210 likes | 795 Views
Defense Security Service 12 x 13 Instruction Guide. www.dss.mil. Partnering with Industry to Protect National Security. Purpose. To introduce industry partners to the 12x13 tool The 12x13 is: A physical depiction of trends data The threat picture as we see it
E N D
Defense Security Service 12 x 13 Instruction Guide www.dss.mil Partnering with Industry to Protect National Security
Purpose • To introduce industry partners to the 12x13 tool • The 12x13 is: • A physical depiction of trends data • The threat picture as we see it • A way for DSS to articulate threat to cleared industry • A way to discuss countermeasures employed against the threat
Technology Trends Report This report reflects a continued rise in reported suspicious contact attempts to obtain sensitive or classified information and technology. Reports from cleared industry increased by almost 18 percent from FY15. For the fifth year in a row, the top four collector regions remained the same. Collectors in the East Asia and the Pacific region, followed by the Near East, South and Central Asia, and Europe and Eurasia posed the most threat to information and technology resident in cleared industry. As in FY15, collectors from the Western Hemisphere and Africa posed the least threat in FY16, collectively accounting for just 7 percent of the overall threat. For the fourth consecutive year, aeronautic systems; command, control, communication, and computers (C4); and electronics made up the top three targeted technologies. However, in FY16, aeronautic systems moved from third to first, while C4 remained second and electronics dropped to third. Radars and armament and survivability finished out the top five targeted technologies.
Industrial Base Technology Listing (IBTL) A – Materials, Raw & Processed B – Electronics C – Manufacturing Equipment & Processes D – Lasers E – Directed Energy F – Optics G – Sensors (Acoustic) H – Positioning, Navigation, Timing I – Radars J – Signature Control K – Aeronautic Systems L – Space Systems M – Marine Systems N – Ground Systems O – Armaments & Survivability P – Energy Systems & Energetics Q – Nuclear R – Biological S – Chemical T – Emerging Technology U – Agricultural V – Medical W – C4 Systems X – Software Y – Services & Other Products Partnering with Industry to Protect National Security
Industrial Base Technology List - defined To organize its targeting analysis, DSS applies a system of categories and subcategories that identify and define technologies. DSS analyzed foreign interest in U.S. technology in terms of the 25 sectors of the DSS-developed Industrial Base Technology List (IBTL). The IBTL is a compendium of the science and technology capabilities under development worldwide that have the potential to significantly enhance or degrade U.S. military capabilities in the future.
Methods of Contact / Methods of Operation • Text • Text
DSS METHODS OF OPERATION & METHODS & CONTACT MATRIX: BLANK H M L VERSION: 18.1 – 4 JAN18 HIGH MEDIUM LOW UNREPORTED
FY17 OVERALL 12x13 METHODS OF OPERATION & METHODS OF CONTACT MATRIX
IBTL CAT B (ELECTRONICS) METHODS OF OPERATION & METHODS OF CONTACT MATRIX
IBTL CAT A (MATERIALS, RAW AND PROCESSED)METHODS OF OPERATION & METHODS OF CONTACT MATRIX
IBTL CATS: A & B (ELECTRONICS, RAW MATERIALS)METHODS OF OPERATION & METHODS OF CONTACT MATRIX
Questions? DSS CI Strategic Engagement Division Contact: dss.quantico.dss-ci.mbx.gray-torch@mail.mil DSS CI South Region Contact: SA Steve Michaud: Stephan.j.Michaud.civ@mail.mil Partnering with Industry to Protect National Security
Reporting Discussion • Open and honest discussion • Intended to highlight best practices • Intended to educate • Hopefully these case studies allow you to envision 12 x 13 application as well
Case Study #1 In February 2017, CC employees were approached at a foreign defense conference. A known Chief Designer for a company based in an adversarial Eurasian country approached the CC booth and questioned CC employees. The Chief Designer focused on specific systems and asked CC employees questions, the answers to which were not publically releasable. The Chief Designer was seeking performance, testing, and evaluation specifics which no doubt would help his own efforts.
Case Study #2 In February 2017, CC employees were approached at a foreign defense conference. A Production Designer for a large defense contractor in an adversarial Asian country approached a CC booth and engaged the employees. The Production Designer noted he was over the program fielding the foreign ‘knock-off” version of the CC product. The Production Designer engaged the CC employee with specific application questions, and appealed to the CC employees knowledge of the system. The Production Designer also introduced the CC employee to other high ranking officials from his Asian company.
Case Study #3 In Fall 2017, a CC employee returning from a trip to Asia, noticed something unusual with his personal electronics. Upon returning home, the CC employee noted the electronic device had been altered. The CC employee had not used the device during his travel; but when he returned home he noticed the language settings had been changed. The CC employee turned the device into his employers security team for analysis.
Comments / Discussion? SA Steve Michaud Defense Security Service South Region 469-329-6375 Stephan.j.Michaud.civ@mail.mil