DECLASSIFIED by
DNI
Ratcliffe
on
23 July 2020
FD-340
Rev.
8-7-97)
Universal
Case File
Number
_9.....:....,.}_ '- U
....
?_-....;;'2;;..;;00-'-3=-=~-=-+(
Field Office Acquiring Evidence
~~~Q
___________
Serial
of
Originating Document __
.---'-o
Date Received
t
17
f
20l(p
From
J<SE
.P,6~1' k4
(Name
of Contributor)
(Address
of Contributor)
(City
and State)
By
...........
O
_ifi._l
___
S'f_V-_...4:....._,.,_,_
...........
__ ... ....
Name of Special Agent)
To
Be
Returned
Yes
No
Receipt
Given
D
Yes
~o
Grand
Jury
Material
-
Disseminate
Only
Pursuant
to Rule
6
(e)
Federal
Rules
of Criminal
Procedure
Yes
~No
Title:
~o~s
,::,
HoJ<~1c+v€:
Reference:
------- -:---..... .-. . .----=-- --c--- -::- -- - -------
(Communication Enclosing Material)
Description
tz9.-.Original
notes re
Interview
of
0l>T£. NC
\lS6l1
.Do~i,.)@
Triuttf
A ;..
o> \
2063661 1A SEC
1
SER 1A2 000023
 
Intro
,.,,.~,
,,
,.,
I
. .. .. ....
{
,/l
l,J
...
.
t;,f,->-'
11
Air
1
ft
,
to6-
r Q
1 10
t.,,0/i
'-/
Purpose -
Cl
and Security
brief
give
Baseline
on
FIS
t,h.-eeat
to
US
Natio
,al
Advise -
if
not
already targeting, due
to
this
briefing
and access -you are
FIS
collect Political, economic, technological
and
military
intelligence Basically
they
want
inside
information
to
give
their
country
a
competitive
advantage
over
US.
FIS
use
Intelligence Officers_
as
their
operatives
or
collectors in
2
ways Official Cover
by
using
10s
under
diplomatic
cover
at
US
based
foreign
establishments Non
officia
l cover
NOCS)
-tourists, students, academics, business people
In
the
US-
Russian
Fed
has
nown
or
suspected
10s,
while
China has
-
 
Russian
threat
is
more
traditional-
establishment
based
10s,
while
China takes an
asymmetrical
approach using
NOCS.
FIS
will
collect
intel
in
3
ways
 
HU
MINT
,
SIGINT
or
Cyber
HUMINT
-10
attempt
to
recruit
a
person
to
provide
Intel
o Highly unlikely
FIS
attempt
to
recruit
you: Staff, Business associates,
domestic
help
-L,
o
However
-
will
come
at
you
to
elicit
information
-
diplomats
or
NOCS
o Classified, Sensitive,
Private information
SIGINT
CYBER
-
FIS
rely
on
our
dependency
t
communicate
electronically
&
look
to
exploit
.
Mindful
landline, cell calls, email,
computer
networks
Mindful
not
only
how
you communicate
but
where
• Insider
Threat-
enable
FIS
technical
penetrations
·
<rP
v
~tp
1. 1.<~
Y
~\.
,,
,;>
~V
l
.p~
~' J
} v
\O
)j
,·l
v
--
 
2063661 1A SEC 001 SER 1A2 000024
View on Scribd