Intelligence: That Cat Looks Suspicious


May 9, 2012: American counter-intelligence agencies have been scrambling to deal with new techniques and technologies China is using to get stolen secret data back to China. The new angle is to exploit the way data is stored on electronic storage devices (memory cards, thumb drives, hard drives, and rewritable DVDs). The simplest, and oldest, deception is to delete files containing stolen secrets, then when you get to, say, China, you use undelete software to revive the erased files. You can further secure the secret files by encrypting them before deleting them. These two methods can easily be uncovered by counter-intelligence agents, so the methods have become more complex. Using custom made hardware or software files can be hidden on a storage device. Manufacturers of operating systems and storage devices have to be enlisted to develop techniques for quickly detecting such well hidden files.

Another deception method involves the use of cloud and email-system storage, although this is considered risky because counter-intelligence agencies can more easily get access to these systems and search for stolen tech files. Spies prefer to use human couriers, although sometimes data can be hidden in animals being shipped internationally. The lesson here is that there are many ways to hide data and move it internationally and counter-intelligence agencies will usually be one step behind the top spies in this area.






Help Keep Us From Drying Up

We need your help! Our subscription base has slowly been dwindling.

Each month we count on your contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage.
Subscribe   Contribute   Close