Presentation is loading. Please wait.

Presentation is loading. Please wait.

The National Counterintelligence and Security Center THE NATIONAL COUNTERINTELLIGENCE AND SECURITY CENTER The Threat Environment Joyce Corell, NCSC Assistant.

Similar presentations


Presentation on theme: "The National Counterintelligence and Security Center THE NATIONAL COUNTERINTELLIGENCE AND SECURITY CENTER The Threat Environment Joyce Corell, NCSC Assistant."— Presentation transcript:

1 The National Counterintelligence and Security Center THE NATIONAL COUNTERINTELLIGENCE AND SECURITY CENTER The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain Summit 09 December 2014

2 The National Counterintelligence and Security Center Director of National Intelligence 2

3 The National Counterintelligence and Security Center Assessing Risk 3 Defense Science Board Task Force Report Resilient Military Systems and the Advanced Cyber Threat 25Feb2013 Risk = ƒ ( threat, vulnerability, consequence) Risk = ƒ ( cost, schedule, performance) Security Integrity

4 The National Counterintelligence and Security Center Threat Model Proliferation of cheap, readily available, and effective Cyber Network Operation tools increasingly gives less capable actors the means to conduct cyber attacks. Nation-State Corporate & Organized Crime / Non-State Individual / Hacktivist Advanced Persistent Threats Defense Science Board Task Force Report Resilient Military Systems and the Advanced Cyber Threat 25Feb2013 $K $M $B 4

5 The National Counterintelligence and Security Center Adversaries Need Not Look Foreign 5 Global US Temporary Workers & Visitors Recruited Citizens Recruited Work & Student Visas Subsidiaries False Flags Overseas Suppliers & End Users Multinationals Front Companies

6 The National Counterintelligence and Security Center Things Are Not Always What They Seem… 6 Observable behavior of Multinational Firm Nefarious Intent … ?… or Business as Usual? Tries to purchase US firms, create joint ventures Seeking intellectual property for intelligence activities Secure market share, distribution, and access to technology and IP Conduct business intelligence on competition Acts as intelligence agents for foreign government Plans and intentions of rivals; limitations of competing products Access to systems or networks after equipment or software install Foreign government access for collection, exploitation, and disruption Retain access to customer systems for service, maintenance, and license compliance monitoring Fills key overseas positions with individuals of specific nationality Vetted trusted insiders can facilitate intelligence activities Executives with strong ties to firm to protect IP and business interests Uses financial structure that is complex with limited transparency Conceals financials to appear independent and fiscally sound Global variation in taxes incentivize complex financial structures; privately held firms limit details Seeks contracts to supply US government Firm may be trying to supply subverted products US government is a large customer of products and services

7 The National Counterintelligence and Security Center Collaboration The U.S. National Security Community is deeply concerned about the integrity of supply chains. We have more than enough evidence to know the threat is real and dangerous, but we will inevitably have difficulty predicting targets and assessing impacts. Supply chain security is a group effort; government and industry must identify threats and implement countermeasures. 7

8 The National Counterintelligence and Security Center QUESTIONS? 8


Download ppt "The National Counterintelligence and Security Center THE NATIONAL COUNTERINTELLIGENCE AND SECURITY CENTER The Threat Environment Joyce Corell, NCSC Assistant."

Similar presentations


Ads by Google