Presentation is loading. Please wait.

Presentation is loading. Please wait.

Technical Counterintelligence Technical Surveillance Counter Measures Services.

Similar presentations


Presentation on theme: "Technical Counterintelligence Technical Surveillance Counter Measures Services."— Presentation transcript:

1 Technical Counterintelligence Technical Surveillance Counter Measures Services

2 Overview “In a world that increasingly measures power in economic as well as military terms, many foreign intelligence services are turning their sights to stealing American technology and trade secrets.” - Former CIA Director, Robert Gates

3 Economic Espionage French government ministry dedicated exclusively to the collection of intelligence or, more directly, to conducting economic espionage about any company competing with corporations in France. Directorate-General for External Security (DGSE)

4 Economic Espionage “This espionage activity is an essential way for France to keep abreast of international commerce and technology. Of course, it was directed against the United States as well as others. You must remember that while we are allies in defense matters, we are also economic competitors in the world.” - Retired Director of the DGSE, Pierre Marion

5 Economic Espionage “Economic Espionage attempts to disadvantage unfairly without legitimate competition.” “It strikes at the heart of our national security… our economic strengths; our position in the world; our future as a country.” “FBI’s #2 Priority; only terrorism ranks above it.” Interview with Dave Szady - FBI Assistant Director

6 Economic Espionage $888 Million US Dollars in illegal eavesdropping equipment sold each year in US alone… according to US State Dept. $512 Million US Dollars of eavesdropping equipment believed to be installed in US Corporations - Ottawa Business Journal February 15, 2006

7 Economic Espionage It is often stated that there is little or no evidence of technical security threats, past or present. Yet we all know that the mere suggestion of a security breach brings the largest organization to a stand still. And no one dares breathe a word of the situation outside of the organization.

8 Economic Espionage Surprisingly, there is a great deal of evidence processed and analyzed by the National Counterintelligence Executive. Their annual report to Congress is very explicit – Foreign Espionage has doubled every year. Their reports for the last 10 years are located at: www.ncix.gov

9 Economic Espionage

10

11 What is the Additional Value? (Dollars in Billions) 111.857 - 29.963 81.894 Company Stock Value Company Assets Value Company Value Based on Faith 73% of Company Value is an Intangible Asset

12 Technical Surveillance Countermeasures Wire taps… mini-cameras… hidden microphones… Sounds like something out of a spy novel or movie, doesn't it? Electronic surveillance is real. Competitors use it. Even so, you can protect yourself with Technical Surveillance Countermeasures (TSCM), thanks to Professional Protection Incorporated (PPI).

13 Technical Surveillance Countermeasures A large variety of economic intelligence can easily be grouped with national security and corporate information. Therefore, it should be controlled and protected as strictly military, government, or corporate secrets.

14 Technical Surveillance Countermeasures The break-up of the Soviet Union did not eliminate a competitor, it created dozens more. All still very focused on the same target and aggressively collecting intelligence.

15 Technical Security Professional Protection Incorporated implements the following defensive measures to properly protect sensitive intelligence. Technical Threat Analysis Radio Frequency Analysis Acoustic Analysis Thermal Analysis Physical Search and Analysis

16 Technical Security The following is a list of the services that will be provided to protect the variety of sensitive intelligence associated with organizational operations.

17 TSCM Services Dignitary Protection Fixed-Facility Evaluations In-Conference Monitoring Preconstruction and Construction Surveys Reactionary Surveys

18 Countermeasures Develop and implement the initial technical security policies for dignitary protection. Establish advanced party operations to be conducted 24 to 48 hours prior to arrival of principal at remote site. Ensure remote site is technically secure and maintain security until the area can be handed off to primary physical protection team. Maintain technical over-watch until principal departs the area. Establish and maintain technical security training and liaison between technical operations personnel and physical protection team personnel. Dignitary Protection

19 Countermeasures Establish the initial technical security of the facility, and develop and implement the technical security program for facility operations. Annually evaluate the technical security program for required modifications due to environmental changes and growth in technology. Conduct and maintain technical security training program for security personnel and facility personnel. Fixed-Facility Evaluations

20 Countermeasures Establish and implement technical security policies and procedures for sensitive conferences and meetings. Conduct live conference monitoring for both local and remote operations. Establish and implement technical security training for facility security and executive personnel. In-Conference Monitoring

21 Establish and implement the technical procedures to validate new building construction is properly supervised to ensure that technical hazards and/or penetrations are not installed or built into a new facility. Establish and implement the technical procedures to ensure that technical hazards and or penetrations are not installed or built into existing building. Preconstruction and Construction Surveys Countermeasures

22 Establish and implement the procedures for proper reporting of suspected penetrations or attempts. Establish and implement the training program to help executives understand the important difference between nullification and exploitation. Reactionary Surveys

23 Contact Mail:Professional Protection Incorporated 1101 Tyvola Road ▪ Suite 202 Charlotte, North Carolina 28217-3515 Business: (704) 523-1107 (704) 523-1660 Fax: (704) 523-5007 E-mail: ppi-sales@ppi-inc.net Web Site: www.ppi-inc.net


Download ppt "Technical Counterintelligence Technical Surveillance Counter Measures Services."

Similar presentations


Ads by Google