User Overview

Followers and Following

Followers
Following
Trendsmap

History

Total Followers - Last Year
Daily Follower Change - Last Year
Daily Tweets - Last Year

Tweet Stats

Analysed 4,822 tweets, tweets from the last 428 weeks.
Tweets Day of Week (UTC)
Tweets Hour of Day (UTC)
Key:
Tweets
Retweets
Quotes
Replies
Tweets Day and Hour Heatmap (UTC)

Tweets

Last 50 tweets from @NCSCgov
Don’t be a pawn. Foreign intelligence entities of repressive regimes have sought to use US-based persons, including private investigators & law enforcement officers, to help them target perceived critics & opponents in the US.

See new NCSC/FBI bulletin: dni.gov/files/NCSC/doc… pic.twitter.com/hZdREKWg1w
Replying to @NCSCgov
Individuals, businesses, or other entities in the US with access to personal data should be vigilant against improper efforts to obtain such data or to solicit other support for malicious foreign operations. See new NCSC/FBI bulletin for mitigation steps. dni.gov/files/NCSC/doc…
 
Don’t be a pawn. Foreign intelligence entities of repressive regimes have sought to use US-based persons, including private investigators & law enforcement officers, to help them target perceived critics & opponents in the US.

See new NCSC/FBI bulletin: dni.gov/files/NCSC/doc…
 
#OTD 1993, Jeff Gregory, a US Army Staff Sergeant pleaded guilty to espionage charges stemming from his provision of US & NATO secrets to Soviet Bloc officials. A member of a spy ring led by US Army sergeant Clyde Lee Conrad, Gregory was sentenced to 18 years in prison.
 
Although often less appreciated than remote-access cyber threats, insider threats to U.S. critical infrastructure are real. See NCSC's “Insider Threat Mitigation for U.S. Critical Infrastructure Entities: Guidelines from an Intelligence Perspective" dni.gov/files/NCSC/doc…
 
This week 1998, nuclear physicist Peter Lee was sentenced to prison for passing secrets to China & making false statements. While working @ Los Alamos National Lab, he disclosed classified data to Chinese scientists during a trip to China & lied about the trip on security forms.
 
Report: China’s global campaign to win friends and influence policy has blossomed in a surprising place: Utah. NCSC in July warned state and local officials nationwide about Chinese influence operations.
apnews.com/article/china-…
 
#ICYMI: Russian National "Illegal" Charged with Acting as Agent of a Russian Intelligence Service in the United States justice.gov/usao-dc/pr/rus…
 
#ICMYI: @NCSCgov's Jeanette McMillian discussed software supply chain security with @FederalNewsNet earlier this week.

When working in cybersecurity, there’s still risk ‘everywhere in the software supply chain’ | Federal News Network federalnewsnetwork.com/cybersecurity/… via @FederalNewsNet
When working in cybersecurity, theres still risk everywhere in the software supply chain | Federal News Network
federalnewsnetwork.com
 
#WomensHistoryMonth: Born into slavery in Maryland, Harriet Tubman went on to serve in the Union Army in the Civil War; first as a nurse & cook, later as a spy, scout & soldier. In addition to seeking out & reporting rebel camps, she participated in Union raids in South Carolina.
 
#OTD 2006: engineer Chi Mak was sentenced to 24 years in prison for illegally exporting sensitive US military technology to China. @FBI and @RealNCIS identified PRC “tasking lists” to Mak requesting specific defense information, including US Navy research on nuclear-powered subs.
 
Many US cities & states have “sister” partnerships with foreign cities/provinces. While these agreements may bring economic benefits, they can also be exploited by foreign governments to advance their own geopolitical interests & influence in the US. See dni.gov/files/NCSC/doc…
 
Commercial spyware is often used by foreign regimes to target dissidents, journalists, and others around the globe who they perceive as critics or political opponents. See below for basic mitigation steps. dni.gov/files/NCSC/doc…
 
#OTD 2016, Su Bin pleaded guilty to participating in a years-long conspiracy to hack into US defense contractor systems, steal data on the C-17 transport aircraft and other US fighter jets, then export that data to China. He was sentenced to 46 months in prison.
 
Whether classified or unclassified, US data, technology, and talent are key targets of foreign intelligence entities today. Check out @NCSCgov’s #KnowtheRiskRaiseYourShield materials for basic steps on how to protect yourself and your organization. dni.gov/index.php/ncsc…
 
#OTD 2001, the State Department notified the Russian Embassy that four of its diplomats had been declared persona non grata in the US and should leave immediately. They were intelligence officers implicated the Russian espionage case involving @FBI Special Agent Robert Hanssen.
 
With a US bipartisan consensus against China impeding efforts to directly influence US national-level policy on China, Beijing has adjusted by redoubling its efforts to build influence at the state & local level to shift US policy in China’s favor. See: dni.gov/files/NCSC/doc…
 
This month in 1942, nine members of a Nazi spy ring led by Kurt Ludwig Frederick had either pleaded guilty or were convicted at trial in the US after an @FBI probe. The spies collected US military data for German intelligence. For more information see: fbi.gov/history/famous…
Ludwig Spy Ring | Federal Bureau of Investigation
fbi.gov
 
This week in 1984, West German mechanic Ernst Forbrich was arrested after paying for classified info from an undercover @FBI agent. For years, he had received military info from US personnel in West Germany and passed it to East German spies. He was sentenced to 15 yrs in prison.
 
#ProtectYourTech: US companies today face an expanding array of threat vectors from the PRC -- not only illicit tactics, but also legal & quasi-legal efforts to acquire US #technology, talent, and data. US firms also face blended operations that combine some or all these methods.
 
#WomensHistoryMonth: A storied group of women who worked as cryptologists in WWII was instrumental in cracking enemy codes used in the European & Pacific theaters. These “code girls” were pivotal to the success of US operations against Axis forces & helped save countless lives.
 
This #StPatricksDay we remember Hercules Mulligan, the Irish-born tailor and spy who twice saved Gen. George Washington’s life. The NYC tailor fitted clothes for British officers as his customers and extracted their military secrets for Gen. Washington & the Continental Army.
 
#WomensHistoryMonth: Many women have shaped our nation’s history through groundbreaking triumphs in espionage.

These trailblazers overcame longstanding social and institutional barriers to serve their country with distinction. Some of their stories are below.
 
Report: Poland detains 9 people suspected of spying for Russia abcnews.go.com/International/…
 
#OTD 2016: Kun Shan Chun, an @FBIelectronics technician, was arrested for acting as an agent of China. At the direction of Chinese gov't officials, Chun collected sensitive FBI info and transmitted it Chinese officials. He pleaded guilty and was sentenced to 24 months in prison.
 
Foreign adversaries are targeting America’s quantum information science enterprise to gain economic and military advantage. In the cross-hairs are quantum researchers in industry and academia, facilities, networks, research and technology. dni.gov/files/NCSC/doc…
 
#OTD 2019, former DIA officer Ron Hansen pleaded guilty to attempting to deliver national defense info to China. He admitted being targeted by Chinese intel officers in 2014, meeting them regularly in China and receiving hundreds of thousands of dollars for info he provided them.
 
NCSC Retweeted ·  
The GEC released a report today exposing a coordinated Kremlin disinformation campaign pushing false narratives about biological weapons. Learn how Russia tries to use disinformation to justify its unjustifiable war in Ukraine. ow.ly/hyY550NijKx
 
Don’t be that guy -- the weakest link in the supply chain. To learn more about ways to minimize your supply chain risk, check out this brief NCSC video for the basics:
youtu.be/oj5iD0D7JsY?t=4
 
Foreign adversaries aren’t just interested in U.S. government secrets. Unclassified information -- including proprietary data, R&D, emerging tech & personal data -- are all key targets today. Protecting your organization has never been more important.
 
#WomensHistoryMonth: In 1856, at age 23, Kate Warne became the first female private detective in the US, working for Allan Pinkerton’s National Detective Agency. Five years later, she helped save President-elect Abraham Lincoln from an assassination plot by Southern secessionists
 
Although research partnerships with foreign companies can yield potential medical breakthroughs, the collection of US personal health data by foreign companies can also pose serious risks. To protect personal health data from foreign exploitation, see: dni.gov/files/NCSC/doc…
 
UK's MI5 announces creation of National Protective Security Authority to help businesses and other organizations defend against state-sponsored attempts at stealing sensitive research and information and other threats. shar.es/afKj2d
 
This week 1950, Valentin Gubichev, a Soviet engineer at the United Nations, was sentenced to 15 years in prison for espionage but was promptly sent to the USSR. Gubichev was arrested along with Justice Department analyst Judith Coplon, who was providing secrets to the Soviets.
 
#OTD 1988, US Army Warrant Officer James Hall III was sentenced to 40 years in prison for scheming with Army mechanic Huseyin Yildirim while in Germany to pass classified data on Western eavesdropping systems to East German and Soviet intelligence for some $100K to $200K.
 
NCSC Retweeted ·  
Today, ODNI released the U.S. Intelligence Community’s 2023 Annual Threat Assessment. View the assessment here: odni.gov/index.php/news…
 
#OTD 2011: former L-3 Communications employee Sixing Liu was arrested for exporting U.S. military technology to China. He stole thousands of L-3 electronic files on guidance systems for missiles, rockets & UAVs and briefed state-backed conferences in China on the technology.
 
Report: US sees China propaganda efforts becoming more like Russia’s
apnews.com/article/china-…
 
Want to connect? Foreign intelligence entities often use deception on social media / professional networking sites to connect to people with access to information they want. Before you link online with someone you don’t know, think about the risks. See: dni.gov/index.php/ncsc…
 
 
#WomensHistoryMonth: Virginia Hall was a legendary intel officer and the only civilian woman to be honored with the Distinguished Service Cross in WWII. Despite the loss of her leg, she served British special ops and the OSS during WWII, later joining @CIA and retiring in 1966. pic.twitter.com/vWSuggFJ8T
Replying to @NCSCgov
Virginia Hall's work in France organizing spy networks, running safe houses and delivering key intelligence earned her the ire of the Gestapo. “The woman who limps is one of the most dangerous Allied agents in France. We must find and destroy her,” the Gestapo ordered.
 
#WomensHistoryMonth: Virginia Hall was a legendary intel officer and the only civilian woman to be honored with the Distinguished Service Cross in WWII. Despite the loss of her leg, she served British special ops and the OSS during WWII, later joining @CIA and retiring in 1966.
 
NCSC Retweeted ·  
Two counterintelligence leaders joined me this week for a rare high-level CI discussion @mvhaydencenter @ScharSchool: Mirriam-Grace MacIntyre, National Counterintelligence & Security Center ExDir; and Alan Kohler, FBI Asst Director for CI.

Listen here:
open.spotify.com/episode/181ANS…
Counterintelligence Today with Mirriam-Grace MacIntyre and Alan Kohler
open.spotify.com
 
The U.S. on Thursday added two subsidiaries of Chinese genetics company BGI to a trade blacklist over allegations it conducted genetic analysis and surveillance activities for Beijing, which Washington says was used to repress ethnic minorities in China. cnn.com/2023/03/02/bus…
US adds Chinese genetics firms to trade blacklist over surveillance allegations | CNN Business
edition.cnn.com
 
#OTD 1997, former CIA officer Harold Nicholson pleaded guilty to providing Russia the identities of CIA officers & other secrets - earning himself 23 years in prison. From prison, he recruited his son to pass info to Russia & collect $$ from them, earning 8 more years in prison.
 
Understand the six-step #OPSEC cycle to protect your organization
1) identify your critical information
2) evaluate threats
3) analyze vulnerabilities
4) assess risks
5) apply countermeasures
6) periodically assess
Check out NCSC's OPSEC bulletin:
dni.gov/files/NCSC/doc…
 
#OTD 1902: Moe Berg, the batter, catcher, soldier and spy was born in New York City. A catcher in Major League Baseball for more than a decade, Berg would later become a soldier and spy during World War II for the Office of Strategic Services, the predecessor to the CIA.
 
#ICYMI: Last night, @NCSCgov's Mirriam-Grace MacIntyre and @FBI's Alan Kohler spoke at the @mvhaydencenter on "Counterintelligence Today." Watch the discussion below. youtu.be/CkHz55crpps?t=…
 
#OTD 1967: Retired Army lieutenant colonel William Whalen was sentenced to 15 years in prison for espionage. While on active duty in 1959-61, Whalen met with Soviet officials at northern Virginia shopping centers and provided them retaliation plans of US Strategic Air Command
 
This month in 1999, former NSA analyst David Boone was sentenced to 24 years for selling US secrets to Russia. Nearly broke, Boone walked into the Soviet Embassy in DC in 1988 & offered his services. A decade later, @FBI arrested Boone at a Virginia hotel after a sting operation.
 
Tonight at 7:00 pm ET, @NCSCgov's Executive Director Mirriam-Grace Macintyre will participate in a moderated discussion on counterintelligence issues at the @mvhaydencenter. To register for the streaming event, see eventbrite.com/e/counterintel…
Counterintelligence Today (Livestream Registration)
eventbrite.com
 
 
For access to this functionality a Trendsmap Explore subscription is required.

A Trendsmap Explore subscription provides full access to all available timeframes

Find out more

Thanks for trying our Trendsmap Pro demo.

For continued access, and to utliise the full functionality available, you'll need to subscribe to a Trendsmap Pro subscription.

Find out more

This account is already logged in to Trendsmap.
Your subscription allows access for one user. If you require access for more users, you can create additional subscriptions.
Please Contact us if you are interested in discussing discounts for 3+ users for your organisation, or have any other queries.