Seven People Charged With Conspiring to Steal Trade Secrets For Benefit of Chinese Manufacturing Company

(DOJ News Release, 24 May 2017) WASHINGTON – A criminal complaint was unsealed today charging seven individuals with conspiring to steal trade secrets from a business in the U.S. on behalf of a company in China that was engaged in manufacturing a high-performance, naval-grade product for military and civilian uses. On May 23, 2017, two defendants […]

Defense engineer pleads guilty after trying to forge ‘The Americans’-type pact with phony Russian spy

(Los Angeles Times) It t looked easy enough on the FX television series “The Americans,” in which a pair of married Russian spies, posing as U.S. citizens, enlist the aid of Americans to steal national intelligence secrets. It’s not so simple in real life, however. That’s what a defense contracting engineer learned the hard way […]

Hackers Hide Cyberattacks in Social Media Posts

(New York Times) . . . While corporations and government agencies around the world are training their staff to think twice before opening anything sent by email, hackers have already moved on to a new kind of attack, targeting social media accounts, where people are more likely to be trusting. Pentagon officials are increasingly worried that […]

State Department Employee Arrested and Charged With Concealing Extensive Contacts With Foreign Agents

(DOJ) A federal complaint was unsealed today charging Candace Marie Claiborne, 60, of Washington, D.C., and an employee of the U.S. Department of State, with obstructing an official proceeding and making false statements to the FBI, both felony offenses, for allegedly concealing numerous contacts that she had over a period of years with foreign intelligence agents. […]

Ray Semko at Impact 2017 Conference

Ray Semko, The D*I*C*E Man, will be giving the rousing, closing DICE security awareness presentation called, “Making Security Great Again” at this year’s IMPACT 2017 Conference sponsored by the National Security Institute. The conference will take place at the Westfields Marriott in Chantilly, VA from Monday, April 24 to Wednesday, April 26. There’s a great […]

Harold “The Hoarder” Martin Indicted

Update on the NSA contractor who hoarded classified info for the past 20 YEARS. Can you imagine this as an episode on A&E’s Hoarders?? Government Contractor Facing Federal Indictment for Willful Retention of National Defense Information (DOJ) A federal grand jury returned an indictment today charging Harold Thomas Martin III, 52, of Glen Burnie, Maryland, with […]

How Did This Happen?

The media and others continue to be bewildered and still don’t get it. Here are a few clues to help them out: by Paul Genova I’m noticing that a lot of you aren’t graciously accepting the fact that your candidate lost. In fact you seem to be posting even more hateful things about those of us […]

FBI Employee Joey Chun Sentenced to Years for Acting as an Agent of China

Update on Joey Chun case.  (FBI) Former FBI Employee Sentenced In Manhattan Federal Court To 24 Months In Prison For Acting As An Agent Of China Kun Shan Chun, a/k/a “Joey Chun,” Provided Sensitive FBI Information to the Chinese Government  Preet Bharara, the United States Attorney for the Southern District of New York, Mary B. McCord, […]

Harold Martin, government contractor for NSA, arrested for taking classified info home

New spy case? Harold Thomas Martin, 51 year old Navy vet working at Booz Allen on contract to NSA in Maryland stashed highly classified information (including SCI material) in his home in Glen Burnie and was secretly arrested on August 27.  No indication yet that he gave the information to a foreign state or organization. Will […]

Management lessons from the espionage of Ana Montes

(CSO) As companies shop for expensive IT security software packages, hire information assurance specialists, or enter into contracts with IT security firms to provide up-to-date cyber threat intelligence, they should not overlook the threats posed to company data from traditional espionage tradecraft. Not even the most robust computer security measures or the latest behavioral analytic/machine […]