natalie's acevedo porfolio digital

20
[email protected] (210) 454-1979

Upload: natalie-acevedo

Post on 15-Feb-2017

91 views

Category:

Design


2 download

TRANSCRIPT

natalieacevedo355yahoocom (210) 454-1979

(210) 454-1979natalieacevedo355yahoocom

Ps

IA

Id

Mu

Technical Skills

Profile

Work Experience

Pursing Bachelors Of Fine Arts in Graphic DesignSanford-Brown CollegeSan Antonio Tx78250

Education Freelance Work

Designed logos for different com-panies such a Project X Print Co Advantage Sci Vital AppsFreelance in artwork for clients as in painting band flags patches accessories basic graphics for T-shirts done manuallyRestaurants menus created in Indesign software

5 years of experience in creating company logos forprivately held companies using traditional art drawing and illustration software Incorporated ideas from college and secondaryresearch of Fortune 500 companiesDiligently monitor marketing strategies that trend well and are effective based on consumer reviewsScored a 135 in Professional Special IntelligenceAssessment

Retail Stock Merchandising Associate Sales AssociateImprove mechandise and prod-ucts space and by consolidatingRecognized by store managementand also regional director for training new hires as a result of my knowledge

Tueday Morning 2014 - 2015

Unload and to unpack new merchandise and also including shipments and prepare them for the selling on the floorUtilize Macyrsquos system and proce-dures to effciencies and Complete support duties

Macyrsquos 2014 - 2015

Branding

Idenity

Control Movie Poster

Beatrsquos Promotional Advertisement

Billboard Poster

Inspirational Poster

Typography

Food Advertisement Typography

Juice Skateboard Magazine Cover

Nike Magazine Adverteisment

Advantagesci

Securing Tomorrow Today

In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact

information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation

Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer

Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book

Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy

In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations

Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement

Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict

CounterIntelligence Brief Homland

Security

FBI US Defense

CREATING NEWSTRATGIES TO SURROUNDER

THE SAFE

Advantage SCI hosted its first CICyber Security Seminar on Wednesday

February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company

Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence

Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final

presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world

Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link

httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691

iTravelSafe App allows you when you travel and you can check if the state is safe or not

where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified

China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C

Trading Confidential Is Leading To Crime

Below from the FBI website is a new internet scam The scam generates fake emails

that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink

h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam

There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims

The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product

If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available

The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

(210) 454-1979natalieacevedo355yahoocom

Ps

IA

Id

Mu

Technical Skills

Profile

Work Experience

Pursing Bachelors Of Fine Arts in Graphic DesignSanford-Brown CollegeSan Antonio Tx78250

Education Freelance Work

Designed logos for different com-panies such a Project X Print Co Advantage Sci Vital AppsFreelance in artwork for clients as in painting band flags patches accessories basic graphics for T-shirts done manuallyRestaurants menus created in Indesign software

5 years of experience in creating company logos forprivately held companies using traditional art drawing and illustration software Incorporated ideas from college and secondaryresearch of Fortune 500 companiesDiligently monitor marketing strategies that trend well and are effective based on consumer reviewsScored a 135 in Professional Special IntelligenceAssessment

Retail Stock Merchandising Associate Sales AssociateImprove mechandise and prod-ucts space and by consolidatingRecognized by store managementand also regional director for training new hires as a result of my knowledge

Tueday Morning 2014 - 2015

Unload and to unpack new merchandise and also including shipments and prepare them for the selling on the floorUtilize Macyrsquos system and proce-dures to effciencies and Complete support duties

Macyrsquos 2014 - 2015

Branding

Idenity

Control Movie Poster

Beatrsquos Promotional Advertisement

Billboard Poster

Inspirational Poster

Typography

Food Advertisement Typography

Juice Skateboard Magazine Cover

Nike Magazine Adverteisment

Advantagesci

Securing Tomorrow Today

In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact

information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation

Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer

Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book

Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy

In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations

Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement

Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict

CounterIntelligence Brief Homland

Security

FBI US Defense

CREATING NEWSTRATGIES TO SURROUNDER

THE SAFE

Advantage SCI hosted its first CICyber Security Seminar on Wednesday

February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company

Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence

Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final

presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world

Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link

httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691

iTravelSafe App allows you when you travel and you can check if the state is safe or not

where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified

China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C

Trading Confidential Is Leading To Crime

Below from the FBI website is a new internet scam The scam generates fake emails

that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink

h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam

There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims

The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product

If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available

The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

Branding

Idenity

Control Movie Poster

Beatrsquos Promotional Advertisement

Billboard Poster

Inspirational Poster

Typography

Food Advertisement Typography

Juice Skateboard Magazine Cover

Nike Magazine Adverteisment

Advantagesci

Securing Tomorrow Today

In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact

information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation

Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer

Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book

Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy

In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations

Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement

Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict

CounterIntelligence Brief Homland

Security

FBI US Defense

CREATING NEWSTRATGIES TO SURROUNDER

THE SAFE

Advantage SCI hosted its first CICyber Security Seminar on Wednesday

February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company

Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence

Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final

presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world

Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link

httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691

iTravelSafe App allows you when you travel and you can check if the state is safe or not

where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified

China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C

Trading Confidential Is Leading To Crime

Below from the FBI website is a new internet scam The scam generates fake emails

that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink

h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam

There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims

The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product

If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available

The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

Idenity

Control Movie Poster

Beatrsquos Promotional Advertisement

Billboard Poster

Inspirational Poster

Typography

Food Advertisement Typography

Juice Skateboard Magazine Cover

Nike Magazine Adverteisment

Advantagesci

Securing Tomorrow Today

In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact

information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation

Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer

Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book

Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy

In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations

Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement

Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict

CounterIntelligence Brief Homland

Security

FBI US Defense

CREATING NEWSTRATGIES TO SURROUNDER

THE SAFE

Advantage SCI hosted its first CICyber Security Seminar on Wednesday

February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company

Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence

Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final

presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world

Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link

httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691

iTravelSafe App allows you when you travel and you can check if the state is safe or not

where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified

China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C

Trading Confidential Is Leading To Crime

Below from the FBI website is a new internet scam The scam generates fake emails

that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink

h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam

There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims

The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product

If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available

The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

Control Movie Poster

Beatrsquos Promotional Advertisement

Billboard Poster

Inspirational Poster

Typography

Food Advertisement Typography

Juice Skateboard Magazine Cover

Nike Magazine Adverteisment

Advantagesci

Securing Tomorrow Today

In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact

information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation

Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer

Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book

Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy

In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations

Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement

Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict

CounterIntelligence Brief Homland

Security

FBI US Defense

CREATING NEWSTRATGIES TO SURROUNDER

THE SAFE

Advantage SCI hosted its first CICyber Security Seminar on Wednesday

February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company

Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence

Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final

presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world

Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link

httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691

iTravelSafe App allows you when you travel and you can check if the state is safe or not

where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified

China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C

Trading Confidential Is Leading To Crime

Below from the FBI website is a new internet scam The scam generates fake emails

that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink

h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam

There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims

The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product

If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available

The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

Beatrsquos Promotional Advertisement

Billboard Poster

Inspirational Poster

Typography

Food Advertisement Typography

Juice Skateboard Magazine Cover

Nike Magazine Adverteisment

Advantagesci

Securing Tomorrow Today

In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact

information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation

Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer

Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book

Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy

In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations

Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement

Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict

CounterIntelligence Brief Homland

Security

FBI US Defense

CREATING NEWSTRATGIES TO SURROUNDER

THE SAFE

Advantage SCI hosted its first CICyber Security Seminar on Wednesday

February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company

Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence

Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final

presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world

Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link

httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691

iTravelSafe App allows you when you travel and you can check if the state is safe or not

where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified

China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C

Trading Confidential Is Leading To Crime

Below from the FBI website is a new internet scam The scam generates fake emails

that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink

h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam

There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims

The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product

If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available

The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

Billboard Poster

Inspirational Poster

Typography

Food Advertisement Typography

Juice Skateboard Magazine Cover

Nike Magazine Adverteisment

Advantagesci

Securing Tomorrow Today

In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact

information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation

Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer

Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book

Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy

In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations

Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement

Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict

CounterIntelligence Brief Homland

Security

FBI US Defense

CREATING NEWSTRATGIES TO SURROUNDER

THE SAFE

Advantage SCI hosted its first CICyber Security Seminar on Wednesday

February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company

Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence

Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final

presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world

Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link

httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691

iTravelSafe App allows you when you travel and you can check if the state is safe or not

where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified

China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C

Trading Confidential Is Leading To Crime

Below from the FBI website is a new internet scam The scam generates fake emails

that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink

h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam

There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims

The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product

If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available

The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

Inspirational Poster

Typography

Food Advertisement Typography

Juice Skateboard Magazine Cover

Nike Magazine Adverteisment

Advantagesci

Securing Tomorrow Today

In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact

information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation

Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer

Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book

Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy

In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations

Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement

Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict

CounterIntelligence Brief Homland

Security

FBI US Defense

CREATING NEWSTRATGIES TO SURROUNDER

THE SAFE

Advantage SCI hosted its first CICyber Security Seminar on Wednesday

February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company

Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence

Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final

presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world

Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link

httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691

iTravelSafe App allows you when you travel and you can check if the state is safe or not

where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified

China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C

Trading Confidential Is Leading To Crime

Below from the FBI website is a new internet scam The scam generates fake emails

that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink

h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam

There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims

The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product

If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available

The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

Typography

Food Advertisement Typography

Juice Skateboard Magazine Cover

Nike Magazine Adverteisment

Advantagesci

Securing Tomorrow Today

In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact

information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation

Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer

Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book

Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy

In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations

Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement

Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict

CounterIntelligence Brief Homland

Security

FBI US Defense

CREATING NEWSTRATGIES TO SURROUNDER

THE SAFE

Advantage SCI hosted its first CICyber Security Seminar on Wednesday

February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company

Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence

Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final

presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world

Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link

httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691

iTravelSafe App allows you when you travel and you can check if the state is safe or not

where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified

China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C

Trading Confidential Is Leading To Crime

Below from the FBI website is a new internet scam The scam generates fake emails

that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink

h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam

There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims

The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product

If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available

The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

Food Advertisement Typography

Juice Skateboard Magazine Cover

Nike Magazine Adverteisment

Advantagesci

Securing Tomorrow Today

In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact

information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation

Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer

Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book

Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy

In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations

Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement

Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict

CounterIntelligence Brief Homland

Security

FBI US Defense

CREATING NEWSTRATGIES TO SURROUNDER

THE SAFE

Advantage SCI hosted its first CICyber Security Seminar on Wednesday

February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company

Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence

Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final

presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world

Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link

httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691

iTravelSafe App allows you when you travel and you can check if the state is safe or not

where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified

China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C

Trading Confidential Is Leading To Crime

Below from the FBI website is a new internet scam The scam generates fake emails

that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink

h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam

There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims

The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product

If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available

The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

Juice Skateboard Magazine Cover

Nike Magazine Adverteisment

Advantagesci

Securing Tomorrow Today

In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact

information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation

Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer

Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book

Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy

In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations

Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement

Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict

CounterIntelligence Brief Homland

Security

FBI US Defense

CREATING NEWSTRATGIES TO SURROUNDER

THE SAFE

Advantage SCI hosted its first CICyber Security Seminar on Wednesday

February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company

Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence

Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final

presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world

Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link

httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691

iTravelSafe App allows you when you travel and you can check if the state is safe or not

where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified

China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C

Trading Confidential Is Leading To Crime

Below from the FBI website is a new internet scam The scam generates fake emails

that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink

h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam

There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims

The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product

If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available

The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

Nike Magazine Adverteisment

Advantagesci

Securing Tomorrow Today

In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact

information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation

Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer

Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book

Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy

In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations

Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement

Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict

CounterIntelligence Brief Homland

Security

FBI US Defense

CREATING NEWSTRATGIES TO SURROUNDER

THE SAFE

Advantage SCI hosted its first CICyber Security Seminar on Wednesday

February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company

Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence

Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final

presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world

Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link

httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691

iTravelSafe App allows you when you travel and you can check if the state is safe or not

where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified

China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C

Trading Confidential Is Leading To Crime

Below from the FBI website is a new internet scam The scam generates fake emails

that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink

h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam

There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims

The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product

If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available

The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

Advantagesci

Securing Tomorrow Today

In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact

information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation

Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer

Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book

Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy

In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations

Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement

Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict

CounterIntelligence Brief Homland

Security

FBI US Defense

CREATING NEWSTRATGIES TO SURROUNDER

THE SAFE

Advantage SCI hosted its first CICyber Security Seminar on Wednesday

February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company

Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence

Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final

presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world

Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link

httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691

iTravelSafe App allows you when you travel and you can check if the state is safe or not

where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified

China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C

Trading Confidential Is Leading To Crime

Below from the FBI website is a new internet scam The scam generates fake emails

that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink

h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam

There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims

The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product

If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available

The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

In addition Kiriakou admitted that he disclosed to Journalists A and B the name and contact

information of a CIA officer identified in court records as Officer B along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002 Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified Based in part on this information Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer Brsquos alleged role in the Abu Zubaydah operation

Kiriakou provided this information to journalists without inquiring what the journalists would do with the information Without Kiriakoursquos knowledge Journalist A passed the information he obtained from Kiriakou to an investigator at Guantanamo Bay The investigator had been unable to successfully identify either officer

Officer is being suspicious secretly photographed and his photographs being tendered to high-value terrorist detainees result Kiriakou himself described as terrifyingKiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique referred to as a magic boxwhile seeking permission from the CIArsquos Publications Review Board to include the classified technique in a book

Mr Kiriakou was playing a dangerous game here He compromised the name of an intelligence agent possibly putting that agents safety at risk He could have compromised intelligence activities and possibly put lives in jeopardy

In a statement of facts filed with his plea agreement Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations

Journalist A and ournalist Bin court records) on multiple occasions between 2007 and 2009 Again here we have an individual who thinks the rules do not apply to him No malicious intent no revenge or greed perhaps just wanting to establish his knowledge and expertise to aggrandize himself Still a potentially dangerous game for the person whom he was referring to and ultimately dangerous to him for at least the 30 months he will be in federal confinement

Another BoI in the Mumbai-based Western Navy Command has recommended stringent action including dismissal from service against at least two commanders for posting confidential infor- mation and data including location of warships and their patrolling patterns on Facebook In spite of the size of the bust US officials at the time presented the grouplsquos spying activity as conflict

CounterIntelligence Brief Homland

Security

FBI US Defense

CREATING NEWSTRATGIES TO SURROUNDER

THE SAFE

Advantage SCI hosted its first CICyber Security Seminar on Wednesday

February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company

Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence

Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final

presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world

Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link

httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691

iTravelSafe App allows you when you travel and you can check if the state is safe or not

where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified

China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C

Trading Confidential Is Leading To Crime

Below from the FBI website is a new internet scam The scam generates fake emails

that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink

h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam

There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims

The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product

If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available

The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

CREATING NEWSTRATGIES TO SURROUNDER

THE SAFE

Advantage SCI hosted its first CICyber Security Seminar on Wednesday

February 27th 2013 With more than 35 attendees a diverse mix of cleared defense contractors government and municipal employees was in attendanceAdvantage SCI CEO and President Elsa Lee welcomed our guests and provided a brief overview of the company

Mike discussed the art of counter intelligence and its current state He delineated case examples and current legal precedents affecting counterintelligence Finally he pointed out trends and issues the discipline faces going forward Following Mike was Brian Smith from Advantage SCI (pictured at right middle photo) Brian is a retired Lieutenant Colonel from the USAF Brian gave an excellent presentation on the collection of intelligence and the methods used by foreign governments to obtain that intelligence

Next Deb Thomas (pictured at bottom right) from The Walt Disney Company spoke Deb retired from the USAF as an OSI agent then worked at Boeing before joining Disney Deb discussed the protection of intellectual property and some of the inherent challenges Our final

presenter of the day was Jason Smolanoff of Stroz Friedberg Jason was a Supervisory Special Agent with the FBI heading up one of the FBI Los Angeles Cyber prior to joining Stroz Friedberg Jason gave a very lively and informative presentation regarding the current state of cyber crime and the threats we face going forward into the electronic world

Our seminar was a great success Our guests provided great reviews of the dayrsquos presentations With the favorable reviews and positive comments another seminar will be planned for the late summer or early fall The next arrest of interest is outlined In this brief extract from the Washington Examiner at web link

httpwashingtonexaminercomwatchdog-alert-fbi -arrests-nasa-contract-employer-trying-to-flee-to- chinaarticle2524691

iTravelSafe App allows you when you travel and you can check if the state is safe or not

where the arrest of Chinese national Bo Jiang is reportedJiang was employed by the National Institute of Aerospace a Hampton VA-based NASA contractor The position afforded Jiang virtually unlimited to aunescorted access to the NASL angley cility which is the location for classified

China was sentenced to nine years in prison in connection with his efforts to sell for personal financial gain classified photographs information and access related to the US Consulate to Chinarsquos Ministry of State Security (MSS) announced Lisa Monaco Assistant Attorney General for the Justice Departmentrsquos National Security Division Ronald C

Trading Confidential Is Leading To Crime

Below from the FBI website is a new internet scam The scam generates fake emails

that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink

h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam

There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims

The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product

If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available

The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

Trading Confidential Is Leading To Crime

Below from the FBI website is a new internet scam The scam generates fake emails

that appear to be coming from the FBI Recipients of the email are faced with a dilemma Pay up or your computer will be locked (frozen inoperable) until the fee is paid Of course itlsquos a scam Pic- tured above is an example of what such an email would look like Please view the original post at the following hyperlink

h t t p w w w f b i g o v n e w s stories2012augustnew -internet-scam

There is a new drive-by virus on the Internet and it often carries a fake message and fine purportedly from the FBIldquoWere getting inundated with complaints rdquosaid Donna Gregory of the Internet Crime Complaint Center (IC3) referring to the virus known as Reveton ransomware which is designed to extort money from its victims

The information provided at OnGuardOnlinegov is valuable to security educators Counter intelligence are professionals that are cleared individuals and relative family members alike

Reveton is described as drive-by malware because unlike many viruses which activate when users open a file or attachment this one can install itself when users simply click on a compromised website Once infected the victimlsquos computer immediately locks and the monitor displays a screen stating there has been a violation of federal lawThe bogus message goes on to say that the userlsquos Internet address was identified by the FBI

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel roomsRecently there have been instances of travelerslsquo laptops being infected with malicious software while using hotel Internet connections In these instances the traveler was attempting to set up the hotel room Internet connection and was pre- sented with a pop-up window notifying the user to update a widely used software product

If the user clicked to accept and install the update malicious software was installed on the laptop The popup window appeared to be offering a routine update to a legitimate software product for which updates are frequently available

The Federal Trade Commission manages On GuardOnline gov in partnership a variety of Federal Government agencies departments bureaus offices and otherentities to OnGuardOnlinegov is a partner in the Stop Think Connect campaign led by the Department of Homeland Security and part of the National Initiative for Cybersecurity Education led by the National Institute of Standards and Technology Readers of our publication are encouraged to provide electronic copies of this publication to individuals that might benefit from the tips located at the hyperlinks that follow And by all means please encourage your clients to visit the OnGuardOnlinegov

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

Advantage Sci

Brochure

Magazine Page

Retro Vintage Advertisement

Brochure

Magazine Page

Retro Vintage Advertisement

Magazine Page

Retro Vintage Advertisement

Retro Vintage Advertisement