National Counterintelligence and Security Center
Five Eyes Launch Shared Security Advice Campaign for Tech Startups
Today, members of the Five Eyes intelligence partnership launched Secure Innovation, shared security guidance to help protect emerging technology companies from a range of threats, particularly those from nation-state actors.
The launch of this joint protective security guidance aimed at protecting the tech sector from national security threats follows last October's unprecedented summit which brought together the heads of the domestic security and intelligence agencies from Australia, Canada, New Zealand, the UK, and the U.S. to announce Five Shared Principles to protect technology companies.
Secure Innovation provides the tech sector with a set of cost-effective measures that companies can take from day one to better protect their ideas, reputation, and future success.
This announcement demonstrates the increased commitment from all Five Eyes nations to work collaboratively against this shared threat. Businesses in Australia, Canada, New Zealand, the UK, and the U.S. can take advantage of a collection of Secure Innovation resources, guidance, and products now available across all Five Eyes countries.
This means companies can benefit from consistent and consolidated advice reflecting both the globalized and interconnected tech startup ecosystem as well as the global nature of the security threats startups face.
"The Five Eyes partners face unprecedented threats to our emerging tech ecosystems. So, today we're arming tech firms across our nations with guidance on how to secure the innovation so critical to our future," said Mike Casey, Director of the National Counterintelligence and Security Center (NCSC). "This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks."
Competition to succeed in emerging technology can be intense. This guidance outlines cost-effective recommendations you can adopt from day one to better protect your ideas, reputation, and future success. Good security practices can protect your competitive advantage, making your company more attractive to investors and customers.
Principles for Companies
Safeguarding Our Future
These bulletins provide an overview of a specific foreign intelligence threat and mitigation steps.
The U.S. emerging technology ecosystem is an attractive target for state actors looking to steal technology, competitors seeking commercial advantage, and criminals looking to profit. Emerging technology companies of all sizes – particularly those with weak security – are targeted by actors seeking to steal technology to fast-track their technological capability, to undermine your competitive edge, to repress their own people to prevent dissent or political opposition, or to increase their military advantage over other countries. There are many ways hostile actors can target assets:
- Insiders – People are your greatest asset but, in some cases, they can pose an insider risk
- Cyber – Insecure IT can provide an easy way for your business to be exploited
- Physical – Your assets could be stolen via physical access
- International Travel – Hostile actors can operate more easily overseas than in the U.S.
- Investment – Investment can be used to gain access to, and influence over, your company
- Overseas Jurisdictions – International expansion can expose you to risk from foreign laws and business practices
- Supply Chain – Vulnerable or malicious suppliers could compromise your business
Identifying those assets most critical to your company's success is an ideal starting point for your security planning. Completing a risk assessment will help you identify vulnerabilities and the potential impact of exploitation of those assets. Consider establishing a process to monitor evolving counterintelligence and security threats and implementing the following mitigations to help reduce risk to a level you find acceptable.
Safeguarding Science
An outreach initiative for protecting research and innovation in emerging technologies.
- Establish a security strategy for your business based on your critical assets, the risks they face, and the risks you are willing to tolerate.
- Regularly review security policies and procedures, so they evolve with the threats to the business.
- Establish security responsibilities with any new employees, contractors, or suppliers.
Build in security measures to protect your critical assets from the start.
- Place barriers around the assets you prioritized for protection. These could be physical barriers, such as an access-controlled room, or virtual barriers such as a firewall.
- Limit access to these assets to only those employees who need it and are trusted to use it securely.
- Implement measures to detect unauthorized activity. Early identification of unauthorized or unusual access to an asset will help avoid or limit a security incident.
Intellectual Asset (IA) and Intellectual Property (IP) management strategies are essential for any business, and are an integral part of your business plans. Understanding the assets you have and what you want to do with them will help determine what actions are required. Know:
- What you need to protect
- How you need to protect it
- The laws of the countries in which you are operating
Legal protections for your IA and IP do not mean they are completely secure. Continuously track and review who has access to your most sensitive information and how you ensure it remains secure. Ensure staff take an active role in IA and IP management. Consider adding IP clauses to employee contracts to help manage the risk to your IA and IP from current and former employees. The best security decisions are taken holistically and consider personnel, information, physical, and cyber risks together.
Partnerships are often essential to the success of a business, but they may also increase a company's information and data exposure. Know the "Three W's"
- Why are you collaborating? Clearly articulate the desired outcomes, as well as the benefits and risks associated with the partnership.
- Who are you working with? Conduct due diligence on prospective partners:
- Do they have organizational structures or relationships that could compromise their independence or integrity?
- Do they have links to foreign militaries, police, or security services?
- Do you know the source of funds for any proposed transaction, whether direct or indirect?
- Do they operate under a legal regime that could compel them to share your data or cooperate with their host government?
- Is there publicly available information that raises concerns about their intentions or values?
- Are they subject to U.S. sanctions, export controls, or similar designations in countries where you may consider doing business in the future?
- Is there information that suggests a lack of transparency from the partner?
- Could the partnership affect future investors, your global business, and long-term intentions?
- Does their approach to managing data, security breaches, or incidents align with your own?
- What are you sharing? Help manage the risks associated with business collaborations by:
- Determining early what data is appropriate to share and implementing measures to limit access to just that data.
- Designing your architecture so your more sensitive systems are independent from those accessible to the wider organization and external parties.
- Taking steps to ensure that third parties are handling sensitive data appropriately and securely.
- Considering how you will regain your data and IP at the end of the collaboration, or if the partner reneges on a deal.
When working with international partners, consider the implications of local laws and regulations in foreign countries. Some legal regimes could compel overseas partners to release data or cooperate with state organizations.
- How are you protecting your innovation? Consider including protections for your assets and data and security requirements within contracts. Check that these requirements are understood and adhered to. Non-disclosure agreements (NDAs) and confidentiality agreements can allow you to put additional legal protections in place, usually for a defined length of time. An NDA can help restrict the use of your ideas and information to a specific permitted purpose. Nevertheless, NDAs do not replace good protective security measures. They can be a useful deterrent and fallback after an incident has occurred, but are unlikely to prevent intentionally hostile actors.
- Is this a secure investment? Investments into your company introduce both opportunities and risks. You may be able to benefit from your investors' experience to improve your business and security practices. However, investment can be used to gain access to, and influence over, your company. Early assessments of prospective investments to determine whether they raise security concerns will allow you to be better informed about possible outcomes and may also help you have a stronger negotiating position. Taking a security-minded approach from the start will enable you to make well-informed investment decisions. Consider the following steps:
- Conduct due diligence on prospective investors
- Be strategic when considering how much data or proprietary information you share with potential investors, both before and after any investment – what could you lose if an investor backs out of the deal?
- Reflect on the following questions and implement appropriate mitigations before in-depth engagement with prospective investors:
- Have you included provisions in your legal investment documentation to protect key operations, information, and data?
- Have you considered how effective a legal or contractual agreement would be if you were relying on enforcement in an overseas jurisdiction?
- Have you implemented a governance and reporting structure that ensures the risk management strategy remains effective over time?
-
Supply Chain Risk Management
NCSC works to raise awareness about supply chain threats, while providing resources to mitigate risks.
- Conduct independent due diligence on suppliers and seek security assurances from them. Consider building diversity and resilience into your supply chain if you are reliant on one supplier. Security clauses in contracts can help hold suppliers accountable for their security responsibilities. As your company grows, you may be able to take more control of your supply chain security by demanding greater security assurances from your suppliers.
- Include security as part of your service. It could give your business a competitive edge. Depending on your sector or customer, there may be a requirement to meet further standards. If this is the case, make sure you understand why a particular standard is needed, and how you can meet future requirements.
Expand safely into new markets.
- As you grow, there may be more need for employees to travel internationally. Consider whether planned travel is likely to introduce additional risks and build in appropriate steps to mitigate them.
- When expanding into new markets, you will need to be aware of U.S. export controls. Certain products, software, or technology (including the intangible transfer of critical, technical knowledge) are ‘controlled' and therefore may require an export license. It is the exporter's responsibility to check whether items require an export license.
- Understand the local laws in the countries where you plan to operate. Different countries have different export control laws, as well as laws regarding the handling and storage of IP and data. National security laws in foreign countries may allow that country's government to access data or information stored in, or transmitted via, that country. Understanding local laws will help ensure you are legally compliant and that you better understand the additional security risks involved in expansion into new markets.
- Many IP rights are territorial and only give protection in the countries in which they were granted or registered. IP legal frameworks can also differ by country. If you are considering trading internationally, familiarize yourself with the IP framework and enforcement processes in that market. Register your IP rights in advance of entering the market and ensure you are resourced to defend those rights, if required.
- National security laws in foreign countries may allow that country's government to access data stored in, or transmitted via, that country.
- China's National Intelligence Law allows China's intelligence agencies to compel individuals and organizations to support and cooperate with state intelligence work. Intelligence work could capture any information to protect China's national interests, be that military, political, economic, social, technological, cultural interests. The law does not allow individuals or organizations to refuse to provide access, information, or support if requested.
- Russia has an extensive lawful intercept capability, known as the System of Operative Search Measures (SORM). SORM allows Russia's Federal Security Service (FSB), to covertly monitor communications to, within, and out of Russia. The FSB can also compel individuals and organizations to share data stored in Russia with the Russian government and can prevent the data holder from informing the data owner about the disclosure. All communication service providers operating in Russia are obliged to install equipment to enable the FSB to monitor communications.
- Understand U.S. laws and regulations regarding data protection and transfers abroad, as well as data laws in the countries in which you are operating.
- As your company grows, you may no longer be able to rely primarily on personal relationships to ensure trust. It is vital that you can trust your workforce to protect your assets and information, and to deter, detect, and report potential security incidents. As you recruit more employees, it is important that you screen potential candidates who wish to be part of your business and access your critical assets. Security checks could include:
- Confirmation of identity
- Nationality and immigration status
- Employment and education history
- Criminal records check
- Financial records check
- Personal references
- Open-source environment
- National security vetting (for access to government classified information)
- Foster a culture in which employees are confident they can speak openly about security concerns; that the organization will likely improve as a result; and that any actions will be reviewed fairly. It should be easy and routine for employees to report concerns. Handling those concerns should be done sensitively and without apportioning blame. Keeping those involved informed of both the progress and benefits of any resulting actions will help reinforce confidence in reporting.
- Consider providing security training for all employees (permanent, temporary, or contracted) to maintain your security culture. Effective education and training help individuals understand the policies, standards, and procedures in place to maintain security. Individuals should also understand the threats facing your business; their security responsibilities; and how to report security concerns.
Security education and training should start at the time of hiring and continue as employees move internally between jobs. Leaders should set an example and reinforce good security practices. Tailored education and training should be provided for job roles with specific security responsibilities: security managers across business areas, security officers and guards, line managers, IT professionals and developers, etc. - Consider providing additional support to high-risk roles. Role-based security risk assessments help keep your security measures proportionate and effective. Assessments of risks to your business and critical assets should provide you with a foundation for determining which roles have a higher risk exposure and require more comprehensive security training and support.
- Prepare for incidents by creating an incident management plan that contains:
- Contact details for anyone you would need to contact to help you identify an incident. These may include a web hosting provider, IT support services or insurance company.
- Clearly defined responsibilities and an escalation criteria and process for critical decisions. This should ideally include contact details and contingencies in case a key member of staff is unavailable.
- A coordination function to track and document findings and actions. A good record of the incident is useful for post-incident reviews and determining where it is necessary to report the incident.
- Use lessons learned from post-incident reviews to update your response plan and security practices.
- Monitor your IT to spot anomalies, which may reveal security incidents. Monitoring user activity, in accordance with privacy and civil liberty laws, can help identify any unauthorized or accidental misuse of systems or data by users. As elsewhere, understanding the risks you are most concerned about will enable you to focus your monitoring to collect information relevant to your needs.
- Recognize potential risk indicators of an insider who feels disgruntled and potentially motivated to harm the organization. A response designed to help the employee overcome challenges or concerning behavior can improve the employee's relationship with the company, thereby reducing risk to your organization. Potential indicators may include:
- Changes in work patterns
- Conflicts at work
- Decline in performance
- Drug or alcohol abuse
- Aggressive behavior
- Mishandling sensitive data
- Debt
- Unexplained wealth
Companies Resources (downloadable documents)
- Security Advice for Emerging Technology Companies (PDF)
- Scenarios and Mitigating Actions (PDF)
- Travel Guidance (PDF)
- Due Diligence Guidance (PDF)
- Companies Summary (PDF)
Competition to succeed in emerging technology can be intense. This guidance offers recommendations to help you empower the companies you invest in to protect their innovation, business, and profitability. Good security practices are also good investment practices.
Principles for Investors
Safeguarding Our Future
These bulletins provide an overview of a specific foreign intelligence threat and mitigation steps.
Investors are not the only people interested in emerging technology companies. Because the U.S. is a global leader in research and development and has a vibrant startup ecosystem, innovative U.S. companies are attractive targets for hostile actors looking to steal technology, competitors seeking commercial advantage, and criminals looking to profit. Companies with weak security are especially at risk from hostile actors trying to fast-track their technological capability (undermining your competitive edge); repress their own people to prevent dissent or political opposition (damaging your reputation); or increase their military advantage over other countries (risking our national security).
These activities pose a terminal risk to those businesses, jeopardizing your investment returns. There are many ways hostile actors could try to acquire your portfolio companies' assets:
- Insiders – People are a business' greatest asset but, in some cases, they can pose an insider risk
- Cyber – Insecure IT can provide an easy way for your portfolio companies to be exploited
- Physical – Your portfolio companies' assets could be stolen via physical access
- International Travel – State-backed actors can operate more easily overseas than in the U.S.
- Investment – Investment can be used to gain access to, and influence over, your portfolio companies
- Overseas Jurisdictions – International expansion exposes businesses to jurisdictional risk from foreign laws and business practices
- Supply Chain – Vulnerable or malicious suppliers could compromise your returns
Pre-Investment: Consider security risks during your pre-investment due diligence on the company and other investors involved. The following questions will help you weigh counterintelligence and security issues that could affect the chances of your investment being a financial and reputational success.
- Does the company have any investors that pose significant risks?
- Could the involvement of other investors inhibit future fundraising or sale of the company because of legal, ethical, or compliance issues? For instance, are other investors subject to U.S. sanctions, export controls, or similar designations?
Post-Investment: Startups struggling to establish themselves may find it difficult to prioritize security. As an investor, you may have a unique opportunity to inform your portfolio companies' attitudes toward security to help them succeed and protect your investment. Consider building certain security requirements into your funding agreement with the company.
Secure Innovation for Companies provides guidance to emerging technology companies on cost-effective measures they can take to lay the foundations for strong security from day one. It is based on an approach to security that focuses on identifying the companies' most valuable assets, assessing the risks to those assets, and putting mitigations in place. The following questions follow this approach. They are intended to help your early conversations with prospective ventures, both as part of your due diligence and to support their growth into secure and prosperous companies developing cutting-edge technology.
- Is security discussed and owned at the Board level?
- Has the company identified its most valuable assets?
- Is security included in the company's risk register?
- Are security measures centered around the company's critical assets?
Safeguarding Science
An outreach initiative for protecting research and innovation in emerging technologies.
Enduring roles and responsibilities for security should be established early. One of the first things that can indicate a company is taking security seriously is clear accountability at the top. This may mean the company has identified a senior leader with the authority and responsibility to ensure that security risks are considered along with other risks to the business. By incorporating security risks into the company's risk register, they are demonstrating an awareness and commitment to managing the risks they face.
Your early involvement can help shape the company's culture to be one in which security, and security incidents, are openly discussed so the company can learn from experience. A good security culture at a startup level is a critical component of a robust security regime. By making security part of your due diligence process and having an open security dialogue, you will help reinforce the message that security is an important component of doing business.
The return on your investment may depend on the startup understanding which assets form the basis of their competitive advantage and ensuring those assets are protected. These assets could include the company's personnel, premises, products, services, information, and technology. It is not always possible to protect everything against every threat, especially for small companies with limited resources. However, security protections can cost less than expected, and will usually pay long term dividends. Security decisions should be prioritized, proportionate to the threat, and based on a thorough understanding of what is most important to the survival and success of the startup – and your investment. Below are questions you might ask of the company you are investing in:
- What are the company's goals and priorities?
- What are their most critical assets?
- What are the threats to those critical assets?
- What is the likeliness and consequence of a threat impacting the company?
The security of any technology products the startup produces will likely be central to the success of the product and the company. Technology is more secure when security has been built in from the start and based on a combination of information, physical, personnel, and cyber security measures.
How an organization plans, manages, and protects their ideas should be a crucial feature in their business planning. A company should have the appropriate Intellectual Asset (IA) and Intellectual Property (IP) protections in place (whether through registered rights or contractual terms and conditions) for the jurisdictions in which they want to operate. You don't want to invest time and money in a business to later find their IP belongs to someone else or is ineligible for IP protection.
However, having the right legal protections for IP in place does not mean it is no longer at risk. Access to a company's most sensitive information should be actively tracked, reviewed, and managed to ensure it remains protected. Questions to ask:
- Have they built security into their products from the beginning?
- Do they have a strategy to identify and manage their IP?
As an investor, partnerships are a way of growing your investment by attracting more customers and collaborators. However, it is also worth informing the company that their choice of third parties may impact your, and potential customers', ability or willingness to do business with them.
Investment – The identity of other investors involved with your portfolio companies may impact you too, especially when considering the following:
- The investor's reputation and track record
- The source of their funds (because some hostile investors may seek to obfuscate their involvement)
- Any implications of the legal regime they are subject to (especially for an overseas investor)
- Whether they have any unexpected or undisclosed commercial, political, or military ties
- Whether they are on the entity or sanctions list of other countries, particularly those countries the startup is, or may consider, doing business with.
Collaboration – Regardless of the collaboration partner, companies should always ensure that any risks they are exposed to are managed in accordance with their risk appetite (and your own as the investor). The following questions will help you discuss these risks with companies you are investing in:
- Has the company limited the data, information, and knowledge it shares to only what is necessary and within its risk tolerance?
- Are the values and objectives of the parties that the company wishes to collaborate with aligned to your own?
- Are their networks segregated?
- Are there appropriate technical and policy protections to ensure that data shared with partners (customers, investors, etc.) is limited to what is necessary?
- Do partners' approaches to managing data and security breaches or incidents align with your own?
Supply Chain Risk Management
NCSC works to raise awareness about supply chain threats, while providing resources to mitigate risks.
Supply Chain – Many startups outsource certain functions to external providers with special expertise. To reduce risks from these external providers, companies can seek suppliers whose security meets their requirements. However, as an investor, you should always assess how a company's suppliers affect their risk profile.
Supply chains present complex security risks for startups, so considering them should be a part of your due diligence process. A series of high-profile attacks on companies has demonstrated that attackers have both the intent and ability to exploit vulnerabilities in supply chain security, often having detrimental consequences for the success of the company. A few relevant questions:
- Has the company considered security at each stage of the procurement process?
- Has the company conducted due diligence on its suppliers?
- Has the company used suppliers whose security arrangements meet the company's requirements?
- Does the company have a risk assessment process for external suppliers?
The risks you take on as an investor are not always static: a company's resilience against security threats will likely change over time. As the startup evolves, so do the threats and the company's resources to deal with them. You should continue to discuss and champion security for the duration of your involvement with the company.
Expanding into New Markets – Exports may be subject to U.S. and international sanctions or export control regulations, particularly when items may have military as well as civilian applications. Different countries have different export control laws, as well as laws regarding the handling and storage of IP and data (possibly including requirements to install certain hardware or allow configuration to permit remote access to data by governments). National security laws in foreign countries may allow that country's government to access data or information stored in, or transmitted via, that country. Understanding local laws of foreign nations will help ensure that you understand the additional security risks involved in expansion into new markets.
Foreign Travel – Foreign travel by employees of the startup could increase their exposure to security risks. Certain foreign countries are actively targeting U.S. innovation. Travel to those countries, or to third-party countries where threat actors can operate easily, could put the employees and the startup's innovation at risk. Questions to ask:
- Has the company put in place proportionate and effective security practices for international travel?
- Is the company compliant with U.S. and international export laws?
- Are you and the company aware of local laws in countries in which they are expanding, and how they could affect their business?
Security for a Growing Team – As the company grows, it is likely to hire new employees, contractors, and suppliers, and may no longer be able to rely primarily on personal relationships to establish trust. Companies operating in sensitive sectors should effectively screen new recruits and staff moving into sensitive roles. Staff access controls should be role-specific, with access to sensitive assets restricted to only those individuals who need it and are trusted to use it securely. Furthermore, an established security training package and willingness to openly discuss security will help ensure that everyone shares responsibility for security.
Preparing for Security Incidents – You cannot protect against all eventualities, but the damage caused to your investment by a breach can be reduced through a well-planned and executed response. This means the company needs to establish and test an incident management plan and processes to detect and explore unexpected behavior.
Questions to ask:
- Has the company implemented and tested an incident management plan?
- Does the company detect and investigate unexpected behavior in IT and staff?
Investors Resources (downloadable documents)
* * * NOTE * * *
The information contained in this document is accurate on the date it was created and is intended as general guidance only. Consider the enclosed information within the context of existing laws, regulations, authorities, agreements, policies, or procedures and consult with independent experts. To the fullest extent permitted by law, NCSC accepts no liability whatsoever for any loss or damage incurred or arising because of any error or omission in the guidance or arising from any person acting, relying upon, or otherwise using this guidance. References in this product to any specific commercial product, process, or service or the use of any corporate name herein is for informational purposes only and does not constitute an endorsement, recommendation, or disparagement of that product, process, service, or corporation on behalf of the Intelligence Community.
Mirriam-Grace MacIntyre
Ms. Mirriam-Grace MacIntyre is the Executive Director of the National Counterintelligence and Security Center (NCSC) where she oversees the daily operations of a national center dedicated to protecting America from foreign intelligence threats.
From 2021-2023, Ms. MacIntyre served as the Director for Counterintelligence at the National Security Council where she led the development of counterintelligence policy under the Biden-Harris Administration.
Ms. MacIntyre joined ODNI cadre in 2016 first as the National Counterintelligence Officer for Russia, Europe and Eurasia and later as the Deputy National Intelligence Manager for Counterintelligence and was responsible for leading the development of strategies, plans, and initiatives to advance the Intelligence Community’s (IC) counterintelligence mission and address the needs of U.S. Government decision makers. Under her leadership, ODNI was instrumental in driving significant CI and security advancements at the North Atlantic Treaty Organization. She also led numerous high-impact initiatives, including NCSC’s support to Operation Warp Speed’s COVID-19 vaccine development effort which enhanced threat awareness for the state, local, and private sector.
Prior to joining ODNI, Ms. MacIntyre served for eleven years as an intelligence officer at the Defense Intelligence Agency (DIA) where she held numerous senior analytic and management positions across the counterterrorism, CI, and counterespionage portfolios. In 2007, she led a team of linguists, analysts, and investigators at the Combined Media Processing Center – Qatar responsible for supporting ongoing military operations during Operation Iraqi Freedom. Prior to that, Ms. MacIntyre held several analytic positions working hard targets and spent two years as an analyst and briefer in support of the Joint Chiefs of Staff, where she produced current intelligence products on foreign intelligence threats to the Department of Defense.
Awards and honors include DIA’s Meritorious Civilian Service Award, DoD’s Civilian Combat Support Award, DoD’s Civilian Expeditionary Award, and the National Security Award for CI Analysis.
Ms. MacIntyre holds degrees and certificates from Georgetown University, George Washington University, and Institut des Etudes Sciences Politiques de Paris.
Authorized Disclosures Podcast
Authorized Disclosures is the NCSC Podcast on key counterintelligence and security issues.
Podcasts:
Jeanette McMillian, the Assistant Director for NCSC's Supply Chain and Cyber Directorate, recently sat down with Ms. Kemba E. Walden, the Principal Deputy National Cyber Director for the Office of the National Cyber Director (ONCD), for a podcast interview.
The discussion focused on the work of the ONCD and its efforts to enhance cybersecurity awareness for a more resilient cyber supply chain.
- Check out the podcast interview, click here
- For a transcript of the interview, click here
- For Ms. Kemba E. Walden's biography, click here
Guest Speaker
Ms. Kemba E. Walden is the Principal Deputy National Cyber Director for the Office of the National Cyber Director. Ms. Walden brings a wealth of public and private sector experience to this role, including her work as assistant general counsel for Microsoft’s Digital Crimes Unit and her service at the Department of Homeland Security, where she served as a cybersecurity attorney for the Cybersecurity and Infrastructure Security Agency, or CISA.
Data breaches involving personal information result in a broad range of risks to individuals and organizations. This includes identity theft, targeting of individuals with knowledge of sensitive government information and internal business processes, and other intelligence activities that use personal information of U.S. citizens to undermine national security.
It is in our collective interest that we take actions to limit the risk of our personal information being exploited, and that we are able to recognize any indicators that we may be the target of such activities.
Confirmation that your personal information has been accessed in a data breach is not a guarantee that your information will be misused or that you will be targeted for further exploitation. However, it is important to remain mindful of the risk of such misuse or exploitation.
The following information is provided to raise your awareness to this possibility and to help you understand how your personal information may be used by foreign intelligence services, and other “bad actors” (extremists, criminals, hackers, and the like).
The information below is provided to raise awareness and provide guidance for mitigating risks; it is not intended to indicate that the government has observed particular adverse effects from data compromises.
General Awareness & Protection Guidance
All individuals potentially affected by a breach should be wary of suspicious activities indicating their personal information has been or is being exploited, and follow these protective measures, including:
- Do not provide additional or detailed information about yourself, your family or associates, or your position with any individual who has an unusual or heightened interest in you, or your family and associates;
- Do not share personal, financial, or sensitive information if you are contacted by unknown individuals or groups via e-mail, instant messaging or text, telephone, social media interaction, and personal encounters;
- Do not open attachments or click on links embedded in emails, instant messages or texts from unknown senders, senders who would be unlikely to send an email directly to you, and even from known senders with grammatical errors, misspellings, or if there is no text with the attachment or link;
- Install and maintain up-to-date anti-virus and anti-malware software to guard against viruses, other malicious code, and pop-ups that can appear if your computer is infected;
- Transmit electronic information safely using encryption and by using secure, known websites (e.g., with addresses starting with “https” rather than “http”);
- Share electronic files and photographs only with those you know as they contain embedded metadata such as identity, date and time, and location information;
- Select the highest level of privacy settings on your electronic devices and applications;
- Monitor your credit history and activity through a reputable credit bureau and your account statements for any unauthorized or unusual entries. Free credit reports can be obtained at: http://www.consumer.ftc.gov/articles/0155-free-credit-reports;
- Maintain direct positive control of, or leave at home, electronic devices during travel, especially when traveling out of the U.S.;
- Know the locations and contact information for U.S. embassies, consulates, and other diplomatic establishments for any issues or emergencies when traveling out of the country. This information can be found at: http://www.state.gov/misc/list/index.htm;
- Report per your department, agency, or company instructions, all suspicious activity, events, or individuals you, relatives, and associates encounter; and
- Share these general awareness and protection guidelines with relatives and associates as appropriate. Avoid misconduct or behaviors that leave you vulnerable to blackmail, coercion, or recruitment.
Social Engineering
Social Engineering is the term used to describe bad actors using information they have discovered either legally or illegally about you to gain your trust and extract further information or manipulate you to take actions you would not otherwise take.
The use of stolen personal information by cyber operators is highly valuable for social engineering as it can be used to create a compelling illusion that you already know an individual or have a shared interest with them. It opens a means to contact you in either cyber space or the physical world to foster that trust or do harm.
Examples of how bad actors may use your personal information for social engineering and other purposes include:
Phishing (or spearphishing) is a common method used to contact people through email. With phishing, bad actors use social engineering to target their victims and lure them into taking actions that could ultimately compromise their computer or network. Examples include getting a victim to open a malicious attachment or clicking on a bogus embedded link. Like other social engineering attacks, spear phishing takes advantage of a victim’s most basic human traits, such as a desire to be helpful, provide a positive response to those in authority, or respond positively to someone who shares similar tastes or views, or simple curiosity about contemporary news and events. Those who “take the bait,” become unwitting participants in a computer network attack by allowing the attackers to bypass many of our technical defenses.
Phishing scams also trick you into providing your confidential information, which is then used to access your accounts. Typically this kind of fraud involves an email, text message, or pop-up window claiming to come from an official source.
Social Media Deception (including Facebook, Twitter, Google and LinkedIn) provides bad actors with an avenue to connect to their victims. Attackers may create a fake profile to befriend their victims while posing as a former acquaintance, job recruiter, or someone with a shared interest. Using a fake online persona, an attacker may try and get their victims to reveal more information about themselves or their employers, or they may simply collect more information about their victims from your social media postings.
Human Targeting is often used by foreign governments to target individuals with access to information of interest to them. For instance, you may unexpectedly meet someone at a venue of interest, such as a conference or child’s school event, who shares your interests or views and establishes an ongoing relationship. Your new friend may test you by getting you to do seemingly small “favors” for them or getting you to talk about trivial work-related information. Over time, trivial information may lead them to information that is of interest.
Travel Vulnerabilities are greater than usual, especially if you are traveling outside of the U.S., as it is common for you to encounter unfamiliar people. Also, your guard may be down because you are traveling for vacation, training, or other relaxing purposes. Therefore, take extra precaution of:
- Those who approach you in a friendly manner and seem to have a lot in common with you--especially if they wish to maintain contact with you once you return home.
- Interactions in social settings where you find you are unusually successful in meeting and impressing others.
- Aseemingly random and/or other foreign acquaintance who has heightened interest in your work or introduces you to a third party who then wants to continue to meet with you.
Unsolicited Telephone and Text Messages from toll-free numbers can be set up quickly and sometimes exist solely for the purpose of capturing your confidential information, often simply by playing a prerecorded message about your accounts being in trouble. The message prompts you to enter your 16-digit account number. This is followed by a request for your PIN and other personal information. Or you may receive a text message or a phone call with a prerecorded message that describes an urgent situation that requires immediate action. The message may say, “Your account has been blocked. Please call 800-123-4567 to unlock it.” Before you realize you’re being scammed, you’ve given enough information to duplicate your card and access your accounts.
Identity Impersonation is acquiring key pieces of your confidential information, such as your name, address, birthdate, Social Security number, and mother's maiden name, in order to commit fraud. Identify Impersonation can be used as a tactic for corporate exploitation via the newly acquired identity. With this information, an identity thief can take over your financial accounts; open new bank accounts; purchase automobiles; apply for loans, credit cards, and Social Security benefits; rent apartments; and establish services with utility and phone companies, all in your name.
Reporting
To protect yourself and your family, we urge all affected individuals to exercise caution and remain vigilant to any events appearing out of the ordinary or suspicious.
If you believe you have observed activity related to a personal data compromise or suspect your personal information has been exploited, report your concern as soon as possible to your security office.
The appropriate Federal government sites may also be used to report specific incidents:
- Report any suspected instances of identity theft to the FBI’s Internet Crime Complaint Center at www.ic3.gov.
- If you notice fraudulent activity, go to the Federal Trade Commission (FTC) website (www.ftc.gov/idtheft or www.identitytheft.gov) and complete an ID theft complaint form and place a fraud alert on your credit report.
- Report unexplained activity related to criminal behavior to the local police department. Provide them with a copy of the FTC form and request a copy of the police report.
Videos
Know the Risk - Raise your Shield: Spear Phishing
Know the Risk - Raise your Shield: Social Media Deception
Know the Risk - Raise your Shield: Human Targeting
More Information
The additional information, as well as future resources, as can be found at the ncsc.gov web site, including:
- 2017 Cybersecurity Calendar with Tips
- Memo from NCIX William “Bill” Evanina
- NCSC Overview Presentation, Your Personal Information – Protecting it from Exploitation
- Video Message from NCSC Deputy Director Dan Payne, Your Personal Information – Protecting it from Exploitation
Personnel Security for Industry & Academia
Job Aids
- Counterintelligence Reporting Essentials (CORE): A Practical Guide for Reporting Counterintelligence and Security Indicators
Supervisors and coworkers are the first line of defense against national security crimes. The government relies on you toprotect national security by reporting any behavior that you observe that may be related to a potential compromise ofsensitive information. However, judgment calls are often required by the potential reporter, and this often leads to indecisionor choosing not to report anything. This resource provides a focused list of serious counterintelligence- and security-relatedbehaviors that, if observed or learned about, should be reported immediately to the appropriate counterintelligence orsecurity authorities. All these behaviors are serious and require little or no speculation.
Reports
- Enhancing Supervisor Reporting of Behaviors of Concern
This report compiles a literature review with key information from subject matter expert (SME) interviews about barriers to reporting, strategies for overcoming these barriers, and tools to assist with the reporting process. - Reporting of Counterintelligence and Security Indicators by Supervisors and Coworkers
Personnel and Security Research Center (PERSEREC) conducted a study of supervisor and coworker reporting of security-related information. Explanations were offered by security managers and by focus group participants as to why manysecurity-related behaviors are underreported. PERSEREC developed a clear, succinct list of behaviors that could pose apotential threat to national security and thus should be reported if observed. - On the Right Track: Worker-on-Worker Violence Prevention
Researchers partnered with subject matter experts (SME) in law enforcement and asked them to share their opinions as towhy worker-on-worker violence seems so rare in police departments, especially given the intense, fast-paced, and armed environment. The purpose of this report is to identify best practices based on these discussions and recommend potential prevention strategies that organizations might want to consider for its own workforce.