Intelligence: That Cat Looks Suspicious

Archives

May 9, 2012: American counter-intelligence agencies have been scrambling to deal with new techniques and technologies China is using to get stolen secret data back to China. The new angle is to exploit the way data is stored on electronic storage devices (memory cards, thumb drives, hard drives, and rewritable DVDs). The simplest, and oldest, deception is to delete files containing stolen secrets, then when you get to, say, China, you use undelete software to revive the erased files. You can further secure the secret files by encrypting them before deleting them. These two methods can easily be uncovered by counter-intelligence agents, so the methods have become more complex. Using custom made hardware or software files can be hidden on a storage device. Manufacturers of operating systems and storage devices have to be enlisted to develop techniques for quickly detecting such well hidden files.

Another deception method involves the use of cloud and email-system storage, although this is considered risky because counter-intelligence agencies can more easily get access to these systems and search for stolen tech files. Spies prefer to use human couriers, although sometimes data can be hidden in animals being shipped internationally. The lesson here is that there are many ways to hide data and move it internationally and counter-intelligence agencies will usually be one step behind the top spies in this area.

 

 

X

ad

Help keep us a float!

Your support helps us keep our ship a float. We appreciate anyway you chose to help out. Visit us daily, subscribe, donate, and tell your friends.

You can support us in the following ways:

  1. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  2. You can contribute to the health of StrategyPage.
  3. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on X.
Subscribe   Contribute   Close