Upload
natalie-acevedo
View
91
Download
2
Embed Size (px)
Citation preview
natalieacevedo355yahoocom (210) 454-1979
(210) 454-1979natalieacevedo355yahoocom
Ps
IA
Id
Mu
Technical Skills
Profile
Work Experience
Pursing Bachelors Of Fine Arts in Graphic DesignSanford-Brown CollegeSan Antonio Tx78250
Education Freelance Work
Designed logos for different com-panies such a Project X Print Co Advantage Sci Vital AppsFreelance in artwork for clients as in painting band flags patches accessories basic graphics for T-shirts done manuallyRestaurants menus created in Indesign software
5 years of experience in creating company logos forprivately held companies using traditional art drawing and illustration software Incorporated ideas from college and secondaryresearch of Fortune 500 companiesDiligently monitor marketing strategies that trend well and are effective based on consumer reviewsScored a 135 in Professional Special IntelligenceAssessment
Retail Stock Merchandising Associate Sales AssociateImprove mechandise and prod-ucts space and by consolidatingRecognized by store managementand also regional director for training new hires as a result of my knowledge
Tueday Morning 2014 - 2015
Unload and to unpack new merchandise and also including shipments and prepare them for the selling on the floorUtilize Macyrsquos system and proce-dures to effciencies and Complete support duties
Macyrsquos 2014 - 2015
Branding
Idenity
Control Movie Poster
Beatrsquos Promotional Advertisement
Billboard Poster
Inspirational Poster
Typography
Food Advertisement Typography
Juice Skateboard Magazine Cover
Nike Magazine Adverteisment
Advantagesci
Securing Tomorrow Today
In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact
information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation
Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer
Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book
Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy
In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations
Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement
Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict
CounterIntelligence Brief Homland
Security
FBI US Defense
CREATING NEWSTRATGIES TO SURROUNDER
THE SAFE
Advantage SCI hosted its first CICyber Security Seminar on Wednesday
February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company
Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence
Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final
presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world
Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link
httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691
iTravelSafe App allows you when you travel and you can check if the state is safe or not
where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified
China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C
Trading Confidential Is Leading To Crime
Below from the FBI website is a new internet scam The scam generates fake emails
that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink
h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam
There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims
The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike
Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI
Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product
If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available
The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement
(210) 454-1979natalieacevedo355yahoocom
Ps
IA
Id
Mu
Technical Skills
Profile
Work Experience
Pursing Bachelors Of Fine Arts in Graphic DesignSanford-Brown CollegeSan Antonio Tx78250
Education Freelance Work
Designed logos for different com-panies such a Project X Print Co Advantage Sci Vital AppsFreelance in artwork for clients as in painting band flags patches accessories basic graphics for T-shirts done manuallyRestaurants menus created in Indesign software
5 years of experience in creating company logos forprivately held companies using traditional art drawing and illustration software Incorporated ideas from college and secondaryresearch of Fortune 500 companiesDiligently monitor marketing strategies that trend well and are effective based on consumer reviewsScored a 135 in Professional Special IntelligenceAssessment
Retail Stock Merchandising Associate Sales AssociateImprove mechandise and prod-ucts space and by consolidatingRecognized by store managementand also regional director for training new hires as a result of my knowledge
Tueday Morning 2014 - 2015
Unload and to unpack new merchandise and also including shipments and prepare them for the selling on the floorUtilize Macyrsquos system and proce-dures to effciencies and Complete support duties
Macyrsquos 2014 - 2015
Branding
Idenity
Control Movie Poster
Beatrsquos Promotional Advertisement
Billboard Poster
Inspirational Poster
Typography
Food Advertisement Typography
Juice Skateboard Magazine Cover
Nike Magazine Adverteisment
Advantagesci
Securing Tomorrow Today
In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact
information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation
Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer
Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book
Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy
In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations
Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement
Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict
CounterIntelligence Brief Homland
Security
FBI US Defense
CREATING NEWSTRATGIES TO SURROUNDER
THE SAFE
Advantage SCI hosted its first CICyber Security Seminar on Wednesday
February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company
Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence
Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final
presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world
Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link
httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691
iTravelSafe App allows you when you travel and you can check if the state is safe or not
where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified
China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C
Trading Confidential Is Leading To Crime
Below from the FBI website is a new internet scam The scam generates fake emails
that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink
h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam
There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims
The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike
Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI
Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product
If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available
The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement
Branding
Idenity
Control Movie Poster
Beatrsquos Promotional Advertisement
Billboard Poster
Inspirational Poster
Typography
Food Advertisement Typography
Juice Skateboard Magazine Cover
Nike Magazine Adverteisment
Advantagesci
Securing Tomorrow Today
In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact
information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation
Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer
Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book
Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy
In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations
Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement
Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict
CounterIntelligence Brief Homland
Security
FBI US Defense
CREATING NEWSTRATGIES TO SURROUNDER
THE SAFE
Advantage SCI hosted its first CICyber Security Seminar on Wednesday
February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company
Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence
Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final
presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world
Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link
httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691
iTravelSafe App allows you when you travel and you can check if the state is safe or not
where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified
China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C
Trading Confidential Is Leading To Crime
Below from the FBI website is a new internet scam The scam generates fake emails
that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink
h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam
There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims
The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike
Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI
Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product
If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available
The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement
Idenity
Control Movie Poster
Beatrsquos Promotional Advertisement
Billboard Poster
Inspirational Poster
Typography
Food Advertisement Typography
Juice Skateboard Magazine Cover
Nike Magazine Adverteisment
Advantagesci
Securing Tomorrow Today
In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact
information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation
Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer
Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book
Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy
In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations
Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement
Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict
CounterIntelligence Brief Homland
Security
FBI US Defense
CREATING NEWSTRATGIES TO SURROUNDER
THE SAFE
Advantage SCI hosted its first CICyber Security Seminar on Wednesday
February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company
Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence
Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final
presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world
Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link
httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691
iTravelSafe App allows you when you travel and you can check if the state is safe or not
where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified
China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C
Trading Confidential Is Leading To Crime
Below from the FBI website is a new internet scam The scam generates fake emails
that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink
h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam
There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims
The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike
Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI
Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product
If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available
The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement
Control Movie Poster
Beatrsquos Promotional Advertisement
Billboard Poster
Inspirational Poster
Typography
Food Advertisement Typography
Juice Skateboard Magazine Cover
Nike Magazine Adverteisment
Advantagesci
Securing Tomorrow Today
In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact
information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation
Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer
Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book
Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy
In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations
Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement
Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict
CounterIntelligence Brief Homland
Security
FBI US Defense
CREATING NEWSTRATGIES TO SURROUNDER
THE SAFE
Advantage SCI hosted its first CICyber Security Seminar on Wednesday
February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company
Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence
Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final
presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world
Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link
httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691
iTravelSafe App allows you when you travel and you can check if the state is safe or not
where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified
China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C
Trading Confidential Is Leading To Crime
Below from the FBI website is a new internet scam The scam generates fake emails
that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink
h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam
There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims
The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike
Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI
Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product
If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available
The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement
Beatrsquos Promotional Advertisement
Billboard Poster
Inspirational Poster
Typography
Food Advertisement Typography
Juice Skateboard Magazine Cover
Nike Magazine Adverteisment
Advantagesci
Securing Tomorrow Today
In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact
information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation
Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer
Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book
Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy
In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations
Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement
Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict
CounterIntelligence Brief Homland
Security
FBI US Defense
CREATING NEWSTRATGIES TO SURROUNDER
THE SAFE
Advantage SCI hosted its first CICyber Security Seminar on Wednesday
February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company
Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence
Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final
presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world
Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link
httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691
iTravelSafe App allows you when you travel and you can check if the state is safe or not
where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified
China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C
Trading Confidential Is Leading To Crime
Below from the FBI website is a new internet scam The scam generates fake emails
that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink
h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam
There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims
The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike
Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI
Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product
If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available
The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement
Billboard Poster
Inspirational Poster
Typography
Food Advertisement Typography
Juice Skateboard Magazine Cover
Nike Magazine Adverteisment
Advantagesci
Securing Tomorrow Today
In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact
information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation
Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer
Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book
Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy
In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations
Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement
Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict
CounterIntelligence Brief Homland
Security
FBI US Defense
CREATING NEWSTRATGIES TO SURROUNDER
THE SAFE
Advantage SCI hosted its first CICyber Security Seminar on Wednesday
February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company
Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence
Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final
presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world
Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link
httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691
iTravelSafe App allows you when you travel and you can check if the state is safe or not
where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified
China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C
Trading Confidential Is Leading To Crime
Below from the FBI website is a new internet scam The scam generates fake emails
that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink
h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam
There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims
The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike
Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI
Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product
If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available
The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement
Inspirational Poster
Typography
Food Advertisement Typography
Juice Skateboard Magazine Cover
Nike Magazine Adverteisment
Advantagesci
Securing Tomorrow Today
In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact
information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation
Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer
Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book
Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy
In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations
Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement
Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict
CounterIntelligence Brief Homland
Security
FBI US Defense
CREATING NEWSTRATGIES TO SURROUNDER
THE SAFE
Advantage SCI hosted its first CICyber Security Seminar on Wednesday
February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company
Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence
Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final
presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world
Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link
httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691
iTravelSafe App allows you when you travel and you can check if the state is safe or not
where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified
China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C
Trading Confidential Is Leading To Crime
Below from the FBI website is a new internet scam The scam generates fake emails
that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink
h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam
There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims
The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike
Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI
Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product
If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available
The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement
Typography
Food Advertisement Typography
Juice Skateboard Magazine Cover
Nike Magazine Adverteisment
Advantagesci
Securing Tomorrow Today
In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact
information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation
Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer
Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book
Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy
In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations
Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement
Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict
CounterIntelligence Brief Homland
Security
FBI US Defense
CREATING NEWSTRATGIES TO SURROUNDER
THE SAFE
Advantage SCI hosted its first CICyber Security Seminar on Wednesday
February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company
Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence
Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final
presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world
Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link
httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691
iTravelSafe App allows you when you travel and you can check if the state is safe or not
where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified
China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C
Trading Confidential Is Leading To Crime
Below from the FBI website is a new internet scam The scam generates fake emails
that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink
h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam
There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims
The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike
Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI
Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product
If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available
The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement
Food Advertisement Typography
Juice Skateboard Magazine Cover
Nike Magazine Adverteisment
Advantagesci
Securing Tomorrow Today
In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact
information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation
Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer
Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book
Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy
In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations
Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement
Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict
CounterIntelligence Brief Homland
Security
FBI US Defense
CREATING NEWSTRATGIES TO SURROUNDER
THE SAFE
Advantage SCI hosted its first CICyber Security Seminar on Wednesday
February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company
Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence
Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final
presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world
Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link
httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691
iTravelSafe App allows you when you travel and you can check if the state is safe or not
where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified
China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C
Trading Confidential Is Leading To Crime
Below from the FBI website is a new internet scam The scam generates fake emails
that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink
h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam
There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims
The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike
Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI
Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product
If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available
The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement
Juice Skateboard Magazine Cover
Nike Magazine Adverteisment
Advantagesci
Securing Tomorrow Today
In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact
information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation
Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer
Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book
Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy
In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations
Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement
Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict
CounterIntelligence Brief Homland
Security
FBI US Defense
CREATING NEWSTRATGIES TO SURROUNDER
THE SAFE
Advantage SCI hosted its first CICyber Security Seminar on Wednesday
February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company
Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence
Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final
presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world
Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link
httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691
iTravelSafe App allows you when you travel and you can check if the state is safe or not
where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified
China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C
Trading Confidential Is Leading To Crime
Below from the FBI website is a new internet scam The scam generates fake emails
that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink
h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam
There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims
The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike
Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI
Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product
If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available
The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement
Nike Magazine Adverteisment
Advantagesci
Securing Tomorrow Today
In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact
information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation
Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer
Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book
Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy
In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations
Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement
Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict
CounterIntelligence Brief Homland
Security
FBI US Defense
CREATING NEWSTRATGIES TO SURROUNDER
THE SAFE
Advantage SCI hosted its first CICyber Security Seminar on Wednesday
February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company
Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence
Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final
presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world
Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link
httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691
iTravelSafe App allows you when you travel and you can check if the state is safe or not
where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified
China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C
Trading Confidential Is Leading To Crime
Below from the FBI website is a new internet scam The scam generates fake emails
that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink
h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam
There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims
The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike
Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI
Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product
If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available
The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement
Advantagesci
Securing Tomorrow Today
In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact
information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation
Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer
Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book
Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy
In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations
Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement
Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict
CounterIntelligence Brief Homland
Security
FBI US Defense
CREATING NEWSTRATGIES TO SURROUNDER
THE SAFE
Advantage SCI hosted its first CICyber Security Seminar on Wednesday
February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company
Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence
Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final
presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world
Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link
httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691
iTravelSafe App allows you when you travel and you can check if the state is safe or not
where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified
China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C
Trading Confidential Is Leading To Crime
Below from the FBI website is a new internet scam The scam generates fake emails
that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink
h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam
There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims
The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike
Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI
Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product
If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available
The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement
In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact
information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation
Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer
Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book
Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy
In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations
Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement
Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict
CounterIntelligence Brief Homland
Security
FBI US Defense
CREATING NEWSTRATGIES TO SURROUNDER
THE SAFE
Advantage SCI hosted its first CICyber Security Seminar on Wednesday
February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company
Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence
Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final
presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world
Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link
httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691
iTravelSafe App allows you when you travel and you can check if the state is safe or not
where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified
China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C
Trading Confidential Is Leading To Crime
Below from the FBI website is a new internet scam The scam generates fake emails
that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink
h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam
There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims
The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike
Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI
Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product
If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available
The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement
CREATING NEWSTRATGIES TO SURROUNDER
THE SAFE
Advantage SCI hosted its first CICyber Security Seminar on Wednesday
February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company
Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence
Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final
presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world
Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link
httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691
iTravelSafe App allows you when you travel and you can check if the state is safe or not
where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified
China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C
Trading Confidential Is Leading To Crime
Below from the FBI website is a new internet scam The scam generates fake emails
that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink
h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam
There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims
The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike
Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI
Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product
If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available
The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement
Trading Confidential Is Leading To Crime
Below from the FBI website is a new internet scam The scam generates fake emails
that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink
h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam
There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims
The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike
Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI
Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product
If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available
The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov
Advantage Sci
Brochure
Magazine Page
Retro Vintage Advertisement