You are on page 1of 15

The Defense

Counterintelligence
and Security Agency
(DCSA) and Foreign
Ownership, Control
or Influence (FOCI)
Handbook
The Defense Counterintelligence and Security Agency (DCSA) and
Foreign Ownership, Control or Influence (FOCI) Handbook

TABLE OF CONTENTS
INTRODUCTION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Defense Counterintelligence and Security Agency (DCSA)
Foreign Ownership, Control or Influence (FOCI)

FOCI MITIGATION INSTRUMENTS. . . . . . . . . . . . . . . . . . . . . . . . . . . . 5


Foreign Ownership
Board Resolutions
Security Agreements
Voting Trust Agreements and Proxy Agreements
Foreign Control or Influence

RISK-BASED SECURITY OVERSIGHT (RISO). . . . . . . . . . . . . . . 7


The New Methodology
New Security Review & Rating Models
DCSA Engagement with Cleared Industry
Comparing Old and New Approaches to Cleared Facility Oversight

OTHER RECENT DEVELOPMENTS. . . . . . . . . . . . . . . . . . . . . . . . . . . . 10


DCSA Granted Background Investigations Responsibility
SF 328 Revisions
DCSA Growth
Counterintelligence Report Finds Increased Attempts
to Hack Sensitive/Classified Information

COMPLIANCE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Due Diligence
Avoiding Potential Pitfalls
Reporting and Investigating Security Breaches

WILEY’S FOCI AND DCSA OVERSIGHT EXPERIENCE . . . 13

CONTACT US. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

ii ©2020 Wiley Rein LLP
The Defense Counterintelligence and Security Agency (DCSA) and
Foreign Ownership, Control or Influence (FOCI) Handbook

INTRODUCTION
The National Industrial Security Program (NISP) compliance regime to an intelligence-based,
was established in 1993 by Executive Order 12829 threat-driven methodology.
to ensure that persons and entities with access
Central to this reform is the Defense Counterin-
to classified or sensitive information comply with
telligence and Security Agency (DCSA). Until June
industry safeguards equivalent to those within
2019, the Defense Security Service (DSS) served
the U.S. government for protecting such infor-
as the Cognizant Security Office for the DOD
mation. Issued in accordance with the NISP, the
responsible for administering and implementing
National Industrial Security Program Operating
the NISP and regulatory control over classi-
Manual (NISPOM) sets forth the requirements,
fied information. On June 20, 2019, the DSS was
restrictions, and other safeguards to prevent the
renamed DCSA.
unauthorized disclosure of classified information.
The NISPOM also prescribes procedures for the As a continuation of the former DSS, DCSA
authorized disclosure of such information by the maintains industrial security responsibilities;
U.S. government to its contractors. The NISPOM however, the name change reflects DCSA’s new
is periodically updated to reflect changes and role as administrator of personnel vetting and
updates in industrial security matters. security clearance responsibilities for the entire
federal government. Accordingly, federal security
U.S. government contracts that require access
clearance entities are being merged into DCSA.
to classified information will not be awarded to
The National Background Investigations Bureau
companies operating under foreign ownership,
(NBIB) was transferred from the U.S. Office of
control or influence (FOCI) unless adequate
Personnel Management (OPM) to the DCSA
safeguards are in place to protect national
on September 29, 2019. The DOD Consolidated
security interests. U.S. contractors must take
Adjudications Facility (CAF)—which determines
specific measures to mitigate or negate FOCI
security clearance eligibility of non-intelligence
concerns in order to obtain and maintain classi-
agency DOD personnel occupying sensi-
fied contracts. The U.S. Department of Defense’s
tive positions or requiring access to classified
(DOD) FOCI policy is premised, in part, on the
material—merged into DCSA on October 1, 2019.
notion that foreign investment in the U.S. defense
This consolidation of federal security clearance
industry serves national security interests and
operations will be complete once the DCSA takes
is encouraged; however, adequate safeguards
over certain functions of the Defense Informa-
must be in place to ensure that national security
tion Systems Agency (DISA) and the Defense
interests are protected.
Manpower Data Center (DMDC), which are to be
Defense Counterintelligence and transferred to DCSA by October 1, 2020.
Security Agency (DCSA) DCSA’s current mission includes vetting and
The DOD is fundamentally changing its approach maintaining a trusted workforce, protecting
to administering the NISP on behalf of all Execu- critical technology, and providing professional
tive branch departments and agencies. Through security education. DCSA’s primary functions
this initiative, the DOD is transitioning its security are clearing industrial facilities, personnel, and
oversight approach from a schedule-driven

2 ©2020 Wiley Rein LLP
The Defense Counterintelligence and Security Agency (DCSA) and
Foreign Ownership, Control or Influence (FOCI) Handbook

associated information systems; collecting, ■ Record of economic and government es-


analyzing, and providing threat information to pionage against U.S. targets by the foreign
industry and government partners; managing government;
FOCI in cleared industry; providing advice and ■ Company’s record of enforcement or engage-
oversight to industry; delivering security educa- ment in unauthorized technology transfer;
tion and training; and providing information
technology services that support the industrial ■ Type and sensitivity of the information requir-
security mission of the DOD and its partner ing protection;
agencies. ■ Nature and extent of FOCI by a foreign
government;
To carry out its NISP oversight duties, DCSA
employs more than 350 industrial security repre- ■ Company’s record of compliance with U.S.
sentatives across 167 field offices in the United laws, regulations, and contracts; and
States. The field offices provide oversight and ■ Nature of any bilateral and multilateral secu-
assistance to cleared industry. Currently, DCSA is rity and information exchange agreements.
responsible for providing security support services
to approximately 13,000 cleared contractor facili- To help inform DCSA’s analysis of these factors,
ties participating in the NISP. companies must complete the Standard Form (SF)
328, “Certificate Pertaining to Foreign Interest.”
Foreign Ownership, Control or The SF 328 includes the following questions,
Influence (FOCI) which assist DCSA in assessing the potential FOCI
DCSA grants security clearances that permit of a company:
companies and their personnel to perform classi-
■ Do any foreign person(s), directly or indirectly,
fied work. DCSA first clears the entity as a whole
own or have beneficial ownership of 5% or
by issuing a Facility Security Clearance (FCL), and
more of the outstanding shares of any class of
then clears its individual employees engaged in
your organization’s equity securities?
classified work by granting Personnel Security
Clearances (PCLs). Key Management Personnel ■ Has any foreign person, directly or indirectly,
must have a PCL at the same level as the facility— subscribed 5% or more of your organization’s
Confidential, Secret, or Top Secret—before DCSA total capital commitment?
will issue a final FCL. In addition, a contractor ■ Does your organization, directly or indirectly
operating under foreign ownership, control or through your subsidiaries and/or affiliates,
influence must take certain steps to mitigate the own 10% or more of any foreign interest?
FOCI before DCSA will issue an FCL.
■ Do any non-U.S. citizens serve as members
A company is generally considered to be of your organization’s board of directors (or
operating under FOCI whenever a foreign interest similar governing body), officers, executive
has the power, direct or indirect, to decide or personnel, general partners, regents, trustees
direct matters affecting the company’s opera- or senior management officials?
tions, which may result in unauthorized access
■ Do any foreign person(s) have the power,
to classified information or adversely affect
direct or indirect, to control the election,
the performance of classified contracts. DCSA
appointment or tenure of members of your
considers the following factors in the aggregate
organization’s board of directors (or similar
in evaluating whether a company is operating
governing body) or other management posi-
under FOCI and determining what mitigation
tions of your organization, or have the power
measures are required:

3 ©2020 Wiley Rein LLP
The Defense Counterintelligence and Security Agency (DCSA) and
Foreign Ownership, Control or Influence (FOCI) Handbook

to control or cause the direction of other deci- officials hold any positions with, or serve as
sions or activities of your organization? consultants for, any foreign person(s)?
■ Does your organization have any contracts, ■ Is there any other factor(s) that indicates
agreements, understandings or arrangements or demonstrates a capability on the part of
with a foreign person(s)? foreign persons to control or influence the op-
erations or management of your organization?
■ Does your organization, whether as borrower,
surety, guarantor or otherwise, have any A company must provide corporate documenta-
indebtedness, liabilities or obligations to a tion to clarify the nature and extent of the foreign
foreign person(s)? interest for any “yes” answer to a question on the
■ During your last fiscal year, did your organiza- SF 328.
tion derive: (a) 5% or more of its total revenues Importantly, a company’s FOCI factors are not
or net income from any single foreign person? only reviewed as part of the initial facility clear-
(b) In the aggregate, 30% or more of its rev- ance process, they are continuously revisited
enues or net income from foreign persons? throughout the life of the FCL in order to address
■ Is 10% or more of any class of your organiza- any changes that have occurred since the
tion’s voting securities held in “nominee” receipt of the clearance. For this reason, when a
shares, in “street names” or in some other company with an FCL enters into negotiations for
method which does not identify the beneficial a proposed merger, acquisition, or takeover by a
owner? foreign entity, the cleared entity must notify DCSA
and inform DCSA of the type of transactions under
■ Do any of the members of your organization’s
negotiation (stock purchase, asset purchase, etc.),
board of directors (or similar governing body),
the identity of the potential foreign investor, and
officers, executive personnel, general part-
plans to mitigate/negate FOCI.
ners, regents, trustees or senior management

4 ©2020 Wiley Rein LLP
The Defense Counterintelligence and Security Agency (DCSA) and
Foreign Ownership, Control or Influence (FOCI) Handbook

FOCI MITIGATION INSTRUMENTS


DCSA has developed mechanisms for addressing instrument where a foreign person effectively
issues that arise due to FOCI. The level of intru- owns or controls a company. Implementation
siveness of the control structures (or mitigation of the SSA requires active involvement of senior
instruments) has traditionally depended princi- management. It also requires that certain board
pally on the extent of FOCI and the sensitivity members are U.S. citizens with no connection to
of the information underlying the classified the foreign interest (i.e., “Outside Directors”). The
contracts. In the event that foreign shareholders SSA maintains the foreign shareholder’s right to
have the power to appoint one or more foreign be represented on the board of directors as an
nationals to the board, DCSA will likely require Inside Director with a direct voice in the manage-
that the company take significant measures in ment of the company, while denying the foreign
order to remain eligible for classified contracts. shareholder unauthorized access to classified
information. In addition, the SSA requires the
Foreign Ownership
creation of a Government Security Committee
The DCSA recognizes three general mitiga- (GSC), which oversees classified and export-
tion instruments to address FOCI of a company controlled matters for the company. Under an
or corporate family: (1) a Board Resolution; (2) SSA, the GSC is composed of cleared officers/
a Special Security Agreement/Security Control directors and Outside Directors.
Agreement; and (3) a Voting Trust/Proxy Agree-
ment, as well as some combination of the three Because the SSA is used when a company is
instruments. effectively owned or controlled by the foreign
entity, frequently, an SSA will involve the creation
Board Resolutions of a separate subsidiary to bid on and perform
A Board Resolution is the least restrictive FOCI all classified work. This subsidiary must operate
mitigation instrument. DCSA generally views this independently with respect to classified contracts
instrument as sufficient to mitigate FOCI where and must demonstrate financial viability. The goal
a foreign person does not own enough voting of an SSA is to create an arms-length relationship
stock to elect a board member, or otherwise is between the parent, which does not have access
not entitled to representation on the board of to classified information, and its cleared subsid-
directors. iary. SSAs are formal arrangements that can be
burdensome, as they give DCSA a prominent role
A Board Resolution identifies foreign shareholders
in the management of the relevant company.
and creditors, acknowledges the company’s
obligation to comply with all industrial security Although the SSA was not intended to permit
program requirements, and certifies that each access to information above the Secret Level,
of the foreign shareholders and creditors identi- there are exceptions to this rule. Tradition-
fied in the resolution will not have access to any ally, a company operating under an SSA could
classified information. This mitigation instrument access Top Secret or higher information only if it
is not available for companies that have foreign obtained a National Interest Determination (NID).
nationals serving on their boards of directors. In order to obtain a NID, a company is required
to present “compelling evidence” that the release
Security Agreements
of the classified information “advances the
The Special Security Agreement (SSA) includes national security interests of the United States.”
significant industrial security measures within The NID process is currently undergoing major
an institutionalized set of corporate practices revisions as a result of long-standing concerns
and procedures. DCSA employs this mitigation

5 ©2020 Wiley Rein LLP
The Defense Counterintelligence and Security Agency (DCSA) and
Foreign Ownership, Control or Influence (FOCI) Handbook

by industry and recently enacted legislation. For Voting Trust Agreements and Proxy
example, the John S. McCain National Defense Agreements
Authorization Act for Fiscal Year 2019 eliminated Voting Trust Agreements (VTAs) and Proxy Agree-
the NID requirement effective October 1, 2020, ments (PAs) are the most restrictive mitigation
for companies that are operating under FOCI instruments. They are typically used to mitigate
and the parent company is within the National FOCI concerns where a foreign shareholder is in
Technology and Industrial Base—which includes a position to control a U.S. company and the U.S.
Australia, Canada, and the United Kingdom. company is handling very sensitive information,
A Security Control Agreement (SCA) is used usually at the Top Secret level. VTAs and PAs are
when a cleared company is not effectively owned substantially identical arrangements in which
or controlled by a foreign entity, but the foreign the voting rights of the foreign-owned stock are
interest is nonetheless entitled to representa- vested in Trustees (for VTAs) or Proxy Holders (for
tion on the company’s governing board. The PAs), who are cleared U.S. citizens approved by
SCA is substantially identical to the SSA with DCSA.
a few notable differences. Because the SCA is Under such agreements, the company must
used when a company is not effectively owned establish that it is organized and financed in
or controlled by the foreign interest, the SCA a manner that allows it to be a viable business
imposes fewer restrictions on the company for entity that is entirely independent from the foreign
the protection of classified information. shareholder. Accordingly, the Trustees and Proxy
Companies operating under either an SSA or SCA Holders act with all the prerogatives of stock
must implement an approved Technology Control ownership and have freedom to act independently
Plan (TCP). The TCP must establish “security from the foreign stockholders. Indeed, they are
measures determined necessary to reasonably tasked with exercising management functions
foreclose the possibility of inadvertent access over the company in order to effectively insulate
by non-U.S. citizen employees and visitors to the company from the foreign stockholders.
information for which they are not authorized.” However, the Trustee or Proxy Holder may be
In addition, the TCP must set forth measures required to obtain the approval of the foreign
designed to ensure “that access by non-U.S. stockholder with respect to the following business
citizens is strictly limited to only that specific activities: the sale or disposal of the corporation’s
information for which appropriate Federal assets or a substantial part thereof; pledges,
Government disclosure authorization has been mortgages or other encumbrances on the capital
obtained[.]” stock; corporate mergers, consolidations or
reorganizations; the dissolution of the corporation;
Companies operating under an SSA or SCA
and the filing of a bankruptcy petition. Given
must also develop and implement an Electronic
that VTAs and PAs require foreign investors to
Communications Plan (ECP). The ECP must
relinquish control over the company, investors
include adequate procedures for internet, email,
tend to disfavor these mitigation instruments.
phone use, etc., to ensure that no classified or
export-controlled information is improperly As with the SSA and SCA, both the VTA and PA
disseminated through electronic communi- require the establishment of a GSC, which ensures
cations. Importantly, companies/contractors that the company maintains and complies with
operating under these agreements are subject to policies and procedures to protect classified and
annual review and certification requirements. export-controlled information.

6 ©2020 Wiley Rein LLP
The Defense Counterintelligence and Security Agency (DCSA) and
Foreign Ownership, Control or Influence (FOCI) Handbook

Under a VTA and PA, the GSC is composed of ■ Assigning specific oversight duties and re-
Proxy Holders or Trustee Directors and those sponsibilities to independent board members;
officers of the company who hold adequate ■ Formulating special executive-level security
security clearances. Further, both the VTA and committees to consider and oversee matters
PA require the establishment of a TCP and ECP. that affect the performance of classified
In addition, contractors operating under these contracts;
agreements are subject to annual review and
certification requirements. ■ Appointing a technology control officer;
■ Modifying or terminating loan agreements,
In contrast to PAs, VTAs are rarely, if ever,
contracts, and other understandings with
employed as a FOCI mitigation mechanism.
foreign interests;
Foreign Control or Influence
■ Diversifying or reducing foreign-source
When foreign control or influence factors are income;
present, but are unrelated to ownership, a mitiga-
■ Demonstrating financial viability independent
tion plan must contain positive measures to effec-
of foreign interests;
tively deny the foreign interest access to classified
information and assure that the foreign interest ■ Eliminating or resolving problem debt;
cannot otherwise adversely affect the company’s ■ Separating, physically or organizationally, the
performance on classified contracts. For example, contractor component performing on classi-
the DCSA has recognized the following measures: fied contracts.
■ Adopting Special Board Resolutions;

RISK-BASED SECURITY OVERSIGHT (RISO)


DCSA is changing the way the federal govern- unprecedented, and adversaries are using stolen
ment conducts industrial security oversight of information to upgrade their military capabilities
FCLs, including those under the FOCI mitigation and compete against the U.S. economy. DCSA
instruments noted above. DCSA is working with is designing a NISP oversight methodology that
industry to develop and implement a security evolves as threats evolve.
methodology that couples NISPOM compliance
DCSA has acknowledged that its previous reliance
with an oversight process that focuses on the
on the NISPOM for oversight compliance proved
particular assets at a cleared facility, the threats
to be insufficient in the modern threat environ-
and vulnerabilities associated with those assets,
ment. DCSA highlighted three drawbacks to the
and appropriate countermeasures. In doing
NISPOM’s static nature: (1) failure to identify
so, the agency is changing the focus of its core
what information needs the most protection; (2)
functions from NISPOM compliance oversight,
failure to respond to the evolving methods used
to a system that uses threat information to more
by adversaries; and (3) failure to address inherent
accurately depict a facility’s security posture by
vulnerabilities in business processes and supply
understanding the specific assets at a facility.
chains.
This fundamental change is a response the rise of
This new security review methodology was piloted
foreign threats to the security of sensitive infor-
as “DSS in Transition” (DiT) and is now called Risk-
mation and technology within U.S. industry. The
based Security Oversight (RISO).
rate of successful attacks on cleared facilities is

7 ©2020 Wiley Rein LLP
The Defense Counterintelligence and Security Agency (DCSA) and
Foreign Ownership, Control or Influence (FOCI) Handbook

The New Methodology Advisory Committee and industry represen-


DCSA’s RISO methodology is a fluid model that tatives to develop this new security oversight
has evolved throughout its phased implementa- methodology, and began running pilot exercises.
tion rollout. DCSA has conceptualized RISO in Throughout 2018, DSS rolled out the RISO method-
five steps: Step 1: Prioritization; Step 2: Security ology at select facilities in four phases. In January
Baseline; Step 3: Comprehensive Security Review; through April 2018, DSS completed the first
Step 4: Tailored Security Plan; and Step 5: Contin- phase, which included four facilities. The second
uous Monitoring. phase ran from July to September 2018 with eight
participant facilities. The agency conducted the
1. Prioritization of the new methodology rollout
third phase in October 2018, and the fourth phase
is conducted in two tiers. DCSA’s initial prioriti-
from November 2018 through January 2019. In
zation occurs at the headquarters level and is
2019, the agency began implementing the DiT or
based on technologies and programs deemed
RISO methodology at additional facilities, begin-
to be critical to national security. Secondary
ning with those holding priority technologies—
prioritization occurs at the field office level and
assets and information most critical to national
is based on local workforce knowledge.
security. In June 2019, DSS became DCSA, and its
2. Contractors establish a Security Baseline by RISO implementation rollout continues.
identifying national security assets at their
New Security Review & Rating Models
facility and the security controls in place. The
Security Baseline is then used to develop a Tai- DCSA has introduced three security review types
lored Security Plan. to serve as alternatives to the traditional Security
Vulnerability Assessment (SVA) during the RISO
3. Comprehensive Security Review is an ex-
transition: (1) Comprehensive Security Review
amination of business processes and security
(CSR); (2) Targeted Security Review (TSR); and (3)
controls associated with asset lifecycles, supply
Enhanced SVAs.
chain protection, and related NISPOM com-
pliance elements. Interviews with contractor CSRs follow the new RISO approach completely
subject matter experts are used to identify as- and are conceptualized as Step 3 of the new
set-focused vulnerabilities. Those vulnerabili- methodology. Facilities that undergo a CSR are
ties are then tracked through a Plan of Action & not rated under the traditional rating model, and
Milestone (POA&M) document and inform the instead result in the development of a Tailored
development and implementation of an effec- Security Plan. In 2018, field personnel conducted
tive mitigation strategy. 61 CSRs and appear to have completed more
than double that number in 2019.
4. Contractors and DCSA develop a Tailored
Security Plan (TSP) based primarily on the TSRs follow the new methodology, except reviews
Security Baseline and POA&M. Supplemental are rated under the traditional ratings model and
asset protection components may be included do not result in a Tailored Security Plan.
through an addendum. Enhanced SVAs initially introduced facility
5. DCSA will conduct Continuous Monitoring of personnel to the RISO concepts of asset identi-
TSPs through recurring reviews by contractors fication and mapping business processes
and DCSA personnel. The objective of Continu- related to asset protection. In 2019, DCSA began
ous Monitoring is to ensure that the TSP secu- putting these concepts into practice by assisting
rity controls adequately and effectively protect contractors in identifying assets at their facili-
assets. ties, reviewing each facility’s business processes
related to security, and providing a matrix specific
In 2017, DSS began monthly meetings with the
to the facility and technology used at the facility.
National Industrial Security Program Policy

8 ©2020 Wiley Rein LLP
The Defense Counterintelligence and Security Agency (DCSA) and
Foreign Ownership, Control or Influence (FOCI) Handbook

Enhanced SVAs are rated under the old rating DCSA currently uses three engagement types
model and closely follow the traditional security as part of the RISO methodology: Targeted,
review format. Horizontal, and Vertical. Targeted engage-
ment focuses on classes of critical technology
Under the traditional ratings process, the Vulner-
at highest risk. Horizontal engagement focuses
ability Assessment Rating Matrix, DCSA assigns
broadly on the business networks surrounding
all facilities a Starting Score of 700 points. Points
a classified contract, including end-to-end
are added to this score for NISP enhancements,
supply chain security. Vertical engagement has a
which are actions a company takes to protect
programmatic focus from the government-client
classified information that extend beyond what is
perspective and addresses the integrity of a given
required under the NISPOM. Following the 2016
program across a team of contractors.
NISPOM update, there were 10 NISP enhance-
ment categories, including: information systems, Comparing Old and New Approaches to
active security organization membership, and Cleared Facility Oversight
physical security. Points are subtracted for viola- Old Approach:
tions based on NISPOM reference and not based
on the number of violation occurrences. The tradi- ■ Scheduling: Security reviews are scheduled on
tional security ratings process accounts for both a 90-day plan, prioritizing facilities with FOCI
the size and complexity of a facility in arriving at mitigation agreements and those with classi-
the final security rating. fied information systems. Facilities with FOCI
have security reviews 30 to 60 days before
As part of the RISO rollout, DCSA conducted on-site their mandatory annual meeting.
security reviews at facilities selected through its
■ Monitoring: Security reviews are focused on a
internal prioritization process, and some facili-
contractor’s compliance with NISPOM require-
ties did not receive an on-site review. DCSA field
ments and result in a security rating within the
offices engaged the contractors not receiving an
Vulnerability Assessment Rating Matrix.
enhanced review to assess the facility’s security
posture and discuss counterintelligence. New RISO Approach:
DCSA recently announced that it is developing ■ Scheduling: DCSA security reviews are priori-
a new industry rating model called the Security tized based on a facility’s assets and threats to
Rating Score (SRS). DCSA has engaged select those assets as determined by national intelli-
industry partners to conduct dry runs and a gence and the DOD’s critical technologies and
limited pilot of the SRS; however, the agency has programs list. Contractors and government
not yet made public the content of the SRS model officials work together to identify assets at
or the implementation’s details. each facility and develop a Tailored Security
Plan. Security reviews are scheduled in light of
DCSA Engagement with Cleared Industry
each facility’s Tailored Security Plan.
As DCSA shifts its focus from NISPOM compliance
■ Monitoring: DCSA conducts a comprehen-
to tailored critical technology protection, cleared
sive security review to establish a Tailored
industry must do the same. Contractors will need
Security Plan. Subsequent reviews assess the
to identify critical assets at their facility and the
implementation and adequacy of the Tailored
security controls in place, document business
Security Plan. DCSA is currently developing a
processes and supply chains, and develop and
new rating system—the SRS—to complement
monitor the effectiveness of Tailored Security
the Tailored Security Plan.
Plans.

9 ©2020 Wiley Rein LLP
The Defense Counterintelligence and Security Agency (DCSA) and
Foreign Ownership, Control or Influence (FOCI) Handbook

OTHER RECENT DEVELOPMENTS


DCSA Granted Background Investigations 2020). NDAA 2020 was signed into law in
Responsibility December 2019 and directs the Director of DCSA
Executive Order 13869, “Transferring Responsi- to submit semiannual reports to the congressional
bility for Background Investigations to the Depart- defense committees on the processes in place for
ment of Defense,” transferred the NBIB from adjudicating security clearances and the progress
OPM to DCSA, which was officially completed made to address the backlog of security clear-
September 30, 2019. Congress initiated this transi- ance applications. In addition, NDAA 2020 directs
tion in the National Defense Authorization Act for the Secretary of Defense to submit a report to
Fiscal Year (FY) 2018 in response to a major hack Congress on the expanded purview of the DCSA.
of OPM’s personnel data. Counterintelligence Report Finds
SF 328 Revisions Increased Attempts to Hack Sensitive/
Classified Information
SF 328, the Certificate Pertaining to Foreign
Interests, has been revised twice since April The DCSA Counterintelligence Directorate issued
2017. Revisions to the form in April 2017 included its most recent “Targeting U.S. Technologies: A
removing the requirement for application of Report of Foreign Targeting of Cleared Industry”
a corporate seal. In November 2018, revisions publication in February 2020. This unclassified
reflected the form’s applicability to the DOD report analyzes suspicious contact reports from
Enhanced Security Program and the DHS Classi- cleared companies that DCSA received in FY 2018.
fied Critical Infrastructure Protection Program, in DCSA also publishes an annual companion report
addition to the NISP. at the classified level. Such annual reporting
helps improve cleared industry’s awareness of
DCSA Growth who instigated a hacking attempt, where it came
In an era of heightened national security concerns, from, the purpose of the attempt, and the method
DCSA and its FOCI oversight programs have used. This information enables cleared compa-
grown significantly as illustrated in the RISO initia- nies to better identify and prevent future illicit
tive. In addition, the transfer of the background contact.
investigations mission and personnel dramati-
In FY 2018, cleared industry filed approximately
cally increases the size of DCSA. Congressional
50,000 reports of suspicious activities from
appropriations reflect DCSA’s growth and transi-
cleared facilities operating within the NISP. DCSA
tion expenses. For example, Congress allocated
classified 6,026 of these as suspicious contact
$545 million to DSS in FY 2015, $765 million for FY
reports (SCRs), which represents a 3% increase in
2019, and $900 million for FY 2020.
SCRs from FY 2017. SCRs are reports of attempts by
To date, over 1 million industry personnel have a foreign entity to obtain unauthorized access to
been cleared, and approximately 10,000 compa- sensitive or classified information and technology
nies and 13,000 contractor facilities are operating or compromise of a cleared employee. These
under NISP clearances. Further, there are attempts include actions by foreign govern-
approximately 268 FOCI mitigation agreements ments and international terrorist organizations.
currently in effect and 674 FOCI facilities. In FY 2018, the most targeted technology was
electronics, and integrated circuits were the
Congress expressed its interest in the successful
most targeted category of electronics. Aeronau-
transformation of the DCSA and DCSA’s admin-
tics systems were the second most targeted
istration of security clearances in the National
technology. Unmanned aerial vehicles were the
Defense Authorization Act for FY 2020 (NDAA

10 ©2020 Wiley Rein LLP
The Defense Counterintelligence and Security Agency (DCSA) and
Foreign Ownership, Control or Influence (FOCI) Handbook

most targeted category of aeronautics systems, operation was request for information/solicita-
and unmanned or independent systems were tion, which involves directly or indirectly asking or
commonly targeted across technology sectors. eliciting personnel for protected information and
More than 40% of the SCRs identified East Asia and technology.
the Pacific as the source of the suspicious activity.
In FY 2018, email was the method of contact
The Near East was the second most common
foreign actors most commonly used to reach
source of unauthorized collection attempts in FY
a target. The basic email method of contact
2018, as that region was associated with 13% of
includes unsolicited requests for information or
the suspicious contacts.
purchase requests. The second most common
Foreign actors utilize a variety of methods to obtain method of contact in FY 2018 was also through
sensitive or classified information and technology, email, but in the form of a phishing operation
but most frequently used the “attempted acquisi- in which malicious content or attachments were
tion of technology” method. This method includes embedded within the email for the purpose of
attempts to acquire protected information in the compromising a network. Foreign actors are likely
form of controlled technologies through front to continue to employ these methods of operation
companies, third countries, or a direct purchase and contact in the future.
of firms. The second most common method of

COMPLIANCE
Due Diligence Avoiding Potential Pitfalls
Contractors should be aware of the potential All cleared contractors are subject to DCSA
consequences of security breaches, including inspection and review. Companies are also
criminal prosecution of the corporation and/ responsible for conducting internal reviews of
or responsible individuals; transfer of classified their security systems to ensure the protection
contracts to another contractor; revocation of the of classified information. DCSA has identified
contractor’s FCL; and/or suspension or debar- several violations that often result in poor security
ment from all federal government contracts. ratings. These include the following:

To prevent security violations, contractors should ■ Foreign parent management control


exercise due diligence to ensure that adequate ■ Unauthorized co-location
safeguards are in place to protect classified and
■ Shared services occurring without approval
export-controlled information and take all neces-
sary steps to promote maximum company-wide ■ Inadequate ECP/TCP implementation
compliance with all policies and procedures ■ Inadequate electronic communications
concerning industrial security. monitoring
DCSA industrial security representatives are ■ Interlocking directors that were not disclosed
tasked with providing oversight and assistance or approved
to cleared contractor facilities and ensuring that ■ Insufficient IT network separation
U.S. classified information is protected. Accord-
■ Disclosure of export-controlled informa-
ingly, when in doubt regarding what is permitted
tion to the foreign parent without export
under a given mitigation instrument, cleared
authorization
or soon-to-be cleared contractors are strongly
encouraged to consult with their industrial ■ Failure to submit an Annual Compliance
security representative. Report

11 ©2020 Wiley Rein LLP
The Defense Counterintelligence and Security Agency (DCSA) and
Foreign Ownership, Control or Influence (FOCI) Handbook

■ Failure to monitor/approve/document visits Specifically, a contractor must take the following


steps to investigate and report a breach: (1) act
■ Insufficient implementation of the SSA, VTA,
“immediately” to “ascertain all of the circum-
or PA
stances surrounding” the breach; (2) if the
■ Inadequate/failure to report (transfers of “preliminary inquiry confirms a loss, compromise,
export material, communications, etc.) or suspected compromise of any classified infor-
■ Unreported material changes mation occurred,” an initial report is required,
which states whether the security violation is
■ Compensation committee consisting of only
a loss, compromise or suspected compromise,
the Inside Director
and identifies the surrounding circumstances; (3)
Reporting and Investigating Security investigate the suspected breach; and (4) submit
Breaches a mandatory final report following the comple-
The NISPOM requires that companies report tion of the investigation, which must include all
security breaches promptly, stating that any “material and relevant information” not provided
“loss, compromise or suspected compromise of by the initial report, identify the responsible
classified information, foreign or domestic, shall individual(s), describe the corrective action taken,
be reported[.] ... Classified material that cannot and present a determination regarding whether
be located within a reasonable period of time or not a breach occurred and the reasons for that
shall be presumed to be lost until an investigation conclusion.
determines otherwise.”

12 ©2020 Wiley Rein LLP
The Defense Counterintelligence and Security Agency (DCSA) and
Foreign Ownership, Control or Influence (FOCI) Handbook

WILEY’S FOCI AND DCSA OVERSIGHT EXPERIENCE


Wiley’s International Trade Practice, recognized International Traffic in Arms Regulations, the
by Chambers USA as one of the country’s elite Export Administration Regulations, and economic
international trade practices, regularly advises sanctions administered by the Treasury Depart-
sophisticated industry clients on DCSA and FOCI ment’s Office of Foreign Assets Control. We also
matters. In addition to providing high-level legal have substantial experience assisting parties
analysis of potential FOCI issues, our attorneys involved in foreign acquisitions, mergers, or
provide step-by-step assistance with the DCSA takeovers in managing the Committee on Foreign
clearance process. Ongoing counseling from Investment in the United States (CFIUS) review
our attorneys ensures that our clients remain in or investigation process, particularly transac-
compliance with FOCI regulations in a dynamic tions involving sophisticated technology or highly
international marketplace. classified information.

Wiley attorneys help clients navigate the policies Our FOCI experts collaborate with the firm’s
and regulations governing the international preeminent Government Contracts Practice
economy, allowing us to provide comprehen- to provide specialized advice to government
sive advice to FOCI clients in related fields. contractors. Wiley is among the leaders in this
Our industry-leading export controls attor- area, consistently ranked by Chambers USA
neys routinely help U.S. companies and foreign as one of only a few firms in the top tier of the
businesses with U.S. affiliates and subsidiaries nation’s government contracts practices.
to navigate the complex requirements of the

CONTACT US

Daniel B. Pickard Tessa Capeloto Nova J. Daly Richard C. Sofield


National Security Of Counsel Senior Public Partner
Practice, Co‑Chair Policy Advisor
202.719.7586 202.719.4500
Partner 202.719.3282
TCapeloto@wiley.law RSofield@wiley.law
202.719.7285 NDaly@wiley.law
DPickard@wiley.law

13 ©2020 Wiley Rein LLP
©2020 Wiley Rein LLP | 1776 K Street NW  |  Washington, DC 20006

You might also like