1 / 31

Intelligence Counterintelligence

Intelligence Counterintelligence. What is Intelligence?. Information Activities Organization. Scope of Intelligence. Government – national security Range from peace time to war time intelligence Type of government Domestic Intelligence – depends on nature of regime

lumina
Download Presentation

Intelligence Counterintelligence

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IntelligenceCounterintelligence

  2. What is Intelligence? • Information • Activities • Organization

  3. Scope of Intelligence • Government – national security • Range from peace time to war time intelligence • Type of government • Domestic Intelligence – depends on nature of regime • Business corporations – competitive advantage • Economics and Intelligence • Government-run economy • Economic well-being of nation • Non-traditions Intelligence • Environmental issues

  4. Intelligence and Law Enforcement • Transnational threats: • Do not originate primarily from a foreign government • Serious threats for nation’s well-being • Fall within law enforcement rather than intelligence • Examples: narcotics trafficking, international terrorism • Law enforcement: waiting until a crime has been committed • Intelligence: collection of convincing evidence • Criminal investigation vs. criminal intelligence investigation • Punishment of a given criminal act or struggle with an organization engaged in criminal activity

  5. Intelligence and Information Age • Increased amount of digital data • How to collect • How to analyze • Technology: dependency on computing technologies • Who is vulnerable?

  6. Technology • Homeland Security News Wire reading: • Second NSA domestic surveillance scheme revealed: data mining from nine U.S. ISPs, 0/07/2013, http://www.homelandsecuritynewswire.com/dr20130607-second-nsa-domestic-surveillance-scheme-revealed-data-mining-from-nine-u-s-isps • Readings, PRISM and Boundless Informant: Is NSA Surveillance a Threat, http://www.brookings.edu/blogs/up-front/posts/2013/06/13-prism-boundless-informant-nsa-surveillance-lempert

  7. Intelligence and Information Age (cont.) • Globalization • Flow of information across borders • International trade • Division of labor • Increased travel • Increased penetration by news media

  8. Information Specialist • Policy maker • Staff of policy maker • Intelligence analysts

  9. Domestic Intelligence Reading • U.S. policymakers mull creation of domestic intelligence agency, http://www.cnn.com/2008/POLITICS/10/20/domestic.intelligence.agency/index.html , 2008 • US Gang Intelligence Agency, http://usgia.org/ • D. Priest and W. Arkin, Top Secret America, A Washington Post Investigation, http://projects.washingtonpost.com/top-secret-america/articles/monitoring-america/ , 2010 • F. Langfitt, In China, Beware: A Camera May Be Watching You, NPR News, http://www.npr.org/2013/01/29/170469038/in-china-beware-a-camera-may-be-watching-you

  10. Domestic Surveillance • Surveillance of own citizens • Legislations • Circumstances permitting surveillance • Limits • Amount and kind of surveillance • U.S.: Constitutional law • Fourth Amendment: prohibition against unreasonable searches and seizures (e.g., wiretap)

  11. Criminal Standard • Scope of domestic intelligence: limited by the law • Mid 1970s: “…domestic intelligence investigations should be strictly limited to situations where a violation of the law has occurred or was about to occur.” (Silent Warfare)

  12. Levi Guidelines • Edward Hirsch Levi (June 26, 1911 – March 7, 2000) • US Attorney General • 1976: issued a set of guidelines to limit the FBI activities, e.g., must show evidence of crime before wiretaps • Effects of surveillance: • Viewed as punishment • Creates a “chill” effect

  13. Privacy Issues • Privacy issues: • Surveillance vs. other law enforcement investigations that do not target specific crimes, e.g., income tax audits, custom inspections • Modified Attorney General's Guideline, Electronic Privacy Information Center, http://epic.org/privacy/fbi/

  14. Law Enforcement Wiretap • Federal Government and state governments are authorized to intercept wire and electronic communications • Court order • Probable cause of criminal activity • Only relevant information • Phone and room bugs, computer monitoring • Organized crime monitoring (drug trafficking, terrorist activities, etc.) • Legislations: • 1986: Electronic Communications Privacy Act, Title III. • 1978: Foreign Intelligence Surveillance Act (FISA) -- Title III (Wiretap Statue) regulates ordinary law enforcement surveillance

  15. FISA • 1978: Foreign Intelligence Surveillance Act (FISA) • Regulates government’s collection of “foreign intelligence” for the purpose of counterintelligence • Electronic eavesdropping and wiretapping • Criminal investigators cannot use it to obtain warrants that cannot be obtained with normal court • Foreign Intelligence Surveillance Court

  16. FISA 2. • 1994: amended to physical entries in connection with “security” investigations • 1998: amended to permit pen/trap orders • FISA applications for search warrant: • Probable cause that the surveillance target is a foreign power or agent • Does not need to be criminal activity • 2001: Patriot Act extends FISA to cover terrorism suspect and agents of foreign countries

  17. FISA 3 • 2008: FISA Amendments Act • ... Permits the Director of National Intelligence and the Attorney General to jointly authorize warrantless electronic surveillance • Protects telecommunications companies from lawsuits for past or future cooperation with federal law enforcement authorities … • On GovTrack, http://www.govtrack.us/congress/bills/110/hr6304#overview • 2012: FISA Amendments Act Reauthorization Act

  18. Questions • Would surveillance act as deterrent? • Can (capabilities) government access critical information? • US citizens • Foreigners • What are the technical issues • Collecting and storing data • Processing technologies

  19. Questions • Name an application/use of technology that represent new privacy risk? • Social networking • Twitter • … • Do we have counter technology?

  20. Means of IntelligenceData collection

  21. Means of Intelligence: Electromagnetic signals • Waves propagating through some medium • Air, water, copper wires, fiber optics, etc. • Frequencies (Hz): wave cycles per second • Bandwidth: difference between the lowest and highest frequencies • Electricity, radio spectrum, infrared, (visible) light, x-ray, etc. • Advantages/disadvantages • Low frequency: hard to jam • High frequency: larger bandwidth

  22. Means of Intelligence: Signal Intelligence (SIGINT) • Operations that involves • Interception • Analysis of signals across electromagnetic spectrum. • Intelligence report, criminal investigations, employee monitoring • Digital signal processing • Communication intelligence (COMINT) • Electronic intelligence (ELINT) • Imagery intelligence (IMINT)

  23. Snooper Insecure channel Recipient Sender Means of Intelligence: Eavesdropping Confidential Tools: microphone receivers, Tape recorder, phone “bugs”, scanners, Radio receivers, satellite receivers, spy satellites, Network sniffing, etc.

  24. Means of Intelligence: Passive Attack • Access to confidential data and traffic pattern • Privacy rights • U.S. federal wiretap law • Illegal for an individual to eavesdrop intentionally on wire, oral or electronic communications • Home usage? Bug your phone? Hidden recorders? • Company monitoring? Computer vs. telephone? • Eavesdropping device: manufacture, sale, possess, advertise • Legal/illegal? • The Spy Factory

  25. Means of Intelligence: Telephone Wiretap • Physical access • Gain: • Sensitive data (e.g., organizational secret, private information, etc.) • Disallowed information (e.g., law enforcement communications) • Federal wiretap restrictions • Individuals and organized crime wiretap • Cellular scanners • Cellular phone calls • 1994 – illegal in USA (import, manufacture, sale) • Homemade scanners? • Pager Intercept

  26. Message Deciphers • Available encryption technology • Cryptanalysis • Technology • Brute force attack • Other means • Spy, social engineering, eavesdropping, keystroke monitoring, hacking, etc. • Release information  give our capabilities • National defense, tactical, ethical, etc.?

  27. Interesting Read R. Paul, Security experts: NIST encryption standard may have NSA backdoor, Arstechnica11/17, 2007, http://arstechnica.com/security/2007/11/security-experts-nist-encryption-standard-may-have-nsa-backdoor/ K. Zetter, How a Crypto ‘Backdoor’ Pitted the Tech World Against the NSA, Wired, 09/24/2013, http://www.wired.com/threatlevel/2013/09/nsa-backdoor/all/ Echelon, Wikipedia, http://en.wikipedia.org/wiki/ECHELON

  28. Counterintelligence • National Security • Nature of regime • Law

  29. Goal of Counterintelligence • National Security • Kinds of threats • Information to be collected • Purpose served • Legislation • Democracy

  30. Counterintelligence • Foreign intelligence guidelines: classified • Investigation of: • Illegal activities: detecting and preventing foreign espionage and terrorist activities • Legal activities: foreign legal political activities like fund-raising, organizational work, etc. • Domestic intelligence guidelines (“Levi Guidelines”): public • Investigation of groups that • hostile to government policies and fundamental principles • seeks to deprive some class of people • has violent approach to political change

  31. Next Class Data Collection and Analysis Current research Preparation for discussions Find 1-2 relevant articles Additional reading is posted on class’ website

More Related