Skip to content
  • Home
  • About
  • Contact

ShhhCretly ( Columnist, Writer, Sleuth – Vanson Soo )

Columnist, Writer, Sleuth – Vanson Soo

Posted on June 11, 2015

Shhh… Hackers Target Database of Chinese with Ties to US Government

Check out the NYT article below.

Hackers May Have Obtained Names of Chinese With Ties to U.S. Government

By DAVID E. SANGER and JULIE HIRSCHFELD DAVISJUNE 10, 2015

WASHINGTON — Investigators say that the Chinese hackers who attacked the databases of the Office of Personnel Management may have obtained the names of Chinese relatives, friends and frequent associates of American diplomats and other government officials, information that Beijing could use for blackmail or retaliation.

Federal employees who handle national security information are required to list some or all of their foreign contacts, depending on the agency, to receive high-level clearances. Investigators say that the hackers obtained many of the lists, and they are trying to determine how many of those thousands of names were compromised.

In classified briefings to members of Congress in recent days, intelligence officials have described what appears to be a systematic Chinese effort to build databases that explain the inner workings of the United States government. The information includes friends and relatives, around the world, of diplomats, of White House officials and of officials from government agencies, like nuclear experts and trade negotiators.

“They are pumping this through their databases just as the N.S.A. pumps telephone data through their databases,” said James Lewis, a cyberexpert at the Center for Strategic and International Studies. “It gives the Chinese the ability to exploit who is listed as a foreign contact. And if you are a Chinese person who didn’t report your contacts or relationships with an American, you may have a problem.”

Officials have conceded in the briefings that most of the compromised data was not encrypted, though they have argued that the attacks were so sophisticated and well hidden that encryption might have done little good.

The first attack, which began at the end of 2013 and was disclosed in the middle of last year, was aimed at the databases used by investigators who conduct security reviews. The investigators worked for a contracting firm on behalf of the Office of Personnel Management, and the firm was fired in August.

The broader attack on the personnel office’s main databases followed in December. That attack, announced last week, involved the records of more than four million current and former federal employees, most of whom have no security clearances.

White House and personnel office officials have provided few details about the latest breach. But the Department of Homeland Security has been telling outside experts and members of Congress that it regards the detection of the attack as a success, because it made use of new “signatures” of foreign hackers, based on characteristics of computer code, to find the attack.

In a statement, the personnel office said Wednesday that “it was because of these new enhancements to our IT systems that O.P.M. was able to identify these intrusions.” But the detection happened in April, five months after the attack began.

The list of relatives and “close or continuous contacts” is a standard part of the forms and interviews required of American officials every five years for top-secret and other high-level clearances, and government officials consider the lists to be especially delicate.

In 2010, when The New York Times was preparing to publish articles based on 250,000 secret State Department cables obtained by WikiLeaks, the newspaper complied with a request by the department to redact the names of any Chinese citizens who were described in the cables as providing information to American Embassy officials. Officials cited fear of retaliation by the Chinese authorities.

Officials say they do not know how much of the compromised data was exposed to the Chinese hackers. While State Department employees, especially new ones, are required to list all their foreign friends, diplomats have so many foreign contacts that they are not expected to list them all.

But other government officials are frequently asked to do so, especially in interviews with investigators. The notes from those interviews, conducted by a spinoff of the personnel office called the United States Investigative Service, were obtained by hackers in the earlier episode last year.

Intelligence agencies use a different system, so the contacts of operatives like those in the C.I.A. were not in the databases.

But the standard form that anyone with a national security job fills out includes information about spouses, divorces and even distant foreign relatives, as well as the names of current or past foreign girlfriends and boyfriends, bankruptcies, debts and other financial information. And it appears that the hackers reached, and presumably downloaded, images of those forms.

“I can’t say whether this was more damaging than WikiLeaks; it’s different in nature,” said Representative Adam B. Schiff, a California Democrat who is a member of the House Intelligence Committee, which was briefed by intelligence officials, the Department of Homeland Security and the personnel office on Tuesday. Mr. Schiff, who declined to speak about the specifics of the briefing, added, “But it is certainly one of the most damaging losses I can think of.”

Investigators were surprised to find that the personnel office, which had already been so heavily criticized for lax security that its inspector general wanted parts of the system shut down, did not encrypt any of the most sensitive data.

The damage was not limited to information about China, though that presumably would have been of most interest to the hackers. They are likely to be particularly interested in the contacts of Energy Department officials who work on nuclear weapons or nuclear intelligence, Commerce Department or trade officials working on delicate issues like the negotiations over the Trans-Pacific Partnership, and, of course, White House officials.

In a conference call with reporters on Wednesday, Senator Angus King, an independent from Maine on both the Intelligence Committee and the Armed Services Committee, called for the United States to retaliate for these kinds of losses. “Nation-states need to know that if they attack us this way, something bad is going to happen to their cyberinfrastructure,” he said.

But Mr. King said he could not say if the attacks on the personnel office were state-sponsored, adding, “I have to be careful; I can’t confirm the identity of the entity behind the attack.” The Obama administration has not formally named China, but there has been no effort to hide the attribution in the classified hearings.

The scope of the breach is remarkable, experts say, because the personnel office apparently learned little from earlier government data breaches like the WikiLeaks case and the surveillance revelations by Edward J. Snowden, both of which involved unencrypted data.

President Obama has said he regards the threat of cyberintrusions as a persistent challenge in a world in which both state and nonstate actors “are sending everything they’ve got at trying to breach these systems.”

The problem “is going to accelerate, and that means that we have to be as nimble, as aggressive and as well resourced as those who are trying to break into these systems,” he said at a news conference this week.

The White House has stopped short of blaming Katherine Archuleta, the director of the personnel office, for the breach, emphasizing that securing government computer systems is a challenging task.

Correction: June 10, 2015

An earlier version of a photo caption with this article misstated the name of the federal office building where employees handle national security information are required to list their foreign contacts. It is the Office of Personnel Management building, not Office of Personal Management.

Matt Apuzzo contributed reporting.

Share this:

  • Facebook
  • LinkedIn
  • Twitter
  • Tumblr
  • Email
  • Print
  • More
  • Reddit
  • Pinterest
  • Pocket

Like this:

Like Loading...
Categories Business risks, Computer and security, Corporate espionage, Cyber Espionage, Eavesdropping, Espionage, Intelligence, Privacy, Regulatory matters, Risk management, Security, Security - computer and devices, Spies, Surveillance, UncategorizedTagsBeijing, Blackmail, Center for Strategic and International Studies, Chinese hackers, CIA, Congress, Data, data breach, Department of Homeland Security, Department of State, Diplomats, Dissidents, FBI, Hack, Hackers, Homeland Security, Meta data, metadata, NSA, Office of Personnel Management, Senate, Snowden, State Department, White House

Post navigation

Previous Previous post: Shhh… William Binney: Everyone Under Surveillance
Next Next post: Shhh… From NSA to Police Surveillance

Menu

  • Home
  • About
  • Contact
IMG-20130618-WA0003

Titles Starting With “Shhh…” Are My Short Musings & Commentaries

  • The World of Corporate Sleuths
  • Whistleblowing and Internal Monitoring/Investigations
  • Shhhcretly Exclusive: Edward Snowden’s Warning Cry
  • Shhh… A Corona?!
  • Shhh…. Ghosn Debunks Reports on Escape Route
  • Shhh… A Cyber-Geopolitical Threats 2019 Roundup
  • Shhh… Updates on Edward Snowden & the Snowden Refugees
  • Shhh… The Matrix, With Mozilla
  • Shhh… Fancy Having A Live Flight Tracker?
  • Shhh… 10 Famous Spies
  • Shhh… One Lucky Chinese: Former Military Officer Bags Suspended Death Sentence in Graft Case
  • Shhh… Crafty Hackers Into Insider Trading
  • Shhh… UK's Spies, Lords & Predators
  • Shhh… British MPs to Court: Stop the Police & GCHQ Spying on Them
  • Shhh… WikiLeaks: NSA Spying on Japan
  • Shhh… Duncan Campbell – Global Spying Program ECHELON & the Decades-long Cosy NSA-GCHQ Relationship
  • Shhh… The Chinese Version of All the President's Men
  • Shhh… The Cost of Watching Julian Assange
  • Shhh… Google: No to Global ‘Right to Be Forgotten’ Order
  • Shhh… The Intercept: A Summer Reading List
  • Shhh… 10 Secret Facts about the CIA
  • Shhh… Spies Vs Silicon Valley
  • Shhh… Microsoft's Wi-Fi Sense Can Make You the 'Hotspot'
  • Shhh… The Snowden Official Teaser Trailer
  • Shhh… The 5 Most Powerful Families That Secretly Control The World
  • Shhh… US-Canada Border – Secret Deal Between Canada’s Spies and Border Guards
  • Shhh… Impact Team: Cheating Spouses Panic As Adultery Site Ashley Madison Hacked
  • Shhh… Hacked By Your Cyber-security Firm?
  • Shhh… Email Spams Dip First Time in Twelve Years
  • Shhh… The 5 Most Dangerous Hackers Of All Time
  • Shhh… Minds.com: A Social Media Network to Stop NSA Surveillance?
  • Shhh… WikiLeaks: TISA Corporate Takeover Plot
  • Shhh… SPIEGEL: US Attack on Press Freedom
  • Shhh… WikiLeaks: NSA Has Spied on German Chancellors for Decades
  • Shhh… US Government Hacks at OPM Exposed More Than 21Million People
  • Shhh… FBI, DEA & US Army Bought Italian Spyware
  • Shhh… Hacking Team: When Hackers Get Hacked
  • Shhh… Russian Parliament Paved Way for "Right to be Forgotten"
  • Shhh… WikiLeaks: NSA’s Been Bugging Top Brazilian Political and Financial Targets
  • Shhh… XKEYSCORE – The NSA Insight Into Everything We Do Online
  • Shhh… China Passes New National Security Law
  • Shhh… What Message is the US Sending to France with Bulk Data Collection to Resume Following WikiLeaks' Espionnage Élysée Expose?
  • Shhh… WikiLeaks: US Also Had a Decade-long Policy of Economic Espionage Against French Companies
  • Shhh… US Data Hack May Be 4 Times Larger Than the Government Has Admitted
  • Shhh… French Asylum Offer to Snowden & Assange as Ultimate US Contempt
  • Shhh… French Former Foreign Minister Roland Dumas: Shocked But Not Surprised With NSA Eavesdrops on French Presidents
  • Shhh… WikiLeaks' "Espionnage Élysée" – François Hollande on Emergency Meeting Following Claims US Spied on 3 French Presidents
  • Shhh… Google Chrome Secretly Downloading Audio Listeners & Eavesdropping on Users Without Consent
  • Shhh… China Changing Course on Foreign Policy?
  • Shhh… Italian Prosecutors Seek to Indict 297 People in Bank of China (Milan) Fraud
  • Shhh… Top 10 Sites Hidden by Google Earth
  • Shhh… Snowden Supports Apple’s Public Stance On Privacy
  • Shhh… French Ultimatum Clicking on Google Over "Right to be Forgotten" Ruling
  • Shhh… 2 Years Post-Snowden Review
  • Shhh… Conspiracy Theories on Latest Snowden Claims?
  • Shhh… From NSA to Police Surveillance
  • Shhh… Hackers Target Database of Chinese with Ties to US Government
  • Shhh… William Binney: Everyone Under Surveillance
  • Shhh… 10 Ways the NSA Spies On US
  • Shhh… Latest Cyberattacks on US Government a Hoax – To Restore NSA Surveillance?
  • Shhh… Snowden Documents: NSA Secretly Expands Cybersurveillance
  • Shhh… FBI Operate Surveillance Planes – With Fictitious Names and Video & Cellphone Technologies
  • Shhh… Live Q&A with Snowden
  • Shhh… US Senate Approves Bill to Reshape NSA Surveillance
  • Shhh… What About Snowden Now with NSA Surveillance on Hold?
  • Shhh… NSA Surveillance on Hold as Senate Blocks Temporary Extensions
  • Shhh… Everything Google – Key Announcements at the Google 2015 I/O Developer Conference
  • Shhh… Fancy Revenge by Stalking Your Identity Thief?
  • Shhh… William Binney on NSA's "Dark Secrets"
  • Shhh… The Internet of Things – Google's New Patent for a Creepy Wi-fi Connected Toy
  • Shhh… USA Freedom Act Fails Again – Senators Reject Bill to Scrap NSA Bulk Collection
  • Shhh… Rand Paul's 10-Hour Filibuster to Derail the Winding Down of NSA Surveillance
  • Shhh… Fraudulent Practices at Fake Cancer Charities
  • Shhh… US Charges 6 Chinese Nationals for Industrial Espionage
  • Shhh… Bruce Schneier on How We Sold Our Souls & Privacy to Internet Giants
  • Shhh… Brett King on FinTech & the Death of the Retail Banking Branches
  • Shhh… US Congress on Track to End NSA's Bulk Phone Collection Program?
  • Shhh… Jack Barsky – The Spy Among US
  • Shhh… Former CIA Officer Sentenced for Leaks to NYT Reporter
  • Shhh… Spy Game: The Thais, the Israelis & the Wiretapping Devices
  • Shhh… NSA Rats Exposed – The "Facebook-NSA Queen" & Mysterious Death of Dave Goldberg
  • Shhh… Court Rules NSA's Phone Data Collection Illegal
  • Shhh… NSA Have More Data Than They Can Handle
  • Shhh… North Korea Exposes Two South Korean Spies
  • Shhh… Profile: Michael G. Vickers, the Retiring Under Secretary of Defense for Intelligence
  • Shhh… AirBus Plans Legal Actions Against NSA/BND Spying Claims – NSA Involved in Industrial Espionage
  • Shhh… NSA Too Late With "Snowden-Proof" Cloud Storage
  • Shhh… Julian Assange: Snowden Better Off in Russia Than Iceland
  • Shhh… Obama Now Understands (Loss of) Privacy Pains?
  • Shhh… Mangfall Kaserne in Bad Aibling – Surveillance-Proof Site for German Intelligence BND to Cooperate with the NSA
  • Shhh… Anonymous: CyberSecurity Bill's a Scam
  • Shhh… The Protecting Cyber Networks Act Gets Greenlight from Congress
  • Shhh… The Perils of Popular News Sites
  • Shhh… New Google Security Chief – In Search of Balance with Privacy
  • Shhh… New Zealand & US Plotted to Spy on China
  • Shhh… WikiLeaks' Latest Stunt: The Sony Archives
  • Shhh… FaceBook Blames "Bug"
  • Shhh… Google's EU Antitrust Troubles Explained
  • Shhh… Spy On Spies – A New Breed of Spies
  • Shhh… China's Powerful "Great Cannon" to Censor the Internet
  • Shhh… Shutting Down Network of 12,000 Computers Used by Cyber-criminals
  • Shhh… Data Breach – What Happens to those Data?
  • Shhh… Turning the White House into a Russian House?
  • Shhh… Edward Snowden on John Oliver's ‘Last Week Tonight’
  • Shhh… Emails Reveal Cozy Google-NSA Relationship on Previously Denied High-Level Policy Discussions
  • Shhh… Google Did the Right Thing to Cut Off China's Certificate Authority CNNIC to Protect the Internet
  • Shhh… Did Obama Know What He's Doing When He Signed the new Executive Order on Cybercrimes?
  • Shhh… Facebook Violates EU Law as it Tracks Everyone Including Logged Out Users and Visitors
  • Shhh… Richard Stallman: Why Facebook is Mass Surveillance
  • Shhh… Why You Should Forget Facebook for Good?
  • Shhh… The "Secret" App – Parents Should Beware How Kids Are Keeping & Sharing Secrets Through Anonymous Posts that Aren't Really Anonymous
  • Shhh… The Why's, How's and What's of Hacks into Health Insurance Companies Like Anthem and Premera
  • Shhh… The USB-C Makes those new MacBooks More Vulnerable
  • Shhh… Apple Still Wants to Find You Even When Location Services are Switched Off
  • Shhh… Anatomy of a Hack – What Should You Do After You're Hacked?
  • Shhh… Windows 10 – "Windows Hello" Biometric Authentication Technology has Potential Serious Security Loopholes
  • Shhh… Department of the Internet: How the Government Has Taken Over Our Lives
  • Shhh… Snowden's Privacy Apps and Programs
  • Shhh… Live Recording: Microsoft Phone Support Scam at Work
  • Shhh… Hidden Spy Cameras at Denver Post Offices
  • Shhh… Bruce Schneier on His New Book "Data and Goliath"
  • Shhh… What Can You Do If Airport Checkpoints Demand for Your Smartphone Password?
  • Shhh… Fujitsu Can Detect Faces in Blurred Security Videos
  • Shhh… ProtonMail: Email Privacy and Encryption
  • Shhh… How Come Obama Suddenly Understood & Explained to China Why Backdoors into Encryption is Really Bad?
  • Shhh… How to Make Yourself Invisible to Facial Recognition with the New "Privacy Glasses"?
  • Shhh… US Pressures Forced PayPal to Punish Mega (& MegaChat) for Encrypted Communications & Keeping Our Privacy
  • Shhh… NSA Demands on Crypto Backdoors Led to US-China Spat on Backdoors & Encryption
  • How to Cope With File-Encrypting Ransomware Risks (After US Offer $3mn Award for GameOver Zeus creator Evgeniy Bogachev)?
  • Shhh… NSA Want Framework to Access Encrypted Communications
  • Shhh… Security Experts Not Convinced By Gemalto's Swift "Thorough" Investigations into NSA-GCHQ SIM Card Hacks
  • Shhh… Out of Africa: Spies & Leaked Intelligence from the New "El Dorado of Espionage"
  • Shhh… Snowden's Girlfriend at the Oscars for CitizenFour
  • Shhh… Doll Hack? New Wi-fi Connected "Hello Barbie" Risks Inviting Pedophiles Into the Barbie World
  • Shhh… Solutions to NSA & GCHQ Hacks into SIM Cards to Eavesdrop on Mobile Phones Worldwide?
  • Shhh… Pre-installed Superfish Malware Leaves Lenovo Computers Vulnerable to Man-in-the-Middle Attacks
  • Shhh… Simple Solutions to NSA's Embedded Spyware in Hard Drives
  • Shhh… Snowden at the ALCU Hawaii’s Davis Levin First Amendment Conference
  • Obama's Still On the Wrong Frequency On Cybersecurity Issues
  • Shhh… New Search Engine Memex to Reach the Other 95% of the Web (And Dark Web) that Google Missed
  • Shhh… China to Boost Cyber-Security with the World's First Quantum Communications Network – QC Satellite to Follow Next Year
  • Shhh… Spy Alert: Your Smart TV Watches You – Just Like Your Computer
  • Edward Snowden & Hervé Falciani Knew Each Other Before Their Respective Exposé?
  • The Flawed "Right To Be Forgotten" Ruling on Google Cannot and Should Not be Globalized
  • Shhh… Martin Jacques on Understanding the Rise of China
  • Shhh… US in Long Battle As China Request Source Code From Western Technology Companies
  • US-China Spat on Intrusive Rules – And Actual Intrusions
  • From Apple With Love – Granting Chinese Security Audits Leaves More Deep & Profound Implications Than Betrayal of Apple Die-Hards
  • Shhh… Why (Obama & Cameron) the NSA is Breaking Our Encryption and Why We Should Care
  • Shhh… Obama & Cameron: Here’s How Low-Tech Encrypted Communications Work – With Just a Pen & Paper – Which You Can’t Decrypt
  • Shhh… How to Register for Kim Dotcom's End-to-End Encrypted Voice Calling Service "MegaChat"
  • Shhh… China's Block to VPN Services Has Global Impacts
  • Shhh… Snowden: iPhone has Secret Surveillance Spyware that Can Be Remotely Controlled
  • Obama: Why is Your Blackberry Super-Encrypted & You Want to Ban the World from Using Encryption?
  • Shhh… Blackberry to Cameron & Obama: Encryption Ban a Gift to Hackers & Cyber-Criminals
  • Shhh… Obama to Support Cameron on Encryption Ban – Knowingly Betray Our Privacy and Security
  • Shhh… Mark Cuban on Social Media Mistakes and Self-Destruct Messaging Apps Cyber Dust
  • Shhh… List of 3,500 Spy Names sold by German Double Agent
  • Shhh… Paris Attacks: Dangerous Precedence & Irreversible Damages with Cameron's Pursuit of “Safe Spaces” & Ban on Encrypted Online Messaging Apps
  • Shhh… CENTCOM Hack: Snowden on Why US Pay the Price for Deprioritizing Cyber Defense
  • Shhh… CENTCOM Hack More Than Just Twitter Feed & YouTube Channel
  • Shhh… Online Privacy: How to Track & Manage Our Digital Shadow
  • Shhh… Facial Recognition & Risks: FBI to Photograph All Americans
  • Shhh… Facial Recognition & Risks: Encoding Your Photos with Photoscrambler
  • Shhh… Facial Recognition & Risks: How Much Is Your Face Worth?
  • Shhh… Get a New Home Router – 12 Millions Vulnerable to "Misfortune Cookie" Hacks
  • New US Sanctions on North Korea – Comparing Sony & the World’s Biggest Data Breaches
  • The Rafael Hui Case Amplifies Flaws in Hong Kong's Background Checks & Vetting System
  • Shhh… The WikiLeaks' CIA Travel Guide
  • Shhh… A Feasible Strategy Despite Severe Innate Phone Security (Eavesdropping) Flaws Like SS7
  • Are You Unique – How to Check Your Browser Fingerprints & Online Privacy?
  • Shhh… US Federal Court: Warrantless Surveillance Footage in Public Areas is an Invasion of Privacy
  • Shhh… The FBI Unmasking of TOR Users with Metasploit
  • One Question on the Sydney Siege: Why didn't the Snipers Shoot Earlier?
  • Shhh… Dick Cheney on "Full of Crap" Torture Report
  • Shhh… John Brennan on the Torture Report
  • Shhh… Michael Hayden on the Senate’s CIA Interrogation Report
  • The US Senate Intelligence Committee & CIA Interrogation Report – A Closer Look at the Tortures at Guantanamo Bay
  • Life-Saving Gadgets like Bulletproof Bags and Shields for Schools & the Workplace
  • Shhh… New Surveillance Gadget – GPS Shoes for Kids
  • Shhh… 10 Surveillance Technologies to Watch
  • Shhh… Russian Police to Award $37,000 for Gadgets That Could Hack iPhones
  • Shhh… DOJ Uses 18th Century Law to Make Apple Unlock Encrypted iPhones
  • Shhh… USB Thumb Drives Everywhere
  • Shhh… Glenn Greenwald with James Risen on "Pay Any Price: Greed, Power, and Endless War"
  • Shhh… How to Prevent Someone from Knowing When You've Seen Apps Messages
  • Shhh… Views on the "Don't Spy On US" Campaign
  • Shhh… The West Wing on Privacy Issues Today – Back in 1999
  • Shhh… How to Contact US Senators Who Block NSA Surveillance Bill & Disregard Our Privacy
  • Shhh… Assange to Appeal Swedish Court Decision After Ecuador Guarantees Indefinite Asylum
  • Shhh… Lawsuit After Proof of British Police Spying on Reporters for Years
  • Shhh… Putin Put Russian Spies on the Spree
  • Shhh… The Puppet Master Putin & Russia’s Escalating Spy Operations
  • Shhh… US Senate Vote Falls Short of Curbing NSA Surveillance
  • Shhh… We Can Now Hear & See Wi-fi?
  • Shhh… WikiLeaks' Cousin AfriLeaks – A New Anonymous Whistleblowing & Open Data Platform for Africa
  • Shhh… Rethinking Snowden – A "Limited Hangout" CIA Operation?
  • Shhh… A Personal Gadget to Block Wireless Surveillance Devices Like Drones & Google Glass
  • Shhh… "Quiet Zone" for the perfect holiday?
  • Shhh… Hotel Cyber Blues

Archives

  • February 2021
  • June 2020
  • February 2020
  • January 2020
  • December 2019
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • October 2011
  • September 2011
  • August 2011
  • January 2011
  • July 2010
  • February 2005
  • November 2004

Media Coverage

http://www.bloombergview.com/articles/2014-03-04/pesek-on-asia-singapore-trumps-tokyo

http://www.vietnamplus.vn/hoat-dong-cua-nsa-khien-my-kho-xu-voi-trung-quoc/252201.vnp

http://citinews.net/the-gioi/hoat-dong-cua-nsa-khien-my--kho-xu--voi-trung-quoc-TW7DIGY/

http://www.sr-indonesia.com/web-exclusives/view/post-snowden-the-us-reaps-a-security-whirlwind

http://asiancorrespondent.com/117792/what-edward-snowden-has-shown-the-world/

http://stratrisks.com/geostrat/6617

http://www.wikileaks-forum.com/whistleblowing/486/for-whom-the-whistle-blows/21320/

http://article.wn.com/view/2012/03/11/Getting_all_Smiley_about_corporate_espionage/

http://yourviet.blogspot.hk/2012/03/world-complicated-world-of-corporate.html

http://jamescks.wordpress.com/2013/02/05/asia-sentinel/

http://therapeofhongkong.com/2014/06/03/regulators-legislators-must-not-repeat-history-again-after-ignoring-it-again/

http://www.techwireasia.com/1075/the-threat-to-freedom-of-information/

Follow Shhh-cretly via Email

Enter your email address to follow this blog and receive notifications of new posts by email.

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Categories

  • business leaders
  • Business risks
  • CEO
  • Computer and security
  • Corporate espionage
  • Corporate governance
  • Cyber Espionage
  • Due diligence
  • Eavesdropping
  • Espionage
  • Frauds
  • Gadgets
  • Intelligence
  • Investigations
  • National Security
  • Others
  • Privacy
  • Regulatory matters
  • Risk management
  • Risks mitigation
  • Security
  • Security – computer and devices
  • Spies
  • Surveillance
  • Uncategorized
  • Whistleblowing
Powered by WordPress.com.
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.
%d bloggers like this: