Counterintelligence Program
Total Page:16
File Type:pdf, Size:1020Kb
Counterintelligence Program Lockheed Martin Aeronautics Blink Today…Gone Tomorrow J. Kuhnell Counterintelligence Program Manager 1 Overview • Counterintelligence mission vs. Cowgirl mission • Lockheed Martin Aeronautics CI Program • Analogy … Education On More Than Just the Obvious • Aeronautics CI Education Pillar • What is Counterintelligence? • Perspective Change • What Are The Threats? • Foreign Intelligence Service (FIS) Recruitment Cycle • Insider Threat • External Threat • Foreign Visits • Counterintelligence THEN • Classified Vs. Proprietary • Counterintelligence NOW • Trends • Suspicious Contact Reports (SCR) & The Value of Reporting • Conclusion 2 What is Counterintelligence to me? 3 AERO CI PROGRAM Education & Compliance Investigations Assessment & Analysis External Agency Collaboration The Four Pillars 4 Analogy Your task is to move a single line so that the below false arithmetic statement becomes true IV = III + III 5 Analogy Did you get it right? In this example you would move the first Roman Numeral I to the right side of the numeral V so that it reads VI=III+III. VI = III + III 6 The Point – Employees may be able to correctly identify their company is a target because it requires a fairly obvious approach. IV = III + III VI = III + III 7 A Much More Challenging Equation to Fix Again, the task is to move a single line so that the below false arithmetic statement becomes true III = III + III 8 Reason this is so difficult Did you get it right? III = III +Not soIII easy this time. III = III = III People are not used to thinking about the operator in an equation, they fix their attention and restrict it to the obvious 9 The Point: A Much More Challenging Equation to Fix – Many employees may not be able to correctly identify they are a target because of a “not so obvious” approach III = III = III 10 Our Challenging Equation “1 in 1,000 persons in a position of trust are eligible targets for recruitment” Bruce Held, Director of Intelligence and Counterintelligence for the Department of Energy and 25 year CIA veteran Education: Consider the Operator What’s the Chance that an employee will file a SCR? No one can say for sure, however, a prepared mind increases that chance. Our Mission: Prepare LM Minds to pay attention to and REPORT the “not so obvious”. “Chance favors the prepared mind” Louis Pasteur 12 Education Pillar • Education: – Protect Our Technology – External & Internal Threats – Why it is important to report (SCR’s) • Don’t restrict your observations to the obvious 13 What is Counterintelligence? • Counterintelligence (CI) is information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons, or their agents, or international terrorist organizations or activities. Executive Order 12333 • Simply stated: CI is about identifying the threats and developing mitigation strategies to address those threats. 14 Perspective Change “Espionage used to be a problem for the FBI, CIA and military, but now it's a problem for corporations…” Joel Brenner, ODNI, 2008 Government Private Industry Corporate proprietary, Classified information intellectual property, pre-classified research US technological edge and National Security financial prosperity Foreign Nations Industry Competition 15 Courtesy of Washington Post, April 2008 What Are The Threats? • Insider Threat – Employees with access to information • Acting on behalf of FIS • Acting in furtherance of self interests • External Threat – Foreign Intelligence Service (FIS) – Foreign and Domestic Industry Competitors – Criminal and Terrorist Organizations 16 FIS Recruitment Cycle Bruce Held, Former CIA SPOTTING TERMINATION ASSESSING HANDLING RECRUITMENT 17 18 Insider Threat What causes someone to commit espionage? • Divided Loyalty – (Camp of The Enemy) • Disgruntled – (Wanting Revenge) • Ego – (Bragging about What You Know) • Financial Gain – (Money) “I was angry all the time…I had an overwhelming need to lash out (at the FBI)…and strike out…I wanted to hurt them.” Earl Pitts, FBI Agent “I am an American citizen, but I strongly feel that I am still a Korean. While carrying out classified work for the US government, I was not able to shake off that feeling.” Robert Kim, US Navy Analyst 19 Courtesy of CI CENTRE and SPYPEDIA Insider Threat Successful Insider Threat Detection Program MUST be proactive! • Education – “Get Smarter” NCIX – “Betrayed” FBI – The Hunch – Presentations – Posters and Hand-outs • Information Assurance • Security • YOU 20 Courtesy of FBI.gov and NCIX.gov External: What Are the Methods? • Direct requests for information • Suspicious work offers • Exploitation of joint ventures and/or research • Acquisition of technology and/or companies • Co-opting of former employees • Soliciting employment 21 External: What Are the Methods? • Targeting cultural commonalities • Recruitment of third parties • Electronic surveillance • Searches of hotel rooms and/or luggage • “Honey pot” scheme • Inappropriate conduct during facility visits 22 Foreign Visits • Suspicious Indicators – Last minute additions or changes to visit party – An agenda different than stated purpose – “Wandering” visitors – Asking questions outside the scope of the visit – Visitors accompanied by embassy officials who attempt to conceal identity during commercial visit 23 Counterintelligence THEN... • Focus primarily on US Classified information – penetrations of Intelligence Community and DoD • Emphasis on military technologies • Lengthy recruitment and vetting periods • Heavy reliance on volunteers • Difficulty in moving documents “I took a huge document and another huge document with me, went across the hall into an unsecured room, laid the documents out on the table, and had my camera ready, and started photographing...” Jeff Carney, USAF, spy for Germany 1982-1991 24 Courtesy of CI CENTRE and SPYPEDIA Classified vs. Proprietary • Classified information has always been a highly sought-after target for adversaries and must be properly safeguarded • We CANNOT discount the appeal of proprietary information and the implications if compromised “US intelligence officials put the cost of lost sales due to illicit appropriation of technology and business ideas at between $100 billion and $250 billion a year.” Financial Times, January 2011 25 Jeffrey Carney (“Cincinnati Kid”) • Air Force Linguist; stationed in West Berlin • Held a TOP SECRET/SCI security clearance • Spied for East Germany 1982-1989 • Wanted to defect; was convinced to spy instead • Motivated by disgruntlement with U.S • Passed originals and copies of classified documents to Stasi (German Ministry for State Security) • Information passed was used for East German and Soviet military superiority 26 Courtesy of CI CENTRE and SPYPEDIA and Hanford DOE.gov Counterintelligence NOW... • Focus has expanded to Corporate America’s proprietary information, pre-classified research • Internet and social media dramatically cut down on recruitment cycle • Expansion of adversaries’ methods • Advancements in technology aid in ease of moving data "Economic espionage is intensifying. The foreign intelligence services of China, Russia, Iran and other countries are after our technology, and most of what they want is in the electronic-information systems of private companies -- and the law and accounting firms that work for them.” Joel Brenner, former National Counterintelligence Executive, 2011 27 Courtesy of Bloomberg.com February 2011 Tze Chao • DuPont Scientist for 36 years • No security clearance / gov’t affiliation • March 2012, pleaded guilty to conspiracy to commit economic espionage • Motivated by Chinese loyalty • Sold DuPont trade secrets to a Chinese state-run company • Global titanium dioxide market valued at 12 billion “Pangang Group employees, in asking me to provide DuPont trade secrets to them, overtly appealed to my Chinese ethnicity and asked me to work for the good of the PRC'' 28 Courtesy of US Justice Department February 8, 2012, public release and CI CENTRE and SPYPEDIA Upward Trend in Economic Espionage Economic Espionage Arrests 1995-2011 20 18 16 14 12 10 8 6 4 2 0 29 Courtesy of CI CENTRE and SPYPEDIA Courtesy of CI CENTRE and SPYPEDIA andCENTRE CI of Courtesy Overall Espionage Activity... Overall Espionage 35 40 10 15 20 25 30 0 5 1945 1947 1949 1951 Individuals ChargedinEspionage 1953 1955 1957 1959 1961 1963 1965 Activities 1967 1969 1971 1973 1975 1945 1977 1979 1981 - 1983 2011 1985 1987 1989 1991 - Related 1993 1995 1997 1999 2001 2003 2005 2007 2009 2011 30 ...and Related Employment Status Employment Status DoE INS DoJ NATO Journalist OSS DoD DIA Marines University Employee NSA FBI State CIA Air Force Contractor Army Navy Foreign National Civilian 0 50 100 150 200 31 Courtesy of CI CENTRE and SPYPEDIA Overall Upward Trend 22.2% of all Espionage arrests in the past 66 years have occurred in the LAST 4 YEARS! 32 Courtesy of CI CENTRE and SPYPEDIA Suspicious Contact Reports • Official documentation of contact with an employee: – By any individual • to obtain unauthorized access to sensitive information (LMPI, PII, classified) • or to compromise the employee... – By • a known or suspected intelligence officer from any country • or by a representative of a foreign or domestic industry competitor... – Which suggests an employee may be the target of an attempted exploitation or recruitment by the intelligence services of another country, or by an industry