Presentation is loading. Please wait.

Presentation is loading. Please wait.

FBI Counterintelligence Domain Program Briefing – Dallas, Texas.

Similar presentations


Presentation on theme: "FBI Counterintelligence Domain Program Briefing – Dallas, Texas."— Presentation transcript:

1 FBI Counterintelligence Domain Program Briefing – Dallas, Texas

2 History/Evolution of the Program DECCA DECCA –Developing Espionage and Counterintelligence Awareness ANSIR ANSIR –Awareness of National Security Issues and Response DOMAIN DOMAIN

3 Technology Development Life Cycle Time-Line End of Acquisition Life Technology Development System Fielding Operational Use System Manufacture System Test/Design Military Value of Information Low High Fundamental Research Classified/SAP Information INFORMAT ION AVAILABILITY Concept Exploration System Demonstration = = Foreign Military Sales Rapid Prototype Universities Labs & Centers Contractors Technology Lifecycle and Counterintelligence Exposure

4 Major Strategy Elements Supported By Domain Program Change Behaviors Change Behaviors –Of most serious foreign threats –Of exploited individuals/institutions Reduce Opportunities Reduce Opportunities –Of adversaries to collect intelligence and conduct operations Band Field Offices/Partners Together Band Field Offices/Partners Together –To devise and implement joint operational plans that cross boundaries Transformation to Proactive Program Transformation to Proactive Program –Pursue foreign positive intelligence collection effort

5 Changing Counterintelligence (CI) Paradigm Shift from reactive to proactive operations Shift from reactive to proactive operations Acknowledgement of new business realities ( “ The World is Flat ” ) Acknowledgement of new business realities ( “ The World is Flat ” ) Development and advocacy of risk mitigation strategies vs. threat avoidance Development and advocacy of risk mitigation strategies vs. threat avoidance Pushing counterintelligence awareness out to the business/academic community Pushing counterintelligence awareness out to the business/academic community Leveraging resources to mutual advantage Leveraging resources to mutual advantage

6 Holistic Approach to CI Risk Management Insure that all facets of security (physical, IT, personnel) are aware of counterintelligence issues and incorporate risk detection and mitigation into cohesive business strategy. Insure that all facets of security (physical, IT, personnel) are aware of counterintelligence issues and incorporate risk detection and mitigation into cohesive business strategy. Partnership between USIC and Private Sector to leverage resources to maximum benefit of nation. Partnership between USIC and Private Sector to leverage resources to maximum benefit of nation.

7 Pitching Partnership Emphasis on Confluence of Interest Emphasis on Confluence of Interest –CI protection = IPR/Research protection Leveraging finite resources Leveraging finite resources –Recognition that we are all short-handed Encouraging ongoing communication Encouraging ongoing communication Building confidence/trust Building confidence/trust –Subject matter competence –No threat posture –Confidentiality

8 CI Domain Program Initiatives Critical National Assets/Domain Equities Critical National Assets/Domain Equities Business Alliance Business Alliance Academic Alliance Academic Alliance CI Working Groups CI Working Groups Program Review Process Program Review Process

9 Business Alliance FBI-led programmatic outreach to Defense Industry (w/ DoD partnership) FBI-led programmatic outreach to Defense Industry (w/ DoD partnership) –Executive level engagement CI and Business confidence-building CI and Business confidence-building Seeking strategic shift Seeking strategic shift Corporate volunteerism to change Corporate volunteerism to change Due-diligence Due-diligence Compel self-governance Compel self-governance –Self-assessment tool/assistance CI General Dynamics Raytheon Lockheed Martin Boeing Northrop Grumman L3 Communications BAE Systems “Better to know than not know…”

10 What is the RTP SIG? RTP = Research and Technology Protection RTP = Research and Technology Protection SIG = Special Interest Group SIG = Special Interest Group The RTP SIG is a tool for Domain Coordinators to use to provide information to their Domain representatives The RTP SIG is a tool for Domain Coordinators to use to provide information to their Domain representativeshttp://www.infragard.net

11 What is the RTP Special Interest Group? The RTP SIG is a tool the FBI utilizes to provide information to cleared Defense Contractors, private industry and academia. Domain Coordinators are your local FBI contacts. The RTP SIG is a tool the FBI utilizes to provide information to cleared Defense Contractors, private industry and academia. Domain Coordinators are your local FBI contacts. –Mission: to provide actionable and relevant information to cleared defense contractors, private industry and academia to better enable them to protect their research and technology.

12 Why we need the RTP SIG To provide information to the targets of foreign intelligence services and economic espionage that will help them become a tougher target. To provide information to the targets of foreign intelligence services and economic espionage that will help them become a tougher target. To increase reporting of Counterintelligence events. To increase reporting of Counterintelligence events.

13 InfraGard RTP SIG

14

15

16 Membership: the application process for the RTP SIG website Must be a current InfraGard member Must be a current InfraGard member Must have a need for information on how to protect research and technology Must have a need for information on how to protect research and technology Should have the capability to take action on the information provided to them Should have the capability to take action on the information provided to them

17 How do I access the RTP SIG? By selecting the “I want to join Research and Technology Protection InfraGard” button you will be requested to answer 7 questions: 1.What is your full name and to what InfraGard chapter do you belong? 2.What is you organization and has it been awarded any classified contracts? 3.Do you have a security clearance? 4.Does your company maintain or develop processes, formulas or other things that might be considered intellectual property or trade secrets? 5.What is your title? 6.Please explain how your responsibilities pertain to protecting your company’s research, technology or trade secrets. 7.Would you like to be listed in the SIG directory?

18 Academic Alliance Foster spirit of cooperation Foster spirit of cooperation Establish a dialogue Establish a dialogue Share information Share information Increase awareness Increase awareness

19 Academic Alliance National Security Higher Education Advisory Board (NSHEAB) National Security Higher Education Advisory Board (NSHEAB) College and University Security Effort (CAUSE) College and University Security Effort (CAUSE)

20 National Security Higher Education Advisory Board (NSHEAB) Members include 16 university presidents and chancellors Members include 16 university presidents and chancellors Chaired by Graham Spanier, President of The Pennsylvania State University Chaired by Graham Spanier, President of The Pennsylvania State University Three meetings a year Three meetings a year Other participants include: Other participants include: –National Science Foundation –Department of Commerce –Central Intelligence Agency –Department of Defense

21 NSHEAB Members The Johns Hopkins University The Johns Hopkins University UCLA UCLA Carnegie Mellon Carnegie Mellon University of Washington University of Washington Texas A&M Texas A&M Iowa State University Iowa State University University of Pennsylvania University of Pennsylvania MIT MIT Purdue Purdue West Virginia University West Virginia University University of Florida University of Florida UNC – Chapel Hill UNC – Chapel Hill University of Maryland University of Maryland The Pennsylvania State University The Pennsylvania State University University of Wisconsin University of Wisconsin

22 Mission of the NSHEAB Promote understanding Promote understanding Create a forum for mutual issues Create a forum for mutual issues Provide advice on the culture of higher education Provide advice on the culture of higher education Build on traditions of openness, academic freedom and international collaboration Build on traditions of openness, academic freedom and international collaboration Discuss matters pertaining to national security. Discuss matters pertaining to national security.

23 CI Working Groups Develop joint operations/initiatives Develop joint operations/initiatives Share and develop threat assessments Share and develop threat assessments Coordinate and with partner OGAs/business/academia as appropriate Coordinate and with partner OGAs/business/academia as appropriate Push knowledge up from Field to National level as foundation for policy development Push knowledge up from Field to National level as foundation for policy development

24 CI Program Review Process Qualify and quantify successful implementation of the National CI Strategy Qualify and quantify successful implementation of the National CI Strategy –Program Reviews use specific metrics Inform FBI management, Congress, OMB, DOJ and the DNI of our progress in reaching goals and objectives Inform FBI management, Congress, OMB, DOJ and the DNI of our progress in reaching goals and objectives Identifying resources needed for success Identifying resources needed for success

25 DETER DETECT DISRUPT


Download ppt "FBI Counterintelligence Domain Program Briefing – Dallas, Texas."

Similar presentations


Ads by Google