Communications using, or data stored on, this information system are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any U.S. Government-authorized purpose. d. This information system includes security measures (e.g., authentication and access controls) to protect U.S. Government interests--not for your personal benefit or privacy. 3. Notwithstanding the above, using an information system does not constitute consent to personnel misconduct, law enforcement, or counterintelligence investigative searching or monitoring of the content of privileged communications or data...
Words: 2024 - Pages: 9
...competition. Human Intelligence (HUMINT), Signals Intelligence (SIGINT), Geospatial Intelligence (GEOINT), Open-Source Intelligence (OSINT), Measurement and Signature Intelligence (MASINT), Cyber Intelligence (CYBINT), Financial Intelligence (FININT), and Counterintelligence (CI) can all be used and considered for obtaining specific data from any organization, yet one must take into consideration the kind of data that is most useful. When attempting to obtain intelligence from an organization, it is important to understand the purpose of the action and how the data or information gained can benefit you and your organization. In this case, the intelligence holds two different objectives. One objective is to understand competition, and the other is to combat threats. To understand competition, one of our informants will infiltrate the Coca-Cola and Pepsi organization and obtain any sensitive or important material regarding operations, production, applications, and systems used. This can relate to products, finances, marketing strategies, and employees. In this process, Human Intelligence, Signals Intelligence, Open-Source Intelligence, Measurement and Signature Intelligence, Cyber Intelligence, Financial Intelligence, and Counterintelligence will be used. The use of Human Intelligence will allow our representatives to use social engineering tactics to obtain specific information regarding the organization. Our informants have the ability to navigate the physical infrastructure and gain...
Words: 3281 - Pages: 14
...Cyber threats and attacks is a person/ persons who attempt unauthorized access to a control system device and/or network using a data communications pathway. (US-CERT, 2005) Over the past few years, we as a nation have seen a major increase in National Security threats in Cyberspeace. President Obama identified Cybersecurity as one of the most serious economic and national security challenges that we are currently facing. Federal government leaders admit to falling behind with the growing threat of attacks from hacker criminals. The government accountability office has identified weakness in security controls in almost all agencies for years but yet to have total control over the threats. One of the underlying causes of the weakness is that agencies fail to implement information security programs which include assessing and managing risks, developing and implementing security policies and procedures, and promoting security awareness. (Nextgov, 2009) In January 2008, President Bush introduced the Comprehensive National Cybersecurity initiative ( CNCI). The CNCI included a number of reinforcing methods that included 1.) Managing the Federal Enterprise Network as a single network enterprise with Trusted Internet Connections. This is headed by the Office of Management and Budget and the Department of Homeland Security, it covers the consolidation of the Federal Government’s external access points (including those to the Internet) 2.) Deploy an intrusion detection system of sensors...
Words: 538 - Pages: 3
...working in the bureau’s Soviet counterintelligence unit (“Robert Hanssen,” 2015). It was form here in which Hanssen decided to start selling FBI foreign intelligence to Russia. In 1979, Hanssen made his first deal with the GRU, a Russian intelligence agency, where he sold information containing the details of an FBI mole in the GRU (“Robert Hanssen,” 2015). In the following several years Hanssen held several different positions in the FBI that included supervisor for a technical surveillance squad in New York City, a supervisor in the Soviet Analytical Unit, an aide in the Inspection Division, and as a program manager in the Soviet Section in Washington (“Robert Hanssen,” 2015). Through these positions Hanssen gained higher levels of clearance and greater access to classified information. According to a statement from FBI Director Louis J. Freeh on the arrest of FBI Special Agent Robert Philip Hanssen, “Hanssen effectively used his training, expertise and experience as a counterintelligence Agent to avoid detection, to include keeping his identity and place of employment from his Russian handlers and avoiding all the customary “tradecraft” and travel usually associated with espionage” (Federal Bureau of Investigation, 2001). In an affidavit it is alleged that Hanssen provided over two dozen computer diskettes and more than 6,000 pages of valuable documentary material containing disclosures of information which compromised FBI counterintelligence investigative sources, techniques...
Words: 1634 - Pages: 7
...The below organizational chart is the current Counterintelligence (CI) hierarchy in 1st Special Forces Group. Though this organizational chart is fictional characteristics, in reality, it is a combination of functional/divisional and matrixed. Each CI section is administratively controlled by their respected detachment commanders. However, each CI section receives their tactical and operational guidance from the Human Intelligence Section (S2X) through the Senior Intelligence Officer (SIO). The mission of Army CI is to detect, manipulate, exploit, or neutralize foreign intelligence services or terrorist group and protect the Army’s equities and personnel. CI support to Special Operations Forces is no different, yet demands that CI Agents...
Words: 816 - Pages: 4
...United States Government Accountability Office Report to Congressional Committees June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems GAO-15-544 June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems Highlights of GAO-15-544, a report to congressional committees. Why GAO Did This Study What GAO Found Since 2010, the United States has suffered grave damage to national security and an increased risk to the lives of U.S. personnel due to unauthorized disclosures of classified information by individuals with authorized access to defense information systems. Congress and the President have issued requirements for structural reforms and a new program to address insider threats. The Department of Defense (DOD) components GAO selected for review have begun implementing insider-threat programs that incorporate the six minimum standards called for in Executive Order 13587 to protect classified information and systems. For example, the components have begun to provide insider-threat awareness training to all personnel with security clearances. In addition, the components have incorporated some of the actions associated with a framework of key elements that GAO developed from a White House report, an executive order, DOD guidance and reports, national security systems guidance, and leading practices recommended...
Words: 17616 - Pages: 71