good men do
Sir Edmund Burke
SA Jeanette S. Greene
Overall Classification of this briefing is UNCLASSIFIED
Protect the United States…
From terrorist attack
Against foreign intelligence operations/espionage
Against cyber-based attacks and high tech crimes
FBI Director Mueller
June 21, 2002
Domain Program Mission
Partnership with public and private
entities to protect the national and
economic security of the United
States through the exchange of
IDENTIFY, ASSESS, DETER,
NEUTRALIZE, OR EXPLOIT
Foreign Intelligence Services' (FIS)
collection activities directed
against our nation's warfighters,
technologies, and secrets.
The act of obtaining, delivering,
transmitting, communicating, or
receiving information in respect to
the National Defense with an intent
or reason to believe that the
information may be used to the
injury of the United States or to the
advantage of any foreign nation.
“Who Are the Bad Guys?”
Foreign Intelligence Services (FIS)
The Traditional Threat
“Order of Battle...”
Free Research and Development
What they may look like…
What Does FIS Want?
Tactics, Techniques, and Procedures
ANYTHING AND EVERYTHING
What Does FIS Want?
FIS is looking for Unclassified as well as
FIS is looking for Proprietary
FIS is looking for personal information
HOW DO FIS GET
WHAT THEY WANT?
Place of Employment
What are they looking for?
Aldrich Ames (CIA)
Alcohol/Drug Abuse Roderick Ramsey
Financial Problems (Greed) Ego “I am to smart to be caught”
Gambling Problems Idea of being a Spy
Money Feeling of Importance
Ryan Anderson George Trofimoff
Ideology Ties to a Foreign Country
Identified with Enemy Family/Friend as for Information
Looking for Acceptance
Unsolicited Correspondence - “Shotgunning”
Exploiting Legitimate Access
Direct Submission of RFIs
Threats or Blackmail
FIS Cold Approach Methods:
Ignoring Visit Restrictions
Divide and Conquer
Exploit National Ties
Last Minute Agenda Change
“Got a light”
“Did not get my briefing”
The Process of obtaining information under the guise of a social
or professional conversation. If done correctly the SUBJECT
does not even know that he/she is being interrogated. The
individual is unaware/unwitting that they are providing
Natural Tendency to Gossip
Natural Tendency to Discuss Work
Natural Tendency to Correct Mistakes
Want to change another person's view point
Malicious Attachments (.doc, .exl, .ppt)
Chat rooms and Forums are a collector’s playground
Spyware/ Data Miners
CD and Thumb Drives
Installs Malicious Software
From: FBI [mailto:firstname.lastname@example.org]
Sent: Tuesday, July 31, 2007 7:02 PM
The Federal Bureau of Investigation (FBI), discovered through our intelligence Monitoring Network, that
you have an on going transaction with some fraudsters who claim to be legally transacting business
with you through the internet.
The fraud starts has been arrested and they are right now in the FBI custody. They confessed that they
scammed you of some amount of money which we will not disclose to you right now until you fill the
form below for verification of ownership. Your money will be sent to you as soon as we have verify
that you are the really owner of the money we recovered from the fraudsters.
Please not that you have been legally declared innocent in the transaction between you and the fraudsters
because you were deceived by the fraudsters and do not know what you were doing, so do not be
afraid of filling the form below and have it sent back to us via this email address
PAYMENT RELEASE ORDER FORM
1. FULL NAME
4. AMOUNT THAT WAS SCAM
5. RESIDENTIAL ADDRESS
6. PHONE NUMBER
7. HOME ADDRESS
Thanks for your understanding and we are sorry for the inconvenience this may has caused you all this
We await your responds to this mail as soon as possible.
+44 70457 36823
Mr. Moore Jolly
Sent: Thursday, July 07, 2005 9:04 AM
Subject: Requested Information
Hello, I am Ekanga Adani, a Indian AD Officer, who
is a grad of OAC 3-98, Ft. Bliss. What I need is
Air Defense, particularly SHORAD lessons learned
from OIF. I would appreciate your assistance if you
could. Please send any information to me by my
Ekanga Adani, Cpt, AD, IND.
Several Possible Espionage
Change in Work Habits (Working Hours)
Repeated Security Violations
Unauthorized Access or Removal of
Unreported Foreign Contact
Joking or Bragging About Working for FIS
Refused Promotion to Avoid PCSing
Had Numerous Minor Security Violations
Worked Long Past Necessary Duty Hours
Made Numerous Copies of Classified Documents
Lead a Very Lavish Lifestyle (FIS Retainer)
Bragged about Working for MASSAD
Took Numerous Documents Home
Took Numerous trips to Israel and Europe
Sought Positions with Better Access
Accessed Information Outside Her Duty Scope
Markus Wolf, Head of East German
During the Cold War
“It was our experience that a simple Sergeant in the
U.S. Army, was perhaps more important and
better, more secret information, than any
provided by a high official or a higher officer.”
Something to think about…
In your office, who has access to every room?
When they come into your office, do you usually
Who has the authorization to remove items from
Who comes in early and leaves late or works after
Who has the placement and access to ease drop?
Where is the threat?
Why am I here?
Who is at risk?
What is the impact?
A STUDY CONDUCTED BY R.J. HEFFERNMAN
ASSOCIATES INVOLVING 246 OF THE FORTUNE 500
COMPANIES REVEALED THAT 49 PERCENT OF THE
COMPANIES STATED THEY HAD BEEN VICTIMS OF
INDUSTRIAL ESPIONAGE. IT WAS ESTIMATED THAT
THE UNITED STATES MAY BE LOSING UP TO $20
BILLION IN BUSINESS PER YEAR AS THE RESULT OF
IN A SEPARATE STUDY, THE AMERICAN SOCIETY
FOR INDUSTRIAL SECURITY’S COMMITTEE ON
SAFEGUARDING PROPRIETARY INFORMATION
ESTIMATED THAT THE 32 LARGEST U.S.
COMPANIES LOST DATA VALUED AT OVER $2
BILLION. THE STUDY SHOWED THAT 70% OF
THE INFORMATION LOST WAS COMPROMISED
BY FORMER OR CURRENT EMPLOYEES.
Cost of Espionage
Espionage costs the US Economy
Money and lowers the US Standard of
Espionage costs Soldiers lives
What to Report?
Unauthorized Request for Information
Deliberate Security Compromise
Exploiting Legitimate Access
Suspicious Telephone Calls
Suspected or Known Computer Intrusions
Attempts to Obtain Unauthorized Information (Classified or Unclassified)
Unofficial Contact with a Foreign National
YOU ARE THE FIRST LINE OF DEFENSE.
YOU ARE OUR EYES AND EARS.
Who do you call?
Federal Bureau of Investigation
Defense Security Services
Army CI, AFOSI, MDA, DCIS, NCIS
When in Doubt Just Call Any Of the Above
and We Will Do the Rest.
The Important Thing to Do is Just Call.