Energy Security Initiative Federal Bureau of Investigation SSRA Matthew W. Espenshade 10/07/2008 Ft. Worth, Texas UNCLASSIFIEDUNCLASSIFIED UNCLASSIFIED.

Slides:



Advertisements
Similar presentations
Creating Competitive Advantage
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
TRADE SECRETS, UNFAIR COMPETITION, EMPLOYEE RAIDS AND EMPLOYEE COVENANTS Alan N. Greenspan Jackson Walker LLP.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
FBI Intelligence Houston Field Intelligence Group Overview Carlos J. Barrón FIG Coordinator Field Intelligence Group H O U S T O N UNCLASSIFIED.
International Theft of Trade Secret: A Case Study Presented by: Nenette Day.
The University Startup Company Law Firm California Massachusetts Florida (310) Stephen P.
CORPORATE ESPIONAGE COUNTERMEASURES Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Information Warfare Theory of Information Warfare
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Intellectual Property Boston College Law School February 5, 2007 Trade Secret – Part 1.
MAXWELL SECURITY AUTHORITY. THE THREAT: The TERROR PLOT of AL QAEDA.
Trade Secrets Introduction Let’s begin our discussion of trade secrets with the following video and article (Video) “Shh! Food trade secrets you'll never.
COUNTERINTELLIGENCE TRENDS
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Federal Bureau of Investigation
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Regional Conference Intellectual Property Crime Bahrain April 2008.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Information Sharing Challenges, Trends and Opportunities
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
Cyber Security Nevada Businesses Overview June, 2014.
“INTERNATIONAL ORGANIZATIONS” MIDDLE EAST TECHNICAL UNIVERSITY Spring 2008 Department of Petroleum and Natural Gas Engineering Dr. Mahmut Parlaktuna Res.
Export Enforcement National Security Division Arms and Strategic Technology Investigations ECCO 2005 Annual Training Seminar May 24, 2005.
The FBI What the Federal Bureau of Investigation is TODAY.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Recent Cyber Attacks and Countermeasures September 2006.
1 Trade Secrets ___________________________ Business Organizations II Mike Brigner, J.D.
How Secure are YOU? Information System Audit and Control Association May 2008 Meeting Presented by Brian Findley Counterintelligence Cyber TE Honeywell.
Trade Secrets & Protection of Trade Secrets ISYM540 Topic 5 – Info Assurance and Security Len Smith July 2009.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Bryce K. Earl, Esq. and Thomas G. Grace, Esq Presentation To: Association of Corporate Counsel January 26, 2010 ______________________________ Covenants.
Trade Secret Law Jody Blanke, Professor Computer Information Systems and Law Mercer University, Atlanta.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
TRANSNATIONAL ORGANISED CRIME SECRET. CCSS TIER 1 THREATS: IMMEDIATE SIGNIFICANT THREAT.
12/14 – 12/20 - RESPOND TO DISCUSSION BOARD - ATTEND SEMINAR - COMPLETE AND SUBMIT LEARNING ACTIVITY UNIT 6: Crime Analysis Applications and organized.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Creating an Insider Threat Program.
Hurdles in implementation of cyber security in India.
Lexmundi.com TRADE SECRET PROTECTION IN THE DIGITAL AGE Eric H. Rumbaugh Partner Michael Best & Friedrich LLP Lex Mundi member firm for Wisconsin This.
Created by: Ashley Spivey For Department of Homeland Security All information from:
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Protection of Trade Secrets; current issues WIPO-UKRAINE SUMMER SCHOOL ON INTELLECTUAL PROPERTY – JULY 2011.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
CONTROLLING INFORMATION SYSTEMS
T RADE S ECRETS Copyright © 2010 by Jeffrey Pittman.
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
The IC Today Chapter 3 ©2013, Taylor & Francis. Introduction The IC is a work in progress It has undergone a major reorganization – Adversaries that possess.
1 SSHHHH! It’s a Trade Secret Steve Baron April 3, 2003.
Chapter 17: Foreign Policy and National Defense Section 2.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
K. Lance Anderson Of Counsel Greenberg Traurig, LLP “Innovate Lea County” Conference A Model for Innovation.
Civil Aviation Security Program The FBI’s Counterterrorism Division’s (CTD) Civil Aviation Security Program (CASP) is responsible for Criminal and Terrorism.
Entrepreneurship CHAPTER 4 SECTION 2.  When you travel abroad for business, you should study the customs of the country you are visiting.  Tips for.
Crown capital management international relations International Affairs.
crimes-report
With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become.
Federal Bureau of Investigation
Trade Secret Definitions (common definition of value omitted)
Theft of Trade Secrets & Economic Espionage
Confronting Cyber Threats: Cybersecurity from the FBI’s Perspective
SSHHHH! It’s a Trade Secret
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
GLOBAL DIGITAL FORENSICS MARKET 2017 – 2025 Published by :Accurize Market Research Pvt. Ltd. Copyright © 2019 Accurize Market Research
Presentation transcript:

Energy Security Initiative Federal Bureau of Investigation SSRA Matthew W. Espenshade 10/07/2008 Ft. Worth, Texas UNCLASSIFIEDUNCLASSIFIED UNCLASSIFIED

Today’s Topics Today’s Topics  FBI Oilfield Theft Task Force  Infrastructure Protection  Economic Espionage

FBI Priorities Terrorism Foreign Counterintelligence High Technology Crimes Public Corruption Civil Rights Transnational Criminal Organizations White Collar Crime State, Local, International Cooperation Technology Upgrades

Energy Security Initiative : The evolution  Terrorism – Concentrated on infrastructure protection. FBI and private sector coordinating response to incidents or mitigated attacks, investigation and monitoring of threats. JTTF establishment.  Economic Espionage  Oilfield Theft Task Force – equipment, product, services

Critical Infrastructures Services so vital that their incapacity or destruction would have a debilitating impact on the defense or economic security of the United States. - Executive Order Executive Order Services so vital that their incapacity or destruction would have a debilitating impact on the defense or economic security of the United States. - Executive Order Executive Order 13010

Counterterrorism Oil and Gas Infrastructure Counterterrorism Oil and Gas Infrastructure  Targeting of oil and gas infrastructure has been discussed by UBL since  Al Qaeda has discouraged attacks on Middle East production facilities.  Encourages attacks on distribution and refinement that supplies the West.  Recent call for attacks on infrastructure in U.S., Canada, Mexico, and Venezuela.

Infrastructure Attacks Infrastructure Attacks  2006 attack on Abqaiq oil refining facility.  Upsurge in Nigerian attacks and kidnappings.  South American pipeline attacks.  Relatively small number by actual Al- Qaeda.  Continued threat by domestic groups.

 “SVR’s activities in the West have been increasingly driven by interests of Russian oil, gas, and defense companies….. Energy sales require scientific-technical espionage networks which the SVR has been actively developing since the 1990s” -Jane’s Sentinel, March 2004 Espionage Trends

Economic Espionage Act of 1996 Title 18 U.S.C., Section 1831 Title 18 U.S.C., Section 1832 Knowingly targets or acquires Trade Secrets For the benefit of Foreign government, instrumentality, or agent Anyone other than the owner Max imprisonment (Individual) 15 years 10 years Max fine (Individual) $500,000 less than $500,000 less than $500,000 Max fine (Organization) $10 Million $5 Million

Trade Secrets  All forms and types of financial, business, scientific, technical, economic, or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, whether tangible or intangible, and whether how stored….

The KEY!!  The owner of the trade secret has taken has taken reasonable measures to keep such information secret.  The information derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable through proper means by the public.  AG can commence civil action at any point in investigation to protect further disclosure.

ECONOMIC ESPIONAGE 101  WHO are the players?  WHAT are they after?  HOW do they accomplish it?  WHY do people engage in this?

WHO: Foreign Threat  Friend and Foe  Rich and Poor  Low and High Technologies  Government and Private 90 Countries Targeted U.S. Technologies

Foreign Collectors  Companies Only way to compete with U.S.Only way to compete with U.S. Gain access to U.S. dominated marketGain access to U.S. dominated market  Individuals Bolster their stature in a foreign firmBolster their stature in a foreign firm Revenge (Terminated)Revenge (Terminated) Private

Foreign Threat

BUSINESS INFORMATION COMPUTER SOURCE CODE ACCESS CARD CONTROL TEST MATERIALS GENETIC SCREENING DNA CELL LINE ENGINEERING PLANS DRUG DELIVERY SYSTEMS MICRO PROCESS RESEARCH CUSTOMER ACCOUNT INFORMATION NETWORK SWITCH PLANS SOFTWARE DESIGN ULTRASOUND BLUEPRINTS WHAT are they after?

Unsolicited s Front companies Recruitment by foreign intelligence services Liaison with universities that have ties to defense contractors Attending & hosting conferences Hacking Visiting scientific and research delegations Circumventing export control laws Researches and facilities relocated overseas HOW do they accomplish it?

Collection Techniques  US Travelers Abroad Electronic monitoring devicesElectronic monitoring devices Foreigners IOs trained to ask the right questionsForeigners IOs trained to ask the right questions AirportsAirports  Traditional Espionage Spotting/Assessing/RecruitingSpotting/Assessing/Recruiting

WHY do people engage in this? Recruited By Family or Friend Recruited By Foreign IO Volunteers Money Ideology Disgruntlement/RevengeIngratiation CoercionThrills/Self-importance Personnel Security Research Center (PERSEREC)

HUMAN FIREWALL What projects are you working on? Would you be interested in joining me in a joint project? I’ve lost my access card/password; can you help me out? Come here often? Can I answer this question without giving away trade secrets? Why are you offering this to me? Do you have legitimate access? Mirror Mirror …

Oilfield Theft Task Force  Identified over $78 million in losses due to theft  Similar per capita losses in Rocky Mountain Region.  Concentrate efforts on organized / interstate major theft organizations.

Mission Statement  “To reduce the impact of oilfield theft by prioritizing and targeting the most significant organizations and individuals responsible for the theft and interstate shipment of oilfield equipment and product.”

The Toolbox  Employ proactive intelligence collection.  Effective liaison with private sector.  Law Enforcement cooperation.  Sophisticated investigative techniques.  Enterprise Theory of Investigation.

Questions SA Matthew W. Espenshade (432)