Presentation is loading. Please wait.

Presentation is loading. Please wait.

Intelligence Counterintelligence. CSCE 727 - Farkas2 What is Intelligence? Information Activities Organization.

Similar presentations


Presentation on theme: "Intelligence Counterintelligence. CSCE 727 - Farkas2 What is Intelligence? Information Activities Organization."— Presentation transcript:

1 Intelligence Counterintelligence

2 CSCE 727 - Farkas2 What is Intelligence? Information Activities Organization

3 CSCE 727 - Farkas3 Scope of Intelligence Government – national security – Range from peace time to war time intelligence – Type of government Domestic Intelligence – depends on nature of regime Business corporations – competitive advantage Economics and Intelligence – Government-run economy – Economic well-being of nation Non-traditions Intelligence – Environmental issues

4 CSCE 727 - Farkas4 Intelligence and Law Enforcement Transnational threats: – Do not originate primarily from a foreign government – Serious threats for nation’s well-being – Fall within law enforcement rather than intelligence – Examples: narcotics trafficking, international terrorism Law enforcement: waiting until a crime has been committed Intelligence: collection of convincing evidence Criminal investigation vs. criminal intelligence investigation – Punishment of a given criminal act or struggle with an organization engaged in criminal activity

5 CSCE 727 - Farkas5 Intelligence and Information Age Increased amount of digital data – How to collect – How to analyze Technology: dependency on computing technologies – Who is vulnerable?

6 Technology Homeland Security News Wire reading: – Second NSA domestic surveillance scheme revealed: data mining from nine U.S. ISPs, 0/07/2013, http://www.homelandsecuritynewswire.com/dr2013060 7-second-nsa-domestic-surveillance-scheme-revealed- data-mining-from-nine-u-s-isps http://www.homelandsecuritynewswire.com/dr2013060 7-second-nsa-domestic-surveillance-scheme-revealed- data-mining-from-nine-u-s-isps – Readings, PRISM and Boundless Informant: Is NSA Surveillance a Threat, http://www.brookings.edu/blogs/up- front/posts/2013/06/13-prism-boundless-informant-nsa- surveillance-lempert http://www.brookings.edu/blogs/up- front/posts/2013/06/13-prism-boundless-informant-nsa- surveillance-lempert CSCE 727 - Farkas6

7 7 Intelligence and Information Age (cont.) Globalization – Flow of information across borders – International trade – Division of labor – Increased travel – Increased penetration by news media

8 CSCE 727 - Farkas8 Information Specialist Policy maker Staff of policy maker Intelligence analysts

9 CSCE 727 - Farkas9 Domestic Intelligence Reading U.S. policymakers mull creation of domestic intelligence agency, http://www.cnn.com/2008/POLITICS/10/20/domestic.int elligence.agency/index.html, 2008 http://www.cnn.com/2008/POLITICS/10/20/domestic.int elligence.agency/index.html US Gang Intelligence Agency, http://usgia.org/http://usgia.org/ D. Priest and W. Arkin, Top Secret America, A Washington Post Investigation, http://projects.washingtonpost.com/top-secret- america/articles/monitoring-america/, 2010 http://projects.washingtonpost.com/top-secret- america/articles/monitoring-america/ F. Langfitt, In China, Beware: A Camera May Be Watching You, NPR News, http://www.npr.org/2013/01/29/170469038/in-china- beware-a-camera-may-be-watching-you http://www.npr.org/2013/01/29/170469038/in-china- beware-a-camera-may-be-watching-you

10 CSCE 727 - Farkas10 Domestic Surveillance Surveillance of own citizens – Legislations – Circumstances permitting surveillance – Limits – Amount and kind of surveillance U.S.: Constitutional law – Fourth Amendment: prohibition against unreasonable searches and seizures (e.g., wiretap)

11 CSCE 727 - Farkas11 Criminal Standard Scope of domestic intelligence: limited by the law Mid 1970s: “…domestic intelligence investigations should be strictly limited to situations where a violation of the law has occurred or was about to occur.” (Silent Warfare)

12 CSCE 727 - Farkas12 Levi Guidelines Edward Hirsch Levi (June 26, 1911 – March 7, 2000) – US Attorney General – 1976: issued a set of guidelines to limit the FBI activities, e.g., must show evidence of crime before wiretaps Effects of surveillance: – Viewed as punishment – Creates a “chill” effect

13 Privacy Issues Privacy issues: – Surveillance vs. other law enforcement investigations that do not target specific crimes, e.g., income tax audits, custom inspections Modified Attorney General's Guideline, Electronic Privacy Information Center, http://epic.org/privacy/fbi/ http://epic.org/privacy/fbi/ CSCE 727 - Farkas13

14 CSCE 727 - Farkas14 Law Enforcement Wiretap Federal Government and state governments are authorized to intercept wire and electronic communications – Court order – Probable cause of criminal activity – Only relevant information Phone and room bugs, computer monitoring Organized crime monitoring (drug trafficking, terrorist activities, etc.) Legislations: – 1986: Electronic Communications Privacy Act, Title III. – 1978: Foreign Intelligence Surveillance Act (FISA) -- Title III (Wiretap Statue) regulates ordinary law enforcement surveillance

15 CSCE 727 - Farkas15 FISA 1978: Foreign Intelligence Surveillance Act (FISA) – Regulates government’s collection of “foreign intelligence” for the purpose of counterintelligence – Electronic eavesdropping and wiretapping – Criminal investigators cannot use it to obtain warrants that cannot be obtained with normal court Foreign Intelligence Surveillance Court

16 FISA 2. 1994: amended to physical entries in connection with “security” investigations 1998: amended to permit pen/trap orders FISA applications for search warrant: – Probable cause that the surveillance target is a foreign power or agent – Does not need to be criminal activity 2001: Patriot Act extends FISA to cover terrorism suspect and agents of foreign countries CSCE 727 - Farkas16

17 FISA 3 2008: FISA Amendments Act –... Permits the Director of National Intelligence and the Attorney General to jointly authorize warrantless electronic surveillance – Protects telecommunications companies from lawsuits for past or future cooperation with federal law enforcement authorities … – On GovTrack, http://www.govtrack.us/congress/bills/110/hr6304#over view http://www.govtrack.us/congress/bills/110/hr6304#over view 2012: FISA Amendments Act Reauthorization Act CSCE 727 - Farkas17

18 CSCE 727 - Farkas18 Questions Would surveillance act as deterrent? Can (capabilities) government access critical information? – US citizens – Foreigners What are the technical issues – Collecting and storing data – Processing technologies

19 Questions Name an application/use of technology that represent new privacy risk? – Social networking – Twitter – … Do we have counter technology? CSCE 727 - Farkas19

20 Means of Intelligence Data collection

21 CSCE 727 - Farkas21 Means of Intelligence: Electromagnetic signals Waves propagating through some medium – Air, water, copper wires, fiber optics, etc. – Frequencies (Hz): wave cycles per second – Bandwidth: difference between the lowest and highest frequencies Electricity, radio spectrum, infrared, (visible) light, x-ray, etc. Advantages/disadvantages – Low frequency: hard to jam – High frequency: larger bandwidth

22 CSCE 727 - Farkas22 Means of Intelligence: Signal Intelligence (SIGINT) Operations that involves – Interception – Analysis of signals across electromagnetic spectrum. Intelligence report, criminal investigations, employee monitoring Digital signal processing – Communication intelligence (COMINT) – Electronic intelligence (ELINT) – Imagery intelligence (IMINT)

23 CSCE 727 - Farkas23 Means of Intelligence: Eavesdropping Sender Snooper Recipient Insecure channel Confidential Tools: microphone receivers, Tape recorder, phone “bugs”, scanners, Radio receivers, satellite receivers, spy satellites, Network sniffing, etc.

24 CSCE 727 - Farkas24 Means of Intelligence: Passive Attack Access to confidential data and traffic pattern Privacy rights U.S. federal wiretap law – Illegal for an individual to eavesdrop intentionally on wire, oral or electronic communications – Home usage? Bug your phone? Hidden recorders? – Company monitoring? Computer vs. telephone? Eavesdropping device : manufacture, sale, possess, advertise – Legal/illegal? – The Spy Factory

25 CSCE 727 - Farkas25 Means of Intelligence: Telephone Wiretap Physical access Gain: – Sensitive data (e.g., organizational secret, private information, etc.) – Disallowed information (e.g., law enforcement communications) Federal wiretap restrictions Individuals and organized crime wiretap Cellular scanners – Cellular phone calls – 1994 – illegal in USA (import, manufacture, sale) – Homemade scanners? Pager Intercept

26 CSCE 727 - Farkas26 Message Deciphers Available encryption technology Cryptanalysis – Technology – Brute force attack Other means – Spy, social engineering, eavesdropping, keystroke monitoring, hacking, etc. Release information  give our capabilities – National defense, tactical, ethical, etc.?

27 Interesting Read R. Paul, Security experts: NIST encryption standard may have NSA backdoor, Arstechnica11/17, 2007, http://arstechnica.com/security/2007/11/security-experts- nist-encryption-standard-may-have-nsa-backdoor/ http://arstechnica.com/security/2007/11/security-experts- nist-encryption-standard-may-have-nsa-backdoor/ K. Zetter, How a Crypto ‘Backdoor’ Pitted the Tech World Against the NSA, Wired, 09/24/2013, http://www.wired.com/threatlevel/2013/09/nsa- backdoor/all/ http://www.wired.com/threatlevel/2013/09/nsa- backdoor/all/ Echelon, Wikipedia, http://en.wikipedia.org/wiki/ECHELON http://en.wikipedia.org/wiki/ECHELON CSCE 727 - Farkas27

28 CSCE 727 - Farkas28 Counterintelligence National Security Nature of regime Law

29 CSCE 727 - Farkas29 Goal of Counterintelligence National Security – Kinds of threats – Information to be collected – Purpose served – Legislation Democracy

30 CSCE 727 - Farkas30 Counterintelligence Foreign intelligence guidelines: classified – Investigation of: Illegal activities: detecting and preventing foreign espionage and terrorist activities Legal activities: foreign legal political activities like fund-raising, organizational work, etc. Domestic intelligence guidelines (“Levi Guidelines”): public – Investigation of groups that hostile to government policies and fundamental principles seeks to deprive some class of people has violent approach to political change

31 Next Class Data Collection and Analysis Current research Preparation for discussions 1. Find 1-2 relevant articles 2. Additional reading is posted on class’ website CSCE 727 - Farkas31


Download ppt "Intelligence Counterintelligence. CSCE 727 - Farkas2 What is Intelligence? Information Activities Organization."

Similar presentations


Ads by Google