100 likes | 180 Views
Incoming Visitors. San Diego Industrial Counterintelligence Working Group. This document is intended solely for the use and information of the client to whom it is addressed. Version 1 - 07/09/2012. Table of Contents. Visit Purpose Vulnerabilities and Collection Techniques Countermeasures
E N D
Incoming Visitors San Diego Industrial Counterintelligence Working Group This document is intended solely for the use and information of the client to whom it is addressed. Version 1 - 07/09/2012
Table of Contents • Visit Purpose • Vulnerabilities and Collection Techniques • Countermeasures • Reporting Requirements
Visit – Knowledge Collection • Types • Contractually based • Exploratory • Unsolicited • Benefits • Face-to-face collaboration • Relationship building • Scientific and technical exchange • Share successes • Dispute resolution • Promote products and services
An Inherent Threat • Although the majority of visits are valid with well intention, visits are a low risk manner for a collector to obtain access to information and/or materials • Unclassified and/or Private/Proprietary information more likely to be target of collection due to access • Threat not limited to Foreign Visitors
Collection Techniques • The possibility of a trained collector within the visit delegation • The unannounced visitor or last minute addition to the planned visit delegation • The wandering visitor • Taking photographs, excessive notes, or collecting materials • Probing questions beyond the scope of the meeting • Easily concealed recording device(s)
Countermeasures • Identification and Badging • Require visitors to provide U.S.-based identification • In turn, require visitors to display identification while on site • Host briefing reinforcing Need-to-Know principle • Pre-visit survey • Determine before the visit meeting space and tour routes • Ensure affected areas are clear of potentially sensitive information
Countermeasures • Inform affected employees about the presence and purpose of visitors prior to the meeting • Employees may need to be reminded to protect sensitive information or materials • Opportunity for employees to be an extra set of eyes and ears regarding the visitor activities and whereabouts • Visitor briefing • Control the potential for inappropriate activities by informing visitors they must remain under escort, they may not use audio or visual recording devices, etc. • If visitors require network access consider a guest network or standalone system to prevent visitor access to your company information • Acknowledge non-compliance of security and safety regulations will result in an immediate end to the meeting
Countermeasures • Technology Control Plan (TCP) may be required for long term foreign visitors • Details badging, escort, work areas, awareness trainings/briefings, etc., all aimed at preventing unauthorized access. TCP requires active signature acknowledgment from both affected employees and long term visitors. • National Industrial Security Program Operating Manual (NISPOM) 2-307, TCP within the framework of Foreign Ownership, Control, or Influence (FOCI) • NISPOM 10-508 & 10-509, TCP when hosting on-site foreign nationals
Reporting Requirements • Post visit follow-up with host and/or affected employees • NISPOM 1-302 requires reporting of suspicious contacts to the CSA • Report anything questionable • Benefits of reporting something seemingly inconsequential outweigh the negative impact of not reporting at all • Your report may be the missing piece of the puzzle or the beginning of a trend