1 / 19

A Contractors Perspective

Counterintelligence. A Contractors Perspective. Pete Miller Lockheed Martin John LeChettee, DSS.

minda
Download Presentation

A Contractors Perspective

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Counterintelligence A Contractors Perspective Pete Miller Lockheed Martin John LeChettee, DSS

  2. The United States continues to lead the world in areas of scientific and technological advancements. But our open nature and increased use of electronic communication, the United States remains the primary target of foreign nations and companies engaged in the collection of information and trade secrets.

  3. Today’s Presentation • Define Counterintelligence • Identify Critical Technologies • Identify Contractors CI Needs and Expectations • Identify Government CI Products and Expectations of the Government • How Can The Government and Contractors Work As Partners • Conclusion

  4. “I want to emphasize that the ‘fall of communism’ has not reduced the level or amount of espionage and other serious intelligence activity conducted against the United States. In many cases, the targets have not changed at all…” Louis Freeh, DirectorFederal Bureau of Investigation

  5. What Should CI Mean To Me? • Counterintelligence as defined by the National Security Act of 1947: • Information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassination conducted by or on behalf of foreign Governments or elements thereof, foreign organizations, foreign persons or international terrorists. • Includes both offensive and defensive activities conducted in the U.S. of abroad

  6. What Should CI Mean To Me? • Objectives of the National Counterintelligence Strategy • Identify, assess, neutralize and exploit the intelligence of foreign powers, terrorist groups, international criminal organizations and other entities who see to do us harm • Protect our intelligence collection and analytical capabilities from adversary denial, penetration, influence and manipulation • Help enable successful execution of U.S. sensitive national security operations • Help safeguard our nations secrets, critical assets, and technologies against theft, covert foreign diversion and exploitation.

  7. Targeted Informationand Technology • Collection efforts driven by military force modernization, economic competition, and commercial modernization • Militarily Critical Technology List • Information Systems • Aeronautics Systems • Sensors and Lasers • Electronics • Armaments and Energetic Materials

  8. Information Systems Information security systems Software/ hardware Transmission systems Modeling and simulation Intelligence systems Command, control, communications, computers and intelligence (C4I) Aeronautics Systems Fixed wing Gas turbine engines Unmanned vehicles (UAV) Stealth Crew interface Sensors and Lasers Focal plane array/infrared Radar Imagery Electro-optic and night vision Acoustics Electronics Microelectronics Materials/components Optoelectronics Fabrication equipment Armaments and Energetic Weapons Advanced artillery munitions Surface-to-air, anti-ship, air-to-air missiles Targeted Informationand Technology

  9. What CI Products or Services Contractors Want • Threat Assessments • DSS • FBI • Military intelligence (902nd MI/ OSI/ NIS) • More Frequent On-Site Visits From CI Agents • CI Briefings • Continuous dialogue with contractor security management tea,

  10. What Are Contractors Expectations of CI Products • Updates from CI Agencies on threats • MDCI • Local area • Program specific • Assessments done on a timely basis • On-site visits by CI agencies • Familiarize agencies with contractors facilities, programs and capabilities • Encourage exchange of information between agencies • Facilitate reciprocity

  11. What Are Contractors Expectations of CI Products • CI Briefings • Current information on threat • Traditional • Non-traditional • Not old collection techniques • When possible provide examples of CI threats from local area • Survey’s • Help contractor understand their real-time vulnerability • Develop effective countermeasures • Ultimately protects critical program information

  12. What Are Contractors Expectations of CI Products • CI security awareness materials that can be used to supplement existing programs • Posters • Videos • Bulletins • Lexis Nexis Searches • Requires specific description of technology, location, test activity • Can prepare analysis or provide raw data

  13. Contractor ResponseTo The Threat • Security geared to validated exploitation threat • Use of Risk Management Principles • Practice communications security • Support personnel security programs • Solid security requirements and instructions • Safeguard materials and media • Good security education program • Insert security early in the program

  14. Government Provided CI Products • Threat Assessments • MDCI • Local area • Off-site areas (Edwards AFB, China Lake, RadScat/RAM, WSMR, etc) • Program specific • Uses key words • Event Specific (Paris/Farmbourgh Air Shows) • On-site visits by CI agencies • Become familiar with contractors facilities, programs and capabilities • Learn about critical program information • Determine OPSEC requirements

  15. Government Provided CI Products • Lexis-Nexis • Word searches that identifies what is known or not known about CPI • Can do assessments so program offices can make classification determinations • OPSEC and other types of Surveys • Requested by customer • Issue specific • Provide threat briefings • Factual • Tailored towards customers

  16. Governments Expectations of Contractor CI Requests • CI Briefings • Requests are specific • Event or technology driven • Contractors must provide adequate information on program, event, facility that would allow for review of all available intelligence data • Conducting Survey’s • Coordinated with customer program management and security office • Specific periods of time • Specific outcome • Identification of specific type of survey and provide parameters

  17. Governments Expectations of Contractor CI Requests • CI Threat Assessments • Requests are specific • Contractors must provide adequate information on program, event, facility that would allow for review of all available intelligence data • On-site Visits • A familiarization tour is good for the 1st time at the facility • Further visits should be more specific in nature to learn more about technology, CPI or the facility • Meet main program team • Freedom to ask any questions on CPFI if the CI agent is cleared and has demonstrated the Need-to-Know

  18. How Can Government and Contractors Work Together • Contractors can develop a partnership with their CI agencies and open a line of communications • Contractors should let the CI agencies know what is critical about programs and facilities • Contractors can outline what expectations for CI they may have • Government can define what products they have available and what limitations they may have • Reach an agreement where they want goals their specific CI program should attain

  19. Summary • Peaceful co-existence has allowed for increased opportunities for new intelligence service and economic espionage to be conducting using overt and legal methods and traditional / non-traditional espionage tradecraft • Only by Government and contractor working together to identify vulnerabilities, develop and implement countermeasures thwart the future mass exodus of CPI and our nations secrets!

More Related