The technology and information resident in U.S. cleared industry is under constant and pervasive threat from foreign intelligence entities seeking to gain the technological edge. Increased awareness of the targeted information and methods of operation used by foreign entities is critical to improving our ability to identify and thwart collection attempts.

print icon

Mouse over a "Contact Type" or "Method of Operation" in the axes to learn more about each. Click on the individual cells in the matrix for suggested countermeasures. This is a learning tool to provide examples of countermeasures, but is not all-inclusive.

    CONTACT TYPE
 

The numbers represent
Volume of industry
reporting.

Blank = No reports

METHODS OF COLLECTION
Attempted Acquisition of Technology 42 3 747 8   6 2     1 7 202
Exploitation of Commercial/Business Activities 191   206 212   35 2     15 1 5
Exploitation of Cyber Operations   529 15 1   1 487   1 10 1 1
Exploitation of Experts 43   260 47 20 2 80 1 49 1 1
Exploitation of Insider Access 3 6 7 29   100     1 3 1  
Exploitation of Relationships 12   21 64 1 85   1 38 6  
Exploitation of Security Protocols 3 4 8 4 2 56 1   1 4 3  
Exploitation of Supply Chain 1   188 1 2 3           2
Resume Submission   1 74 3   1   457 261 3   1
RFI/Solicitation 88   768 25   25 1 2 2 81 19 66
Search/Seizure       1   9            
Surveillance 21         24       2 2  
Theft   2 1   1 9 2       1  

View Targeting U.S. Technologies 2017: A Trend Analysis of Cleared Industry Reporting PDF icon for an analysis of suspicious contact reports received from cleared industry in fiscal year 2016.