2011 Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry - DSS Protection of National Security Classified Information from Espionage, Sabotage, and Terrorism

Nonfiction, Social & Cultural Studies, Political Science
Cover of the book 2011 Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry - DSS Protection of National Security Classified Information from Espionage, Sabotage, and Terrorism by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781476255231
Publisher: Progressive Management Publication: April 5, 2012
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781476255231
Publisher: Progressive Management
Publication: April 5, 2012
Imprint: Smashwords Edition
Language: English

Every day, foreign entities attempt to break through our collective defenses to illegally acquire U.S. technological secrets. Our national security rests on our collective success at thwarting these persistent attacks. The stakes are high in the battle against foreign collection and espionage targeting U.S. technology, trade secrets, and proprietary information. Not only is our national security at risk but also our technological edge, which is closely tied to the health of our economy and the economic success of the cleared contractor community. Most importantly, every time our adversaries gain access to restricted information it jeopardizes the lives of our warfighters, since those adversaries can use the information to develop more lethal weapons or countermeasures to our systems.

Preventing such loss is a team effort. The Defense Security Service (DSS) supports national security by overseeing the protection of the nation's technological base and both U.S. and foreign classified information in the hands of cleared industry. The DSS Counterintelligence Directorate seeks to identify and stop those who would unlawfully penetrate our defenses. In this mission, DSS relies on the support of cleared contractor employees and the U.S. intelligence and law enforcement communities. This publication, Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry, presents the annual statistical analysis of suspicious contact reports (SCRs) from industry provided to the Defense Security Service (DSS). The information contained in this publication helps employees, companies, and intelligence and law enforcement professionals better understand the continuing yet changing nature of the threats we face. Increased awareness of the targeted technologies and the methods of operation that foreign entities use in their attempts to acquire U.S. technologies will only make us better at identifying and thwarting their efforts.

Like any publication, this one is only as good as the information that goes into it. The SCRs DSS analyzes originate with cleared contractor employees. Timely and accurate reporting of illicit collection attempts are the foundation upon which this process rests. Thus, the cleared contractor community is both a supplier to and a customer of DSS. This long-standing and interdependent relationship functions best when both partners understand all stakeholders' needs, build strong relationships on the basis of trust, and interact with each other in a cooperative fashion.

The process that begins with reporting and continues with ongoing and collective analysis reaches its ultimate stage in successful investigations or operations. In fiscal year 2010, federal investigative or intelligence agencies opened more than 200 operations or investigations based on information that industry provided to DSS. These foreign collectors were identified, isolated, diverted, or otherwise thwarted.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Every day, foreign entities attempt to break through our collective defenses to illegally acquire U.S. technological secrets. Our national security rests on our collective success at thwarting these persistent attacks. The stakes are high in the battle against foreign collection and espionage targeting U.S. technology, trade secrets, and proprietary information. Not only is our national security at risk but also our technological edge, which is closely tied to the health of our economy and the economic success of the cleared contractor community. Most importantly, every time our adversaries gain access to restricted information it jeopardizes the lives of our warfighters, since those adversaries can use the information to develop more lethal weapons or countermeasures to our systems.

Preventing such loss is a team effort. The Defense Security Service (DSS) supports national security by overseeing the protection of the nation's technological base and both U.S. and foreign classified information in the hands of cleared industry. The DSS Counterintelligence Directorate seeks to identify and stop those who would unlawfully penetrate our defenses. In this mission, DSS relies on the support of cleared contractor employees and the U.S. intelligence and law enforcement communities. This publication, Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry, presents the annual statistical analysis of suspicious contact reports (SCRs) from industry provided to the Defense Security Service (DSS). The information contained in this publication helps employees, companies, and intelligence and law enforcement professionals better understand the continuing yet changing nature of the threats we face. Increased awareness of the targeted technologies and the methods of operation that foreign entities use in their attempts to acquire U.S. technologies will only make us better at identifying and thwarting their efforts.

Like any publication, this one is only as good as the information that goes into it. The SCRs DSS analyzes originate with cleared contractor employees. Timely and accurate reporting of illicit collection attempts are the foundation upon which this process rests. Thus, the cleared contractor community is both a supplier to and a customer of DSS. This long-standing and interdependent relationship functions best when both partners understand all stakeholders' needs, build strong relationships on the basis of trust, and interact with each other in a cooperative fashion.

The process that begins with reporting and continues with ongoing and collective analysis reaches its ultimate stage in successful investigations or operations. In fiscal year 2010, federal investigative or intelligence agencies opened more than 200 operations or investigations based on information that industry provided to DSS. These foreign collectors were identified, isolated, diverted, or otherwise thwarted.

More books from Progressive Management

Cover of the book Effects of UAVs on Interstate Relationships: A Case Study of U.S. Relations With Pakistan and Yemen - UAS, Drones, al-Qaeda, AQAP, Saudi Arabia, Arab Spring, Anwar al-Awlaki, Collateral Damage by Progressive Management
Cover of the book The Report of the Presidential Commission on the Space Shuttle Challenger Accident: The Tragedy of Mission 51-L in 1986 - Volume Three, Appendix O, Search, Recovery and Reconstruction Report by Progressive Management
Cover of the book NASA International Space Station (ISS) Oral History Project: Interviews with Astronauts, Managers - Cabana, Chilton, Suffredini, Voss, Whitson, Williams, Columbia Shuttle Accident, Chilean Mine Rescue by Progressive Management
Cover of the book U.S. Air Force Mishap Prevention Program - Air Force Instruction (AFI) 91-202 - Main USAF Document and Air National Guard Supplement, Aviation, Nuclear, Space Safety by Progressive Management
Cover of the book U.S. Military Deployments to Africa: Lessons from the Hunt for Joseph Kony and the Lord's Resistance Army (LRA) - Uganda, Sub-Saharan Africa, Special Operations (SOF), People's Liberation Army (SPLA) by Progressive Management
Cover of the book The Innate Insurgent Advantage: Can Training and Planning Bridge the Gap? Iraqi Freedom and Enduring Freedom, Afghanistan, Terrorism, Casualties and Chaos, COIN Counterinsurgency, MRAP Vehicles, Kits by Progressive Management
Cover of the book Using Their Own People Against Them: Russia's Exploitation of Ethnicity in Georgia and Ukraine - Putin, Crimea, Donbras, Ethnonationalism Foreign Policy, NATO, Hybrid War and Propaganda, Insurgency by Progressive Management
Cover of the book War in the Balkans, 1991-2002: Comprehensive History of Wars Provoked by Yugoslav Collapse: Balkan Region in World Politics, Slovenia and Croatia, Bosnia-Herzegovina, Kosovo, Greece, Turkey, Cyprus by Progressive Management
Cover of the book Fighting in the Mountains and Among the People: Imperial Russian and Early Soviet Population-Centric Counterinsurgency - Caucasian War and Bolshevik Suppression of Basmachi Rebellion (1919-1933) by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Chronic Myeloproliferative Disorders - Chronic Myelogenous Leukemia, Polycythemia Vera, Myelofibrosis, Thrombocythemia, Neutrophilic Leukemia by Progressive Management
Cover of the book Saturn IB Flight Manual (Skylab Saturn 1B Rocket) - Comprehensive Details of H-1 and J-2 Engines, S-IB and S-IVB Stages, Launch Facilities, Emergency Detection and Procedures by Progressive Management
Cover of the book Educating Captains for War: Deliberately Designing Professional Military Education - School of Advanced Leadership and Tactics (SALT), Development of Captains' Career Course (CCC) Curricula by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Counterinsurgency (COIN) Field Manual (FM 3-24) Tactics, Intelligence, Airpower by Petraeus - Plus Bonus IED Coverage (Value-added Professional Format Series) by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Marine Division Expeditionary Ground Combat Marine Corps Field Manual - FMFM 6-1 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Essential Guide to Child Abuse and Missing Children: Law Enforcement and Family Response, Injuries, Illness, Fatalities, STDs and Sexual Abuse, Battered Child Syndrome, Burn Injuries, AMBER Alert by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy