hellrefa.blogg.se

Modern espionage techniques
Modern espionage techniques













  1. Modern espionage techniques movie#
  2. Modern espionage techniques trial#

Schulte is accused of stealing and leaking classified information to Wikileaks.

Modern espionage techniques trial#

For example, the ongoing trial for treason against disgruntled CIA employee Joshua Schulte shows the internal working climate among developers with security clearance. Wright’s comments fit the profile depicted by other sources from inside intelligence agencies too. Sometimes they’re just weird,” says Charity Wright, a former senior intelligence officer at the US National Intelligence Agency (NSA) who is now a cyber-threat intelligence analyst.

modern espionage techniques

The reality of today’s tech-savvy spies is much dorkier: “From my experience, they tend to be nerdy, definitely not as cool as in Hollywood. Mentioning Bond to ex-intelligence officers merely provokes a chuckle.

Modern espionage techniques movie#

There are the real-life ones behind the curtain, many of them now spending most of their time at computers and much less time locating potential dead-drops.īehind the smoke and mirrors game, one thing seems certain: the description of modern intelligence agents does not fit fictional movie heroes like James Bond. Online social-media spies are not the only contemporary secret agents who paint the town red. The social-media spy is now an established strategy, experts say, and the trend towards these profiles is only growing, according to a researcher at Secureworks. It had garnered over 500 LinkedIn connections, some being legitimate photographers. Next to the Facebook and Linkedin profile, there was also a blog set up which was active for almost a year before the whole operation blew up. Mia Ash not only teaches us about modern spies’ latest schemes, it is also a lesson in how much effort goes into it creating the charade. The only thing that mattered was that he had access to his company computer network,” Lucas says in his book ‘Spycraft Rebooted: How Technology is Changing Espionage’. “Victim A did not need to be particularly interesting as an intelligence source. It exemplifies how the world has changed in the wake of technology. To Edward Lucas, a British journalist, this example of modern-day espionage stands out.

modern espionage techniques

It contained an assault with a malicious macro meant to infect the receiver’s computer. Eventually, the employee received an email with a Microsoft Excel attachment for a photography survey. Conversations began on LinkedIn, then moved to Facebook. The cover was blown for the espionage campaign when a security analyst at Secureworks, a US cyber-security company, spotted an employee’s conversation with Mia Ash. When it turned out to be a trap by Iranian state-sponsored hackers, it may have dawned on some that behind Mia Ash there was something more than an enchanting, young, female photographer. When a coy Facebook profile with the name of Mia Ash began to contact men in senior positions – many of them with access to computer networks – it did not arouse any suspicion.















Modern espionage techniques