-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
UK MoD Manual of Security Volumes 1, 2 and 3 Issue 2, JSP-440, RESTRICTED, 2389 pages, 2001
,----[ Quote ]
| The main threats of this type are posed by
| investigative journalists, pressure groups,
| investigation agencies, criminal elements,
| disaffected staff, dishonest staff and computer
| hackers. The types of threat from these sources
| can be categorized in six broad groups: a.
| Confidentiality. Compromise of politically
| sensitive information. This threat is presented
| by: (1) Pressure groups and investigative
| journalists attempting to obtain sensitive
| information. (2) Unauthorized disclosure of
| official information (leaks)..."
|
| "Investigative journalists have exploited
| personal tax information; they also target
| commercial and financial information as do
| criminal elements seeking financial advantage. "
|
| [..]
|
| "The threat to operations against these targets
| is less likely to arise from positive acts of
| counter-espionage, than from leakage of
| information through disaffected members of staff,
| or as a result of the at tentions of an
| investigative journalist, or simply by accident
| or carelessness. 1706. In this wider definition
| of Threat, the "enemy" is unwelcome publicity of
| any kind, and through any medium. The most
| effective safeguard is to reinforce those aspects
| of security that minimise the risk of leakage of
| sensitive intelligence operations or product into
| the public domain - whether by accidental
| exposure or deliberate intent. The STRAP System
| aims to achieve this."
|
| [..]
|
| "The security measures in this chapter are aimed
| primarily to cover contacts made in CSSRAs and
| have been drawn up to protect the individual from
| action by FISs, extremist groups, investigative
| journalists and criminals."
|
| [..]
|
| "An Annual Threat Assessment (ATA) is issued to
| all Government Departments giving generic
| statements as to the main sources of Threat. This
| will include personnel who may be from or
| influenced by Foreign Intelligence Services
| (FIS), authorized users who, for whatever motive,
| may seek to gain access to official information
| they have no 'need to know', subversive or
| terrorist organizations, and investigative
| journalists."
|
| [..]
|
| "The threat from subversive or terrorist
| organisations, investigative journalists and
| others must also be considered."
|
| "Experience has shown that at least half the
| attempts to hack into systems arise from this
| group and that external hackers use "social
| engineering" techniques to trick authorised users
| into revealing information which may aid an
| external penetration. 7. The Media. Investigative
| journalists are increasingly interested in State
| IT systems, particularly those operated by the
| police and the Security and Intelligence
| agencies. There has been evidence of premeditated
| attempts to acquire protectively marked
| information from IT systems. 8. Members of the
| Public. The fact that inform ation held
| electronically may be open to novel forms of
| surreptitious attack provides a special
| attraction to certain individuals, commonly known
| as 'hackers'. Whilst the efforts of hackers are
| unlikely to be directed specifically against
| protectively marked information, there is added
| kudos in breaking into Defence systems, so much
| information might be discovered fortuitously. "
|
| "..The threat from subversive and terrorist
| organizations, criminal activity, investigative
| journalists, and members of the public cannot be
| discounted..."
|
| "..Malicious software can originate from many
| sources such as disaffected staff, foreign
| intelligence services, investigative journalists
| or terrorists..."
|
| [..]
|
| "..The main elements of the Audio security threat
| are: a. The threat from deliberate attempts to
| overhear conversations posed by FIS (especially
| at locations overseas), sophisticated terrorist
| and subversive organisations and in particular
| from criminals, investigative journalists,
| private investigators and some members of the
| public..."
|
| [..]
|
| "..Identify possible threats to your site, such
| as from: Foreign Intelligence Services. Terrorist
| groups. Disaffected staff. Criminals.
| Investigative journalists."
`----
http://wikileaks.org/wiki/UK_MoD_Manual_of_Security_Volumes_1%2C_2_and_3_Issue_2%2C_JSP-440%2C_RESTRICTED%2C_2389_pages%2C_2001
EU social network spy system brief, INDECT Work Package 4, 2009
,----[ Quote ]
| This file, marked "confidential", describes
| development of an EU-funded intelligence
| gathering system ("INDECT work package 4")
| designed to comb webblogs, chat sites,
| newsreports, and social-networking sites to
| inorder to build up automatic dossiers on
| individuals, organizations and their
| relationships.
`----
http://wikileaks.org/wiki/EU_social_network_spy_system_brief%2C_INDECT_Work_Package_4%2C_2009
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkrKJBcACgkQU4xAY3RXLo7oVgCcDHzWELT3SXEpRCGEc4mad1Oh
Mi0An1nVwBkqHx5BeGRIMOmTctVYsuIC
=Ij+1
-----END PGP SIGNATURE-----
|
|