DCSA CI MCMO Countermeasures Matrix
The technology and information resident in U.S. cleared industry is under constant and pervasive threat from foreign intelligence entities seeking to gain the technological edge. Increased awareness of the targeted information and methods of operation used by foreign entities is critical to improving our ability to identify and thwart collection attempts.
Mouse over a "Contact Type" or "Method of Operation" in the axes to learn more about each. Click on the individual cells in the matrix for suggested countermeasures. This is a learning tool to provide examples of countermeasures, but is not all-inclusive.
The numbers represent
Blank = No reports
METHODS OF COLLECTION
|Attempted Acquisition of Technology||42||3||747||8||6||2||1||7||202|
|Exploitation of Commercial/Business Activities||191||206||212||35||2||15||1||5|
|Exploitation of Cyber Operations||529||15||1||1||487||1||10||1||1|
|Exploitation of Experts||43||260||47||20||2||80||1||49||1||1|
|Exploitation of Insider Access||3||6||7||29||100||1||3||1|
|Exploitation of Relationships||12||21||64||1||85||1||38||6|
|Exploitation of Security Protocols||3||4||8||4||2||56||1||1||4||3|
|Exploitation of Supply Chain||1||188||1||2||3||2|
View Targeting U.S. Technologies 2017: A Trend Analysis of Cleared Industry Reporting for an analysis of suspicious contact reports received from cleared industry in fiscal year 2016.
- Best Practices for Keeping Your Home Network Secure (September 2016)
- CI Awareness Toolkit
- Counterintelligence: Best Practices for Cleared Industry (September 2017)
- DCSA Counterintelligence Handouts
- Foreign Collection Methods: Indicators and Countermeasures
- Industrial Base Technology List
- Protecting Personal Information
- Targeting U.S. Technologies 2017: A Trend Analysis of Cleared Industry Reporting