Upload
lumina
View
65
Download
3
Tags:
Embed Size (px)
DESCRIPTION
Intelligence Counterintelligence. What is Intelligence?. Information Activities Organization. Scope of Intelligence. Government – national security Range from peace time to war time intelligence Type of government Domestic Intelligence – depends on nature of regime - PowerPoint PPT Presentation
Citation preview
IntelligenceIntelligence
CounterintelligenceCounterintelligence
CSCE 727 - Farkas 2
What is Intelligence?What is Intelligence?
InformationActivitiesOrganization
CSCE 727 - Farkas 3
Scope of IntelligenceScope of Intelligence
Government – national security – Range from peace time to war time intelligence– Type of government
Domestic Intelligence – depends on nature of regime Business corporations – competitive advantage Economics and Intelligence
– Government-run economy– Economic well-being of nation
Non-traditions Intelligence– Environmental issues
CSCE 727 - Farkas 4
Intelligence and Law Intelligence and Law EnforcementEnforcement
Transnational threats: – Do not originate primarily from a foreign government– Serious threats for nation’s well-being– Fall within law enforcement rather than intelligence– Examples: narcotics trafficking, international terrorism
Law enforcement: waiting until a crime has been committed
Intelligence: collection of convincing evidence Criminal investigation vs. criminal intelligence
investigation – Punishment of a given criminal act or struggle with an
organization engaged in criminal activity
CSCE 727 - Farkas 5
Intelligence and Information AgeIntelligence and Information Age Increased amount of digital data
– How to collect– How to analyze
Technology: dependency on computing technologies– Who is vulnerable?
TechnologyTechnology Homeland Security News Wire reading:
– Second NSA domestic surveillance scheme revealed: data mining from nine U.S. ISPs, 0/07/2013, http://www.homelandsecuritynewswire.com/dr20130607-second-nsa-domestic-surveillance-scheme-revealed-data-mining-from-nine-u-s-isps
– Readings, PRISM and Boundless Informant: Is NSA Surveillance a Threat, http://www.brookings.edu/blogs/up-front/posts/2013/06/13-prism-boundless-informant-nsa-surveillance-lempert
CSCE 727 - Farkas 6
CSCE 727 - Farkas 7
Intelligence and Information Age Intelligence and Information Age (cont.)(cont.)
Globalization – Flow of information across borders– International trade– Division of labor– Increased travel– Increased penetration by news media
CSCE 727 - Farkas 8
Information SpecialistInformation Specialist
Policy makerStaff of policy makerIntelligence analysts
CSCE 727 - Farkas 9
Domestic Intelligence ReadingDomestic Intelligence Reading U.S. policymakers mull creation of domestic intelligence
agency, http://www.cnn.com/2008/POLITICS/10/20/domestic.intelligence.agency/index.html , 2008
US Gang Intelligence Agency, http://usgia.org/ D. Priest and W. Arkin, Top Secret America, A
Washington Post Investigation, http://projects.washingtonpost.com/top-secret-america/articles/monitoring-america/ , 2010
F. Langfitt, In China, Beware: A Camera May Be Watching You, NPR News, http://www.npr.org/2013/01/29/170469038/in-china-beware-a-camera-may-be-watching-you
CSCE 727 - Farkas 10
Domestic SurveillanceDomestic Surveillance
Surveillance of own citizens– Legislations– Circumstances permitting surveillance– Limits– Amount and kind of surveillance
U.S.: Constitutional law– Fourth Amendment: prohibition against unreasonable
searches and seizures (e.g., wiretap)
CSCE 727 - Farkas 11
Criminal StandardCriminal Standard
Scope of domestic intelligence: limited by the law
Mid 1970s: “…domestic intelligence investigations should be strictly limited to situations where a violation of the law has occurred or was about to occur.” (Silent Warfare)
CSCE 727 - Farkas 12
Levi Guidelines Levi Guidelines
Edward Hirsch Levi (June 26, 1911 – March 7, 2000)– US Attorney General– 1976: issued a set of guidelines to limit the FBI
activities, e.g., must show evidence of crime before wiretaps
Effects of surveillance:– Viewed as punishment– Creates a “chill” effect
Privacy IssuesPrivacy Issues
Privacy issues:– Surveillance vs. other law enforcement
investigations that do not target specific crimes, e.g., income tax audits, custom inspections
Modified Attorney General's Guideline, Electronic Privacy Information Center, http://epic.org/privacy/fbi/
CSCE 727 - Farkas 13
CSCE 727 - Farkas 14
Law Enforcement WiretapLaw Enforcement Wiretap
Federal Government and state governments are authorized to intercept wire and electronic communications – Court order– Probable cause of criminal activity– Only relevant information
Phone and room bugs, computer monitoring Organized crime monitoring (drug trafficking, terrorist
activities, etc.) Legislations:
– 1986: Electronic Communications Privacy Act, Title III. – 1978: Foreign Intelligence Surveillance Act (FISA) -- Title III
(Wiretap Statue) regulates ordinary law enforcement surveillance
CSCE 727 - Farkas 15
FISAFISA 1978: Foreign Intelligence Surveillance Act (FISA)
– Regulates government’s collection of “foreign intelligence” for the purpose of counterintelligence
– Electronic eavesdropping and wiretapping– Criminal investigators cannot use it to obtain
warrants that cannot be obtained with normal court
Foreign Intelligence Surveillance Court
FISA 2.FISA 2.
1994: amended to physical entries in connection with “security” investigations
1998: amended to permit pen/trap orders FISA applications for search warrant:
– Probable cause that the surveillance target is a foreign power or agent
– Does not need to be criminal activity2001: Patriot Act extends FISA to cover
terrorism suspect and agents of foreign countries
CSCE 727 - Farkas 16
FISA 3FISA 3 2008: FISA Amendments Act
– ... Permits the Director of National Intelligence and the Attorney General to jointly authorize warrantless electronic surveillance
– Protects telecommunications companies from lawsuits for past or future cooperation with federal law enforcement authorities …
– On GovTrack, http://www.govtrack.us/congress/bills/110/hr6304#overview
2012: FISA Amendments Act Reauthorization Act
CSCE 727 - Farkas 17
CSCE 727 - Farkas 18
QuestionsQuestions
Would surveillance act as deterrent? Can (capabilities) government access critical
information?– US citizens – Foreigners
What are the technical issues– Collecting and storing data – Processing technologies
QuestionsQuestions
Name an application/use of technology that represent new privacy risk?– Social networking – Twitter– …
Do we have counter technology?
CSCE 727 - Farkas 19
Means of IntelligenceMeans of Intelligence
Data collectionData collection
CSCE 727 - Farkas 21
Means of Intelligence: Means of Intelligence: Electromagnetic signalsElectromagnetic signals
Waves propagating through some medium – Air, water, copper wires, fiber optics, etc.– Frequencies (Hz): wave cycles per second– Bandwidth: difference between the lowest and highest
frequencies Electricity, radio spectrum, infrared, (visible)
light, x-ray, etc. Advantages/disadvantages
– Low frequency: hard to jam– High frequency: larger bandwidth
CSCE 727 - Farkas 22
Means of Intelligence: Signal Means of Intelligence: Signal Intelligence (SIGINT)Intelligence (SIGINT)
Operations that involves– Interception– Analysis of signals across electromagnetic spectrum.
Intelligence report, criminal investigations, employee monitoring
Digital signal processing– Communication intelligence (COMINT)– Electronic intelligence (ELINT)– Imagery intelligence (IMINT)
CSCE 727 - Farkas 23
Means of Intelligence: EavesdroppingMeans of Intelligence: Eavesdropping
Sender
Snooper
Recipient
Insecure channel
Confidential
Tools: microphone receivers, Tape recorder, phone “bugs”, scanners,Radio receivers, satellite receivers, spy satellites,Network sniffing, etc.
CSCE 727 - Farkas 24
Means of Intelligence: Passive AttackMeans of Intelligence: Passive Attack
Access to confidential data and traffic pattern Privacy rights U.S. federal wiretap law
– Illegal for an individual to eavesdrop intentionally on wire, oral or electronic communications
– Home usage? Bug your phone? Hidden recorders? – Company monitoring? Computer vs. telephone?
Eavesdropping device: manufacture, sale, possess, advertise– Legal/illegal?– The Spy Factory
CSCE 727 - Farkas 25
Means of Intelligence: Telephone Means of Intelligence: Telephone WiretapWiretap
Physical access Gain:
– Sensitive data (e.g., organizational secret, private information, etc.)– Disallowed information (e.g., law enforcement communications)
Federal wiretap restrictions Individuals and organized crime wiretap Cellular scanners
– Cellular phone calls– 1994 – illegal in USA (import, manufacture, sale)– Homemade scanners?
Pager Intercept
CSCE 727 - Farkas 26
Message DeciphersMessage Deciphers
Available encryption technology Cryptanalysis
– Technology– Brute force attack
Other means– Spy, social engineering, eavesdropping, keystroke
monitoring, hacking, etc. Release information give our capabilities
– National defense, tactical, ethical, etc.?
Interesting ReadInteresting Read R. Paul, Security experts: NIST encryption standard may
have NSA backdoor, Arstechnica11/17, 2007, http://arstechnica.com/security/2007/11/security-experts-nist-encryption-standard-may-have-nsa-backdoor/
K. Zetter, How a Crypto ‘Backdoor’ Pitted the Tech World Against the NSA, Wired, 09/24/2013, http://www.wired.com/threatlevel/2013/09/nsa-backdoor/all/
Echelon, Wikipedia, http://en.wikipedia.org/wiki/ECHELON
CSCE 727 - Farkas 27
CSCE 727 - Farkas 28
CounterintelligenceCounterintelligence
National SecurityNature of regimeLaw
CSCE 727 - Farkas 29
Goal of Goal of CounterintelligenceCounterintelligence
National Security – Kinds of threats– Information to be collected – Purpose served – Legislation
Democracy
CSCE 727 - Farkas 30
CounterintelligenceCounterintelligence Foreign intelligence guidelines: classified
– Investigation of: Illegal activities: detecting and preventing foreign
espionage and terrorist activities Legal activities: foreign legal political activities like fund-
raising, organizational work, etc. Domestic intelligence guidelines (“Levi Guidelines”):
public– Investigation of groups that
hostile to government policies and fundamental principles seeks to deprive some class of people has violent approach to political change
Next ClassNext Class
Data Collection and Analysis
Current research
Preparation for discussions
1. Find 1-2 relevant articles
2. Additional reading is posted on class’ website
CSCE 727 - Farkas 31