National Counterintelligence and Security Center

Features

National Counterintelligence and Security Center

Forms

Form SF 312:

Classified Information Nondisclosure Agreement

(GSA library link may reflect 2013 version until GSA completes update to the DNI approved 2023 version)

 

Form SF 714:

Financial Disclosure Report

Current revision date 07/2022

Roles & Responsibilities

The Director of National Intelligence (DNI), in accordance with EO 13467, is responsible, as the Security Executive Agent (SecEA), for the development, implementation, and oversight of effective, efficient, and uniform policies and procedures governing the conduct of investigations and adjudications for eligibility for access to classified information and eligibility to hold a sensitive position. While the DNI is focused primarily on the Intelligence Community (IC), as SecEA his responsibilities are further extended to cover personnel security processes within all agencies, government-wide.

The Special Security Directorate (NCSC/SSD), NCSC’s Special Security Directorate serves as the Executive Staff for all Security Executive Agent functions and responsibilities on behalf of the DNI.

The Suitability and Security Clearance Performance Accountability Council (PAC) is responsible to the President for driving implementation of the Security and Suitability Reform Effort and for “ensuring accountability by agencies, ensuring the Suitability Executive Agent and the Security Executive Agent align their respective processes, and sustaining reform momentum.”

Executive Order 12333 as Amended, 30 July 2008 (PDF)

 

Goals, Directions, Duties, Responsibilities and Conduct with respect to the United States Intelligence Efforts.

 

Reforms the Intelligence Community and creates the Director of National Intelligence.

 

Establishes the National Counterintelligence Executive, the National CI Policy Board, and the Office of the National Counterintelligence Executive with title IX of the FY 2003 Intelligence Authorization Act.

 

Authorized intelligence and intelligence-related activities for FY 2003.

 

 

Reforms the Intelligence Community and creates the Director of National Intelligence.

 

Authorized intelligence and intelligence-related activities for FY 2004.

 

Authorized intelligence and intelligence-related activities for FY 2005.

 

"Uniting and strengthening America by providing appropriate tools required to intercept and obstruct terrorism."

 

 

Statutes
Presidential Issuances
National Policies
Intelligence Community Directives
Intelligence Community Policy Guidance
Intelligence Community Standards

 

Additional Links

 

Supply Chain Risk Management

PDDNI Dr. Stacey Dixon providing keynote address title=

NCSC thanks the Honorable Dr. Stacey Dixon, Principal Deputy Director of National Intelligence, for providing the keynote address for the 10th Annual Supply Chain Technical Exchange Conference, hosted at the National Geospatial-Intelligence Agency during the National Supply Chain Integrity Month events. NCSC partnered with several government, industry, and academic experts to bring awareness to the critical supply chains we need to protect. Dr. Dixon’s remarks were especially fitting the theme of including Acquisition, Cyber, and Enterprise (A.C.E.) security into SCRM programs. Dr. Dixon's remarks underscored the need to have our A.C.E.s at the ready and to "play together" to protect the supply chains of critical technologies, systems, and capabilities. This was truly a great event advancing supply chain security with our stakeholders.

Mission Statement

The mission of NCSC's Supply Chain and Cyber Directorate (SCD) is to enhance the nation's supply chain and cyber security, leveraging multidisciplinary counterintelligence and security expertise to inform, guide, and coordinate integrated risk decisions and responses with strategic partners.

PROTECTING CRITICAL SUPPLY CHAINS

Protecting Critical Supply Chains: A Guide to Securing Your Supply Chain Ecosystem

A Guide to Securing Your Supply Chain Ecosystem

Protecting Critical Supply Chains: Building a Resilient Ecosystem

Building a Resilient Ecosystem

Protecting Critical Supply Chains: Risks From Adversarial Exposure

Protecting Critical Supply Chains: Risks From Adversarial Exposure

Protecting Critical Supply Chains: Cyber Threat Hunting

Protecting Critical Supply Chains: Cyber Threat Hunting

CHAMPION SUPPLY CHAIN

Take the General Services Administration (GSA) and Federal Acquisition Institute (FAI) training course to Fortify the Chain:

Protecting Supply Chains for Critical Technologies

In October 2021, the National Counterintelligence and Security Center (NCSC) prioritized outreach efforts in five critical technology sector areas: Artificial Intelligence (AI), Bioeconomy, Autonomous Systems, Quantum, and Semiconductors.

These technologies present unique opportunities and challenges where the stakes are potentially greatest for U.S. economic and national security.

One of the unique challenges is managing the threats and risks to the very complex supply chains that support each one of these critical and emerging technologies.

For National Supply Chain Integrity Month in April 2022, NCSC focused on supply chain security issues unique to AI, specifically machine learning (ML) an AI subset; autonomous systems, specifically autonomous vehicles; and semiconductors

The awareness materials below highlight the unique supply chain issues associated with these critical technologies.

National Supply Chain Integrity Month

April 2024—#SCRM is the A.C.E.

Don't let threat actors have the upper hand.
Play an A.C.E.

Threat Landscape, Supply Chain Integrity Month April 2024

Securing Your Ecosystem: Methods and Potential Impacts of Supply Chain Attacks

April 2023 — Supply Chain Risk Management (SCRM) – The Recipe for Resilience

April 2022 — Fortify the Chain

April 2021 — A Call to Action

Supply Chain Risk Management (SCRM) - Don't Be the Weakest Link!

Supply Chain Risk Management

Executive Orders

Authorities, Policies, and Standards

Tools

Reducing Threats to Key U.S. Supply Chains

Podcasts

Additional Resources

Insider Threat

NCSC co-leads the National Insider Threat Task Force (NITTF) with the FBI. The NITTF helps the Executive Branch build programs that deter, detect, and mitigate actions by insiders who may represent a threat to national security. The NITTF develops guidance, provides assistance, assesses progress and analyzes new and continuing insider threat challenges. It is important to note that insider threat programs target anomalous activities, not individuals, so the NITTF’s work is coordinated with the relevant organization’s records management office, legal counsel, and civil liberties and privacy officials to build-in protections against infringing upon employees’ civil liberties, civil rights, privacy and whistleblower protections.

Insider Threat Websites

Relevant Reports, Briefings & Reading Material:

Economic Espionage

Throughout history, America's adversaries have routinely taken their competitive efforts beyond the battlefield. They frequently avoid using standing armies, shirk traditional spy circles, and go after the heart of what drives American prosperity and fuels American might. Nazi spies during World War II tried to penetrate the secrets behind our aviation technology, just as Soviet spies in the Cold War targeted our nuclear and other military secrets. Today, foreign intelligence services, criminals, and private sector spies focus their efforts on American industry and commerce.

These adversaries employ traditional intelligence methods against vulnerable American companies. However, their gaze has shifted to the cyber realm. The cyber environment, where critical business and technological information resides, provides a fast, efficient, and relatively safe avenue for penetrating the foundations of our economy. Their actions jeopardize intellectual property, trade secrets, and technological advancements vital for national security. Economic espionage against the private sector poses a long-term threat to U.S. prosperity.

Corrective action demands collaboration between the Federal Government and the private sector. Technologies nurtured by American minds and universities are at risk of becoming the spoils of competing nations. Unfortunately, the private sector alone lacks the resources and expertise to effectively thwart foreign attempts to pilfer critical American know-how.

Counterintelligence, not a typical corporate function, faces two challenges. One the cost. CI measures consume resources that could otherwise fuel growth. Second is the Nature of Public Corporations. Shareholders and growth ambitions drive American companies into developing markets, often leaving them vulnerable to espionage.

In this high-stakes game, vigilance, cooperation, and strategic investment are essential to safeguarding America’s future prosperity and security.

Reports, Briefings & Reading Material:

Foreign Economic Espionage in Cyberspace

National Counterintelligence and Security Center