Army Cyber Command brings in outside help to fight insider threats

Two companies announced Thursday a $6.5 million contract award to help the United States Army Cyber Command shore up counterintelligence efforts. Applied Insight and DV United will work in tandem to support Army Cyber Command (ARCYBER) with its User Activity Monitoring Program (UAM). The two companies have experience handling cyber weapons systems, insider threat analysis and computer network defense for the Pentagon and the wider intelligence community. Greg Walker, president of Applied Insights, told CyberScoop that prior partnerships with the Army, Air Force and FBI were key to fostering trust and securing the ARCYBER contract. Thomas Dalton, chief operating officer of DV United, voiced similar sentiments. “Our deep experience providing cyber and information security mission solutions to the government has assisted in securing federal networks, combating cybercrime and protecting critical infrastructure,” Dalton said in a press release. Over five years, the two companies will monitor user activity, identify potential insider […]

The post Army Cyber Command brings in outside help to fight insider threats appeared first on Cyberscoop.

Continue reading Army Cyber Command brings in outside help to fight insider threats

The Espionage of Former CIA Case Officer Jerry Chun Shing Lee for China

Was Jerry Chun Shing Lee (aka Zheng Cheng Li) a recruited asset of China’s Ministry for State Security (MSS), or was he a financially strapped former CIA case officer who volunteered his services to commit espionage on behalf of the MSS? It’s a bit li… Continue reading The Espionage of Former CIA Case Officer Jerry Chun Shing Lee for China

Amid ongoing geopolitical tension, researchers find Pakistani hacking operation aimed at India

As well-crafted hacking tools become more ubiquitous, long simmering rivalries between developing nations take on a new dimension: cyber espionage runs rampant. Research released Thursday by Talos Security, Cisco’s internal cybersecurity unit, describes how a long running computer spying campaign against India was likely controlled by operators in Pakistan. Researchers highlighted a stealthy remote access trojan, dubbed “GravityRAT,” that’s been repetitively used to target Indian organizations since at least 2016. During that timeframe, the author of GravityRAT added new features and changed certain capabilities to make it more difficult to detect. This also included making the malware multilingual, so that whenever it was packaged inside a phishing email it had a better chance at tricking people who speak Chinese, Italian, French, German or Spanish. India’s computer emergency response team (CERT) previously published an advisory about GravityRAT, which suggests it targeted multiple Indian entities, according to Talos. The Indian CERT, however, only […]

The post Amid ongoing geopolitical tension, researchers find Pakistani hacking operation aimed at India appeared first on Cyberscoop.

Continue reading Amid ongoing geopolitical tension, researchers find Pakistani hacking operation aimed at India

Counterintelligence: Who is the Chinese Spy Jerry Chun Shing Lee?

Until Jan. 16, unless you were part of the counterintelligence China mole-hunt team at the CIA and FBI, you probably had never heard of a former CIA case officer Jerry Chun Shing Lee. A 13-year veteran of the CIA (1994-2007), Lee stands accused of “unl… Continue reading Counterintelligence: Who is the Chinese Spy Jerry Chun Shing Lee?

China Continues its Xenophobic Counterintelligence Campaigns

Some may say that China has always had an underlying current of xenophobia. Arrests and prosecutions of foreign nationals in China on unexplained or unidentified espionage charges continue. These actions continue to feed this narrative, as do the gover… Continue reading China Continues its Xenophobic Counterintelligence Campaigns

Here’s How CIA Spies On Its Intelligence Liaison Partners Around the World

WikiLeaks has just published another Vault 7 leak, revealing how the CIA spies on their intelligence partners around the world, including FBI, DHS and the NSA, to covertly collect data from their systems.

The CIA offers a biometric collection system—with predefined hardware, operating system, and software—to its intelligence liaison partners around the world that helps them voluntary share

Continue reading Here’s How CIA Spies On Its Intelligence Liaison Partners Around the World

Top U.S. intelligence official: Media is wrong about low morale

The issue of sinking morale within the U.S. intelligence community is a myth fabricated by the media, said a top U.S. intelligence official who spoke Thursday at the National Press Club. “I am in the intelligence community, I have spent time in the FBI, in NCSC now and CIA, and I don’t see a dip […]

The post Top U.S. intelligence official: Media is wrong about low morale appeared first on Cyberscoop.

Continue reading Top U.S. intelligence official: Media is wrong about low morale

Top U.S. intelligence official: Media is wrong about low morale

The issue of sinking morale within the U.S. intelligence community is a myth fabricated by the media, said a top U.S. intelligence official who spoke Thursday at the National Press Club. “I am in the intelligence community, I have spent time in the FBI, in NCSC now and CIA, and I don’t see a dip […]

The post Top U.S. intelligence official: Media is wrong about low morale appeared first on Cyberscoop.

Continue reading Top U.S. intelligence official: Media is wrong about low morale