Technical Counterintelligence Technical Surveillance Counter Measures Services.

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

L3 Communications Holdings Inc. (LLL) Jim Clark Doug Coursen Addison Doyle Andrew Felten Kevin Freeman SIA Analyst Program Wednesday March 28, 2007.
MINISTRY OF HEALTH ACTION PLAN FOR THE PREVENTION AND CONTROL OF ANTHRAX Dr. Marion BullockDuCasse, SMO(H) Director, Emergency, Disaster Management and.
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Secure Infra-Structure Consulting and Force Protection Services US and Mexico Capability Brief for The Service.
CORPORATE ESPIONAGE COUNTERMEASURES Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant.
The Department of Defense Intelligence Oversight Program
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Matt Maze Vs..  The KGB was the security agency in the Soviet Union.  Even though the Soviet Union fell in 1990 the KGB was not disbanded. They instead.
By: Paige Reinhardt.  Began as the Office of Strategic Services (OSS)  Formed during WWII to coordinate espionage  Established in 1947 when President.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
COUNTERINTELLIGENCE TRENDS
Risk Management Vs Risk avoidance William Gillette.
Initial Security Security & the Facilities Manager A Current Overview Presented by: Mike Bluestone MA MSyI FIISec Director of Training.
Competitive Intelligence: What is It & It’s Status Jerry P. Miller Director Competitive Intelligence Center Simmons College Boston, MA
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
ROLLOUT PRESENTATION June 2005 Military Business and Resource Gap Analysis.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Introduction to Network Defense
Seafood HACCP Alliance for Training and Education Chapter 10 Principle 6: Establish Verification Procedures.
United States Foreign Military Fund Execution in Bulgaria Defense Security Cooperation Agency.
UNDERSTANDING THE NATURE AND SCOPE OF HRM
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
Current situation of use of business information in Slovene organizations with focus on competitive intelligence Ines Vrenko Peruško, MBA, GfK Gral-Iteo.
United States Coast Guard Port Security Assessment Program Evaluability Assessment LaKeshia Allen Alexandra Sommers May 2, 2005.
The Main Idea Reading Focus
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
Threat Assessment in a Logical Environment U.S. Financial Infrastructure Physical to Logical environment Protection and Threat Assessment Safe School.
Foreign Policy and National Defense Chapter 17 Notes
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Citizenship Issues C.I.4 U.S. Domestic and Foreign Policy Students are able to: 4.2 Describe U.S. foreign policy. Students may indicate this by: – Defining.
The NRS Project NRS Activities Enhancing Performance Through Accountability American Institutes for Research February 2005.
Export Enforcement National Security Division Arms and Strategic Technology Investigations ECCO 2005 Annual Training Seminar May 24, 2005.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
DoD Region 4 Pollution Prevention Project Task 8: Database Development and EMS Integration Phil Barnes University of South Carolina.
Foreign & Defense Policies. Discussion Questions:  Why do you think the Founders intentionally divided responsibility for foreign affairs between president.
The National Security Bureaucracy. Key Agencies The State Department.
INTRODUCTION TO TELEWORK By Jean-Claude Marot JC Consultants
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
PwC Informations- gold assets. 2 Introduction 3 Central and Eastern EuropeGlobal Number of companies that have been victims of economic crime in the.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
1 Inter-American Committee on Ports Secretariat Executive Secretariat for Integral Development October 5, 2012.
Chapter 1: Introducing the Concepts By: Jake Alonzo Charly Cone Natalie Bohman Meredithe Marshall Michael Scott Mikey Via Virginie Charlotte Milhaud By:
Discuss the analytical skills, including systems thinking, needed for a systems analyst to be successful Describe the technical skills required of a systems.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Overview July 2011 INMM Nuclear Security and Physical Protection Technical Division.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Ch 1 -1 Chapter 1 The Nature of Strategic Management Strategic Management: Concepts.
Component D: Activity D.3: Surveys Department EU Twinning Project.
Safety Management Systems Session Four Safety Promotion APTA Webinar June 9, 2016.
Head of association Arunas Janusonis. CONTENT  FACTORS OF CONTAMINATION  ASSOCIATION „REMNANTS OF WAR THREAT PREVENTION“ o MISSION o PURPOSES o SERVICES.
Export Control at Jefferson
Business Strategy and Policy
CPA Gilberto Rivera, VP Compliance and Operational Risk
Team 1 – Incident Response
Business Counter-Intelligence
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
Intelligence Oversight U.S. Army Inspector General School 1
Electronic Surveillance, Post 9/11
Deconstructing Standard 2a Dr. Julie Reffel Valdosta State University
Chapter 15 Services.
Export Control at Jefferson
Foreign Policy and National Defense Chapter 17 Notes
NATE Tower Site Hazard Recognition Guide
Presentation transcript:

Technical Counterintelligence Technical Surveillance Counter Measures Services

Overview “In a world that increasingly measures power in economic as well as military terms, many foreign intelligence services are turning their sights to stealing American technology and trade secrets.” - Former CIA Director, Robert Gates

Economic Espionage French government ministry dedicated exclusively to the collection of intelligence or, more directly, to conducting economic espionage about any company competing with corporations in France. Directorate-General for External Security (DGSE)

Economic Espionage “This espionage activity is an essential way for France to keep abreast of international commerce and technology. Of course, it was directed against the United States as well as others. You must remember that while we are allies in defense matters, we are also economic competitors in the world.” - Retired Director of the DGSE, Pierre Marion

Economic Espionage “Economic Espionage attempts to disadvantage unfairly without legitimate competition.” “It strikes at the heart of our national security… our economic strengths; our position in the world; our future as a country.” “FBI’s #2 Priority; only terrorism ranks above it.” Interview with Dave Szady - FBI Assistant Director

Economic Espionage $888 Million US Dollars in illegal eavesdropping equipment sold each year in US alone… according to US State Dept. $512 Million US Dollars of eavesdropping equipment believed to be installed in US Corporations - Ottawa Business Journal February 15, 2006

Economic Espionage It is often stated that there is little or no evidence of technical security threats, past or present. Yet we all know that the mere suggestion of a security breach brings the largest organization to a stand still. And no one dares breathe a word of the situation outside of the organization.

Economic Espionage Surprisingly, there is a great deal of evidence processed and analyzed by the National Counterintelligence Executive. Their annual report to Congress is very explicit – Foreign Espionage has doubled every year. Their reports for the last 10 years are located at:

Economic Espionage

What is the Additional Value? (Dollars in Billions) Company Stock Value Company Assets Value Company Value Based on Faith 73% of Company Value is an Intangible Asset

Technical Surveillance Countermeasures Wire taps… mini-cameras… hidden microphones… Sounds like something out of a spy novel or movie, doesn't it? Electronic surveillance is real. Competitors use it. Even so, you can protect yourself with Technical Surveillance Countermeasures (TSCM), thanks to Professional Protection Incorporated (PPI).

Technical Surveillance Countermeasures A large variety of economic intelligence can easily be grouped with national security and corporate information. Therefore, it should be controlled and protected as strictly military, government, or corporate secrets.

Technical Surveillance Countermeasures The break-up of the Soviet Union did not eliminate a competitor, it created dozens more. All still very focused on the same target and aggressively collecting intelligence.

Technical Security Professional Protection Incorporated implements the following defensive measures to properly protect sensitive intelligence. Technical Threat Analysis Radio Frequency Analysis Acoustic Analysis Thermal Analysis Physical Search and Analysis

Technical Security The following is a list of the services that will be provided to protect the variety of sensitive intelligence associated with organizational operations.

TSCM Services Dignitary Protection Fixed-Facility Evaluations In-Conference Monitoring Preconstruction and Construction Surveys Reactionary Surveys

Countermeasures Develop and implement the initial technical security policies for dignitary protection. Establish advanced party operations to be conducted 24 to 48 hours prior to arrival of principal at remote site. Ensure remote site is technically secure and maintain security until the area can be handed off to primary physical protection team. Maintain technical over-watch until principal departs the area. Establish and maintain technical security training and liaison between technical operations personnel and physical protection team personnel. Dignitary Protection

Countermeasures Establish the initial technical security of the facility, and develop and implement the technical security program for facility operations. Annually evaluate the technical security program for required modifications due to environmental changes and growth in technology. Conduct and maintain technical security training program for security personnel and facility personnel. Fixed-Facility Evaluations

Countermeasures Establish and implement technical security policies and procedures for sensitive conferences and meetings. Conduct live conference monitoring for both local and remote operations. Establish and implement technical security training for facility security and executive personnel. In-Conference Monitoring

Establish and implement the technical procedures to validate new building construction is properly supervised to ensure that technical hazards and/or penetrations are not installed or built into a new facility. Establish and implement the technical procedures to ensure that technical hazards and or penetrations are not installed or built into existing building. Preconstruction and Construction Surveys Countermeasures

Establish and implement the procedures for proper reporting of suspected penetrations or attempts. Establish and implement the training program to help executives understand the important difference between nullification and exploitation. Reactionary Surveys

Contact Mail:Professional Protection Incorporated 1101 Tyvola Road ▪ Suite 202 Charlotte, North Carolina Business: (704) (704) Fax: (704) Web Site: