Intro
,.,,.~,
,,
,.,
I
. .. .. ....
{
,/l
l,J
...
.
t;,f,->-'
11
Air
1
ft
,
to6-
r Q
1 10
t.,,0/i
'-/
Purpose -
Cl
and Security
brief
give
Baseline
on
FIS
t,h.-eeat
to
US
Natio
,al
Advise -
if
not
already targeting, due
to
this
briefing
and access -you are
FIS
collect Political, economic, technological
and
military
intelligence Basically
they
want
inside
information
to
give
their
country
a
competitive
advantage
over
US.
FIS
use
Intelligence Officers_
as
their
operatives
or
collectors in
2
ways Official Cover
by
using
10s
under
diplomatic
cover
at
US
based
foreign
establishments Non
officia
l cover
NOCS)
-tourists, students, academics, business people
✓
In
the
US-
Russian
Fed
has
nown
or
suspected
10s,
while
China has
-
Russian
threat
is
more
traditional-
establishment
based
10s,
while
China takes an
asymmetrical
approach using
NOCS.
✓
FIS
will
collect
intel
in
3
ways
HU
MINT
,
SIGINT
or
Cyber
HUMINT
-10
attempt
to
recruit
a
person
to
provide
Intel
o Highly unlikely
FIS
attempt
to
recruit
you: Staff, Business associates,
domestic
help
-L,
o
However
-
will
come
at
you
to
elicit
information
-
diplomats
or
NOCS
o Classified, Sensitive,
Private information
SIGINT
CYBER
-
FIS
rely
on
our
dependency
t
communicate
electronically
&
look
to
exploit
. •
Mindful
landline, cell calls, email,
computer
networks
•
Mindful
not
only
how
you communicate
but
where
• Insider
Threat-
enable
FIS
technical
penetrations
·•
<rP
v
~tp
1. 1.<~
Y
~\.
,,
,;>
~V
l
.p~
~' J
} v
\O
)j
,·l
v
--
2063661 1A SEC 001 SER 1A2 000024