E y e s o f t h e E a g l e Air Force Office of Special Investigations Current Investigative Trends SA James P. Stoddard 30 March 10 National Contract.

Slides:



Advertisements
Similar presentations
James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Advertisements

Company Overview. Statement of Purpose The following will identify the mission, value and objective of the company with a brief introduction to the business.
T VIETNAM PRESENTATION Bali Process Ad Hoc Group Workshop on Immigration Intelligence Analysis Best Practice In Auckland, New Zealand 07 – 10 February.
THE FOLLOWING MINI PRESENTATION ON OPSEC IS TAKEN FROM A US AIR FORCE BRIEFING. ALTHOUGH THIS IS A MILITARY PRESENTATION, IT PROVIDES A GOOD OVERVIEW OF.
Introduction to Operations Security (OPSEC) Updated 09/28/11 1 Security is Everyone's Responsibility – See Something, Say Something!
MULTI-LEVEL SECURITY for NATO 1. OUTSIDE MARKET FORCES DELL CONFIDENTIAL 2 There are 3.4 identities stolen every 12 seconds and produces an average loss.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Approved for Public Release – NGA Case # The Power of NGA.
Introduction to Information Operations Attaché Corps- SEP 09
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
Chapter 17 Law and Terrorism.
E y e s o f t h e E a g l e Air Force Office of Special Investigations Lt Col Terry Bullard AFOSI Command Chair Spaatz Center, Air University AFOSI and.
Information Warfare Theory of Information Warfare
Management idea: Outsourcing 唐付静 Definition of Outsourcing Outsourcing is the act of one company contracting with another company to provide.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
CRP Acquisition Fraud Awareness/UNCLASSIFIED1 ACQUISITION FRAUD AWARENESS Unclassified.
Developing A Strategy For The Internet Age The Five Forces Model
Principal Director, Countering Weapons of Mass Destruction, Department of Defense Represents Department of Defense on counter-proliferation and non- proliferation.
CTTSO Overview John Morgan, Deputy Director for Science and Technology, CTTSO September 2010.
Integrating Environment into Development Policy: The World Bank’s Experience with Country Environmental Analysis Sub-Regional Workshop for GEF Focal Points.
Project Jackal for Businesses and Financial Institutions
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
May 8, 2007 MCAD-SB [UNCLASSIFIED] Doing Business with the Department of Defense Global Border Security Conference and Expo Presented by Dan E. Shackelford.
APEX 25 Participants James “Jim” Argue
Health Budgets & Financial Policy 1. Objectives Introduce the TRICARE Program Integrity (PI) office Explain PI role in DoD Direct Care & Purchased Care.
Information Warfare Playgrounds to Battlegrounds.
By Renata Jaruseviciute 1 ©Renata Jaruseviciute.  Financial Crime definition & types  Regulatory body  Legislation  Questions to be asked yourself.
Antiterrorism. Learning Topics Introduction Identifying and selecting targets Regions Levels Vigilance Don’t be a target Responding and reporting Detection.
Headquarters U. S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e © 2008 The MITRE Corporation. All rights reserved From Throw Away.
Thomas “Tom” Grayson Deputy Director COIC Joint IED Defeat Organization, COIC United States Army Lynne Halbrooks Principal Deputy Inspector General DoD.
Introduction to Logistics. Exactly What is “Logistics?” Business Logistics –The planning, implementation, & control of the efficient & effective flow.
Terrorism. Learning Topics Introduction Terrorism/Acts of war History of Terrorism Elements of Terrorism Types Media’s Role Objectives Tactics.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
USE OF BSA REPORTING BY THE FBI. BSA Requirements The regulators Your customer Money Laundering – traditional targets.
Briefer’s Name Date This briefing is UNCLASSIFIED Antiterrorism / Force Protection NWP
OVERVIEW  Who OSI is  What OSI can do for you  What you can do for OSI  What OSI and you can do together.
1 2 Mark Bowes, Safety Programs Coordinator 3 Life has changed Forever. Effective 9/11/2001 Effective 9/11/2001.
Local Police- local jurisdiction 3 Main responsibilities: 1.Law Enforcement- investigate crimes, make arrests, appear in court 2.Community Patrol- traffic,
Cold War Part II Page 27 East Germany - especially East Berlin became the focus of the Cold War.
Information Warfare Playgrounds to Battlegrounds.
BAE Systems Small Business Program
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
The Executive Branch. The job of the executive branch is to carry out the laws that the legislative branch passes. It contains the president. But the.
Cold War Review Two East ___________ - especially East ________ (city) became the focus of the Cold War Germany Berlin.
The IC Today Chapter 3 ©2013, Taylor & Francis. Introduction The IC is a work in progress It has undergone a major reorganization – Adversaries that possess.
PPBS Planning Programming Budgeting Systems. PPBS The Department of Defense is the only Agency to use this type of budget.budget.
Ministry of the Interior of the Republic of Latvia STATE POLICE of LATVIA CENTRAL CRIMINAL POLICE DEPARTMENT Economic Crime Enforcement Department.
Chapter 17: Foreign Policy and National Defense Section 2.
1 WARFIGHTER SUPPORT ENHANCEMENT STEWARDSHIP EXCELLENCE WORKFORCE DEVELOPMENT WARFIGHTER-FOCUSED, GLOBALLY RESPONSIVE, FISCALLY RESPONSIBLE SUPPLY CHAIN.
Fraudulent and Questioned Documents. Top 5 Countries Originating Fraud.
TRADITIONAL OFFICER VACANCY ANNOUNCEMENT NEW YORK AIR NATIONAL GUARD 174th ATTACK WING 6001 EAST MOLLOY ROAD SYRACUSE, NY ANNOUNCEMENT#: FY.
CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT MODULE: NAVAL KNOWLEDGE UNIT 2: NAVAL OPERATIONS AND SUPPORT FUNCTIONS.
IPR 2 WUHAN 29 JULY 2009 TACKLING THE IPR PROBLEM THREATS AND OPPORTUNITIES.
CJA 484 Week 5 DQ 2 What is cyber-crime? How does cyber-crime impact the criminal justice system on a global level? How can we better improve the approach.
CJA 484 Week 5 DQ 3 What is an example of a global policing system? How do global policing systems impact criminal activity on a global level? How can.
  Brand Intelligence   “We liked the existing investigative services, but we prefer having our own (intelligence) capability.” Introduction Our clients.
Federal Bureau of Investigation
The vulnerability of economic markets to crime in 2015
AFOSI and the First Sergeant
Variant Market Research
Many Faces of Fraud Seminar 12 October 2017
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
ENGINEERS DO MANY THINGS. ENGINEERS DO MANY THINGS.
The Kirtland National Security Complex
Tire Industry Symposium
Federal Protective Service
Role of US Security and Intelligence Agencies
Small Business Opportunities
Many Faces of Fraud Seminar 24 October 2019
Presentation transcript:

E y e s o f t h e E a g l e Air Force Office of Special Investigations Current Investigative Trends SA James P. Stoddard 30 March 10 National Contract Management Association Symposium

E y e s o f t h e E a g l e Introduction AFOSI Mission Current Investigative Trends Your Response

E y e s o f t h e E a g l e AFOSI Mission & Priorities Mission To Identify, exploit and neutralize criminal, terrorist and intelligence threats to the Air Force, Department of Defense and U.S. Government. Priorities Identify and resolve crime that threatens Air Force readiness or good order and discipline Combat threats to information systems and technologies Detect and defeat fraud impacting force acquisitions and base-level capabilities Yes, we are kind of like that show NCIS…

E y e s o f t h e E a g l e Current Investigative Trends Counterfeit Microchips Origins in China, India, Russia, Middle East, and Southeast Asia Harvesting of Chips Re-selling to Market (Disadvantaged businesses) Purchase by Contractors/Sub-Contractors Installation in USAF Weapon Systems Results System Failure Espionage “What we have here is a pollution of the military supply system”

E y e s o f t h e E a g l e The Counterfeit Process

E y e s o f t h e E a g l e Current Investigative Trends Counterfeit Parts Small Machine Shops Reverse Engineered Parts Re-selling to Government on Surplus Market Purchase by Contractors/Sub-Contractors Installation in USAF Weapon Systems Results System Failure Degraded System Life “Counterfeit products have been linked to the crash of mission-critical networks...”

E y e s o f t h e E a g l e A Contract Management Response Air Force Contracting Guiding Principals Do the Right Thing Ask questions… be alert… Integrity If it doesn’t seem right, it probably isn’t. Focus on the Details Inspect your product, don’t just take things for face value Investigate your contractor or supplier Share Knowledge & Experience Report your suspicions, fears and concerns Investigative agencies need to investigate Protect our Nation, Air Force & Contracting Profession It could save someone’s life and it’s your money too!

E y e s o f t h e E a g l e SA James P. Stoddard AFOSI Det 114, Fraud Division (405) Thank You!