Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.

Slides:



Advertisements
Similar presentations
Susan Wyatt Sedwick, PhD, CRA Associate Vice President for Research and Director, Office of Sponsored Projects Export Controls and Deemed Exports.
Advertisements

What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
11 Karen Atkins 12 September 2013 The Importance of New Hire Orientation - FISWG.
COUNTERINTELLIGENCE TRENDS
Computer Security Fundamentals
University of Pittsburgh Study Abroad Programs Guidelines and Checklist.
INTERNET and CODE OF CONDUCT
A Look at Workplace Ethics. Copyright © Texas Education Agency, All rights reserved. Copyright © Texas Education Agency, These Materials are.
Computer Security: Principles and Practice
Ann Murphy, Office of the Chief Administrative Officer NOAA Trusted Agent Training Silver Spring, MD October 2014 National Oceanic and Atmospheric Administration.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
NSF Cyber Security Conference FBI Counterintelligence Domain Program Briefing.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Export Control Contact Information: Debra L. Covey, Export Control Officer 311 TASF ;
Security Services Constitutional Issues in Private Security.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
Personnel Management SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United.
1 Brown Bag Luncheon Series Training 09/25/2008 EXPORT CONTROLS AT YALE.
Export Control Basics James E. Peterson, Ph.D. Associate Vice Chancellor for Research Office of Sponsored Research.
PAMS Export Control Page UTHSC Campus –Wide Business Managers Meeting May 17, 2012.
China Is the Market Rigged? The Implications for IP-based Transactions Bruce A. Lehman Chairman, International Intellectual Property Institute Senior Advisor,
Deemed Exports Overview and the Inspector General’s Report Presentation for : Office of National Security and Technology Transfer Controls Bureau of Industry.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
ESPIONAGE INDICATORS. ESPIONAGE INDICATORS GUIDE BRIEFING DEPARTMENTAL ADMINISTRATIVE ORDER (DAO ) NOAA ADMINISTRATIVE ORDER (NAO )
Section Eleven: Threat Awareness and Defensive Measures Note: All classified markings contained within this presentation are for training purposes only.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
 What is conflict of interest and how can it be avoided  What factors should be considered when determining a “ fair wage “
Cyber Security Nevada Businesses Overview June, 2014.
A Strategy… Nancy N. Soreide NOAA/PMEL NOAA WebShop 2004 July 27-29, 2004, Philadelphia, PA For improving the security of Web and Internet applications.
Export Enforcement National Security Division Arms and Strategic Technology Investigations ECCO 2005 Annual Training Seminar May 24, 2005.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
KJC001 (sp2015.ppt – May 12, 2015) – Industry senior project presentation Industry-based Senior Project in the Department of Computer Science and Engineering.
Category Advanced Notice Required Information Required (same for both categories) FN Visitor – Facility access 3 or fewer days or attending a conference.
CD4D Export Control and Economic Espionage Briefing Unit Chief CD4D Alexis Hatten Phone:
How Secure are YOU? Information System Audit and Control Association May 2008 Meeting Presented by Brian Findley Counterintelligence Cyber TE Honeywell.
CARRUTHERS LSC 3/20/06 1 LIGO-G M The View from NSF Tom Carruthers LIGO Program Officer National Science Foundation (703)
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
1 Olga King Jet Propulsion Laboratory Office Of Export Compliance April 27, 2011.
 U.S. laws and their implemented regulations that prohibit the unauthorized “export” of certain controlled ITEMS, INFORMATION OR SOFTWARE to foreign.
Security Awareness Training. What is security awareness training? Security awareness training is an overview of how to be more diligent in the use, management,
Presented By Patricia Dawson Oregon State University Extension Service.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
 Cooperation between international firms can take many forms, such as cross-licensing of proprietary technology, sharing of production facilities, cofunding.
Program of the development of Japan-Russia business relations in the domain of construction by means of conducting regular business meetings International.
Page No. 1 FDOC/MOD Observation Groundrules & Communication information.
1 An Overview of Process and Procedures for Health IT Collaboration GSA Office of Citizen Services and Communications Intergovernmental Solutions Division.
Chapter 17: Foreign Policy and National Defense Section 2.
The Executive Branch: Bureaucracy in a Democracy.
Threat Awareness Briefing. Why Our Information Employee Responsibilities Threat Awareness and Defensive Information Methods.
Center of Excellence and Expertise Tradewatch 2011 February 17, 2011.
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device.
Crown capital management international relations International Affairs.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Insider Threat Awareness
With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become.
EXPORT CONTROLS. EXPORT CONTROLS The U.S. Government regulates the WHAT IS EXPORT CONTROL The U.S. Government regulates the Transfer of Information.
Export Control at Jefferson
How to Develop Effective Industry Relations and Fundraising
China Is the Market Rigged?
Lynn Titus Jr (Tye) Export Controls Administrator
Federal Protective Service
Electronic Surveillance, Post 9/11
LO1 - Know about aspects of cyber security
Export Control at Jefferson
NASA Kennedy Space Center
Presentation transcript:

Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory

2 Information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons…

3 * To detect, deter, and counteract attempts of foreign powers to illegally obtain information from the laboratory; * To work closely with agencies responsible for protecting the United States from threats from hostile powers, terrorists, and terrorist organizations; * To educate employees about the foreign intelligence and terrorist threat; * To conduct these activities in a professional manner, sensitive to the needs of Fermi National Acceleratory Laboratory employees. Protecting our Nation’s Science and Technology….

4 Scientific collaboration “open sharing environment” – open publication Scientific collaboration “open sharing environment” – open publication Funding for Research Funding for Research Invited speakers for international conferences Invited speakers for international conferences Hosting guest scientists, post docs, etc. Hosting guest scientists, post docs, etc. Establishing rapport with the scientific community Establishing rapport with the scientific community Utilizing the scientific community - technical expertise Utilizing the scientific community - technical expertise “…the business of the Laboratory is Science not CI…” Larry Collins, SCIO

5 Foreign governments, foreign intelligence services, and foreign companies – including those based in the U.S. – have the potential to harm Fermilab’s interests through espionage…

6 * Fermilab searches out individuals & programs from both international and domestic organizations with desirable scientific & technical skills, and * Fermilab establishes collaborative ventures to achieve its goals These collaborative efforts are essential to capturing benefits of scientific and technical advances and furthering mutual agreements These collaborative efforts are essential to capturing benefits of scientific and technical advances and furthering mutual agreements

7 Factors that increase the possibility that YOU or other Fermilab employees will be targeted Your access to information, people, or places of interest International or domestic travel where foreign intelligence organizations can gain access to you Your ethnicity, gender, racial, or religious background may attract the attention of foreign intelligence organizations

In the past four years, nearly 100 individual or corporate defendants have been charged by the US Justice Department with stealing trade secrets or classified information from private industry and US Government agencies and providing them to foreign entities… Washington Post Article – March 25, 2013 Peter Finn

9 * Former State Department Official and Wife Arrested for Serving as Illegal Agents of Cuba for Nearly 30 Years - * Former State Department Official and Wife Arrested for Serving as Illegal Agents of Cuba for Nearly 30 Years - Couple Allegedly Conspired to Provide Classified Information to Cuban Government * Valspar Corporation Chemist Charged Theft of Trade Secrets * Former Dow Chemical Company Research Scientist Convicted Stealing Trade Secrets and Perjury * Trade Secret Theft Couple Conspires to Steal GM Hybrid Technology * NASA Scientist Arrested * Foreign Nationals Charged with Attempting to Illegally Export Military Satellite Components An insider threat arises when an individual with authorized access to personnel, facilities, information, equipment, networks, and systems, uses that access to harm the security of that entity…

10 It is YOUR responsibility to protect Fermilab’s Technologies and Information…

11 * A visitor who attempts to solicit information outside the scope of the visit/assignment; * A visitor who attempts to access “property protected” areas; * A visitor who attempts to access programs, data, or applications beyond the approved computer access.

12 requests for Fermilab research and technical information and employment opportunities * Receiving unsolicited s from foreign countries is a common occurrence at Fermilab, however, many of these s contain requests for Fermilab research and technical information and employment opportunities. * The CI Office would like to review these s before a response is sent. * Forward copies of all unsolicited s received from foreign countries to * Direct any questions Steve Fuller, CI Cyber Specialist, * Direct any questions regarding these unsolicited e- mails to Steve Fuller, CI Cyber Specialist,

13 * Any indication/suspicion of theft of Fermilab technologies * Any indication of the targeting of Fermilab employees, technologies, or programs * Any attempt to solicit sensitive proprietary information without a valid need-to-know (foreign or U.S. citizens)

14 * Any travel funded by a foreign entity * Any foreign business transactions, not including financial support to/from family members * For more details and additional information, see the CI Web Site at

You can help by being vigilant and aware of activities that could indicate possible domestic or international terrorist activities… You can help by being vigilant and aware of activities that could indicate possible domestic or international terrorist activities… 15

16 We must work together to protect Fermilab’s cutting edge research

17 * Office of Counterintelligence Contact Information To report an Incident or for Further Information, Please Contact: * Larry/SCIO ( ) * Diana Naples/Lead Senior CI Analyst ( ) * Tom Stillman/Lead CIO ( ) * Doug Lenhart/CIO ( ) * Kevin Milligan/CIO ( ) * Sue Bohle/CIO ( ) * Steve Due/CIO ( ) * Steve Fuller/Lead CI Cyber Specialist ( ) * Jeff Valles/CI Cyber Specialist ( ) * Bonnie Svoboda/Intelligence Research Specialist ( ) * Pat Scalzetti/Intelligence Research Specialist ( )

18 Office of Counterintelligence