NSF Cyber Security Conference FBI Counterintelligence Domain Program Briefing.

Slides:



Advertisements
Similar presentations
Final Report Presentation By Mohammad Saber Sakhizada March,26 – 2009.
Advertisements

1 Protecting the Long Island Business Community A Public Safety Partnership.
Building a More Secure and Prosperous Texas through Expanded Cybersecurity Mary Dickerson Texas Cybersecurity, Education and Economic Development Council.
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
FBI Counterintelligence Domain Program Briefing – Dallas, Texas
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
UPDATE: “Military & Defense Sector” OEA Grant and Defense Industry Adjustment Program Presentation to the Washington Economic Development Association 4.
Capability Cliff Notes Series PHEP Capability 1—Community Preparedness
Introduction to InfraGard. About InfraGard InfraGard is a public-private volunteer organization that serves as the critical link that forms a tightly-
Florida Invasive Species Partnership: Managing Invasive Species Across Boundaries in Florida Kristina Serbesoff-King Invasive Species Program Manager Florida.
DHS, National Cyber Security Division Overview
National Cybersecurity Awareness Campaign 11
InfraGard A Partnership For Protecting America. What is InfraGard “ A cooperative undertaking between the U.S. Government (the FBI) and an association.
2011 ADC WINTER FORUM | PAGE 1 Joint Base San Antonio Sustainable Energy Innovation Center Sid Saunders Defense Transformation Institute February 15, 2011.
Addressing Synthetic Biology and Biosecurity
Who We Are… The Foundation is a 501(c)(3) non-profit research organization that owns and operates the Morrelly Homeland Security Center which is the first.
Just Think State of the University Address Presented by Chancellor Thomas F. George September 17, 2003.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Future Directions Strategic Communications Plan FCDC/GOS/TNM FGDC Coordination Working Group January 11, 2005.
Academic Alliance Federal Bureau of Investigation Unclassified.
Join Our Research Efforts in CCAA to Improve Cybersecurity Robustness, Resiliency and Management in Enterprises Information Slides to Encourage Your Organization.
Developing Defense Business Solutions Magnum Analytics Inc. Capabilities Brief.
bv02 Inc.® 2006 Sponsorship Marketing How to Measure the Effectiveness of your Sponsorship Marketing Program.
National Institute of Standards and Technology U.S. Department of Commerce TheTechnology Innovation Program (TIP) Standard Presentation of TIP Marc G.
Company LOGO Broader Impacts Sherita Moses-Whitlow 07/09/09.
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
S tate G uard A ssociation of the U nited S tates 25 November, 2009.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
EHS presentation 28 April Presentation Content Introductions Background to aNSwer Origins of project AMAS contract aNSwer:
Jeff Recor IAC 2003 FISSEA IA Community Outreach March 2005 Jeff Recor Director, IAC.
Board of Trustees Orientation September 23, 2014 Dr. George Railey Vice Chancellor of Educational Services and Institutional Effectiveness 1.
Baltic Area Committee Meeting Tallinn 14 th -15 th June 2008 Industrial Relations (IR) Fritz Bekkadal Vice Chair & IRO Norway Section.
Activities of the National Water Quality Monitoring Council Gail Mallard, USGS NWQMC Meeting Phoenix, AZ, December 10, 2002.
Meridian International Center and The Center for the Study of the Presidency and Congress An Initiative of Foundation for International Understanding “…A.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Critical Infrastructure: Commerce/NTIA Lead Agency Role by Shirl Kinney Deputy Assistant Secretary, NTIA October - November, 1998 A Composite of Recent.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
1 Presented by: Dolores Coelho Sr. Program Officer Aboriginal Procurement and Business Promotion Directorate (APBP) Aboriginal Affairs & Northern Development.
Women Mean Business ®. The National Association of Women Business Owners Chicago Area Chapter propels women entrepreneurs into economic, social and political.
Transportation Engineering and Road Research Alliance Rory L. Rhinesmith, P.E Wisconsin DOT Mid Continent Transportation Research Symposium 08/15/2013.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
EUROPEAN COMMISSION Washington June 2004 Space exploration in the context of the European Space Policy Jack Metthey Director for Space and Transports.
University/Industry Partnerships for Excellence in Education and Research.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
Government and Industry IT: one vision, one community Vice Chairs April Meeting Agenda Welcome and Introductions GAPs welcome meeting with ACT Board (John.
Standards Education 18 March 2009 Steve Mills, Chair, SEC Standards Board Forum.
Advancing Government through Collaboration, Education and Action Discovery Management Zone (DMZ) Emerging Technology (ET) Shared Interest Group (SIG)
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
Strength through Industry & Technology National Defense Industrial Association “The Premier Defense Association!” The Voice of the Industrial Base.
STRATEGIC PLAN OVERVIEW Prepared By: SOUTHERN MARYLAND CHAPTER STRATEGIC PLANNING COMMITTEE April 2007.
Science & Technology for National Progress in African Region: Highlights of Regional Strategy and Action Professor Gabriel B. Ogunmola, FAS President,
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
Community Resilience Jill J Artzberger, MPH 2011 Texas Emergency Management Conference Thursday, April 28, 2011.
Technical Operations Report Board of Governors Meeting May 7-9, 2015
Industry Relations Strategic Planning
Ken Watson 9 Sep 2003 Critical Infrastructure Assurance: Business Case for Public-Private Partnership Ken Watson 9 Sep 2003
The Reserve Officers and Noncommissioned Officers Union in nature is a national, patriotic, professional, independent and non-party organization. It is.
California Cybersecurity Integration Center (Cal-CSIC)
PMRIPT Portal Team.
Why Accessibility Profession Matters IAAP UK Chapter
Foundations Come with Institutional Cultures
InfraGard: An Alliance for Infrastructure Protection
Insurance and Climate Change Project
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Provided by: Anthony C. Smith, Sr. Director/Program Manager
The European Bioeconomy Network
Presentation transcript:

NSF Cyber Security Conference FBI Counterintelligence Domain Program Briefing

History/Evolution of the Program DECCA DECCA –Developing Espionage and Counterintelligence Awareness ANSIR ANSIR –Awareness of National Security Issues and Response DOMAIN DOMAIN

Technology Development Life Cycle Time-Line End of Acquisition Life Technology Development System Fielding Operational Use System Manufacture System Test/Design Military Value of Information Low High Fundamental Research Classified/SAP Information INFORMAT ION AVAILABILITY Concept Exploration System Demonstration = = Foreign Military Sales Rapid Prototype Universities Labs & Centers Contractors Technology Lifecycle and Counterintelligence Exposure

Major Strategy Elements Supported By Domain Program Change Behaviors Change Behaviors –Of most serious foreign threats –Of exploited individuals/institutions Reduce Opportunities Reduce Opportunities –Of adversaries to collect intelligence and conduct operations Band Field Offices/Partners Together Band Field Offices/Partners Together –To devise and implement joint operational plans that cross boundaries Transformation to Proactive Program Transformation to Proactive Program –Pursue foreign positive intelligence collection effort

Changing Counterintelligence (CI) Paradigm Shift from reactive to proactive operations Shift from reactive to proactive operations Acknowledgement of new business realities ( “ The World is Flat ” ) Acknowledgement of new business realities ( “ The World is Flat ” ) Development and advocacy of risk mitigation strategies vs. threat avoidance Development and advocacy of risk mitigation strategies vs. threat avoidance Pushing counterintelligence awareness out to the business/academic community Pushing counterintelligence awareness out to the business/academic community Leveraging resources to mutual advantage Leveraging resources to mutual advantage

Holistic Approach to CI Risk Management Insure that all facets of security (physical, IT, personnel) are aware of counterintelligence issues and incorporate risk detection and mitigation into cohesive business strategy. Insure that all facets of security (physical, IT, personnel) are aware of counterintelligence issues and incorporate risk detection and mitigation into cohesive business strategy. Partnership between USIC and Private Sector to leverage resources to maximum benefit of nation. Partnership between USIC and Private Sector to leverage resources to maximum benefit of nation.

Pitching Partnership Emphasis on Confluence of Interest Emphasis on Confluence of Interest –CI protection = Research protection Leveraging finite resources Leveraging finite resources –Recognition that we are all short handed Encouraging dialog Encouraging dialog Building confidence/trust Building confidence/trust –Subject matter competence –No threat posture –Confidentiality

Academic Alliance Foster spirit of cooperation Foster spirit of cooperation Establish a dialogue Establish a dialogue Share information Share information Increase awareness Increase awareness

Academic Alliance National Security Higher Education Advisory Board (NSHEAB) National Security Higher Education Advisory Board (NSHEAB) College and University Security Effort (CAUSE) College and University Security Effort (CAUSE)

National Security Higher Education Advisory Board (NSHEAB) Members include 16 university presidents and chancellors Members include 16 university presidents and chancellors Chaired by Graham Spanier, President of The Pennsylvania State University Chaired by Graham Spanier, President of The Pennsylvania State University Three meetings a year Three meetings a year Other participants include: Other participants include: –National Science Foundation –Department of Commerce –Central Intelligence Agency –Department of Defense

NSHEAB Members The Johns Hopkins University The Johns Hopkins University UCLA UCLA Carnegie Mellon Carnegie Mellon University of Washington University of Washington Texas A&M Texas A&M Iowa State University Iowa State University University of Pennsylvania University of Pennsylvania MIT MIT Purdue Purdue West Virginia University West Virginia University University of Florida University of Florida UNC – Chapel Hill UNC – Chapel Hill University of Maryland University of Maryland The Pennsylvania State University The Pennsylvania State University University of Wisconsin University of Wisconsin

Mission of the NSHEAB Promote understanding Promote understanding Create a forum for mutual issues Create a forum for mutual issues Provide advice on the culture of higher education Provide advice on the culture of higher education Build on traditions of openness, academic freedom and international collaboration Build on traditions of openness, academic freedom and international collaboration Discuss matters pertaining to national security. Discuss matters pertaining to national security.

What is the RTP SIG? RTP = Research and Technology Protection RTP = Research and Technology Protection SIG = Special Interest Group SIG = Special Interest Group The RTP SIG is a tool for Domain Coordinators to use to provide information to their Domain representatives The RTP SIG is a tool for Domain Coordinators to use to provide information to their Domain representativeshttp://

What is the RTP Special Interest Group? The RTP SIG is a tool the FBI utilizes to provide information to cleared Defense Contractors, private industry and academia. Domain Coordinators are your local FBI contacts. The RTP SIG is a tool the FBI utilizes to provide information to cleared Defense Contractors, private industry and academia. Domain Coordinators are your local FBI contacts. –Mission: to provide actionable and relevant information to cleared defense contractors, private industry and academia to better enable them to protect their research and technology.

Why we need the RTP SIG To provide information to the targets of foreign intelligence services and economic espionage that will help them become a tougher target. To provide information to the targets of foreign intelligence services and economic espionage that will help them become a tougher target. To increase reporting of Counterintelligence events. To increase reporting of Counterintelligence events.

InfraGard RTP SIG

Membership: the application process for the RTP SIG website Must be a current InfraGard member Must be a current InfraGard member Must have a need for information on how to protect research and technology Must have a need for information on how to protect research and technology Should have the capability to take action on the information provided to them Should have the capability to take action on the information provided to them

How do I access the RTP SIG? By selecting the “I want to join Research and Technology Protection InfraGard” button you will be requested to answer 7 questions: 1.What is your full name and to what InfraGard chapter do you belong? 2.What is you organization and has it been awarded any classified contracts? 3.Do you have a security clearance? 4.Does your company maintain or develop processes, formulas or other things that might be considered intellectual property or trade secrets? 5.What is your title? 6.Please explain how your responsibilities pertain to protecting your company’s research, technology or trade secrets. 7.Would you like to be listed in the SIG directory?

DETER DETECT DISRUPT