NCSC(@NCSCgov) 's Twitter Profileg
NCSC

@NCSCgov

Advancing Counterintelligence and Security Excellence

ID:2906666380

linkhttp://www.NCSC.gov calendar_today05-12-2014 17:59:30

5,7K Tweets

116,7K Followers

180 Following

NCSC(@NCSCgov) 's Twitter Profile Photo

Nazi agents in Spain gained access to the fake papers on the corpse and did just what the British intended in the ruse. Germany shifted resources to Greece and elsewhere, allowing the Allies to carry out the invasion of Sicily more quickly and with fewer losses than anticipated.

Nazi agents in Spain gained access to the fake papers on the corpse and did just what the British intended in the ruse. Germany shifted resources to Greece and elsewhere, allowing the Allies to carry out the invasion of Sicily more quickly and with fewer losses than anticipated.
account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

1943, Operation Mincemeat began with HMS Seraph setting sail to deposit a corpse dressed as a British major off the coast of Spain for the Nazis to find. Outfitted with fake papers citing Greece, not Sicily, as the target of a pending Allied invasion, the corpse did its job.

#OTD 1943, Operation Mincemeat began with HMS Seraph setting sail to deposit a corpse dressed as a British major off the coast of Spain for the Nazis to find. Outfitted with fake papers citing Greece, not Sicily, as the target of a pending Allied invasion, the corpse did its job.
account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

Software supply chain attacks are deliberate acts directed against the supply chains of software products, enabling subsequent adversarial actions against users of the software. Explore NCSC’s full infographic as part of 2024: dni.gov/files/NCSC/doc…

Software supply chain attacks are deliberate acts directed against the supply chains of software products, enabling subsequent adversarial actions against users of the software. Explore NCSC’s full infographic as part of #SupplyChainIntegrityMonth 2024: dni.gov/files/NCSC/doc…
account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

NCSC Wall of Spies artifact: In 1999, a Russian listening device was found hidden in a chair rail in a conference room at State Department HQ. FBI agents later detained a Russian SVR official who had been recording audio in the room using special equipment in his nearby vehicle.

NCSC Wall of Spies artifact: In 1999, a Russian listening device was found hidden in a chair rail in a conference room at State Department HQ. @FBI agents later detained a Russian SVR official who had been recording audio in the room using special equipment in his nearby vehicle.
account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

This week in 1985, veteran CIA officer Aldrich Ames walked into the Soviet Embassy in Washington, DC and volunteered to spy for the KGB. Over the next nine years, he compromised over 100 Soviet and East European cases and multiple US assets, some of whom were later executed.

This week in 1985, veteran CIA officer Aldrich Ames walked into the Soviet Embassy in Washington, DC and volunteered to spy for the KGB. Over the next nine years, he compromised over 100 Soviet and East European cases and multiple US assets, some of whom were later executed.
account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

Understand the six-step Operations Security ( ) cycle to protect your organization:
1) Identify your critical information
2) Evaluate threats
3) Analyze vulnerabilities
4) Assess risks
5) Apply countermeasures
6) Periodically re-assess
Visit: dni.gov/index.php/ncsc…

Understand the six-step Operations Security (#OPSEC) cycle to protect your organization: 1) Identify your critical information 2) Evaluate threats 3) Analyze vulnerabilities 4) Assess risks 5) Apply countermeasures 6) Periodically re-assess Visit: dni.gov/index.php/ncsc…
account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

Next Tuesday (April 23), join Jeanette McMillian, NCSC’s Assistant Director for Supply Chain & Cyber, for an INSA'Coffee & Conversation' on acquisition, cyber, and enterprise security as part of
National 2024. insaonline.org/detail-pages/e…

account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

During National , take steps to secure your ecosystem. Explore the methods and potential impacts of supply chain attacks at:
dni.gov/files/NCSC/doc…

During National #SupplyChainIntegrityMonth, take steps to secure your ecosystem. Explore the methods and potential impacts of supply chain attacks at: dni.gov/files/NCSC/doc…
account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

Visit the NCSC Safeguarding Science page to learn about our partnership with academia and the scientific community to protect research and innovation in emerging technologies. dni.gov/index.php/safe…

Visit the NCSC Safeguarding Science page to learn about our partnership with academia and the scientific community to protect research and innovation in emerging technologies. dni.gov/index.php/safe…
account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

Bluetooth tracking tags on lanyards, keycards, and binders have become common at conferences and trade shows. While they help conference organizers with metrics, they can also be exploited by threat actors to collect location data. See NCSC’s bulletins: dni.gov/files/NCSC/doc…

Bluetooth tracking tags on lanyards, keycards, and binders have become common at conferences and trade shows. While they help conference organizers with metrics, they can also be exploited by threat actors to collect location data. See NCSC’s bulletins: dni.gov/files/NCSC/doc…
account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

Former U.S. Ambassador and National Security Council Official Admits to Secretly Acting as Agent of the Cuban Government and Receives 15-Year Sentence justice.gov/opa/pr/former-…

account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

Tomorrow is : The Founding Father whose many accomplishments included the Committee on Spies report that was considered by the Continental Congress and led to the enactment of the first espionage act on Aug. 21, 1776.

Tomorrow is #NationalThomasJeffersonDay: The Founding Father whose many accomplishments included the Committee on Spies report that was considered by the Continental Congress and led to the enactment of the first espionage act on Aug. 21, 1776.
account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

is Sunday. Help secure America’s future in by protecting cutting-edge quantum research and innovation from threat actors. See the NCSC/FBI bulletin at: dni.gov/files/NCSC/doc…

#WorldQuantumDay is Sunday. Help secure America’s future in #quantum by protecting cutting-edge quantum research and innovation from threat actors. See the NCSC/FBI bulletin at: dni.gov/files/NCSC/doc…
account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

The days of cloak and dagger spying look a bit different in the digital age. But the spy business itself is busy — and getting busier. NCSC Director Mike Casey spoke to NPR on All Things Considered. npr.org/2024/04/11/124…

account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

Although often less appreciated than remote-access cyber threats, insider threats to critical infrastructure entities are growing and difficult to mitigate. See NCSC’s insider threat guidance for critical infrastructure: dni.gov/files/NCSC/doc…

Although often less appreciated than remote-access cyber threats, insider threats to critical infrastructure entities are growing and difficult to mitigate. See NCSC’s insider threat guidance for critical infrastructure: dni.gov/files/NCSC/doc…
account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

Supply Chain Risk Management ( ) is the systematic process for managing supply chain risk, vulnerabilities, and threats. Play an A.C.E. For more information, visit: dni.gov/index.php/ncsc…

Supply Chain Risk Management (#SCRM) is the systematic process for managing supply chain risk, vulnerabilities, and threats. Play an A.C.E. For more information, visit: dni.gov/index.php/ncsc…
account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

in 1992, major and archivist Vasili Mitrokhin defected to UK officials in Latvia. He provided MI6 with a voluminous collection of KGB case files, which later became known as the Mitrokhin Archive. Info that he shared exposed several KGB agents in the West.

#OTD in 1992, #KGB major and archivist Vasili Mitrokhin defected to UK officials in Latvia. He provided MI6 with a voluminous collection of KGB case files, which later became known as the Mitrokhin Archive. Info that he shared exposed several KGB agents in the West.
account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

NCSC Wall of Spies artifact: Replica of the Great Seal of the US given to the US Ambassador in Moscow by a group of Soviet school children in 1945. The seal contained a KGB listening device & hung in the US Ambassador’s residence until the bug was discovered in 1951.

#TechTuesday NCSC Wall of Spies artifact: Replica of the Great Seal of the US given to the US Ambassador in Moscow by a group of Soviet school children in 1945. The seal contained a KGB listening device & hung in the US Ambassador’s residence until the bug was discovered in 1951.
account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

Don’t get fooled by . Last year NSA Cyber, FBI, and Cybersecurity and Infrastructure Security Agency issued guidance on synthetic media threats and how organizations can guard against them. Visit: media.defense.gov/2023/Sep/12/20…

Don’t get fooled by #deepfakes. Last year @NSACyber, @FBI, and @CISAgov issued guidance on synthetic media threats and how organizations can guard against them. Visit: media.defense.gov/2023/Sep/12/20…
account_circle
NCSC(@NCSCgov) 's Twitter Profile Photo

This week in 1965, US Army sergeant Robert Lee Johnson was arrested for espionage. Angry at being denied an Army promotion, he sold the USSR secrets from a US courier center near Paris. Sentenced to 25 years, he was killed in prison by his visiting son, a Vietnam veteran.

This week in 1965, US Army sergeant Robert Lee Johnson was arrested for espionage. Angry at being denied an Army promotion, he sold the USSR secrets from a US courier center near Paris. Sentenced to 25 years, he was killed in prison by his visiting son, a Vietnam veteran.
account_circle