The technology and information resident in U.S. cleared industry is under constant and pervasive threat from foreign intelligence entities seeking to gain the technological edge. Increased awareness of the targeted information and methods of operation used by foreign entities is critical to improving our ability to identify and thwart collection attempts.

print icon
Mouse over a "Contact Type" or "Method of Operation" in the axes to learn more about each. Click on the individual cells in the matrix for suggested countermeasures. This is a learning tool to provide examples of countermeasures, but is not all-inclusive.
    CONTACT TYPE
  matrix legend
METHODS OF COLLECTION
Attempted Acquisition of Technology Low Threat/Capability   High Threat/Capability Medium Threat/Capability   Medium Threat/Capability       Low Threat/Capability Low Threat/Capability Medium Threat/Capability
Exploitation of Commercial/Business Activities Medium Threat/Capability Low Threat/Capability Medium Threat/Capability Medium Threat/Capability   Medium Threat/Capability       Low Threat/Capability Low Threat/Capability Low Threat/Capability
Exploitation of Cyber Operations   High Threat/Capability Low Threat/Capability Low Threat/Capability   Low Threat/Capability High Threat/Capability     Low Threat/Capability Low Threat/Capability  
Exploitation of Experts Low Threat/Capability   Medium Threat/Capability Low Threat/Capability Low Threat/Capability Low Threat/Capability       Medium Threat/Capability Low Threat/Capability  
Exploitation of Insider Access   Low Threat/Capability Low Threat/Capability Low Threat/Capability Low Threat/Capability High Threat/Capability       Low Threat/Capability Medium Threat/Capability  
Exploitation of Relationships Low Threat/Capability   Medium Threat/Capability Medium Threat/Capability Low Threat/Capability Medium Threat/Capability     Low Threat/Capability Medium Threat/Capability Medium Threat/Capability  
Exploitation of Security Protocols Medium Threat/Capability Low Threat/Capability Medium Threat/Capability Medium Threat/Capability Low Threat/Capability Medium Threat/Capability Low Threat/Capability     Low Threat/Capability Low Threat/Capability  
Exploitation of Supply Chain Low Threat/Capability   Medium Threat/Capability Low Threat/Capability           Low Threat/Capability    
Resume Submission       Low Threat/Capability   Medium Threat/Capability Low Threat/Capability Medium Threat/Capability Medium Threat/Capability     Low Threat/Capability
RFI/Solicitation High Threat/Capability Low Threat/Capability Medium Threat/Capability Medium Threat/Capability   Medium Threat/Capability Low Threat/Capability Low Threat/Capability Low Threat/Capability Medium Threat/Capability Low Threat/Capability Low Threat/Capability
Search/Seizure           Medium Threat/Capability            
Surveillance Medium Threat/Capability Low Threat/Capability   Low Threat/Capability   Medium Threat/Capability         Low Threat/Capability  
Theft Medium Threat/Capability   Low Threat/Capability     Medium Threat/Capability            

View Targeting U.S. Technologies 2017: A Trend Analysis of Cleared Industry Reporting PDF icon for an analysis of suspicious contact reports received from cleared industry in fiscal year 2016.