Presentation is loading. Please wait.

Presentation is loading. Please wait.

Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.

Similar presentations


Presentation on theme: "Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain."— Presentation transcript:

1 Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain Summit 09 December 2014 Classification

2 Director of National Intelligence
Classification Director of National Intelligence 2 Classification

3 Risk = ƒ ( cost, schedule, performance)
Classification Assessing Risk Risk = ƒ ( cost, schedule, performance) Security Integrity Defense Science Board Task Force Report Resilient Military Systems and the Advanced Cyber Threat 25Feb2013 Risk = ƒ ( threat, vulnerability, consequence) 3 Classification

4 Classification Threat Model Nation-State Corporate & Organized Crime / Non-State Individual / Hacktivist Advanced Persistent Threats Defense Science Board Task Force Report Resilient Military Systems and the Advanced Cyber Threat 25Feb2013 $K $M $B Proliferation of cheap, readily available, and effective Cyber Network Operation tools increasingly gives less capable actors the means to conduct cyber attacks. 4 Classification

5 Adversaries Need Not Look Foreign
Classification Adversaries Need Not Look Foreign Global US Temporary Workers & Visitors Recruited Citizens Recruited Work & Student Visas Subsidiaries False Flags Overseas Suppliers & End Users Multinationals Front Companies 5 Classification

6 Things Are Not Always What They Seem…
Classification Things Are Not Always What They Seem… Observable behavior of Multinational Firm Nefarious Intent … ? … or Business as Usual? Tries to purchase US firms, create joint ventures Seeking intellectual property for intelligence activities Secure market share, distribution, and access to technology and IP Conduct business intelligence on competition Acts as intelligence agents for foreign government Plans and intentions of rivals; limitations of competing products Access to systems or networks after equipment or software install Foreign government access for collection, exploitation, and disruption Retain access to customer systems for service, maintenance, and license compliance monitoring Fills key overseas positions with individuals of specific nationality Vetted trusted insiders can facilitate intelligence activities Executives with strong ties to firm to protect IP and business interests Uses financial structure that is complex with limited transparency Conceals financials to appear independent and fiscally sound Global variation in taxes incentivize complex financial structures; privately held firms limit details Seeks contracts to supply US government Firm may be trying to supply subverted products US government is a large customer of products and services Classification

7 Classification Collaboration The U.S. National Security Community is deeply concerned about the integrity of supply chains. We have more than enough evidence to know the threat is real and dangerous, but we will inevitably have difficulty predicting targets and assessing impacts. Supply chain security is a group effort; government and industry must identify threats and implement countermeasures. 7 Classification

8 Classification QUESTIONS? 8 Classification


Download ppt "Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain."

Similar presentations


Ads by Google