The head of the U.S. National Counterintelligence and Security Center, William R. Evanina, in an interview with Reuters shared on Aug. 31, 2018, revealed that U.S. counterintelligence and law enforcement officials informed LinkedIn that the Chinese Ministry of State Security (MSS) was \u201csuper aggressive\u201d on their site. The goal: to target, access, and recruit U.S. sources.I hope Evanina also noted that water is wet.The use of social networks by nation states, competitors, and criminal entities has been one of the primary routes to reaching out and touching targets of interest, often your trusted insider.Thus, Evanina\u2019s declaration is old news, but one that the U.S. intelligence and security community had their nose wiped in when the treasonous Kevin Patrick Mallory\u2019s path to recruitment included having been contacted via LinkedIn by the MSS.Indeed, Mallory himself used LinkedIn to fluff his importance in the eyes of the Chinese, baiting them, if you will, to look more attractive. Mallory had 500-plus connections on LinkedIn; perhaps you are one of those being highlighted to the MSS?According to Mallory\u2019s indictment and criminal complaint, he used LinkedIn to facilitate direct communication with individuals with knowledge and access to information of interest to the MSS \u2014 your trusted insider.Social networks are a targeteer\u2019s dreamThis is not new news, though reminders need to be made. Let\u2019s look at how LinkedIn and other social networks have been exploited for the purposes of engaging targets of interest.First stop, the white hat effort that created Robin Sage, a fictitious persona\u00a0that duped many members of the defense sector into maintaining contact and sharing information with \u201cRobin.\u201d This effort served to demonstrate how social networks can be used to lasso unsuspecting individuals into contact.Germany\u2019s warningIn 2017, the German BfV (internal security service) identified, publicized and neutralized eight fake Chinese LinkedIn profiles and three companies involved in targeting, accessing, and engaging German nationals in positions of interest to the MSS. Just how many individuals did the MSS target in Germany? According to the BfV, over 10,000 German citizens. In their most recent annual report, the BfV notes the counterintelligence threat posed by China via social networks, specifically LinkedIn.Interestingly, it is the BfV that shares modus operandi with us regarding China\u2019s MSS and their engagement via LinkedIn:\u201cSupposed scientists, job brokers, and headhunters make contacts with people who have a meaningful personal profile. They are lured with tempting offers and finally invited to China; there they are engaged by the Chinese intelligence apparatus.\u201dUnited Kingdom\u2019s warningIn 2015, the United Kingdom\u2019s MI-5 (internal security service) disseminated a memo to government entities warning that \u201cforeign spies on LinkedIn are trying to recruit civil servants.\u201d \u00a0Dell Secure Works IDs fake LinkedIn accountsIn 2015, Dell uncovered 25 fake LinkedIn profiles that turned out to be Iranian sock puppets targeting entities of interest to the Iranian Ministry of Intelligence and Security (MOIS).What\u2019s available to nation states' intelligence entities?As we look back over the past 10 years, and begin to add up the compromised data sets that may be in the hands of nation states' intelligence entities for the purpose of putting together targeting portfolios on your trusted insider, the picture is just plain ugly.Let\u2019s start with the low-hanging fruit. The OPM breach of 2015 provided the complete file on millions of individuals who have or had applied for U.S. government security clearance (excluding the U.S. intelligence community whose applicants were not included in the OPM database).Couple that with the salacious information culled from the Ashley Madison breach. Throw in the information from the Internal Revenue Service breach, the various medical insurance and service provider breaches, and then the credit rating services, and you have a mountain of information to cross reference.For this reason alone, one should be cautious when engaging with unknown individuals on social networks. As the cases of Mallory and Robin Sage evidence, individuals are connecting with people and harvesting their information on social networks.As I have said numerous times, you don't get to decide if you are the target. The targeting entity decides if you are of interest and then they go to work in the hopes of evolving a strategy to make you an offer you can't refuse.\u00a0Fair warning, you may be that next target.