Social Engineering Attacks and Counterintelligence
Social engineering describes a non-technical intrusion that relies on human interaction and involves tricking people in order to break security procedure. It is a form of a game, where a person breaks in a computer network to gain an authorized user’s confidence and to make them reveal information that involves network’s security. Social engineers rely on the help of people, as well as on their weaknesses. They might call authorized employee reporting an urgent problem, which requires network access at an immediate effect.
Social engineering aspect relies on the inability of people to keep up a culture that depends on information technology. They rely on the unawareness of people of the posed information and their carelessness in protecting it. In many cases, social engineers get the valuable information from dumpsters or memorize codes through shoulder surfing (looking over one’s shoulder). They also take advantage of inclinational nature of a person to choose meaningful password that can easily be guessed. Social engineers have become a great threat in any security system. To prevent this, people need to read essaysprofessors feedback and to be educated about the value of information, the ways to protect it, and to increase the awareness on social engineers’ operations.
Social Engineering is referred to as people’s psychological manipulation in divulging information that is confidential, or performing an action. It is a confidence trick, which purpose is gathering information, system access, and fraud. Social engineering is associated with social science, though its usage has involved computer and information from the security professionals.
Following the research, Iraq war proponents were incorrigibly imprudent, because it is a social engineering writ large. During this period, all social engineers were inclined towards imprudence whether they set designs on their societies or other societies. This was because they treated their institution and people in a way that it is easy to form and reform clay. Social engineers remarked the world in their own image and blind them to the disastrous results led by lust.
The expert refers to counterintelligence as information activities conducted and information gathered in order to protect ageist espionage. Other intelligence activities, assassinations, and sabotage are conducted on behalf of international terrorist’s activities or foreign power, person, or organization. Counterintelligence is of three categories. First, collective counterintelligence involves gaining opponent’s intelligence information and collection capability aimed at an entity. The other category is defensive counterintelligence. This category deals with thwarting hostile intelligence services efforts to penetrate the service. Lastly, there is offensive counterintelligence.
Military organizations own counterintelligence forces, which are capable of taking care of protective operations both at home and abroad. In the United States, it was a large enforced organization domestic service. Due to Afghan soldier growing pattern and attack of coalition counterpart by police officer, America’s military sent 80 counterintelligence troops to Afghanistan to threaten.
Largest military leak was released in October 2010, still by Wikileaks revealing occupation of war in Iraq. According to the Department of Defense, this type of information was considered as a classified data. Collectively, other media partners and Wikileaks have published over 400,000 secret documents from Iraq war. These documents have provided information of the detained abuses and civilian casualties by Iran. The release of the information has been condemned by Pentagon, since it endangers Iraqis and Americans by hampering military operations.
New York Times reveals unreported accidents from the US troops, which killed civilians in helicopter strikes and at checkpoint. It was difficult to tabulate the total number of casualties, because some deaths were reported more than once, but in the entire document it appeared that the number of Iraq civilian deaths was more than 100,000. These documents were raw battlefield reports from the small units to the commanders.
Importance of Forming Security Workforce
The United States relied upon the contractors to provide variety of services in Iraq and Afghanistan. It is believed that use of contractors, mostly private security contractors, made a lot of efforts in Afghanistan and Iraq war. In March 2011, there were over 28,000 private contractor personnel in Iraq and Afghanistan. National Defense Authority defined private security contractor function as guarding facilities, personnel, or property, and other activities that required being armed. The services provided by them are divided in the two categories: unarmed services and armed services. Armed services included protecting static and fixed sites, such as reconstruction work sites, housing areas, and government building. Security contractors protected convoys and individuals, who were traveling to the unsecured places. They also provided protection to high ranking individuals. For the private security contractors, who provided unarmed services, they managed and established communication, control, and command operation centers. These contractors developed hostage negotiation, threat analysis, and gathered information. They provided international and domestic security forces with that information.
Challenges Faced By Security Workforce
According to the Department of Defense, 319 private security contractors working for the Department of Defense had been killed in Afghanistan. In May 2009, the US private security contractors were involved in Kabul accident, where three Afghan civilian were injured and one killed. In October 2007, two Americans were shot dead in Iraq after their car came close to the protected convoy by (URG) Unity Resource Group. The URG was involved again in March 2006 for shooting an Australian professor. Blackwater guards had involved themselves in 200 shootings according to the U.S Congress memorandum.
Influence of Wikileaks in Organizations
Release of the document by Wikileaks has been condemned by Pentagon over five years of war. Pentagon has warned the release, since it can put lives in jeopardy though this has not happened with 70,000 documents leaked from the Afghanistan war in July.
Low ranking soldiers from the U.S, who served as intelligence analysts, have been charged by Pentagon. These soldiers provided a video to Wikileaks that showed an Apache helicopter firing Iraq civilians. It is also believed that other materials were passed to Wikileaks by Manning.
The UN Human Right High Commissioner later called for Iraq and US investigation from the latest released Wikileaks. From the Iraq files, military from the US received numerous reports from their soldiers that Iraq security forces tortured Iraq prisoners. The US concluded that since Iraq was sovereign country, it was not under American’s control. On torture, the UN’s chief investigator decided that independent panel will have to find out the detained transfers. He continued saying that handling over detainees was a serious risk.
Since a big number of those documents were obtained from the low ranking soldiers of the US army, Iraq has promoted disbelief among themselves whether the documents are real. Some Iraq newspaper suggested that the Iraq documents were manufactured by other countries in order to disseminate political turmoil. Pentagon special team is preparing to protect those citizens from Iraq, whose names appear in the documents. The task force has secretly worked for months to review the same database that Wikileaks has. Pentagon team found some information that might put military operation in danger, e.g. individual names and things that could reveal information to their enemies about damaging operations. Efforts were reported by the new organizations trying to remove names and sensitive information, but it is not clear whether this material remained during the publication of the documents.
Methods to Improve Intelligence Leak
Relieving Officials from their Duties
According to the US embassy cables, Iran was financing Afghan political and religious leaders, grooming religious scholars, seeking influence from MP’s, and training Taliban militants. In relation to the conversation between Afghan and American officials, the dispatches mounted Iranian involvement to eastern neighbors. Omar Daudzai, president’s chief of staff, claimed that some officials were relieved from their duties, since they were dishonest receiving a package from Iran to support the president’s office. This information was revealed by the diplomatic cables. Some people saw Wikileaks as an assault into the government secrecy, which was overused. It is hard to quantify how the leaks hurt the security of the nation, but it is clear that there was a lesson learnt about communicating the U.S diplomat information.
From the release of over 400,000 diplomatic documents, Wikileaks attention shifted from the U.S military to the country diplomat revealing information that government didn’t care sharing with public. Following to this, Pentagon has looked for the ways of increasing security of the classified files. William Lynn, the deputy secretary of defense, said that the measurable things to be considered were thorough checks that would be suspicious in accessing the data; similarly like getting alerts through credit cards companies in prevention of fraudulent charges. Mr. Lynn concluded that if somebody was doing inappropriate thing from where they were, such as downloading 100,000 documents from obscure part of country, then they would be questionable. On deputy secretary’s tour to Afghanistan and Iraq, he said that Pentagon was looking for the ways to come to a balance between maintaining database security and giving officers in the field broad access to the needed information. Military units have complained that despite the intelligence provided, they were not enough for them to form a broad picture.
President Obama has approved the continuation of social engineering in Iraq. To save Iraq, rupture is needed from the political people. The initial plan to destroy and divide Iraq into the three entities depending on the alliance between Iranian religious fascists, Kurds, and Israel secret service, was its own criminal engineering contrary to the occupation under international law. However, Iraq people chose to resist the occupation and engaged into the disastrous genocidal action for both Iraq and the US.
Results of Iraq War
In March 2003, Iraq war had caused many casualties, though it did not cause major humanitarian crisis or mass migration. Coalation operations, which included massive attacks, led to large displacements, increased mortality, and affected thousands of people. There has been a sharp rise of death rate in Iraq. A growing number of Iraq people have been forced to vacate their homes, and majority of the groups were in serious risks due to the ground attacks and coalation bombing, as well as the rise in secretarian violence. According to the United Nation Development Programme, one third of Iraq population is now living in poverty. International relief system is not able to cope with the humanitarian challenges. International agencies have faced problems in reaching Iraq. Iraq humanitarian emergency is in a crisis level that compares Iraq with world’s most urgent crisis.