NCSC Profile Banner
NCSC Profile
NCSC

@NCSCgov

118,763
Followers
181
Following
3,022
Media
5,966
Statuses

Advancing Counterintelligence and Security Excellence

Joined December 2014
Don't wanna be here? Send us removal request.
@NCSCgov
NCSC
19 hours
Former FAA contractor indicted for illegally acting as an agent of the Iranian government -- allegedly conspired with Iranian intelligence operatives to obtain employment as a federal contractor and share sensitive government materials with Iran.
0
40
75
@NCSCgov
NCSC
23 hours
NCSC Wall of Spies artifact: In 1999, a Russian listening device was found hidden in a chair rail in a conference room at US State Department HQ. @FBIgov later detained a Russian SVR official who had been recording audio in the room using special equipment in his nearby vehicle.
Tweet media one
9
85
181
@NCSCgov
NCSC
1 day
#OTD1985 , CIA stenographer Sharon Scranage was convicted of espionage and sentenced to five years in prison for providing sensitive CIA information to Michael Soussoudis, her Ghanaian lover and a member of the Ghanaian intelligence service.
Tweet media one
2
8
20
@NCSCgov
NCSC
2 days
Don’t get fooled by #deepfakes . Last year @NSACyber , @FBI , and @CISAgov issued guidance on synthetic media threats and how organizations can guard against them. Visit:
Tweet media one
2
16
31
@NCSCgov
NCSC
2 days
How do foreign threat actors exploit early-stage investments in U.S. emerging tech startups to gain access to sensitive data? Explore the recent bulletin from @NCSCgov , @RealAFOSI , @RealNCIS and OESET:
Tweet media one
5
67
113
@NCSCgov
NCSC
3 days
This week in 1989, former US Navy airman James Wilmoth was convicted of attempted espionage for the Soviets. He was arrested by Naval Investigative Service agents for attempting to sell classified information to a Soviet agent in Japan. He was sentenced to 35 years.
Tweet media one
4
14
26
@NCSCgov
NCSC
3 days
Protecting your critical assets can’t just be left to your security team. It should include human resources, procurement, legal, and other offices across your organization. Explore NCSC's enterprise risk mitigation guide.
Tweet media one
0
5
26
@NCSCgov
NCSC
3 days
This week in 1997, Robert Kim, a computer expert at the Office of Naval Intelligence (ONI) pleaded guilty to passing intelligence to a South Korean Embassy official. Saddled with major debt, Kim sought to cash in on what he learned from ONI. He was sentenced to 9 years in prison.
Tweet media one
3
9
40
@NCSCgov
NCSC
4 days
Limit your digital footprint! Digital exhaust is the sum total of the data generated as a byproduct of your digital interactions and activities. Your digital exhaust can reveal your activities, interests, and location. Learn how to reduce your footprint:
Tweet media one
3
36
72
@NCSCgov
NCSC
4 days
#NITAM2024 Potential risk indicators (PRI) of insider threat activity can include a range of stressors, choices, actions, and behaviors. This job aid can help you identify PRIs & why spotting them is vital to #insiderthreat prevention.
Tweet media one
1
15
43
@NCSCgov
NCSC
4 days
Nation-state actors work 24/7 to defeat network enterprise security. Do you have the essential elements for #cybersupplychainintegrity ? Having a proactive cyber threat hunting capability is a force-multiplier to combat threats. Explore NCSC’s bulletin:
Tweet media one
0
21
38
@NCSCgov
NCSC
8 days
This week in 1985, former @CIA officer Edward Lee Howard was charged with espionage. Upset after being fired by CIA and armed with names of agents, surveillance operations, and identities of CIA officers in the Soviet Union, he provided classified information to the KGB.
Tweet media one
12
64
120
@NCSCgov
NCSC
8 days
#DYK that damage assessments are conducted by NCSC to evaluate actual or potential damage to national security from the unauthorized disclosure or compromise of classified information? NCSC coordinates equity reviews and damage assessments across the IC, as directed by the DNI.
Tweet media one
2
14
29
@NCSCgov
NCSC
9 days
NCSC’s “Wall of Spies Experience” provides more than 200 stories of espionage and sabotage from our country’s founding to contemporary times. Read more here:
Tweet media one
7
4
23
@NCSCgov
NCSC
9 days
Do you use strong passwords and multi-factor authentication? Recognize and report phishing? Update software regularly? October is #CybersecurityAwarenessMonth so get prepared by visiting @CISAgov here to view their resources and toolkit.
Tweet media one
6
35
79
NCSC Retweeted
@ODNIgov
Office of the DNI
10 days
Today, ODNI along with our partners @FBI and @CISAgov released a joint statement.  Read the statement here:
Tweet media one
44
184
380
@NCSCgov
NCSC
10 days
#OTD in 2017, engineer Gregory Justice, who worked for a cleared U.S. government contractor, was sentenced to prison. He sold sensitive satellite information to an undercover @FBI agent he thought was a Russian intelligence officer and collected $3,500 for the data. #NITAM2024
Tweet media one
6
97
192
@NCSCgov
NCSC
10 days
Think outside the box when it comes to #cyber . Is your company prepared to defend against other approaches used by foreign threat actors to acquire data, technology, and talent?
Tweet media one
10
26
54
@NCSCgov
NCSC
11 days
Russia's intelligence services and their proxies continue to target the U.S. through espionage, influence operations, and cyber activities while also seeking to degrade U.S. and partner support for Ukraine. For U.S. companies in the crosshairs, see
Tweet media one
47
313
507