1 / 20

Defense Security Service 12 x 13 Instruction Guide

Defense Security Service 12 x 13 Instruction Guide. www.dss.mil. Partnering with Industry to Protect National Security. Purpose. To introduce industry partners to the 12x13 tool The 12x13 is: A physical depiction of trends data The threat picture as we see it

graceland
Télécharger la présentation

Defense Security Service 12 x 13 Instruction Guide

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Defense Security Service 12 x 13 Instruction Guide www.dss.mil Partnering with Industry to Protect National Security

  2. Purpose • To introduce industry partners to the 12x13 tool • The 12x13 is: • A physical depiction of trends data • The threat picture as we see it • A way for DSS to articulate threat to cleared industry • A way to discuss countermeasures employed against the threat

  3. Technology Trends Report This report reflects a continued rise in reported suspicious contact attempts to obtain sensitive or classified information and technology. Reports from cleared industry increased by almost 18 percent from FY15. For the fifth year in a row, the top four collector regions remained the same. Collectors in the East Asia and the Pacific region, followed by the Near East, South and Central Asia, and Europe and Eurasia posed the most threat to information and technology resident in cleared industry. As in FY15, collectors from the Western Hemisphere and Africa posed the least threat in FY16, collectively accounting for just 7 percent of the overall threat. For the fourth consecutive year, aeronautic systems; command, control, communication, and computers (C4); and electronics made up the top three targeted technologies. However, in FY16, aeronautic systems moved from third to first, while C4 remained second and electronics dropped to third. Radars and armament and survivability finished out the top five targeted technologies.

  4. Industrial Base Technology Listing (IBTL) A – Materials, Raw & Processed B – Electronics C – Manufacturing Equipment & Processes D – Lasers E – Directed Energy F – Optics G – Sensors (Acoustic) H – Positioning, Navigation, Timing I – Radars J – Signature Control K – Aeronautic Systems L – Space Systems M – Marine Systems N – Ground Systems O – Armaments & Survivability P – Energy Systems & Energetics Q – Nuclear R – Biological S – Chemical T – Emerging Technology U – Agricultural V – Medical W – C4 Systems X – Software Y – Services & Other Products Partnering with Industry to Protect National Security

  5. Industrial Base Technology List - defined To organize its targeting analysis, DSS applies a system of categories and subcategories that identify and define technologies. DSS analyzed foreign interest in U.S. technology in terms of the 25 sectors of the DSS-developed Industrial Base Technology List (IBTL). The IBTL is a compendium of the science and technology capabilities under development worldwide that have the potential to significantly enhance or degrade U.S. military capabilities in the future.

  6. Methods of Contact / Methods of Operation • Text • Text

  7. Risk Management

  8. DSS METHODS OF OPERATION & METHODS & CONTACT MATRIX: BLANK H M L VERSION: 18.1 – 4 JAN18 HIGH MEDIUM LOW UNREPORTED

  9. FY17 OVERALL 12x13 METHODS OF OPERATION & METHODS OF CONTACT MATRIX

  10. IBTL CAT B (ELECTRONICS) METHODS OF OPERATION & METHODS OF CONTACT MATRIX

  11. IBTL CAT A (MATERIALS, RAW AND PROCESSED)METHODS OF OPERATION & METHODS OF CONTACT MATRIX

  12. IBTL CATS: A & B (ELECTRONICS, RAW MATERIALS)METHODS OF OPERATION & METHODS OF CONTACT MATRIX

  13. Quantifying the Threat

  14. Questions? DSS CI Strategic Engagement Division Contact: dss.quantico.dss-ci.mbx.gray-torch@mail.mil DSS CI South Region Contact: SA Steve Michaud: Stephan.j.Michaud.civ@mail.mil Partnering with Industry to Protect National Security

  15. Reporting Discussion • Open and honest discussion • Intended to highlight best practices • Intended to educate • Hopefully these case studies allow you to envision 12 x 13 application as well

  16. Case Study #1 In February 2017, CC employees were approached at a foreign defense conference. A known Chief Designer for a company based in an adversarial Eurasian country approached the CC booth and questioned CC employees. The Chief Designer focused on specific systems and asked CC employees questions, the answers to which were not publically releasable. The Chief Designer was seeking performance, testing, and evaluation specifics which no doubt would help his own efforts.

  17. Case Study #2 In February 2017, CC employees were approached at a foreign defense conference. A Production Designer for a large defense contractor in an adversarial Asian country approached a CC booth and engaged the employees. The Production Designer noted he was over the program fielding the foreign ‘knock-off” version of the CC product. The Production Designer engaged the CC employee with specific application questions, and appealed to the CC employees knowledge of the system. The Production Designer also introduced the CC employee to other high ranking officials from his Asian company.

  18. Case Study #3 In Fall 2017, a CC employee returning from a trip to Asia, noticed something unusual with his personal electronics. Upon returning home, the CC employee noted the electronic device had been altered. The CC employee had not used the device during his travel; but when he returned home he noticed the language settings had been changed. The CC employee turned the device into his employers security team for analysis.

  19. Comments / Discussion? SA Steve Michaud Defense Security Service South Region 469-329-6375 Stephan.j.Michaud.civ@mail.mil

More Related