National Counterintelligence and Security Center

Newsroom

Executive Order 12333 as Amended, 30 July 2008 (PDF)

 

Goals, Directions, Duties, Responsibilities and Conduct with respect to the United States Intelligence Efforts.

 

Reforms the Intelligence Community and creates the Director of National Intelligence.

 

Establishes the National Counterintelligence Executive, the National CI Policy Board, and the Office of the National Counterintelligence Executive with title IX of the FY 2003 Intelligence Authorization Act.

 

Authorized intelligence and intelligence-related activities for FY 2003.

 

 

Reforms the Intelligence Community and creates the Director of National Intelligence.

 

Authorized intelligence and intelligence-related activities for FY 2004.

 

Authorized intelligence and intelligence-related activities for FY 2005.

 

"Uniting and strengthening America by providing appropriate tools required to intercept and obstruct terrorism."

 

 

Statutes
Presidential Issuances
National Policies
Intelligence Community Directives
Intelligence Community Policy Guidance
Intelligence Community Standards

 

Additional Links

 

Mission Statement

The mission of NCSC's Supply Chain and Cyber Directorate (SCD) is to enhance the nation's supply chain and cyber security, leveraging multidisciplinary counterintelligence and security expertise to inform, guide, and coordinate integrated risk decisions and responses with strategic partners.

PROTECTING CRITICAL SUPPLY CHAINS

Protecting Critical Supply Chains: A Guide to Securing Your Supply Chain Ecosystem

A Guide to Securing Your Supply Chain Ecosystem

Protecting Critical Supply Chains: Building a Resilient Ecosystem

Building a Resilient Ecosystem

Protecting Critical Supply Chains: Risks From Adversarial Exposure

Protecting Critical Supply Chains: Risks From Adversarial Exposure

Protecting Critical Supply Chains: Cyber Threat Hunting

Protecting Critical Supply Chains: Cyber Threat Hunting

CHAMPION SUPPLY CHAIN

Take the General Services Administration (GSA) and Federal Acquisition Institute (FAI) training course to Fortify the Chain:

Protecting Supply Chains for Critical Technologies

In October 2021, the National Counterintelligence and Security Center (NCSC) prioritized outreach efforts in five critical technology sector areas: Artificial Intelligence (AI), Bioeconomy, Autonomous Systems, Quantum, and Semiconductors.

These technologies present unique opportunities and challenges where the stakes are potentially greatest for U.S. economic and national security.

One of the unique challenges is managing the threats and risks to the very complex supply chains that support each one of these critical and emerging technologies.

For National Supply Chain Integrity Month in April 2022, NCSC focused on supply chain security issues unique to AI, specifically machine learning (ML) an AI subset; autonomous systems, specifically autonomous vehicles; and semiconductors

The awareness materials below highlight the unique supply chain issues associated with these critical technologies.

National Supply Chain Integrity Month

April 2024—#SCRM is the A.C.E.

Don't let threat actors have the upper hand.
Play an A.C.E.

Threat Landscape, Supply Chain Integrity Month April 2024

Securing Your Ecosystem: Methods and Potential Impacts of Supply Chain Attacks

April 2023 — Supply Chain Risk Management (SCRM) – The Recipe for Resilience

April 2022 — Fortify the Chain

April 2021 — A Call to Action

Supply Chain Risk Management (SCRM) - Don't Be the Weakest Link!

Supply Chain Risk Management

Executive Orders

Authorities, Policies, and Standards

Tools

Reducing Threats to Key U.S. Supply Chains

Podcasts

Additional Resources

Economic Espionage

Throughout history, America's adversaries have routinely taken their competitive efforts beyond the battlefield. They frequently avoid using standing armies, shirk traditional spy circles, and go after the heart of what drives American prosperity and fuels American might. Nazi spies during World War II tried to penetrate the secrets behind our aviation technology, just as Soviet spies in the Cold War targeted our nuclear and other military secrets. Today, foreign intelligence services, criminals, and private sector spies focus their efforts on American industry and commerce.

These adversaries employ traditional intelligence methods against vulnerable American companies. However, their gaze has shifted to the cyber realm. The cyber environment, where critical business and technological information resides, provides a fast, efficient, and relatively safe avenue for penetrating the foundations of our economy. Their actions jeopardize intellectual property, trade secrets, and technological advancements vital for national security. Economic espionage against the private sector poses a long-term threat to U.S. prosperity.

Corrective action demands collaboration between the Federal Government and the private sector. Technologies nurtured by American minds and universities are at risk of becoming the spoils of competing nations. Unfortunately, the private sector alone lacks the resources and expertise to effectively thwart foreign attempts to pilfer critical American know-how.

Counterintelligence, not a typical corporate function, faces two challenges. One the cost. CI measures consume resources that could otherwise fuel growth. Second is the Nature of Public Corporations. Shareholders and growth ambitions drive American companies into developing markets, often leaving them vulnerable to espionage.

In this high-stakes game, vigilance, cooperation, and strategic investment are essential to safeguarding America’s future prosperity and security.

Reports, Briefings & Reading Material:

Foreign Economic Espionage in Cyberspace

Insider Threat

NCSC co-leads the National Insider Threat Task Force (NITTF) with the FBI. The NITTF helps the Executive Branch build programs that deter, detect, and mitigate actions by insiders who may represent a threat to national security. The NITTF develops guidance, provides assistance, assesses progress and analyzes new and continuing insider threat challenges. It is important to note that insider threat programs target anomalous activities, not individuals, so the NITTF’s work is coordinated with the relevant organization’s records management office, legal counsel, and civil liberties and privacy officials to build-in protections against infringing upon employees’ civil liberties, civil rights, privacy and whistleblower protections.

Insider Threat Websites

Relevant Reports, Briefings & Reading Material:

Cyber Security

The cyber threat is simultaneously a national & homeland security threat and a counterintelligence problem. State and non-state actors use digital technologies to achieve economic and military advantage, foment instability, increase control over content in cyberspace and achieve other strategic goals — often faster than our ability to understand the security implications and neutralize the threat.

NCSC works with the U.S. Government cyber community and the IC, to provide the CI and security perspective on foreign intelligence and other threat actors’ cyber capabilities and provides context and possible attribution of adversarial cyber activities.

Relevant Reports, Briefings & Reading Material:

Provides an indispensable series of basic steps every American can take to safeguard their home networks from cyber intrusions

CI tips for cyber smarts:

Other Links:

National Counterintelligence and Security Center