Archive for the ‘Industrial Espionage in Cyberspace’ Category

China Dragon  The answer to that question is Roofman the Spy’s audio page. ROOFMAN is being pirated big time in China.

I remember that back when there was a Soviet Union, their industrial espionage     involved  both cyber-espionage and recruiting agents (see Clifford Stoll’s Cuckoo’ Egg). I suspect the Chinese might be doing the same thing and using ROOFMAN as a textbook on how NOT to run an American asset.

It seems that ROOFMAN is also being pirated in Sayreville, N.J. – go figure.  I doubt if they’re enemies of the State, however.

Here’s the email I sent to the Department of Homeland Security on 2/19/13. Judge for yourself.

To Homeland Security:

My name is John Pansini, and I live at 1313 E. San Miguel #2, Colorado Springs, CO 80909.

From 12/83 to 12/87, I was a controlled asset of the FBI. They used me against an undercover Soviet intelligence officer (GRU) named Mikhail Katkov. I published an ebook about my experiences in 2011. (Seehttp://roofmanthespy.com/ ; )
The book, ROOFMAN: A True Story of Cold War Espionage, contains 63 minutes of embedded audio in 32 separate mp3 files. In the pdf version, the audio files are embedded. A reader need only click on a link to hear the file; everything is internal to the ebook.
The ebook comes in two other formats: mobi for Kindles and epub for other e-readers such as B&N’s Nook. Because of the primitive capabilities of some e-readers, the 32 mp3 files cannot be embedded into the e-book. Instead, to hear the audio readers must click on a link in the text which then takes them to an external website (seehttp://roofmanpansini.com/ ) then click on a link on that site to hear the audio.
I noticed something very strange in regards to the number of visits in 2012 to the audio website, RoofmanPansini.com. It is for this reason that I am bringing the matter to your attention. My ebook in the mobi and epub formats is being pirated in China; and since the book deals with industrial espionage as carried out by the Soviet Union in the 1980s, I suspect this piracy is being carried out by the Chinese government. The book details counterespionage as practiced by the FBI, industrial espionage as practiced by the U.S.S.R., and how Americans are recruited by hostile intelligence services. Useful information to anyone looking to steal our secrets.
Here are the statistics that first drew my attention to the matter. They can be easily verified by my ISP: http://www.1and1.com/ :

1
1) 22,690 hits to RoofmanPansini.com (the audio site that only needs to be accessed by a Kindle or a Nook) came from China. That’s 93.89% of all hits to the site. In contrast, there were only 966 hits to this site from the United States (4%) and 144 hits from Russia (0.6%).
2) 22,364 hits (92.54%) came from one city: Beijing.
3) RoofmanTheSpy.com, my main website where most of my ebook sales are generated, had only 1,123 hits from the PRC (24.87%) in 2012. This compares with 2,131 hits from the U.S. (47.2%) and 200 hits from Russia (4.43%).
4) Again, Beijing had most of those hits: 561 (12.43%).
5) For January 2013, the last month I had Site Analytics Plus which generated the statistics for 2012, of 2,697 hits to the audio site that month, 84.3% (2,030) came from China, and 2,007 came from Beijing. Only 324 came from the U.S., and 14 from Russia. February 2013 should also generate over 2K hits for the month, so they’re not slowing down.
6) I also have a blog that can also be a source of hits to the audio site. In 2012, there were 0 hits to this blog from China.(See https://roofmanthespy.wordpress.com/ )
1
Given the PRC’s proclivity for cyber espionage, I think they’re using ROOFMAN as a textbook for conducting industrial espionage in the U.S. I’m willing to cooperate (with DHS in) anyway I can.
Thank you,
John Pansini

… there was an ad in the New York Times. I answered it, and one day an undercover GRU officer, Mikhail Katkov, phoned me and invited me to lunch. He said he wanted to discuss a business arrangement of mutual benefit with me.

His words sounded familiar, like I come across the exact same phrase once before. It didn’t take me long to find out where.

Excerpt from Chapter One:

(more…)

 “There’s something that isn’t quite clear to me,” FBI Agent Dan Parrish asked me on December 12, 1983. “He says he’s Russian, works at the UN. You call us. Why?”

A deep breath before letting loose my theory: “For many reasons, beginning with computer networks. It’s true that all the information I have access to is unclassified and publicly available, but–”

“You mean there’s nothing to stop him from sitting down at his own terminal and doing it himself?” my other FBI questioner, David Neahle asked.

“I’m not sure. Some databases may not be open to Soviets. Regardless, unclassified technical information can still be of interest to the Soviets. My services as an information specialist can save them a great deal of time and effort tracking down certain documents. And even if Katkov’s not a spy, the information he requests is obviously on behalf of his government. Knowing what he is requesting gives us clues to the Soviet State of the Art, so in a sense, we’ll be spying on them.” I paused to let that filter through the shit-for-brains that floated around in their hard as porcelain skulls. “Finally, I suspect that this may be part of a much larger effort: to use Americans like me to infiltrate our nation’s computer networks.[1] You guys probably know better than me” — a bit of diplomacy on my part because I didn’t think these guys knew a damn thing — “that there are plenty of classified databases out there. Wouldn’t the Russians just love to have someone who could plug into them?”

Everything old is new again; nothing changes; same old same old — pick any cliche you like. They all fit in this case. What I was involved in over a quarter century ago is still going on today.

(more…)