...Case Study 2: Social Engineering Attacks and Counterintelligence Marilyn Washington Dr. Gideon U. Nwatu CIS 502 November 3, 2013 Abstract The topic of this paper is “Social Engineering Attacks and Counterintelligence.” Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Social Engineering Attacks and Counterintelligence Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and Iraq War Logs. WikiLeaks is an open website that reveals classified documents to the general public. Voice of America stated that “WikiLeaks releases 400,000 classified US Military files (Pessin, 2010). WikiLeaks is a serious threat to national security. WikiLeaks is a threat for three reasons: reveals the identities of operatives, defaces the name of the USA to foreign countries, and threatens the safety of the USA. A danger of WikiLeaks is it reveals the identities of operatives both foreign and domestic. WikiLeaks allows the names of many allies and operative missions to be posted on a public website. This type of exposure endangers many oversea...
Words: 1115 - Pages: 5
...Counterintelligence and Chinese wave of spies INTL 408 B001 SPR 15 Professor John Dolan June 29, 2015 Introduction China has set a goal for itself to become a global power; having full dominance in the Pacific region. (Secretary’s International Security Advisory Board ISAB) It wants to dominate the region and the United States with its economy growth, military domination, and technological advancement. To achieve their strategic goal, Chinese leadership is trying to modernize every aspect of their economy and military. On the economic arena this means accelerated growth through technological development. (ISAB) On the military side, it means modernizing its military from a manpower-based land army to a technology advanced and proficient army on a world scale. (ISAB) In order to achieve this level of modernization and growth, China uses every effort and means possible. That means buying new technologies from the West, but it also means using espionage to acquire secret corporate and military intelligence. China utilizes its intelligence security services in these efforts, but also has called upon Chinese immigrants/expats with ties to Chinese heritage that hold key access at important industries such as naval and aviation. This creates an insider threat for United States’ security. Secret data on U.S. military technology is being stolen by a long-term Chinese insider threat that is being...
Words: 1767 - Pages: 8
...Table of Contents Ethical and Social Issues In Information System 1 Chapter one 3 Introduction to the Study 3 Context of the Problem 4 Statement of the Problem 5 Research Questions 6 Introduction 6 Research Question 6 Research Question 7 Research Question 7 Significance of the Study 8 Research Design and Methodology 9 Organization of the study 9 Literature Review 10 Introduction 10 References 14 Chapter one Introduction to the Study Ethical and social issues in information system is a combination of the benefits and disadvantages of using computer and computer related devices, social networks versus our ethics, morals and beliefs. The importance and reliability of computer in our day to day running of human life cannot be over emphasized. Social networking platforms may allow organizations to improve communication and productivity by disseminating information among different groups of employees in a more efficient manner, resulting in increased productivity. While it is not meant to be all-inclusive, there are a lot of problems faced by its usage in younger generations, businesses use, and the even medical field. The social media comes with risks as it opens up the possibility for hackers to commit fraud, launch spam and virus attacks, and also increases the risk...
Words: 3249 - Pages: 13
...and experiences have created some of the most significant counterintelligence programs. Their programs are designed to protect their countries national security interests against espionage, terrorism and foreign power threats. Their domestic and foreign counterintelligence goals are comparably similar in regards to ethics; some of their application approaches can differ due to different governmental structures, policies, laws and organizational perspectives. Philosophical Both the U.S and UK understand that very real threats against their nations stemming from terrorist threats such as al-Qaeda and from foreign powers espionage threats such as Russia and China (Diaz & Morajev, 2007). Both countries understand that there is a reality...
Words: 790 - Pages: 4
...immense lack of strategic vision is the biggest problem that needs to be addressed within the counterintelligence field. Jennifer E. Simms and Burton Gerber emphasize three root causes that contribute to the weaknesses in the counterintelligence process in their article, The Way Ahead. Technological change, political culture and confused purposes are among the three contributors discussed in the article. United States counterintelligence can be used to its maximum potential only if these three issues can be controlled and improved upon. As new technologies are introduced, new frustrations and complications for counterintelligence agencies arise. New detection technology forces agencies to adapt to an evolving technological world, causing countless problems. These new technologies however, need to be implemented between intelligence agencies and private industries. When properly collaborated remarkable things can take place; an example of this can be seen in the Circuit City store in New Jersey. The police were notified after an employee had been asked to make copies of an incendiary video. The FBI prevented an attack at Fort Dix due to the information passed down by the police officers. Many civilians have the capability to hack into computer networks and patrol the internet. Atlantic Monthly reported that these individuals use both deception strategies and technical counterintelligence to catch con artists on the web. These hackers need to be aware of possible threats as well...
Words: 1024 - Pages: 5
...engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs “Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures”. (Rouse, 2006) Social engineering is a con game in where a person breaks into a computer network in the efforts to gain the confidence of an authorized user and to get them to reveal information that will compromise their network security. Social engineering relies on the weakest link, which are human beings. Most social engineering attacks happen when attackers send urgent emails or correspondence to an unsuspecting authorized user of an urgent problem that requires immediate network access. According to (Rouse, 2006) these types of social engineering tactics appeal to vanity, a since of authority, or greed. Attackers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it. Security experts believe people are more dependent on information than ever and social engineering will remain the greatest threat to any security system. They also believe that educating people about the value of information, training them to protect it, and increasing people's awareness of how attackers operate is the best weapon. “Counterintelligence is a branch of...
Words: 2232 - Pages: 9
...The book “Terrorism and counterintelligence” was written by Blake W. Mobley and published by the Columbia University Press. Mobley is an associate political scientist at the RAND Corporation in Santa Monica. His qualified to offer this political science global analysis due to his Ph.D. in political science from Georgetown University, his also has M.P.P from Harvard University, and a B.A from Stanford University. He has also built his experience through his employment at the Central Intelligence Agency (CIA) as a counter-intelligence analyst. He developed his skills through his work in Washington D.C and in the Middle East. His specialization in non-state actors in counterintelligence gave him a unique insight in handling the issues he recognized...
Words: 1097 - Pages: 5
...prevent the planes from taking off. Also, the resistance could have helped with establishing road blocks. Castro’s use of his tanks was a main reason Brigade 2506 were repelled. Had obstacles and barriers on the road been emplaced this could have helped prevent the tanks from advancing. Counterintelligence Failures As useful as HUMINT is there are downfalls. One of the oldest professions in the world is spying. Technology is not needed and in any war both sides usually have the use of HUMINT to make their decisions. This is where counterintelligence comes gets involved. Three things that are helpful are counterintelligence screenings, vetting, and counterintelligence reviews. Castro saw the invasion coming. He more than likely had sources within Brigade 2506 and the Cuban population of Miami where most of the Brigade was recruited. Also, it does not help when “the New York Times ran a front page story under the headline, ‘U.S. HELPS TRAIN AN ANTI-CASTRO FORCE AT SECRET GUATEMALAN BASE.’” (Craughwell, 2009) Castro developed his own intelligence network before he started his revolution in 1959, and continued to use it as he was still fighting guerilla forces. Counterintelligence assets should have conducted screenings of all individuals within Brigade 2506 to try to determine if they had ties to Castro or were one of his operatives. With the recruitment of the resistance forces it is safe to assume Castro would have at least one insider attempt to join. To ensure...
Words: 1868 - Pages: 8
...the intent and goal of the counterintelligence (CI) objective.1 Further, to accomplish the CI objective, information is separated in two categories of credible intelligence, that has been analyzed thoroughly and information that is secondary information. For example, media, local news, or information provided for gain.2 Additionally, information from Prouty’s case steams from supporting documents, revealing that she was not a Hezbollah agent nor collaborated with Foreign Intelligence Services (FIS) or radical organizations.3...
Words: 523 - Pages: 3
...The Counter Intelligence Community Adequate Efficiency within Our Ranks American Military University Rodolfo Ivan Bustamante Professor Holden, Richard February 26, 2013 Counterintelligence is adequate only to those not directly affected by its lack of efficiency. CI adequacy is difficult to measure and its very status seems to be politically protected in secrecy. The American people are allowed to view things from the outside and cannot accurately provide a direct measure nor possess the slightest understanding of what really goes on behind closed doors. Measuring adequacy and efficiency requires benchmarks and detail accounts of mission failure or success. Classified information cannot be utilized in the equation, but at least the definition of the words can provide a basic understanding and from there begin to analyze unclassified information on various cases. Counterintelligence is defined by law as an embrace of both the collection of information and activities conducted to counter foreign intelligence threats (Cleave, 2007). In other words, it’s the ability to identify, assess, neutralize and exploit foreign intelligence out to cause harm to the United States of America and its citizens. Efficiency in general describes the extent to which time, effort or cost is well used for the intended task or purpose. It is often used with the specific purpose of relaying the capability of a specific application of effort to produce a specific outcome effectively with...
Words: 1735 - Pages: 7
...will look to his or her leaders and find attributes that will be instrumental in his or her growth as a prospective leader. Prior to attaching to Naples Detachment, Region I, 650th Military Intelligence Group in 2014, I lacked the experience of being around leaders that took a personal interest in my own advancement and growth as an NCO. However, this changed when I met Chief Warrant Officer (CW3) Rosette E. Henley. She is not only a Field Grade Officer but is in Counterintelligence (CI); and yet, she explained that she would neither forget the NCO Corps...
Words: 610 - Pages: 3
...The Federal Bureau of Investigation, or F.B.I., is a federal national security organization that has many responsibilities and is comprised of several departments in order to, “protect and defend the United Sates against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the U.S., and to provide leadership and criminal justice services to federal, state, municipal, and international agencies and partners.” The FBI investigates and oversees many different types of threats against the U.S., including: terrorism, counterintelligence, cyber crime, weapons of mass destruction, civil rights, organized crime, white-collar crime, and public corruption. This federal agency was created on July 26, 1908, and is described...
Words: 1092 - Pages: 5
...for U.S. Government authorized use only. 2. You consent to the following conditions: a. The U.S. Government routinely intercepts and monitors communications on this information system for purposes including, but not limited to, penetration testing, communications security (COMSEC) monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. b. At any time, the U.S. Government may inspect and seize data stored on this information system. c. Communications using, or data stored on, this information system are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any U.S. Government-authorized purpose. d. This information system includes security measures (e.g., authentication and access controls) to protect U.S. Government interests--not for your personal benefit or privacy. 3. Notwithstanding the above, using an information system does not constitute consent to personnel misconduct, law enforcement, or counterintelligence investigative searching or monitoring of the content of privileged communications or data...
Words: 2024 - Pages: 9
...Cyber threats and attacks is a person/ persons who attempt unauthorized access to a control system device and/or network using a data communications pathway. (US-CERT, 2005) Over the past few years, we as a nation have seen a major increase in National Security threats in Cyberspeace. President Obama identified Cybersecurity as one of the most serious economic and national security challenges that we are currently facing. Federal government leaders admit to falling behind with the growing threat of attacks from hacker criminals. The government accountability office has identified weakness in security controls in almost all agencies for years but yet to have total control over the threats. One of the underlying causes of the weakness is that agencies fail to implement information security programs which include assessing and managing risks, developing and implementing security policies and procedures, and promoting security awareness. (Nextgov, 2009) In January 2008, President Bush introduced the Comprehensive National Cybersecurity initiative ( CNCI). The CNCI included a number of reinforcing methods that included 1.) Managing the Federal Enterprise Network as a single network enterprise with Trusted Internet Connections. This is headed by the Office of Management and Budget and the Department of Homeland Security, it covers the consolidation of the Federal Government’s external access points (including those to the Internet) 2.) Deploy an intrusion detection system of sensors...
Words: 538 - Pages: 3
...competition. Human Intelligence (HUMINT), Signals Intelligence (SIGINT), Geospatial Intelligence (GEOINT), Open-Source Intelligence (OSINT), Measurement and Signature Intelligence (MASINT), Cyber Intelligence (CYBINT), Financial Intelligence (FININT), and Counterintelligence (CI) can all be used and considered for obtaining specific data from any organization, yet one must take into consideration the kind of data that is most useful. When attempting to obtain intelligence from an organization, it is important to understand the purpose of the action and how the data or information gained can benefit you and your organization. In this case, the intelligence holds two different objectives. One objective is to understand competition, and the other is to combat threats. To understand competition, one of our informants will infiltrate the Coca-Cola and Pepsi organization and obtain any sensitive or important material regarding operations, production, applications, and systems used. This can relate to products, finances, marketing strategies, and employees. In this process, Human Intelligence, Signals Intelligence, Open-Source Intelligence, Measurement and Signature Intelligence, Cyber Intelligence, Financial Intelligence, and Counterintelligence will be used. The use of Human Intelligence will allow our representatives to use social engineering tactics to obtain specific information regarding the organization. Our informants have the ability to navigate the physical infrastructure and gain...
Words: 3281 - Pages: 14