The head of the U.S. National Counterintelligence and Security Center says China's MSS is using social networks, specifically LinkedIn, to target, access, and recruit U.S. sources. Credit: Etereuti The head of the U.S. National Counterintelligence and Security Center, William R. Evanina, in an interview with Reuters shared on Aug. 31, 2018, revealed that U.S. counterintelligence and law enforcement officials informed LinkedIn that the Chinese Ministry of State Security (MSS) was “super aggressive” on their site. The goal: to target, access, and recruit U.S. sources.I hope Evanina also noted that water is wet.The use of social networks by nation states, competitors, and criminal entities has been one of the primary routes to reaching out and touching targets of interest, often your trusted insider.Thus, Evanina’s declaration is old news, but one that the U.S. intelligence and security community had their nose wiped in when the treasonous Kevin Patrick Mallory’s path to recruitment included having been contacted via LinkedIn by the MSS. Indeed, Mallory himself used LinkedIn to fluff his importance in the eyes of the Chinese, baiting them, if you will, to look more attractive. Mallory had 500-plus connections on LinkedIn; perhaps you are one of those being highlighted to the MSS?According to Mallory’s indictment and criminal complaint, he used LinkedIn to facilitate direct communication with individuals with knowledge and access to information of interest to the MSS — your trusted insider. Social networks are a targeteer’s dreamThis is not new news, though reminders need to be made. Let’s look at how LinkedIn and other social networks have been exploited for the purposes of engaging targets of interest.First stop, the white hat effort that created Robin Sage, a fictitious persona that duped many members of the defense sector into maintaining contact and sharing information with “Robin.” This effort served to demonstrate how social networks can be used to lasso unsuspecting individuals into contact.Germany’s warningIn 2017, the German BfV (internal security service) identified, publicized and neutralized eight fake Chinese LinkedIn profiles and three companies involved in targeting, accessing, and engaging German nationals in positions of interest to the MSS. Just how many individuals did the MSS target in Germany? According to the BfV, over 10,000 German citizens. In their most recent annual report, the BfV notes the counterintelligence threat posed by China via social networks, specifically LinkedIn.Interestingly, it is the BfV that shares modus operandi with us regarding China’s MSS and their engagement via LinkedIn:“Supposed scientists, job brokers, and headhunters make contacts with people who have a meaningful personal profile. They are lured with tempting offers and finally invited to China; there they are engaged by the Chinese intelligence apparatus.”United Kingdom’s warningIn 2015, the United Kingdom’s MI-5 (internal security service) disseminated a memo to government entities warning that “foreign spies on LinkedIn are trying to recruit civil servants.” Dell Secure Works IDs fake LinkedIn accountsIn 2015, Dell uncovered 25 fake LinkedIn profiles that turned out to be Iranian sock puppets targeting entities of interest to the Iranian Ministry of Intelligence and Security (MOIS). What’s available to nation states’ intelligence entities?As we look back over the past 10 years, and begin to add up the compromised data sets that may be in the hands of nation states’ intelligence entities for the purpose of putting together targeting portfolios on your trusted insider, the picture is just plain ugly.Let’s start with the low-hanging fruit. The OPM breach of 2015 provided the complete file on millions of individuals who have or had applied for U.S. government security clearance (excluding the U.S. intelligence community whose applicants were not included in the OPM database).Couple that with the salacious information culled from the Ashley Madison breach. Throw in the information from the Internal Revenue Service breach, the various medical insurance and service provider breaches, and then the credit rating services, and you have a mountain of information to cross reference.For this reason alone, one should be cautious when engaging with unknown individuals on social networks. As the cases of Mallory and Robin Sage evidence, individuals are connecting with people and harvesting their information on social networks. As I have said numerous times, you don’t get to decide if you are the target. The targeting entity decides if you are of interest and then they go to work in the hopes of evolving a strategy to make you an offer you can’t refuse. Fair warning, you may be that next target. Related content news analysis Tesla insider with expired NDA spills the tech beans A former Tesla engineer with an expired non-disclosure agreement (NDA) shared inside technical information on an obscure forum, which was quickly shared across multiple social media platforms. By Christopher Burgess Aug 30, 2018 3 mins Risk Management Security news analysis Horizon Air tragedy highlights airline insider threat vulnerability The ease at which a Horizon Air employee was able to steal and crash a Bombardier Q400 turboprop will likely prompt airlines to develop an insider threat mitigation strategy to close this vulnerability. By Christopher Burgess Aug 13, 2018 4 mins Security news analysis How did the TimeHop data breach happen? Compromise of an employee's credentials, lack of multi-factor authentication, and weak insider threat analysis all played a factor in the recent TimeHop data breach in which 21 million user accounts were compromised. By Christopher Burgess Aug 10, 2018 4 mins DLP Software Analytics Security news analysis How pervasive is the insider threat in your company? The Dtex 2018 Threat Report finds that 100 percent of companies have blind spots when it comes to the insider threat. By Christopher Burgess Aug 01, 2018 5 mins DLP Software IT Leadership Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe