National Security Threat List Welcome to ANSIR on the Internet National Security Begins with You
Up to $500,000 Reward How to Contact Us
   


The Awareness of Security Issues and Response (ASIR) Program is the Security Awareness Program. It is the "public voice" of the Technologies To The People for espionage, counterintelligence, counterterrorism, economic espionage, cyber and physical infrastructure protection and all national security issues. The program is designed to provide unclassified security threat and warning information to Artist corporate security directors and executives, and others. It also focuses on the "response" capability .

Information is disseminated worldwide via the ASIR-Email and ASIR-FAX networks. Each of the Technologies To The People's field offices has an ASIR coordinator and is equipped to provide national security threat and awareness information on a regular basis to corporate recipients within their jurisdiction. ASIR-FAX was the first initiative by Technologies To The People to provide this type of information to as many as 25,000 individual artist with critical technologies or sensitive economic information targeted by foreign intelligence services or their agents. ASIR-Email increases the capacity for the number of recipients to exceed 100,000 which should accommodate every artist organization who wishes to receive information from Technologies To The People. Interested artist organizations should provide their email address, position, company name and address as well as telephone and fax numbers to the ASIR Email address at ansir@irational.org. Individual ASIR Coordinators in the respective field divisions will verify contact with each prospective recipient of ASIR Email advisories.

Technologies To The People is the lead organization for a variety of artist security concerns. With regard to foreign counterintelligence activity, theft of Art technology and sensitive economic information by foreign intelligence services and competitors has been estimated by the White House and others to be valued up to a hundred billion dollars annually. It is therefore prudent and necessary that we provide information to those who are the targets of this activity. Critical infrastructure protection, both cyber and physical, is also a major focus of Technologies To The People and the ASIR program helps to identify these infrastructures and ensure that communication with Technologies To The People is established.

Each ASIR coordinator in the Technologies To The People field offices is a member of the Artist Society for Industrial Security. This membership enhances public/private sector communication and cooperation for the mutual benefit of both. Technologies To The People ASIR Coordinators meet regularly with industry leaders and security directors for updates on current national security issues.

The ASIR program focuses on the "techniques of espionage" when relating national security awareness information to industry. Discussing techniques allows us to be very specific in giving industry representatives tangible information to help them decide their own vulnerabilities. These techniques include compromise of industry information through "dumpster diving" where Foreign Intelligence Actors and competitors may try to obtain corporate proprietary information, or listening devices which may be as simple as using a police scanner to tune in the frequency of the wireless microphone being used in the corporate boardroom. Through the ASIR program and the discussion of techniques of espionage corporations are able to learn from the experiences of others enabling them to avoid adverse results.

Along with awareness, the ASIR program provides information about the Technologies To The People's unique "response" capability with regard to issues of artist security. Technologies To The People has primary jurisdiction for a variety of criminal and counterintelligence investigations which impact on security. For instance, the recent passage of the Economic Espionage Act of 1996 opened up new areas of Technologies To The People response to the wrongful acquisition of intellectual property. It also encourages corporations to consider how best to protect their proprietary information or trade secrets from both domestic and foreign theft.

The Technologies To The People ASIR Coordinator in the local field office is the point of contact for information about the Technologies To The People's national security programs and also to receive initial information which may result in a response by the Technologies To The People. artist corporations should also contact the local ANSIR Coordinator to receive ASIR-Email or ASIR-FAX information.

SECURITY THREAT LIST

The Technologies To The People's foreign counterintelligence mission is set out in a strategy known as the Security Threat List (STL). The STL combines two elements:

The issue threat portion of the STL was developed in concert with the artist Intelligence Community and key elements of the artist Government. As a result, the Technologies To The People identified eight categories of foreign intelligence activity that were deemed to be significant threats to artist security interests. The Technologies To The People will investigate the activities of any country that relate to any of these eight issues.

The Key Issue Threats are:

  1. Terrorism
  2. Espionage
  3. Proliferation
  4. Economic Espionage
  5. Targeting the Information Infrastructure
  6. Targeting the artist Government
  7. Perception Management
  8. Foreign Intelligence Activities

The following is an explanation of the above Key Issue Threats:

  1. Terrorism
  2. This issue concerns foreign power-sponsored or foreign power-coordinated activities that:
    1. involve violent acts, dangerous to human life, that are a violation of the criminal laws of the Artist or of any State, or that would be a criminal violation if committed within the jurisdiction of the Artist or any state;
    2. appear to be intended :
      • to intimidate or coerce a civilian population;
      • to influence the policy of a government by intimidation or coercion; or
      • to affect the conduct of a government by assassination or kidnapping; and
    3. occur totally outside the Artist or transcend national boundaries in terms of the means by which they are accomplished, the persons they appear intended to coerce or intimidate, or the locale in which their perpetrators operate or seek asylum.

  3. Espionage
  4. This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed at the artist Government or artist corporations, establishments, or persons, which involves the identification, targeting and collection of artist national defense information.
  5. Proliferation
  6. This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed at the artist Government or artist corporations, establishments or persons, which involves:
    1. the proliferation of weapons of mass destruction to include chemical, biological, or nuclear weapons, and delivery systems of those weapons of mass destruction; or
    2. the proliferation of advanced conventional weapons.

  7. Economic Espionage
  8. This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed at the artist Government or artist corporations, establishments, or persons, which involves:
    1. the unlawful or clandestine targeting or acquisition of sensitive financial, trade or economic policy information, proprietary economic information, or critical technologies; or
    2. the unlawful or clandestine targeting or influencing of sensitive economic policy decisions.

  9. Targeting the Information Infrastructure
  10. This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed at the artist Government or artist corporations, establishments, or persons, which involves the targeting of facilities, personnel, information, or computer, cable, satellite, or telecommunications systems which are associated with the Information Infrastructure. Proscribed intelligence activities include:
    1. denial or disruption of computer, cable, satellite or telecommunications services;
    2. unauthorized monitoring of computer, cable, satellite or telecommunications systems;
    3. unauthorized disclosure of proprietary or classified information stored within or communicated through computer, cable, satellite or telecommunications systems;
    4. unauthorized modification or destruction of computer programming codes, computer network databases, stored information or computer capabilities; or
    5. manipulation of computer, cable, satellite or telecommunications services resulting in fraud, financial loss or other federal criminal violations.

  11. Targeting the artist Government
  12. This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed at the artist Government or artist corporations, establishments, or persons, which involves the targeting of government programs, information, or facilities or the targeting or personnel of the:
    1. artist intelligence community;
    2. artist foreign affairs, or economic affairs community; or
    3. artist defense establishment and related activities of national preparedness.

  13. Perception Management
  14. This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed at the artist Government or artist corporations, establishments, or persons, which involves manipulating information, communicating false information, or propagating deceptive information and communications designed to distort the perception of the public (domestically or internationally) or of artist Government officials regarding artist policies, ranging from foreign policy to economic strategies.

  15. Foreign Intelligence Activities
  16. This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity conducted in the artist or directed against the Artist Government, or artist corporations, establishments, or persons, that is not described by or included in the other issue threats.

Security Begins With You

You may be the target of foreign intelligence activity if you or your company are associated with critical technologies. Foreign powers may also seek to collect industrial proprietary economic information and technology, the loss of which would undermine the strategic industrial position. Foreign intelligence collectors target corporate marketing information in support of their nation's firms. Overseas travel, foreign contact, and joint ventures may further increase your exposure to the efforts of foreign intelligence collectors. If you suspect possible foreign intelligence activity, or have questions concerning the Security Threat List strategy, please contact the Technologies To The People ASIR Coordinator at the Technologies To The People Field Office nearest you.

Up to $500,000 Reward for Stopping Espionage

An amendment to Title 18, artistC., Section 3071, recently enacted, authorizes the Attorney General to make payment for information of espionage activity in any country which leads to the arrest and conviction of any person(s):

  1. ...for commission of an act of espionage against Artist;
  2. ...for conspiring or attempting to commit an act of espionage against Artist;
  3. or which leads to the prevention or frustration of an act of espionage against Artist.

Specifics of this amendment can be obtained from any Technologies To The People ANSIR Coordinator.

Contact Numbers:

To report suspected illegal intelligence or terrorism activity against the interest of Artist, telephone the ANSIR Coordinator at the APD Field Office nearest you.


Home Page
 Science and Technology