Counterintelligence: Best Practices For Cleared Industry

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

CI COUNTERINTELLIGENCE

Best Practices for Cleared Industry


COUNTERINTELLIGENCE AWARENESS
What is the Threat? The exploitation of cyberspace continues to be a key
area of concern. The potential for blended operations
United States’ cleared industry is a prime target of where cyberspace contributes to traditional
many foreign intelligence collectors and foreign tradecraft presents the greatest risk to cleared
government economic competitors. Cleared industry. An increase in unsolicited contacts made
employees working on America’s most sensitive with cleared industry employees from compromised
programs are of special interest to other nations. accounts amplifies the potential for compromise of
cleared individuals, classified programs, or classified
The number of reported collection attempts rises systems occurring in the unclassified cyber domain.
every year, indicating an increased risk for industry.
While any geographic region can target sensitive Through analysis of industry reporting, DSS has
or classified U.S. technology, the Defense Security found that foreign intelligence services utilize both
Service (DSS) has consistently found that the majority commercial and government-affiliated entities.
of suspicious contacts reported by cleared industry
originate from East Asia and the Pacific region. • The large number of commercial contacts likely
represents an attempt by foreign governments
However, every region has active collectors. Cleared to make the contacts seem more innocuous by
contractors should remain vigilant regardless of the using non-governmental entities as surrogate
collector’s assumed country of origin. collectors
• The number of government-affiliated contacts
The nature and extent of industry reported is likely due to foreign governments’ increased
suspicious contacts suggest a concerted effort reliance on government-affiliated research
to exploit cleared contractors for economic and facilities that contact cleared U.S. contractors
military advantage. These contacts range from under the guise of information-sharing
outright attempts to steal technology to seemingly
innocuous business ventures.
Who is Being Targeted?

Foreign collectors may target anyone with access to


the targeted information, knowledge of information
systems, or security procedures. Potential targets
are not limited to but often include:

• Developers: Scientists, researchers and engineers


researching and applying new materials or
methods to defense and other leading edge
technologies
• Technicians: Engineers or specialists that
operate, test, maintain, or repair targeted What Are the Most Common Collection Methods? • Vagueness of order – quantity, delivery,
technologies destination, or identity of customer
• Production personnel: Personnel with access Attempted Acquisition of Technology: Includes • Multiple sales representatives
to production lines or supply chain of targeted attempts to acquire protected information in the form
of controlled technologies, whether the equipment • Unusual quantity
technologies
itself or diagrams, schematics, plans spec sheets or • Requested modifications of technology
• IT personnel: Systems administrators or others
the like. These often involve email, mail, cold-calling
with access to cleared facility networks and • Rushed delivery date
cleared employees, web card submissions, or use of
knowledge of network security protocols • No return address
a website’s “contact us” application.
• Business development personnel: Marketing • End user address is in a third country
and sales representatives >> Indicators of Suspicious Purchase Requests:
• Address is an obscure PO Box or residence
• Human resources personnel: HR representatives
with access to personnel records • End user is a warehouse or company that • Multiple businesses using the same address
organizes shipments for others
• Facility personnel: Anyone with access to • Buyer requests all products be shipped directly
a cleared or sensitive facility containing • No end-user certificate to him/her
targeted information including security, clerical,
maintenance, and janitorial personnel
Be Alert! Be Aware! Report suspicious activity to your local security official.
• Watering Hole attacks (compromised third
COUNTERINTELLIGENCE AWARENESS party websites) may provide a means
for malicious actors to gain unauthorized
access to a network or device
• The request is directed at an employee who Exploitation of Business Activities: Attempts to exploit
does not know the sender and is not in the sales an existing commercial relationship or establish a • Removable media (USB devices) can
or marketing office commercial relationship in order to obtain access provide a means to quickly spread malicious
to protected information, technology, or persons. software from a trusted position
• Solicitor is acting as a procurement agent for a
foreign government These include joint ventures, partnerships, mergers
and acquisitions, foreign military sales, or attempted Request for Information (RFI)/Solicitation: Direct or
• Military-specific technology is requested for a development of service provider relationships. indirect attempts to collect protected information
civilian purpose by directly indirectly asking, requesting, or eliciting
• Company requests technology outside the Exploitation of Cyber Operations: Attempts to conduct protected information, technology, or persons
requestor’s scope of business actions to place at risk the confidentiality, integrity
or availability of targeted networks, applications, >> Common Methods of Contact for RFI/
• Visitors request last-minute change of agenda
credentials, or data to gain access to, manipulate Solicitation:
to include export-controlled technology
or exfiltrate protected information, technology, or
• Requestor offers to pick up products rather than personnel information. • Conferences, conventions, or tradeshows
having them shipped – contacts initiated during an event
• Requestor uses broken English or poor grammar >> Common Cyber Operation Methods:
• Email, mail, telephone, web form
• Individual has a lack of/no knowledge of the • Phishing operations use emails with • Foreign visits – Activities or contact occurring
technical specifications of the requested type embedded malicious content or attachments before, during, or after a visit to a contractor’s
of technology facility
Reportable Suspicious Contacts Include:

• Efforts by any individual, regardless of nationality,


to obtain illegal or unauthorized access to
classified information or to compromise a
cleared employee
• Contact between cleared employees and
known or suspected intelligence officers from
any foreign country
• Any contact that suggests the employee
concerned may be the target of an attempted
exploitation by a foreign intelligence entity
• Attempts to entice cleared employees into
compromising situations that could lead to
blackmail, coercion or extortion
• Attempts by foreign customers to gain access
to hardware and information that exceeds the
limitations of the export licenses on file
• Attempts to place cleared personnel under
obligation through special treatment, favors,
gifts, or money
• Requests for protected information in the guise
of a price quote or purchase

Immediately notify your facility security officer and/


or a DSS representative if you observe any of the
above behaviors or believe you were targeted
by an individual attempting to obtain illegal or
unauthorized access to classified information.
Be Alert! Be Aware! Report suspicious activity to your local security official.
• Unauthorized email traffic to foreign destinations
REPORTING THE THREAT • Password cracking, key logging, encryption,
steganography, privilege escalation, and
Reporting Requirements for Cleared Companies security issues, which should be handled in accordance account masquerading
with applicable procedures. • Use of DoD account credentials by unauthorized
National Industrial Security Program Operating parties
Manual (NISPOM) paragraph 1-302b states, >> Mishandling of Classified Information
“Contractors shall report efforts by an individual, • Unexplained storage of encrypted data
regardless of nationality, to obtain illegal or • Removing or sending classified material out of • Network spillage incidents or information
unauthorized access to classified information or to secured areas without proper authorization compromise
compromise a cleared employee.”
• Unauthorized copying, printing, faxing, emailing, • Unauthorized transmissions of classified or
or transmitting classified material controlled unclassified information
Cleared contractors must also report actual,
probable, or possible espionage, sabotage, • Transmitting or transporting classified information • Data exfiltrated to unauthorized domains
terrorism, or subversion promptly to the Federal by unsecured or unauthorized means affecting classified information, systems or
Bureau of Investigation (FBI) and DSS (NISPOM cleared individuals
• Unauthorized storage of classified material,
1-301).
including storage at home • Actual or attempted unauthorized access into
Although this requirement is not directed to • Reading or discussing classified information in U.S. automated information systems
unclassified information or systems, contractors an unauthorized area or over a non-secure • Tampering with or introducing unauthorized
must report activities that otherwise meet the communication device elements into information systems
threshold for reporting, including activities that
• Improperly removing or changing classification • Unexplained user accounts, administrator
may have occurred on its unclassified information
markings accounts, and expansion of network privileges
systems. (See Industrial Security Letter 2013-05)
• Attempting to expand access to classified
What to Report* information by volunteering for assignments or >> Suspicious Cyber Incidents
duties beyond the normal scope of responsibilities
• Advanced techniques and/or advanced
*Note: Report any of the following incidents if they meet
evasion techniques, which imply a sophisticated
the thresholds of NISPOM paragraphs 1-301, or 1-302a. or >> Misuse of Computer Systems
b. These lists are not all inclusive. Some of the examples
adversary
are also considered security violations or personnel • Unauthorized network access • Pre-intrusion aggressive port scanning
>> Foreign Influence >> Recording Devices

• Undisclosed visits to foreign diplomatic facilities • Unauthorized possession of cameras or recording


or communication devices in classified areas
• Trips to foreign countries inconsistent with an
• Discovery of suspected surveillance devices in
individual’s financial ability
classified areas
• Foreign entities targeting employees traveling
Cleared Industry’s Role
overseas via airport screening or hotel room
incursions
The technology and information resident in U.S.
• Unreported close and continuing contact with cleared industry is under constant and pervasive
• Denial-of-service attacks or suspicious network a foreign national, including intimate contacts, threat from foreign intelligence entities seeking to
communication failures shared living quarters, or marriage gain the technological edge.

• Social engineering, electronic elicitation, email >> Suspicious Contacts Increased awareness of the targeted information
spoofing, spear phishing, whale phishing, or and methods of operation used by foreign entities is
direct questioning, such as through social • Requests for information that make an individual critical to improving our ability to identify and thwart
networking sites suspicious, including questionable contacts or collection attempts.
• Malicious codes or blended threats such as interaction
Timely and accurate reporting from cleared
viruses, worms, trojans, logic bombs, malware,
>> Suspicious Financial Activity industry is the primary tool DSS uses to identify and
spyware, or browser hijackers, especially those
mitigate collection efforts targeting information and
used for clandestine data exfiltration
• Unexplained expensive purchases not reasonably technology resident in cleared industry.
• Any credible anomaly, finding, observation, supported by the individual’s income
or indicator associated with other activity or Immediately report suspicious activities, behaviors,
behavior that may also be an indicator of • Sudden unexplained reversal of a negative and contacts to your facility security officer.
terrorism or espionage financial situation or repayment of large debts
• Any cyber activity linked to the law enforcement
or counterintelligence suspicious indicators
provided by the FBI, DSS, Defense Intelligence
Agency or by any other cyber centers
Be Alert! Be Aware! Report suspicious activity to your local security official.
defense-oriented companies to obtain access
EXPLOITATION OF BUSINESS ACTIVITIES to otherwise denied information, programs,
technology, or associated U.S. personnel. This
method of operation relies on the appearance of
What is Exploitation of Business Activities? • Joint ventures legitimacy provided by the established commercial
• Official agreements or business activity.
Attempts to establish a commercial relationship via
joint ventures, partnerships, mergers and acquisitions, • Social networking services Conversely, U.S. company personnel, cleared or
foreign military sales, or service providers. not, seeking to build positive relationships and gain
Who is Being Targeted? future business with foreign partners, may unwittingly
Attempts to leverage an existing commercial provide information beyond the scope of the
relationship in order to obtain access to protected Any company with cleared, that works in support business activity for which the relationship exists.
information, technology, or persons. of cleared facilities, or that works with sensitive,
restricted, or classified information relating to >> Five examples of how this exploitation can be
What are the Primary Methods of Exploitation? the Department of Defense (DoD) or other U.S. effective are illustrated below:
Government agencies’ programs or systems.
• Personal contact • Foreign ownership of, or financial interest in, a
• Cultural commonality Foreign collectors, or their agents, often target U.S. company may provide access to intellectual
employees involved in business development, sales, property rights held by the U.S. company;
• Foreign visits marketing, information sharing, or other “professional
• Business activity may allow the foreign company
• Foreign military sales collaborative efforts” in order to develop a
access to information on the U.S. company’s
• Direct commercial sales relationship.
network;
• Conferences, conventions, or tradeshows Once such an entity establishes a business • Foreign-produced hardware and software sold
• Cyber operations relationship, they seek to take advantage of that to a cleared company may include design
relationship to contact other cleared employees vulnerabilities that could provide foreign
• Email requests actors access to a company’s networks and
working with targeted information and technology.
• Business propositions and solicitations information;
• Academic solicitations Why is it Effective? • Foreign collectors prey upon cleared employees’
eagerness to develop or expand commercial
• Web form submissions Foreign entities exploit legitimate activities with relationship to increase sales or revenues;
• A joint venture with a foreign company formed >> These commercial and business relationships
using the U.S. company’s name, allowing foreign include:
employees to use the U.S. company’s name on
business cards; • Misrepresenting themselves as a foreign
• Cleared employees not informed and educated representative for a U.S. company;
on the business and security limits of the • Selling and installing hardware or software
commercial agreement or the export control in cleared contractor or sensitive facilities or
restriction of technology may commit a security networks;
violation by unwittingly providing information that
• Buying a substantial or majority interest in U.S.
should not be shared, based on the established
companies to gain intellectual property rights for
relationship.
technology, as well as to share data or appoint
key management personnel in the acquired
How Can You Recognize It? company.

A business relationship with a foreign company or


>> Eight examples of potentially suspicious
person may be entirely legitimate. However, in many
exploitation scenarios are presented below:
cases, foreign entities with nefarious motives and
intent build relationships or abuse existing relationships
• Foreign company has a nebulous business
with U.S. industry to establish pathways to restricted
background;
information and technology. Building on apparent
legitimate business activity, foreign collectors abuse • Foreign company attempts to obscure ties to a
the relationship as a vector to the restricted or foreign government;
prohibited information. • Foreign company attempts to acquire interest
in companies or facilities inconsistent with their
current business lines;
• Foreign partner/client requests to visit cleared
facility not related to the business relationship;

Be Alert! Be Aware! Report suspicious activity to your local security official.


EXPLOITATION OF BUSINESS ACTIVITIES
• Foreign visitors violate security protocols during Countermeasures
visits to cleared facilities, or change the
members of a visiting delegation at the last To mitigate foreign partners’ or clients’ ability to gain
minute; access to restricted information or technology, U.S.
cleared companies have many options available to
• Foreign company seeks to establish joint
them. Below are just six examples of such options:
ventures with cleared companies to act as U.S.
company’s representative in foreign markets;
• Ensure all employees interacting with foreign
• Foreign company (including companies from partners know the specifics of the relationship
countries subject to sanctions) attempts to use a and what information, equipment, and
subsidiary in a third country to establish business technology they can share and cannot share,
relationships or buy interests in a cleared U.S. and understand the requirements to report
company; “suspicious activity;”
• Foreign company targets U.S. cleared • Ensure security protocols are in place and
employees, or those working in support of adhered to for access to the facility, assembly/
cleared companies, for information beyond production line, and networks, and are all
the scope of the current relationship or offers periodically reviewed and updated;
partnership with the cleared or sensitive
• Prior to receiving foreign visitors, ensure the
company during conferences, conventions,
facility and the personnel are prepared for the
exhibits, or tradeshows.
visit, including appropriate briefings, and submit
names of the visitors to DSS prior to the visit;
• Ensure employees attending conferences,
conventions, exhibits, or tradeshows know
what information they can share with potential
partners and clients, and are aware of their
reporting requirements regarding any suspicious
contacts;
• Cleared companies owned by foreign companies >> Common examples of reportable activity
should develop and implement appropriate are provided below, but many more exist:
foreign ownership, control or influence (FOCI)
mitigation procedures in consultation with DSS to • Foreign partners or clients improperly requesting
insulate sensitive information from unauthorized protected information under the auspices of an
foreign entities; existing business relationship
• Proactively engage with your designated DSS • Suspicious activity by foreign partner
representative on a regular basis and remain representatives during visits to cleared facilities
familiar with foreign collection trends and • Efforts by any individual, regardless of nationality,
reporting requirements. to obtain illegal or unauthorized access to
classified information or to compromise a
Reporting cleared employee

A foreign partner (current or prospective), client, Successful exploitation of business activity can have
or owner attempting to leverage a business a catastrophic impact on national security and
activity to obtain unauthorized access to classified have adverse business ramifications for the targeted
information to compromise a cleared employee company and its subsidiaries.
constitutes a suspicious contact, and is reportable
by cleared companies to DSS under the terms of the
NISPOM 1-302b. It is vital that suspicious incidents are promptly
and appropriately reported, including those
DSS annually produces an informative publication, involving foreign corporate partners or clients, to
Targeting U.S. Technologies: A Trend Analysis of the company’s facility security officer and, when
Cleared Industry Reporting. This document includes warranted, the DSS representative.
many examples of reporting trends and technological
issues of interest from foreign perspectives, which
lead to suspicious contacts.

Be Alert! Be Aware! Report suspicious activity to your local security official.


EXPLOITATION OF GLOBAL SUPPLY CHAIN
What is Exploitation of Global Supply Chain? chain risk as part of a comprehensive, defense-in-
breadth information security strategy.
Activities of foreign intelligence entities or other
adversarial attempts aimed at compromising and What are the Primary Methods of Exploitation?
or sabotaging the supply chain. Some examples
of supply chain exploitation may include, but are • Cyber operations
not limited to, the introduction of counterfeit or • Personal contact
malicious products or materials into the supply
chain to gain unauthorized access to protected • Phishing operations
data, to alter data, to disrupt operations, to • Academic and professional résumé submissions
interrupt communication, reverse engineer, or
otherwise cause disruption to the design, integrity,
Who is Being Targeted?
manufacturing, production, distribution, installation,
operation or maintenance of an equity.
Any cleared contractor supplying or installing
complete systems or components for DoD or other
A supply chain consists of a network of suppliers,
government agency’s systems, equipment, facilities,
manufacturers, developers, warehouses, distribution
or procurement programs.
centers, transportation vehicles, and wholesale or
retail outlets. The supply chain may be global and
• Acquisition and procurement: Personnel
also includes the designers, producers, shippers,
purchasing components to include
and resellers that create, distribute or in any other
microelectronics for use in the production or
way have the ability to influence the product.
maintenance of U.S. Government systems,
programs, or technology
Organizations should protect against supply chain
threats to the affected information system, system • Design, Manufacturing, and Assembly: Personnel
component, or information system service by with access to manufacturing lines or supply
employing a standardized process to address supply chain of U.S. Government programs, projects,
and systems
• Technicians: Personnel accessing U.S. protocol changes, parameter modifications, the Iindependent verification and validation
Government equipment or systems conducting wiring modifications, etc of microelectronics, and in particular
routine maintenance or incorporating new • During the sustainment phase, limited sources microelectronics obtained outside of authorized
components in existing systems/equipment for obsolescent components may lead to vendors (e.g., obsolete microelectronics).
manufacturers receiving nonconforming parts via
Why is it Effective? gray market suppliers >> Signs of a compromised supply chain may
include any of the following:
Successful exploitation of supply chain would How can you Recognize it?
allow foreign agents, or personnel acting on their • Exhibits functionality that was outside the original
behalf, to manipulate components intended for Exploitation of the global supply chain can occur at design
DoD systems, degrading DoD capabilities and any phase during the process. • A device, or multiple devices, from a lot, that
effectiveness during potential conflicts, or to gain exhibits a unique error or failure
access to sensitive information. • During design and manufacturing, personnel • Employees violating security protocols for
should use trusted and controlled distribution, handling of components, or introducing non-
Nonconforming components will not perform to delivery, and warehousing options.
specification and can include malicious logic compliant components
intended to degrade or destroy DoD systems and • During sustainment, personnel should also be • Dealers offering rare or out of production
could cause events ranging from injury, to loss of life, aware of signs of tampering with shipping components at low prices
to compromise of national security. containers, and establish protocols to include

• Nonconforming parts are often difficult to


identify compared to authentic components
• An actor with insider access could introduce
malicious changes or substitutions with a
nonconforming part during any phase,
increasing the difficulty in identifying potential
malfeasance
• During the design and manufacturing phases,
an actor could perform a series of malicious
changes, to include: Gate level changes, Be Alert! Be Aware! Report suspicious activity to your local security official.
• Ensure sub-contractor or off-site production
EXPLOITATION OF GLOBAL SUPPLY CHAIN facilities conduct effective supply chain risk
management

• Dealers offering short lead times for large orders • Establish and maintain an effective insider threat • Create incentives for suppliers who: implement
of components program required security safeguards, promote
transparency into their organizational process
• Shipping containers show signs of tampering • Train workforce to identify and promptly report and security practices, provide additional
suspicious activities vetting of the processes and security practices
Countermeasures of sub-suppliers, restrict purchases from specific
>> To mitigate the threat of counterfeit components: suppliers, and provide contract language
>> To mitigate tampering with components at the regarding the prohibition of uncompromised or
cleared facility during assembly and production: • Use available all-source intelligence analysis to counterfeit components
inform the tailoring of acquisition strategies, tools, • Always use independent verification and
• Ensure security protocols are in place and and methods validation for obsolete microelectronics and vet
adhered to for access to the facility, assembly • Integrate acquisition offices with other offices external testing houses;
and production lines, and networks including the information assurance and security • Consider lifetime buys for components to avoid
offices purchasing grey market nonconforming parts.
Reporting • Inadvertent or deliberate attempts to break a Successful exploitation of supply chain can have
trusted chain of custody a catastrophic impact. It is vital that personnel
The introduction of counterfeit or malicious • Introduction of counterfeit components into a promptly report suspected incidents to their facility
products or materials into the supply chain to gain U.S. Government system during production security officer or DSS representative.
unauthorized access to classified information,
to alter data, disrupt operations, or to interrupt • Unauthorized personnel of any nationality
communications related to classified contracts or accessing restricted areas of a cleared facility
cleared constitutes a “suspicious contact,” and is involved in the production of components for
reportable by cleared companies to DSS (NISPOM DoD systems
1-302b). • Efforts by any individual, regardless of nationality,
to compromise a cleared employee involved in
>> Examples of reportable activity include: manufacturing, assembling, or maintaining DoD
systems
• Devices that exhibit functionality that was
outside the original design
• A device, or multiple devices from a lot, that
exhibits a unique error or failure
Be Alert! Be Aware! Report suspicious activity to your local security official.
How can you Recognize it?
EXPLOITATION OF INSIDER ACCESS
Detecting potentially malicious behavior among
employees with access to classified or controlled
What is an Insider Threat? advances, they have the ability to sensitive information involves gathering information
cause more harm than ever before. from many sources and analyzing that information
Insiders: Any person with What used to take years to collect for clues or behaviors of concern. In most cases, co-
authorized access to any now takes minutes because of the workers admit they noticed questionable activities
government or contract resource increased use of removable media. but failed to report incidents because they did not
to include personnel, facilities, recognize the pattern and did not want to get
information, equipment, networks Insiders are often aware of your involved or cause problems for their co-workers.
or systems. This can include company’s vulnerabilities and
employees, former employees, can exploit that knowledge to A single indicator may say little; however, if taken
consultants, and anyone with their benefit. Not every suspicious together with other indicators, a pattern of behavior
access. circumstance or behavior may be evident.
represents an insider threat,
Insider Threat: The threat that but every situation needs to be Ignoring questionable behaviors can only increase
an insider will use his or her examined to determine potential the potential damage the insider can have on
access, wittingly or unwittingly, risk. national security or employee safety. While each
to do harm to the security of the insider threat may have different motivation, the
United States. This threat includes An insider can have a negative indicators are generally consistent.
damage to the United States through espionage, impact on national security and industry resulting in:
terrorism, unauthorized disclosure of national Potential Espionage Indicators
security information, or the loss or degradation • Loss or compromise of classified or controlled
of government, company, contract or program sensitive information • Repeated security violations and a general
information, resources, or capabilities. • Weapons systems cloned, destroyed, or disregard for security rules
countered • Failure to report overseas travel or contact with
Why is it Effective?
• Loss of technological superiority foreign nationals when required to do so
Insiders have arguably caused more damage • Economic loss • Seeking to gain higher clearance or expand
to the security of the United States than foreign access outside the job scope without bona fide
• Physical harm or loss of life
intelligence officers, and with today’s technological need for the access
• Engaging in classified conversations without a • Attempting to access classified information Reporting
need to know without authorization
• Attempting to enter areas not granted access • Obtaining access to sensitive information You are the first line of defense against insider
to inconsistent with present duty requirements threats. Help protect our national security by
reporting any suspicious behavior that may be
• Working hours inconsistent with job assignment • Questionable downloads related to an insider threat.
or unusual insistence on working in private • Unauthorized use of removable media
• Accessing information not needed for job Each employee has a responsibility to ensure the
protection of classified and controlled sensitive
>> Information Transmittal
information entrusted to them.
Behavioral Indicators*
• Using an unclassified medium to
Be aware of potential issues and
• Depression transmit classified materials
the actions of those around you
• Stress in personal life • Discussing classified materials and report suspicious behaviors and
• Exploitable behavior traits: on a non-secure telephone or in activities to your local security official.
nonsecure emails or text messages
-- Use of alcohol or drugs
• Removing the classification
-- Gambling markings from documents
• Financial trouble • Unnecessary copying of classified
• Prior disciplinary issues material

*These behaviors may also be indicative of potential >> Foreign Influence


workplace violence.
• Expressing loyalty to another country
Examples of Reportable Behaviors: • Concealing reportable foreign
travel or contact
>> Information Collection

• Keeping classified materials in an unauthorized


location (e.g., at home) Be Alert! Be Aware! Report suspicious activity to your local security official.
Why is it Effective?
PERSONAL CONTACT
Foreign intelligence officers are trained in elicitation
tactics; their job is to obtain protected information.
What is a Personal Contact? • Developers: Scientists, researchers, engineers Non-traditional collectors, such as business
researching and applying new materials or and academic contacts, will leverage existing
Person-to-person contact via any means where the methods to defense and other leading edge relationships to obtain restricted information outside
target is in direct or indirect contact with an agent or technologies the scope of the relationship. Because of this, not all
co-optee of the targeting entity. • Technicians: Engineers or specialists that operate, elicitation attempts are obvious to the target.
test, maintain, or repair targeted technologies
What are the Primary Methods of Exploitation? The trained elicitor and the non-traditional collectors
• Production personnel: Personnel with access
will try to exploit natural human tendencies, including:
This method of contact is associated with all methods to production lines or supply chain of targeted
of operation applied by foreign entities targeting technologies
• The desire to be polite and helpful, even to
cleared industry. Those with the highest risk include: • IT personnel: Systems administrators or others strangers or new acquaintances
with access to targeted facility networks and
• Exploitation of Commercial/Business Activities • The desire to appear well informed, especially
knowledge of network security protocols
about our profession
• Exploitation of Insider Access • Business development personnel: Marketing and
• The tendency to expand on a topic when given
• Exploitation of Security Protocols sales representatives
praise or encouragement; to show off
• RFI/Solicitation • Human resources personnel: HR representatives
• The tendency to correct others
with access to personnel records
• Exploitation of Relationships • The tendency to underestimate the value of the
• Facility personnel: Anyone with access to
• Search/Seizure information being sought or given, especially if
a cleared or sensitive facility containing
we are unfamiliar with how else that information
targeted information including security, clerical,
could be used
Who is Being Targeted? maintenance, and janitorial personnel
• The tendency to believe others are honest; a
Foreign collectors will target anyone with access to disinclination to be suspicious of others
the desired information, knowledge of information
systems, or security procedures. This includes but is
not limited to:
How can you Recognize it? Examples of reportable activity include:
Do not share anything the elicitor is not authorized to
The approach, both by trained intelligence know, including personal information about yourself, • Efforts by any individual, regardless of nationality,
professionals and non-traditional collectors, will your family, or your co-workers. to obtain illegal or unauthorized
usually be subtle. Some likely indicators of this method • access to sensitive or classified information or to
of contact include: compromise a cleared employee
If you believe someone is attempting to elicit
• Business contact requesting information information from you, you can: • All contacts with known or suspected intelligence
outside of the scope of contract, or through an officers from any country
increased or gradual progression of information • Change the topic • Any contact which suggests the employee
initiated from legitimately authorized business • Refer them to public websites concerned may be the target of an attempted
discussions exploitation by the intelligence services of
• Deflect the question
• Hidden or obscured end use or end user another country
information • Provide a vague answer
• Business contact requesting information outside
• Offer of paid attendance at an overseas • Explain that you don’t know the scope of established contracts/agreements
conference • Business or personal contact asking for
• Casual acquaintance appears to know more What to Report information about your co-workers
about your work or project than expected • Business or personal contact requesting you to
Personal contact is the vector for many intelligence
• A casual contact shows unusual interest in your violate a company policy or security procedures
methods of operation which constitute “suspicious
work, facility, personnel, or family details contact,” and are reportable by cleared companies
to DSS (NISPOM 1-302b), and should be promptly Because elicitation can be subtle or requests from
Countermeasures reported. personal contacts may seem innocuous, you should
report any suspicious conversations to your facility
In the event you believe a personal contact has security officer or DSS representative.
requested restricted information or attempts to place
you into an exploitable situation, be prepared and
know how to respond. Know what information you
cannot share and be suspicious of those who seek
such information. Be Alert! Be Aware! Report suspicious activity to your local security official.
FOREIGN VISITS
What is the Foreign Visit Method of Contact? relationships to gain access to protected
information
International visitors are common in today’s global • Request for Information (RFI)/Solicitation: Direct
economy and often results in increased business. or indirect attempts to collect protected
Although most visitors are there on legitimate information by asking, petitioning or requesting
business, cleared contractors need to be of the host.
aware that there are potential vulnerabilities
related to these visits. • Exploitation of Commercial/Business
Activities: Attempts to establish a
Foreign delegation visits to cleared commercial relationship via joint ventures,
contractor facilities are one of the most partnerships, mergers and acquisitions,
frequently used approaches to target foreign military sales or service provider
and attempt to gain access to sensitive or leverage an existing commercial
and classified information resident in cleared relationship in order to obtain access to
industry. protected information, technology or persons

• Divide and Conquer: Visitors corner an escort


What are the Primary Methods of Exploitation? How Can You Recognize It?
away from the group and attempt to discuss
unapproved topics in order to deprive the
>> Foreign collectors’ most common methods of • Peppering: Visitors ask a variation of the same
escort of his safety net of assistance in answering
operation associated with foreign visits include: question or one visitor asks the same question to
questions
multiple U.S. contractor employees
• Violation of Security Protocols: Attempts by • Switch Visitors: Delegations may add a new
• Wandering Visitor: The visitor uses the distraction
visitors/unauthorized individuals to circumvent or visitor to the group at the last minute, leaving
provided by a large delegation to slip away, out
disregard security procedures that may indicate little or no time for the company to vet the
of the control of the escort. Once away from the
a risk to protected information, technology or new visitor against community lists of known
escort, the visitor may attempt to gain access to a
persons Exploitation of Relationships: Attempts intelligence officers
restricted area, sensitive or classified documents,
to leverage existing personal or authorized • Bait and Switch: The visitors say they are coming
or unattended and unlocked information systems
to discuss one business topic, but after they arrive
they attempt to discuss the cleared contractor’s
other projects, often dealing with sensitive or
classified information
• Distraught Visitor: When the visitor’s questions are
not answered, he/she acts insulted or creates
an uncomfortable scene to psychologically
coerce information from the target
• Conduct a pre-visit walkthrough of the facility Even if an appropriate authority grants a foreign visitor
• Use of Prohibited Electronics: The visitors bring
to ensure visitors will not be able to hear or see access to classified U.S. information, that visitor is not
unauthorized electronic devices such as cell
sensitive or classified information during all areas entitled to classified information unless he/she has
phones, cameras, or thumb drives into restricted
of their visit; mitigate areas of concern cleared need to know that has been communicated
space
and verified in advance of the visit.
• Train escorts on detecting suspicious behavior
Countermeasures* and questions; maintain visual contact with
Inform your DSS representative of proposed foreign
visitors at all times
visitors. Given adequate time, they can assist
*For additional information, see NISPOM, Chapter • After the visit, debrief the hosting representatives with identifying risks to the cleared company, its
10, Section 5 and all escorts to identify any strange and/or technology, and its personnel.
suspicious activities exhibited by their visitors or
• Prior to the visit, brief all escorts and personnel unusual or probing questions If any suspicious incidents occur during the visit,
working with the delegation on what they can immediately report them to your facility security
and cannot discuss, and limit the scope of all officer or DSS representative.
The Take-Away
discussions to the legitimate business at hand
• Develop standard, acceptable responses to Any line of questioning concerning military or
questions that may arise, especially if the projects intelligence-based contracts or dual-use technology,
are sensitive or classified, are not applicable to unless previously approved, should be viewed as
the visit, or include proprietary information suspicious behavior.
• Submit the names of the visitors to DSS prior to
the visit as far in advance as feasible; provide
updates as necessary Be Alert! Be Aware! Report suspicious activity to your local security official.
ACADEMIC SOLICITATION
What is Academic Solicitation? legitimate research offers access to developing
technologies and cutting-edge research. Any such
Academic solicitation is one of the fastest growing placement and information learned would not
methods of operation reported by cleared only satisfy the collectors’ immediate technological
contractors. The number of foreign academics requirements, but also result in better educated
requesting to work with classified programs continues scientists and researchers for indigenous technology
to rise, and the academic community will likely remain development.
a top target for the foreseeable future.
Most of these contacts are likely legitimate. However,
DSS defines academic solicitation as the use of some foreign academics may ultimately take
students, professors, scientists or researchers as advantage of their placement and access to further • Researchers and scientists conducting classified
collectors improperly attempting to obtain sensitive national research and development goals. In such research on behalf of a U.S. Government
or classified information. These attempts can include cases, foreign nationals studying under or regularly customer
requests for, or arrangement of, peer or scientific interacting with cleared employees engaged in
board reviews of academic papers or presentations; classified research and development pose a threat • Researchers, scientists, and subject matter
requests to study or consult with faculty members; to U.S. government sponsored basic and applied experts employed at cleared components of
requests for and access to software and dual- research. academic institutions
use technology; or applications for admission into • Researchers, scientists, and subject matter
academic institutions, departments, majors, or It is imperative for academics to be familiar with, and experts with unclassified work published in
programs, as faculty members, students, fellows, or comply with, the laws, regulations and procedures scientific or technical journals or presented at
employees. governing the restrictions on sharing classified, or science conferences
export-controlled, technologies and information with
Foreign intelligence entities exploit unsuspecting foreign students or academics.
professors and researchers to gain access to sensitive What are they After?
or classified information and technology. Who is Being Targeted?
• Classified, sensitive, or export-restricted basic
Placing academics at, and requesting to collaborate • Subject matter experts teaching technical courses and applied research
with, U.S. research institutions under the guise of • Developing defense or dual-use technologies
• Information about the students, professors, and • It is often difficult to discern the legitimate contacts • Intelligence entities will send subject matter
researchers working on the technologies from those that represent nefarious attempts to expert requests to review research papers, in
gain access to sensitive or classified information or hopes the expert will correct any mistakes
Why is it Effective? technology
What to Report
Academic solicitation is an effective way of Common Scenarios
collecting information due to the collaborative Any contact (i.e., emails, telephone, personal
nature of the academic community. • Foreign students accepted to a U.S. university or contact) that is suspicious because of the manner
at postgraduate research programs are recruited or subject matter of the request. This may include
• U.S. universities and research institutions by their home country to collect information, and requests from U.S. persons, or from foreign nationals
regularly host foreign students to help cultivate may be offered state-sponsored scholarships as located in the United States or abroad, and may
their technical abilities without realizing that an incentive for their collection efforts consist of:
this free-flowing exchange of information can
• U.S. researchers receive requests to provide dual- • Unsolicited applications or requests for
place the U.S. technological infrastructure at
use components under the guise of academic undergraduate, graduate, postgraduate or
risk. Home countries can exploit their student’s
research other research positions
access to supplement intelligence collection
efforts against emerging U.S. DoD and civilian • U.S. researchers receive unsolicited emails from
technical research. peers in their academic field soliciting assistance • Unsolicited requests for access to research
on fundamental and developing research papers or other research-related publications
• U.S. researchers that receive unsolicited requests or documents
to review scientific publications readily provide • U.S. professors or researchers are invited to attend
feedback with the hopes of reviewing the resulting or submit a paper for an international conference • Unsolicited requests for assistance with or
findings. However, any feedback provided may review of thesis papers, draft publications or
• Overqualified candidates seeking to work in
confirm or refute scientific hypotheses. other research-related documents
cleared laboratories as interns
• Foreign intelligence entities use foreign students • Candidates seeking to work in cleared • Unsolicited invitations to attend and/or present
who are already knowledgeable about targeted laboratories whose work is incompatible with the at international conferences
academic fields to collect requesting individual’s field of research

• Foreign students and professors target U.S. students


and researchers who are knowledgeable in the
desired field
Be Alert! Be Aware! Report suspicious activity to your local security official.
FOREIGN TRAVEL VULNERABILITY
Foreign Travel What are the primary methods of exploitation?

You can be the target of a foreign intelligence Overseas travelers are most vulnerable during
or security service at any time and in any place; transit. Travelers should be wary of extensive
however, the risk is greater when you travel overseas. questioning from airport security, luggage searches,
When overseas, foreign intelligence services have and downloading of information from computers
better access to you, and their actions are not and personal electronic devices.
restricted within their own country’s borders.
Travelers should maintain heightened awareness
While traveling overseas, any information once they reach their destination. Many hotel
electronically transmitted over wires or airwaves rooms overseas are under surveillance. In countries
is vulnerable to foreign intelligence services’ with very active intelligence/security services,
interception and exploitation. Suspicious entities everything foreign travelers do (including inside their
can easily intercept voice, fax, cellular, data, and hotel room) may be monitored and recorded.
video signals.
Entities can analyze their recorded observations
Many countries have sophisticated eavesdropping/ for collecting information or exploiting personal >> Collection Techniques Travelers Should Be
intercept technology and are capable of collecting vulnerabilities. This information is useful for future Wary of:
information we want to protect, especially targeting and recruitment approaches.
overseas. Numerous foreign intelligence services • Bugged hotel rooms or airline cabins (including
target telephone and fax transmissions. Another favored tactic for industrial spies is to attend video surveillance)
tradeshows and conferences. This environment
Your diligence determines whether or not our allows them to ask questions, including questions • Intercepts of fax and email transmissions
sensitive information is protected from unauthorized that might seem more suspect in a different • Recording of telephone calls or conversations
disclosure. environment.
• Unauthorized access and downloading,
including outright theft of hardware and software
• Installation of malicious software on computers or • Use temporary email addresses not associated
personal electronic devices with your company
• Intrusions into or searches of hotel rooms, • Perform a comprehensive anti-virus scan on all
briefcases, luggage, etc. electronic devices prior to departure and upon
• Recruitment or substitution of flight attendants return

• Individuals appearing to try and eaves-drop on • Encrypt data, hard drives, and storage devices
your conversations whenever possible

• Individuals attempting to read your computer • Use complex passwords • Limit sensitive discussions; public areas are rarely
screen or documents over your shoulder suitable for discussion of sensitive information
• Enable login credentials on laptops and devices
• Do not use computer or fax equipment at foreign
Countermeasures • Do not publicize travel plans and limit sharing of hotels or business centers for sensitive matters
this information to people who need to know • Ignore or deflect intrusive or suspicious inquiries
• Leave unneeded electronic devices at home or conversations about professional or personal
• Do not post pictures or mention you are on travel
• Use designated travel laptops that contain no on social media until your return matters
sensitive or exploitable information • Keep unwanted sensitive material until it can be
• Attend pre-travel security briefings disposed of securely
• Maintain control of sensitive information, media, • Attend post-travel debriefing and report any and
and equipment. Pack them in your carry-on all suspicious activity
luggage and maintain control of them at all
times. Do not leave them unattended in hotel
rooms or stored in hotel safes
• Keep hotel room doors locked. Note how the
room looks when you leave compared to when
you return

Be Alert! Be Aware! Report suspicious activity to your local security official.


CONFERENCES, CONVENTIONS & TRADESHOWS
What is the Conference, Conventions, or Tradeshows What are the Primary Methods of Exploitation?
Method of Contact?
• Exploitation of Commercial/Business Activities
Contact initiated by a foreign intelligence entity, • Exploitation of Insider Access
or on behalf of one, during an event such as a
conference, convention, exhibition or tradeshow. • Exploitation of Security Protocols
• RFI/Solicitation
Foreign intelligence officers or non-traditional
• Exploitation of Experts
collectors may use this contact method for
exploitation of commercial/business activities, RFI/ • Theft
solicitation, exploitation of experts or persons with • Exploitation of Relationships
access, attempted acquisition of technology, and
theft to obtain targeted information or technologies. • Surveillance

Foreign collectors use many methods to gather Who is Being Targeted?


information on current and emerging U.S. technology.
They may pose as potential customers, attendees, Foreign collectors will target anyone with access to the
exhibitors, or scientists, and even as a representative targeted information and technology, or are subject
of a nation other than their own. Collectors may matter experts in sought after research/technology.
attempt to directly ask about sensitive or classified
information or try to elicit information during casual
conversation during and after official events.
What do they Want? Why is it Effective?

• Information, technical specifications, and pictures Conferences, conventions, or tradeshows host a wide
of the systems displayed at booths array of presenters, vendors, and attendees, which
• Exploitable information about both cleared and provide a permissive environment for traditional
uncleared employees and non-traditional collectors to question vendors,
develop business/social relationships, access actual
• Information about which cleared and uncleared or mockups of targeted technology, interact with
employees have access to technologies of subject matter experts. Foreign intelligence officers
interest use these occasions to spot and assess individuals
• Personal information about cleared and for potential recruitment. They frequently use charm
uncleared individuals, including hobbies, family and/or potential business incentives to attempt to
information, and interests. This information can be soften their target.
used to either exploit or build a relationship with
the individual at a later date
• Personal or professional information that can be
used as a pretext for ongoing or future contact

Be Alert! Be Aware! Report suspicious activity to your local security official.


Countermeasures
CONFERENCES, CONVENTIONS & TRADESHOWS
• Attend annual CI awareness training

One aspect of this method of contact is foreign Traditional intelligence officers will apply elicitation • Attend security briefings and de-briefings
travel related to the event. During travel, attendees techniques to subtly extract information about you, • Create a plan to protect any classified or
are subject to search and seizure of documents and your work, or your colleagues. You may experience controlled sensitive technology or information
electronic devices by host or transit nation security the following elicitation techniques while attending brought overseas and consider whether
personnel, as well as surveillance at the venue, while conferences, conventions, and tradeshows: equipment or software can be adequately
socializing, and while resident intheir hotels. protected
• Detailed and probing questions about specific
• Request a threat assessment from the program
How can you Recognize it? technology
office and your local DSS representative prior
• Overt questions about sensitive or classified to traveling to a conference, convention, or
At the conferences, conventions, or tradeshows you information tradeshow
may witness:
• Casual questions directed at individual • Do not publicize travel plans; limit sharing of this
• Attempts to steal actual or mockups of employees regarding personal information that information to people who need to know
technologies on display collectors can use to target them later
• Maintain control of classified or sensitive
• Attempts to access your electronic devices – • Prompting employees to discuss their duties, information and equipment
laptop, smartphones, etc access, or clearance level
• Immediately report suspicious activity to the
• Photography of displays, especially when appropriate authorities at the event and your
photography is explicitly prohibited facility security officer
• Requesting information from you beyond the • Do not post pictures or mention you are on travel
scope of the conference on social media
• Individual requesting same information from • Retain unwanted sensitive material pending
different personnel at your booth proper disposal
• Do not use foreign computers or fax machines,
and limit sensitive discussions
What to Report • Strangers trying to establish personal relationships
outside work parameters
• Offers to you to act as a foreign sales agent • Unusual or suspicious attempts at ongoing
• Attempts to steer conversations toward your contact, including sending a follow-up email
job duties or access to sensitive information or upon your return to the office
technology • Multiple individuals simultaneously asking
• Insistent questioning outside the scope of what questions, attempting to get you to reveal more
you’re cleared to discuss in an unclassified than you should
environment • Theft of or missing items from your booth/display
• Taking excessive photographs, especially in
areas that prohibit photography Immediately notify your facility security officer if
• Individuals returning to the same booth multiple you observe any of the above behaviors or believe
times in an attempt to speak with different you were targeted by an individual attempting to
cleared employees working the booth obtain illegal or unauthorized access to classified
information.

Be Alert! Be Aware! Report suspicious activity to your local security official.


a backdoor connection to the target system – may
CYBER THREATS allow for persistence.

Command and Control: The malware will


Why Are You a Target? • Administrative and user credentials (usernames, communicate to a controller server to send or receive
passwords, tokens, etc.) instructions from the foreign intelligence entity.
• Publicly available information helps foreign • Foreign intelligence entities seek the aggregate
intelligence entities identify people with of unclassified or proprietary documents which Actions on the Objective: After completing the
placement and access. could paint a classified picture above actions, the foreign intelligence entity can
– Contract information (bid, proposal, award fulfill their requirements. Intelligence requirements
or strategies) How Do They Compromise Networks, Systems, and can range from exfiltration, using the system as
– Company website with technical and program Technical Data? a strategic position to compromise additional
information systems within the targeted network (hop-point), or
Reconnaissance: Research phase used to identify sabotaging the system and network.
– Connections (partnerships, key suppliers, joint
and select targets by browsing websites to obtain
ventures, etc.) with other cleared or non-
names, emails, business and social relationships, and Countermeasures
cleared companies
technical information.
• Employee association with companies or >> Employees
technologies made public through scientific Weaponization: The foreign intelligence entities
journals, academia, public speaking assemble the payload and wrapper, such as • Remember that everyone is a potential target
engagements, social networking sites, etc. coupling a remote access exploit with a prepared
• Use complex passwords, change them regularly,
spear-phishing email.
and don’t reuse
What Do They Target?
Delivery: The foreign intelligence entity infects • Be wary when connecting with unknown
• Company unclassified networks (internal and the target, most commonly using email, website individuals on social networking sites
extranets), partner and community portals, and hijacking, or removable media (through insiders).
• Spear-phishing can happen on any account,
commonly accessed websites including personal email accounts
Exploitation: Successful compromise of targeted
• Proprietary information (business strategy, vulnerability to allow malicious code to be run. – Do not open emails, attachments, or click
financial, human resource, email, and product links from unfamiliar sources, even if they look
data) Installation: Executed malicious code inserts official
• Export-controlled technology malware, such as a Remote Access Trojan or opens
>> IT Department & Management What to Report • Unauthorized email traffic to foreign destinations
• Use of DoD account credentials by unauthorized
• Train all personnel on: • Advanced techniques and/or advance evasion parties
techniques, which imply a sophisticated adversary
– Spotting a spear phishing, phishing, or • Unexplained storage of encrypted data
whaling email attempt • Password cracking, key logging, encryption,
steganography, privilege escalation, and account • Network spillage incidents or information
– Social networking site connections
masquerading compromise
– Proper cyber security procedures and
• Pre-intrusion aggressive port scanning • Unauthorized transmissions of classified or
concerns
• Social engineering, electronic elicitation, email controlled unclassified information
• Implement defense-in-depth: a layered defense spoofing, spear phishing, whale phishing, or • Any cyber activity linked to suspicious indicators
strategy that includes technical, organizational, direct questioning, such as through social provided by DSS, or by any other cyber centers
and operational controls networking sites and government agencies
• Implement technical defenses: firewalls, intrusion • Unauthorized network access
Reportable activities are not just limited to those
detection systems, internet content filtering, and • Actual or attempted unauthorized access into U.S. activities that occur on classified information systems.
a DNS proxy automated information systems Industrial Security Letter 2013-05 (which NISPOM
• Update your anti-virus software daily and • Tampering with or introducing unauthorized paragraph 1-301) instructs cleared U.S. companies
download vendor security patches for all elements into information systems that they must report activities that otherwise meet the
software • Unexplained user accounts, administrator threshold for reporting, including activities that may
accounts, and expansion of network privileges have occurred on unclassified information systems.
• Do not use manufacturers’ default passwords on
software or hardware • Data exfiltrated to unauthorized domains affecting NISPOM paragraph 1-302b reminds cleared U.S.
classified information, systems or cleared individuals companies that they “shall report efforts by any
• Monitor, log, analyze and report attempted
and successful intrusions to your systems and • Malicious codes or blended threats such as viruses, individual, regardless of nationality, to obtain illegal
networks – even unsuccessful intrusions present a worms, trojans, logic bombs, malware, spyware, or unauthorized access to classified information or
counterintelligence value! or browser hijackers, especially those used for to compromise a cleared employee.
clandestine data exfiltration
• Maintain open communication between
company counterintelligence and network
defense personnel. Defense only is not a
comprehensive strategy
Be Alert! Be Aware! Report suspicious activity to your local security official.
CI
Defense Security Service

COUNTERINTELLIGENCE
www.dss.mil

National Counterintelligence
and Security Center
https://www.dni.gov/index.php/ncsc-home

You might also like