2008 DIB CIP CONFERENCE MIAMI, FL April 9, 2008



Similar documents
COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA

Middle Class Economics: Cybersecurity Updated August 7, 2015

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

The UK cyber security strategy: Landscape review. Cross-government

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Developing a robust cyber security governance framework 16 April 2015

FBI AND CYBER SECURITY

National Cyber Security Strategies: United States

Security Vulnerability Assessment

NSF Cyber Security Conference. FBI Counterintelligence Domain Program Briefing

U.S. Department of Justice

James R. Clapper. Director of National Intelligence

Cybersecurity: Mission integration to protect your assets

Bureau of Industry and Security

A conversation with Allan Friedman about cybersecurity issues


CORPORATE ESPIONAGE & GLOBAL SECURITY: PROTECTING YOUR BUSINESS INTERESTS

Corporate Spying An Overview

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Foreign Affairs and National Security

UAE Offshore Company Formation

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

The FBI and the Internet

INFRAGARD.ORG. Portland FBI. Unclassified 1

CYBERSECURITY RISK MANAGEMENT

Defense Security Service (DSS)

m a s t e r o f s c i e n c e i n

Defense Security Service

Komatsu s Aftermarket Business Strategies

FBI CHALLENGES IN A CYBER-BASED WORLD

Federal Bureau of Investigation

WRITTEN TESTIMONY OF

DRAFT. Educating the Next Generation of Intelligence Professionals Jan P. Herring

Confrontation or Collaboration?

RUSSIA CHINA NEXUS IN CYBER SPACE

Pursuant to section 1.7(i) of Executive Order 12333, as amended, the FBI is authorized to:

Cyber Diplomacy A New Component of Foreign Policy 6

Financial Results for the First Quarter Ended June 30, 2014

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

PHILIP H. HILDER H I L D E R A N D A S S O C I A T E S, P. C L O V E T T B L V D. H O U S T O N, T E X A S W W W

Hybrid Warfare & Cyber Defence

Secure Data Centers For America A SOLUTION TO

Cybersecurity Delivering Confidence in the Cyber Domain

FIREFIGHTER/PARAMEDIC EMPLOYMENT APPLICATION (Please Print)

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

THE DEPARTMENT OF JUSTICE S EFFORTS TO COMBAT IDENTITY THEFT. U.S. Department of Justice Office of the Inspector General Audit Division

Records Authority. Australian Security Intelligence Organisation

How does a venture capitalist appraise investment opportunities?

United States Cyber Security in the 21st Century

The Strategic Importance, Causes and Consequences of Terrorism

Consolidated Financial Results for the First Quarter of the Fiscal Year Ending March 31, 2016 (Japan GAAP)

Tax Refund Fraud and Identity Theft

Risk & Vulnerability Assessment Training

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

IN THE WAR ON TERRORISM

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. June 15th, 2015

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

Of Citadels And Sentinels: State. Tim Legrand and Jeff Malone

Price List. Services for foreign companies on the Russian territory:

COMMERCIAL LENDERS MANDATED TO FIGHT WAR ON TERRORISM

Public Private Partnerships and National Input to International Cyber Security

The Comprehensive National Cybersecurity Initiative

Actions and Recommendations (A/R) Summary

U. S. Attorney Office Northern District of Texas March 2013

IRIS Report Commercial Espionage: The Threat from Chinese Cyber Attacks Executive Summary

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World

Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Foreign Corrupt Practices Act:

2015 Information Security Awareness Catalogue

FBI Omaha Counterintelligence Strategic Partnership Program

Introduction to the Foreign Corrupt Practices Act (a training presentation for employees)

Counterintelligence Awareness Glossary

(5) Notes Regarding Going Concern Assumptions. (6) Basis of presenting consolidated financial statements. None. [1] Scope of consolidation

Getting real about cyber threats: where are you headed?

BSA GLOBAL CYBERSECURITY FRAMEWORK

I N T E L L I G E N C E A S S E S S M E N T

HIPAA NOTICE OF PRIVACY PRACTICES

Cyber Risk Managemet Next? What Board Members, Shareholders, Government, Auditors and Others Will be Asking from the CIO Next:

Foreign Corrupt Practices Act. The Rationale behind the Implementation of the FCPA

Transcription:

1 2008 DIB CIP CONFERENCE MIAMI, FL April 9, 2008 INTELLIGENCE AND THREAT WARNING

THE THREAT IS CORPORATE AMERICA IT IS ASYMMETRIC WARFARE 2

Annual Report to Congress: Foreign Economic Collection and Industrial Espionage Entities from 108 countries were involved in collection efforts against sensitive and protected US technologies in FY 2005 Office of the National Counterintelligence Executive 3

According to the FBI: Foreign entities most responsible for Economic Espionage investigations within the US: 4 1. China 2. India 3. France 4. Russia 5. Israel

The FBI s Top Five These countries are allowed to utilize their intelligence services to support commercial gain within their own country. 5 All in the name of national security and economic gain.

SOLUTIONS American organizations must begin policing their operations more aggressively today to prevent valuable data from being stolen Info World Magazine 9/14/07 6

FBI s DOMAIN PROGRAM Tasked to protect US companies sensitive information and technologies Corporate America is part of US national security Partner FBI with corporate America to identify what is at risk Develop plan to protect it Build relationships 7

FBI S DOMAIN PROGRAM Business Alliance 8 Academic Alliance Protect technology while in the R&D stages

GLOBAL INNOVATION DATASET Technology monitoring developed by Pamir and its partner Identified US technologies that were proliferated by foreign entities Looks at patent information within 120 countries Prevention tool against Insider Threat as well 9

PREVENTION PROGRAM From pre-employment to post-employment 10 Proper prevention can diminish loss of technology, number of investigations Cannot just react, need to prevent (Request of DoJ)

DUE DILIGENCE 11 The importance of conducting proper Due Diligence (DD) in an emerging overseas market prior to conducting business overseas cannot be overstated The need to conduct DD as you continue to conduct business in foreign markets

DUE DILIGENCE 12 A Due Diligence (DD) in an emerging market should include: Company profile Annual inspection Any modification on Registration Ownership Shareholders Executives

DUE DILIGENCE Investment/Affiliated enterprises Banking information Loan information Balance sheet Financial analysis Main operation and products Suppliers/customers 13

DUE DILIGENCE 14 Criminal record (national police checks not possible in India) Intelligence or military affiliation Political or Party affiliation China specific: a China context analysis of what it all means CAUTION: Be careful to what DD vendors claim regarding the extent of their capabilities

CI AWARENESS PROGRAM Need to establish a counterintelligence awareness program that reaches all employees Need force multipliers (eyes/ears) Need sources Need to instill in employees that CI awareness is everyone s responsibility How to report and to whom Cyber responsibility 15

INVESTIGATIONS When prevention and monitoring are not enough of a deterrent Prosecution becomes a priority because of what is at stake CHI Mak case DOJ Task Forces Force multipliers Build relationships 16

Resources & Consulting, Inc. 17 RUDY GUERIN PRINCIPAL 100 EAST STREET S.E. SUITE 203 VIENNA, VA 22180 703 319 319 96469646 (O) 703 319 319 8205 (F) 703 303 303 9047 (M)