The Defense Security Service (DSS) has released its annual unclassified report titled Targeting U.S. Technologies, A Trend Analysis of Reporting from Defense Industry, for Fiscal Year 2011 (FY11). The 75-page document is an analysis of foreign collection efforts and espionage that targets U.S. technology, intellectual property, trade secrets and proprietary information. It is an important report that should be reviewed by all members of industry to understand the importance of counter-espionage in your security efforts and for reporting suspicious contact efforts to appropriate agencies.

The Executive Summary of the report discusses Regional Trends and FY11 Collection Trends. DSS has established 4 regions of the world to group data – East Asia and The Pacific, Near East, Europe and Eurasia, and South and Central Asia. DSS also identifies 5 collector affiliations (commercial, individual, government, etc), 11 methods of operation (attempted acquisition of technology, academic solicitation, conferences or trade shows, etc), and the top 12 targeted technologies (information systems, aeronautics systems, electronics, etc).

Special Focus Area. The special focus area for FY11 is radiation-hardened microelectronics (RHM). RHM technology is essential in high-altitude flights and space operations, in particle accelerators, and fusion or fusion reactions processes. Attempts to obtain RHM technology from industry has risen 17% from FY10 to FY11. The primary region of origin for the collection efforts was East Asia and the Pacific; collector affiliation most often identified was commercial; and the methods of operation most often used were attempted acquisition of technology and requests for information.

The bulk of the report analyzes each of the 4 regions and identifies which collection affiliations are most active, which methods of operation are most used and which technologies are targeted most often. The report also provides a comparative analysis of FY10 and FY11 data, an outlook on future efforts, and case studies. A summary of regions reveals the following:

East Asia and the Pacific. The collector affiliation most often identified was commercial; the methods of operation most often used were suspicious network activity and attempted acquisition of technology; and the most often targeted technology was information systems.

Near East The collector affiliation most often identified was government affiliated; the methods of operation most often used were academic solicitation and attempted acquisition of technology; and the most often targeted technology was information systems.

Europe and Eurasia. The collector affiliation most often identified was commercial; the methods of operation most often used were attempted acquisition of technology and requests for information; and the most often targeted technologies were aeronautics systems and lasers, optics and sensors.

South and Central Asia. The collector affiliation most often identified was commercial; the methods of operation most often used were attempted acquisition of technology and requests for information; and the most often targeted technologies were information systems and lasers, optics and sensors.

In summary, no country or area of the world is above collecting or attempting to collect important information from U.S. companies. I must note, along with DSS, that this report is only as good as the input, namely reports from industry of suspicious or direct attempts by unknown or unauthorized sources to obtain information. It takes active efforts from all involved parties, Government and industry, to thwart these efforts and report such efforts to appropriate agencies.

Related News

William Loveridge is a Facility Security Officer, a security consultant, a retired DoD personnel security adjudicator and a retired US Army Reserve Warrant Officer.