The technology and information resident in U.S. cleared industry is under constant and pervasive threat from foreign intelligence entities seeking to gain the technological edge. Increased awareness of the targeted information and methods of operation used by foreign entities is critical to improving our ability to identify and thwart collection attempts.

Mouse over a "Contact Type" or "Method of Operation" in the axes to learn more about each. Click on the individual cells in the matrix for suggested countermeasures. This is a learning tool to provide examples of countermeasures, but is not all-inclusive.

    CONTACT TYPE
 

The numbers represent
Volume of industry
reporting.

Blank = No reports

METHODS OF COLLECTION
Attempted Acquisition of Technology 7 6 93 7 1 7 2     3 3 60
Exploitation of Commercial/Business Activities 35 3 206 199 3 14     2 27 4 18
Exploitation of Cyber Operations   189 16       9     2   2
Exploitation of Experts 47 1 204 19 1 28 2 12   94 5 57
Exploitation of Insider Access 3 12 16 4 3 50   4 3 10    
Exploitation of Relationships 2   18 9   25       23 1  
Exploitation of Security Protocols   3 2   1 5            
Exploitation of Supply Chain   2 151 1 2 2       10 1 3
RFI/Solicitation 17   144 9   6 2   1 26 4 148
Resume Submission     18 3       467 317 1 1 3
Search/Seizure         1 4            
Surveillance 6 1 1 1   13            
Theft           4       1    

View Targeting U.S. Technologies 2022: A Report of Threats to Cleared Industry PDF icon for an analysis of suspicious contact reports received from cleared industry in fiscal year 2021.