Intelligence Counterintelligence

31
Intelligence Intelligence Counterintelligence Counterintelligence

description

Intelligence Counterintelligence. What is Intelligence?. Information Activities Organization. Scope of Intelligence. Government – national security Range from peace time to war time intelligence Type of government Domestic Intelligence – depends on nature of regime - PowerPoint PPT Presentation

Transcript of Intelligence Counterintelligence

Page 1: Intelligence Counterintelligence

IntelligenceIntelligence

CounterintelligenceCounterintelligence

Page 2: Intelligence Counterintelligence

CSCE 727 - Farkas 2

What is Intelligence?What is Intelligence?

InformationActivitiesOrganization

Page 3: Intelligence Counterintelligence

CSCE 727 - Farkas 3

Scope of IntelligenceScope of Intelligence

Government – national security – Range from peace time to war time intelligence– Type of government

Domestic Intelligence – depends on nature of regime Business corporations – competitive advantage Economics and Intelligence

– Government-run economy– Economic well-being of nation

Non-traditions Intelligence– Environmental issues

Page 4: Intelligence Counterintelligence

CSCE 727 - Farkas 4

Intelligence and Law Intelligence and Law EnforcementEnforcement

Transnational threats: – Do not originate primarily from a foreign government– Serious threats for nation’s well-being– Fall within law enforcement rather than intelligence– Examples: narcotics trafficking, international terrorism

Law enforcement: waiting until a crime has been committed

Intelligence: collection of convincing evidence Criminal investigation vs. criminal intelligence

investigation – Punishment of a given criminal act or struggle with an

organization engaged in criminal activity

Page 5: Intelligence Counterintelligence

CSCE 727 - Farkas 5

Intelligence and Information AgeIntelligence and Information Age Increased amount of digital data

– How to collect– How to analyze

Technology: dependency on computing technologies– Who is vulnerable?

Page 6: Intelligence Counterintelligence

TechnologyTechnology Homeland Security News Wire reading:

– Second NSA domestic surveillance scheme revealed: data mining from nine U.S. ISPs, 0/07/2013, http://www.homelandsecuritynewswire.com/dr20130607-second-nsa-domestic-surveillance-scheme-revealed-data-mining-from-nine-u-s-isps

– Readings, PRISM and Boundless Informant: Is NSA Surveillance a Threat, http://www.brookings.edu/blogs/up-front/posts/2013/06/13-prism-boundless-informant-nsa-surveillance-lempert

CSCE 727 - Farkas 6

Page 7: Intelligence Counterintelligence

CSCE 727 - Farkas 7

Intelligence and Information Age Intelligence and Information Age (cont.)(cont.)

Globalization – Flow of information across borders– International trade– Division of labor– Increased travel– Increased penetration by news media

Page 8: Intelligence Counterintelligence

CSCE 727 - Farkas 8

Information SpecialistInformation Specialist

Policy makerStaff of policy makerIntelligence analysts

Page 9: Intelligence Counterintelligence

CSCE 727 - Farkas 9

Domestic Intelligence ReadingDomestic Intelligence Reading U.S. policymakers mull creation of domestic intelligence

agency, http://www.cnn.com/2008/POLITICS/10/20/domestic.intelligence.agency/index.html , 2008

US Gang Intelligence Agency, http://usgia.org/ D. Priest and W. Arkin, Top Secret America, A

Washington Post Investigation, http://projects.washingtonpost.com/top-secret-america/articles/monitoring-america/ , 2010

F. Langfitt, In China, Beware: A Camera May Be Watching You, NPR News, http://www.npr.org/2013/01/29/170469038/in-china-beware-a-camera-may-be-watching-you

Page 10: Intelligence Counterintelligence

CSCE 727 - Farkas 10

Domestic SurveillanceDomestic Surveillance

Surveillance of own citizens– Legislations– Circumstances permitting surveillance– Limits– Amount and kind of surveillance

U.S.: Constitutional law– Fourth Amendment: prohibition against unreasonable

searches and seizures (e.g., wiretap)

Page 11: Intelligence Counterintelligence

CSCE 727 - Farkas 11

Criminal StandardCriminal Standard

Scope of domestic intelligence: limited by the law

Mid 1970s: “…domestic intelligence investigations should be strictly limited to situations where a violation of the law has occurred or was about to occur.” (Silent Warfare)

Page 12: Intelligence Counterintelligence

CSCE 727 - Farkas 12

Levi Guidelines Levi Guidelines

Edward Hirsch Levi (June 26, 1911 – March 7, 2000)– US Attorney General– 1976: issued a set of guidelines to limit the FBI

activities, e.g., must show evidence of crime before wiretaps

Effects of surveillance:– Viewed as punishment– Creates a “chill” effect

Page 13: Intelligence Counterintelligence

Privacy IssuesPrivacy Issues

Privacy issues:– Surveillance vs. other law enforcement

investigations that do not target specific crimes, e.g., income tax audits, custom inspections

Modified Attorney General's Guideline, Electronic Privacy Information Center, http://epic.org/privacy/fbi/

CSCE 727 - Farkas 13

Page 14: Intelligence Counterintelligence

CSCE 727 - Farkas 14

Law Enforcement WiretapLaw Enforcement Wiretap

Federal Government and state governments are authorized to intercept wire and electronic communications – Court order– Probable cause of criminal activity– Only relevant information

Phone and room bugs, computer monitoring Organized crime monitoring (drug trafficking, terrorist

activities, etc.) Legislations:

– 1986: Electronic Communications Privacy Act, Title III. – 1978: Foreign Intelligence Surveillance Act (FISA) -- Title III

(Wiretap Statue) regulates ordinary law enforcement surveillance

Page 15: Intelligence Counterintelligence

CSCE 727 - Farkas 15

FISAFISA 1978: Foreign Intelligence Surveillance Act (FISA)

– Regulates government’s collection of “foreign intelligence” for the purpose of counterintelligence

– Electronic eavesdropping and wiretapping– Criminal investigators cannot use it to obtain

warrants that cannot be obtained with normal court

Foreign Intelligence Surveillance Court

Page 16: Intelligence Counterintelligence

FISA 2.FISA 2.

1994: amended to physical entries in connection with “security” investigations

1998: amended to permit pen/trap orders FISA applications for search warrant:

– Probable cause that the surveillance target is a foreign power or agent

– Does not need to be criminal activity2001: Patriot Act extends FISA to cover

terrorism suspect and agents of foreign countries

CSCE 727 - Farkas 16

Page 17: Intelligence Counterintelligence

FISA 3FISA 3 2008: FISA Amendments Act

– ... Permits the Director of National Intelligence and the Attorney General to jointly authorize warrantless electronic surveillance

– Protects telecommunications companies from lawsuits for past or future cooperation with federal law enforcement authorities …

– On GovTrack, http://www.govtrack.us/congress/bills/110/hr6304#overview

2012: FISA Amendments Act Reauthorization Act

CSCE 727 - Farkas 17

Page 18: Intelligence Counterintelligence

CSCE 727 - Farkas 18

QuestionsQuestions

Would surveillance act as deterrent? Can (capabilities) government access critical

information?– US citizens – Foreigners

What are the technical issues– Collecting and storing data – Processing technologies

Page 19: Intelligence Counterintelligence

QuestionsQuestions

Name an application/use of technology that represent new privacy risk?– Social networking – Twitter– …

Do we have counter technology?

CSCE 727 - Farkas 19

Page 20: Intelligence Counterintelligence

Means of IntelligenceMeans of Intelligence

Data collectionData collection

Page 21: Intelligence Counterintelligence

CSCE 727 - Farkas 21

Means of Intelligence: Means of Intelligence: Electromagnetic signalsElectromagnetic signals

Waves propagating through some medium – Air, water, copper wires, fiber optics, etc.– Frequencies (Hz): wave cycles per second– Bandwidth: difference between the lowest and highest

frequencies Electricity, radio spectrum, infrared, (visible)

light, x-ray, etc. Advantages/disadvantages

– Low frequency: hard to jam– High frequency: larger bandwidth

Page 22: Intelligence Counterintelligence

CSCE 727 - Farkas 22

Means of Intelligence: Signal Means of Intelligence: Signal Intelligence (SIGINT)Intelligence (SIGINT)

Operations that involves– Interception– Analysis of signals across electromagnetic spectrum.

Intelligence report, criminal investigations, employee monitoring

Digital signal processing– Communication intelligence (COMINT)– Electronic intelligence (ELINT)– Imagery intelligence (IMINT)

Page 23: Intelligence Counterintelligence

CSCE 727 - Farkas 23

Means of Intelligence: EavesdroppingMeans of Intelligence: Eavesdropping

Sender

Snooper

Recipient

Insecure channel

Confidential

Tools: microphone receivers, Tape recorder, phone “bugs”, scanners,Radio receivers, satellite receivers, spy satellites,Network sniffing, etc.

Page 24: Intelligence Counterintelligence

CSCE 727 - Farkas 24

Means of Intelligence: Passive AttackMeans of Intelligence: Passive Attack

Access to confidential data and traffic pattern Privacy rights U.S. federal wiretap law

– Illegal for an individual to eavesdrop intentionally on wire, oral or electronic communications

– Home usage? Bug your phone? Hidden recorders? – Company monitoring? Computer vs. telephone?

Eavesdropping device: manufacture, sale, possess, advertise– Legal/illegal?– The Spy Factory

Page 25: Intelligence Counterintelligence

CSCE 727 - Farkas 25

Means of Intelligence: Telephone Means of Intelligence: Telephone WiretapWiretap

Physical access Gain:

– Sensitive data (e.g., organizational secret, private information, etc.)– Disallowed information (e.g., law enforcement communications)

Federal wiretap restrictions Individuals and organized crime wiretap Cellular scanners

– Cellular phone calls– 1994 – illegal in USA (import, manufacture, sale)– Homemade scanners?

Pager Intercept

Page 26: Intelligence Counterintelligence

CSCE 727 - Farkas 26

Message DeciphersMessage Deciphers

Available encryption technology Cryptanalysis

– Technology– Brute force attack

Other means– Spy, social engineering, eavesdropping, keystroke

monitoring, hacking, etc. Release information give our capabilities

– National defense, tactical, ethical, etc.?

Page 27: Intelligence Counterintelligence

Interesting ReadInteresting Read R. Paul, Security experts: NIST encryption standard may

have NSA backdoor, Arstechnica11/17, 2007, http://arstechnica.com/security/2007/11/security-experts-nist-encryption-standard-may-have-nsa-backdoor/

K. Zetter, How a Crypto ‘Backdoor’ Pitted the Tech World Against the NSA, Wired, 09/24/2013, http://www.wired.com/threatlevel/2013/09/nsa-backdoor/all/

Echelon, Wikipedia, http://en.wikipedia.org/wiki/ECHELON

CSCE 727 - Farkas 27

Page 28: Intelligence Counterintelligence

CSCE 727 - Farkas 28

CounterintelligenceCounterintelligence

National SecurityNature of regimeLaw

Page 29: Intelligence Counterintelligence

CSCE 727 - Farkas 29

Goal of Goal of CounterintelligenceCounterintelligence

National Security – Kinds of threats– Information to be collected – Purpose served – Legislation

Democracy

Page 30: Intelligence Counterintelligence

CSCE 727 - Farkas 30

CounterintelligenceCounterintelligence Foreign intelligence guidelines: classified

– Investigation of: Illegal activities: detecting and preventing foreign

espionage and terrorist activities Legal activities: foreign legal political activities like fund-

raising, organizational work, etc. Domestic intelligence guidelines (“Levi Guidelines”):

public– Investigation of groups that

hostile to government policies and fundamental principles seeks to deprive some class of people has violent approach to political change

Page 31: Intelligence Counterintelligence

Next ClassNext Class

Data Collection and Analysis

Current research

Preparation for discussions

1. Find 1-2 relevant articles

2. Additional reading is posted on class’ website

CSCE 727 - Farkas 31