Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] UK MoD Manual LEAKED: "Investigative Journalist" Now a Dirty Word Like "Terrorist"

  • Subject: [News] UK MoD Manual LEAKED: "Investigative Journalist" Now a Dirty Word Like "Terrorist"
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Mon, 05 Oct 2009 17:51:34 +0100
  • Followup-to: comp.os.linux.advocacy
  • Newsgroups: comp.os.linux.advocacy
  • User-agent: KNode/4.3.1
Hash: SHA1

UK MoD Manual of Security Volumes 1, 2 and 3 Issue 2, JSP-440, RESTRICTED, 2389 pages, 2001

,----[ Quote ]
| The main threats of this type are posed by 
| investigative journalists, pressure groups, 
| investigation agencies, criminal elements, 
| disaffected staff, dishonest staff and computer 
| hackers. The types of threat from these sources 
| can be categorized in six broad groups: a. 
| Confidentiality. Compromise of politically 
| sensitive information. This threat is presented 
| by: (1) Pressure groups and investigative 
| journalists attempting to obtain sensitive 
| information. (2) Unauthorized disclosure of 
| official information (leaks)..."
| "Investigative journalists have exploited 
| personal tax information; they also target 
| commercial and financial information as do 
| criminal elements seeking financial advantage. "
| [..] 
| "The threat to operations against these targets 
| is less likely to arise from positive acts of 
| counter-espionage, than from leakage of 
| information through disaffected members of staff, 
| or as a result of the at tentions of an 
| investigative journalist, or simply by accident 
| or carelessness. 1706. In this wider definition 
| of Threat, the "enemy" is unwelcome publicity of 
| any kind, and through any medium. The most 
| effective safeguard is to reinforce those aspects 
| of security that minimise the risk of leakage of 
| sensitive intelligence operations or product into 
| the public domain - whether by accidental 
| exposure or deliberate intent. The STRAP System 
| aims to achieve this."
| [..]
| "The security measures in this chapter are aimed 
| primarily to cover contacts made in CSSRAs and 
| have been drawn up to protect the individual from 
| action by FISs, extremist groups, investigative 
| journalists and criminals."
| [..]
| "An Annual Threat Assessment (ATA) is issued to 
| all Government Departments giving generic 
| statements as to the main sources of Threat. This 
| will include personnel who may be from or 
| influenced by Foreign Intelligence Services 
| (FIS), authorized users who, for whatever motive, 
| may seek to gain access to official information 
| they have no 'need to know', subversive or 
| terrorist organizations, and investigative 
| journalists."
| [..]
| "The threat from subversive or terrorist 
| organisations, investigative journalists and 
| others must also be considered."
| "Experience has shown that at least half the 
| attempts to hack into systems arise from this 
| group and that external hackers use "social 
| engineering" techniques to trick authorised users 
| into revealing information which may aid an 
| external penetration. 7. The Media. Investigative 
| journalists are increasingly interested in State 
| IT systems, particularly those operated by the 
| police and the Security and Intelligence 
| agencies. There has been evidence of premeditated 
| attempts to acquire protectively marked 
| information from IT systems. 8. Members of the 
| Public. The fact that inform ation held 
| electronically may be open to novel forms of 
| surreptitious attack provides a special 
| attraction to certain individuals, commonly known 
| as 'hackers'. Whilst the efforts of hackers are 
| unlikely to be directed specifically against 
| protectively marked information, there is added 
| kudos in breaking into Defence systems, so much 
| information might be discovered fortuitously. "
| "..The threat from subversive and terrorist 
| organizations, criminal activity, investigative 
| journalists, and members of the public cannot be 
| discounted..."
| "..Malicious software can originate from many 
| sources such as disaffected staff, foreign 
| intelligence services, investigative journalists 
| or terrorists..."
| [..]
| "..The main elements of the Audio security threat 
| are: a. The threat from deliberate attempts to 
| overhear conversations posed by FIS (especially 
| at locations overseas), sophisticated terrorist 
| and subversive organisations and in particular 
| from criminals, investigative journalists, 
| private investigators and some members of the 
| public..."
| [..]
| "..Identify possible threats to your site, such 
| as from: Foreign Intelligence Services. Terrorist 
| groups. Disaffected staff. Criminals. 
| Investigative journalists."


EU social network spy system brief, INDECT Work Package 4, 2009

,----[ Quote ]
| This file, marked "confidential", describes 
| development of an EU-funded intelligence 
| gathering system ("INDECT work package 4") 
| designed to comb webblogs, chat sites, 
| newsreports, and social-networking sites to 
| inorder to build up automatic dossiers on 
| individuals, organizations and their 
| relationships. 

Version: GnuPG v1.4.9 (GNU/Linux)


[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index