Intelligence Training and Education
Culture • Lifestyle • Preparedness
Training and education on the intelligence cycle, collection methods, disciplines and analysis for the everyday person. It will include example reports and formats, how to analyze information, conduct open source research and publish the findings. Content will be articles, podcasts, first hand accounts and real world examples of current events. The intent is to have a "how to" of relevant intelligence subjects that anyone can learn.
Interested? Want to learn more about the community?
September 03, 2021
Travel Security Considerations: Espionage Threats

Espionage Threats

Conferences and conventions provide excellent cover for foreign state-backed espionage operatives to target key organizations and individuals. The open and collaborative environment of conferences fosters networking opportunities, but also allows private corporate or state-backed rivals to recruit sources and collect information on their competition. Threat actors can conceal ulterior motives at conferences by making carefully planned approaches appear to be purely coincidental to gain a contact at a company by posing as a potential vendor or — and even more attractive to the target — as a potential client. Such approaches can lay the groundwork for future interactions that can start off innocuously, but develop into hostile attempts to bribe or compromise an employee in order to gain an inside source to valuable intellectual property

Governments, especially those sponsoring or hosting an event, have even more recourse to underhanded tactics to collect intelligence on their rivals. Host governments control the broader environment, from the convention center itself to the hotels where attendees stay, the restaurants they dine at, the airports they fly in and out of, and the digital communications networks they rely on. Additionally, they can use their general control over the environment to orchestrate and exploit physical approach tactics outlined above. More aggressively, they can engage in physical intimidation, blackmail or other coercive activities to gain access to sensitive documents, compromise electronic devices or compromise an inside source — all of which can ultimately allow intelligence agencies to steal intellectual property.

Even though engaging with human sources remains critical for access, recent examples highlight the threat that state-backed cyberespionage campaigns can pose to conferences and events even when they are well outside their borders. As conferences have had to go virtual to accommodate COVID-19-related restrictions, the increased reliance on digital networks to plan and organize conferences gives state-backed hackers more options to target individuals virtually. Even as conferences return to in-person events, they are likely to incorporate more virtual attendance options following the pandemic — allowing hackers to continue using conferences to target individuals.

July 2021: Iranian-backed hackers stole digital login credentials from academics based in the United Kingdom and the United States by sending them invitations to a fake online conference purporting to cover U.S. security challenges in the Middle East.
July 2021: Chinese spies recruited a German political scientist to exploit his access to academic and political conferences, paying him to gain access to and share sensitive information for more than 10 years.
November 2019: Czech Republic intelligence officials warned that Chinese and Russian intelligence officers have focused on recruiting government officials, students, professors and other academics by inviting them to conferences or reaching out to them through LinkedIn.
2017/2018: Two Iranian intelligence agents surveilled Iranian opposition groups and high-profile critics by monitoring Mujahideen-e-Khalq conventions and rallies in Washington and New York. The two men were later arrested and sentenced to prison.

Interested? Want to learn more about the community?
What else you may like…
Videos
Podcasts
Posts
July 03, 2021
How to get your free month of access

How to get your free month
How pricing works
How to view posts
What you can post

00:14:00
May 02, 2021
Search tips and thoughts

Video talking through basic google searches and what to look for, crossreferencing. It is using simple google and Facebook without additional tools

00:37:40
March 31, 2021
1 Million Tweet Map How-To Video

Uploaded to replace the previous "audio-only" podcast

00:13:21
October 30, 2021
Travel Plans, schedules, training
Travel Plans, schedules, training
October 21, 2021
Training Opportunities

How to identify and prepare for intel and other training you may want. This will help both of us out which I explain in addition to what is available

Training Opportunities
September 25, 2021
Comments, Questions, My upcoming Schedule

Listen till the end to hear about some training opportunities

Comments, Questions, My upcoming Schedule
See More
Available on mobile and TV devices
google store google store app store app store
google store google store app tv store app tv store amazon store amazon store roku store roku store
Powered by Locals