recentpopularlog in

jerryking : moles   6

Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core
NOV. 12, 2017 | The New York Times | By SCOTT SHANE, NICOLE PERLROTH and DAVID E. SANGER.

“These leaks have been incredibly damaging to our intelligence and cyber capabilities,” said Leon E. Panetta, the former defense secretary and director of the Central Intelligence Agency. “The fundamental purpose of intelligence is to be able to effectively penetrate our adversaries in order to gather vital intelligence. By its very nature, that only works if secrecy is maintained and our codes are protected.”
adversaries  data_breaches  hacking  vulnerabilities  counterintelligence  counterespionage  moles  malware  ransomware  Fedex  Mondelez  Edward_Snowden  security_&_intelligence  Russia  Leon_Panetta  NSA  cyber_security  cyber_warfare  cyberweapons  tools  David_Sanger  SecDef  CIA 
november 2017 by jerryking
Killing C.I.A. Informants, China Crippled U.S. Spying Operations - The New York Times
By MARK MAZZETTI, ADAM GOLDMAN, MICHAEL S. SCHMIDT and MATT APUZZOMAY 20, 2017

The Chinese government systematically dismantled C.I.A. spying operations in the country starting in 2010, killing or imprisoning more than a dozen sources over two years and crippling intelligence gathering there for years afterward.

Current and former American officials described the intelligence breach as one of the worst in decades. ..... The C.I.A. considers spying in China one of its top priorities, but the country’s extensive security apparatus makes it exceptionally hard for Western spy services to develop sources there.

At a time when the C.I.A. is trying to figure out how some of its most sensitive documents were leaked onto the internet two months ago by WikiLeaks, and the F.B.I. investigates possible ties between President Trump’s campaign and Russia, the unsettled nature of the China investigation demonstrates the difficulty of conducting counterespionage investigations into sophisticated spy services like those in Russia and China.....As more and more sources vanished, the operation took on increased urgency. Nearly every employee at the American Embassy was scrutinized, no matter how high ranking. Some investigators believed the Chinese had cracked the encrypted method that the C.I.A. used to communicate with its assets. Others suspected a traitor in the C.I.A., a theory that agency officials were at first reluctant to embrace — and that some in both agencies still do not believe.
CIA  China  espionage  security_&_intelligence  informants  counterintelligence  moles  counterespionage  covert_operations 
may 2017 by jerryking
Get smart: scooping the competition in six easy steps—without breaking the law | Managing | Strategy | Canadian Business Online
December 27, 2004 | From Canadian Business Online |
Gathering competitive intelligence is all too often confused with
corporate espionage, but practitioners say it really has nothing to do
with planting a mole inside your competitor's HQ or hacking into a
computer system. After all, that's against the law. Still, there are
perfectly legal, ethical and effective ways to find out what your
competitors are doing.
competitive_intelligence  scuttlebutt  due_diligence  market_research  sleuthing  moles 
february 2010 by jerryking
The Meaning of al Qaeda's Double Agent - WSJ.com
JANUARY 7, 2010 | Wall Street Journal | by Reuel Marc Gerecht.
The jihadists are showing impressive counterintelligence ability that
the CIA seems to have underestimated.
Jihad  security_&_intelligence  Afghanistan  counterintelligence  CIA  al-Qaeda  moles 
january 2010 by jerryking
CIA Blast Blamed On Double Agent - WSJ.com
JANUARY 5, 2010 | Wall Street Journal | By SIOBHAN GORMAN, ANAND GOPAL and YOCHI J. DREAZEN
security_&_intelligence  Afghanistan  CIA  moles 
january 2010 by jerryking

Copy this bookmark:





to read