Defense Security Service
Defense Security Service Cybersecurity Operations Division Counterintelligence
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
Defense Security Service Defense Security Service Cybersecurity - - PowerPoint PPT Presentation
UNCLASSIFIED//FOUO Defense Security Service Defense Security Service Cybersecurity Operations Division Counterintelligence UNCLASSIFIED//FOUO UNCLASSIFIED Defense Security Service DSS Mission Capability DSS Supports national security and
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
DSS Mission DSS Supports national security and the warfighter, secures the nation’s technological base, and oversees the protection of U.S. and foreign classified information in the hands of Industry CI Mission DSS CI identifies unlawful penetrators of cleared U.S. defense industry and articulates the threat for industry and government leaders Scope
personnel
Capability
liaison, field support, strategic development and program management
Cyber, Security, Intel, IA, CNO and more
across 25 DSS field offices nationwide
National Security Agency, National Cyber Investigative Joint Task Force and the Department of Homeland Security
UNCLASSIFIED UNCLASSIFIED
Challenges
Significant Achievements and Notable Events
reports from Industry and the Intelligence Community; facilitating action on over 170 federal investigations/operations
Community to include the 3rd edition of the DSS Cyber Trends
activity occurring on their networks.
UNCLASSIFIED UNCLASSIFIED
UNCLASSIFIED UNCLASSIFIED
Suspicious Contact Report
industry intelligence analysis
contact and approach
military programs and key facility programs
Method of Operation
Collector Affiliation
Technologies and Programs Targeted
UNCLASSIFIED UNCLASSIFIED
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
UNCLASSIFIED UNCLASSIFIED
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
64% 8% 8% 6% 5% 4% 3% 2% Unknown Aeronautics Information Systems Other Marine Systems Information Security Space Systems Lasers, Optics, Sensors
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
66% 13% 13% 6% 1% 1% Unsuccessful Attempt Root Level Intrusion Suspicious Network Activity / Exploitation User Level Intrusion Reconnaissance Malicious Logic
UNCLASSIFIED UNCLASSIFIED
UNCLASSIFIED UNCLASSIFIED
UNCLASSIFIED UNCLASSIFIED
analysis, their capabilities, objectives, doctrine and limitations
UNCLASSIFIED UNCLASSIFIED
Recon
Weapon
Delivery Exploit Install
Command and Control Actions on Objectives
UNCLASSIFIED UNCLASSIFIED
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
Recon
Weapon
Delivery Exploit Install
Command and Control Actions on Objectives
Foreign Intelligence Entities activities throughout Industry
Intelligence Community
the Intelligence Community in articulating the threat to the highest levels of the U.S. Government
Government data aids the adversary: strategically,
research and development, etc., etc…
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
Cyber Special Assessments, Crimson Shield, Scarlet Sentinel, Annual Cyber Trends
UNCLASSIFIED UNCLASSIFIED
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
UNCLASSIFIED UNCLASSIFIED
UNCLASSIFIED UNCLASSIFIED
UNCLASSIFIED UNCLASSIFIED
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO