Facing the challenges of the 1990s.
The Defense Investigative Service (DIS) works continually to make its overseas contractors aware that it is just a matter of time before they come to the attention of another country's intelligence service. DIS's primary role is to provide the advice and assistance needed to help contractors understand their security obligations. DIS is especially helpful overseas where duty stations are located thousands of miles away from their principal source of guidance.
The Far East, which competes heavily in business with the United States, is a good example of an area that may pose a threat to contractors located there. It is the job of the DIS's Office of Industrial Security-Far East (OISI-FE) to help contractors in that area protect themselves.
OISI-FE is involved with the entire spectrum of classified activity. Contractors are divided between those working on Army and Navy installations; the marketing and liaison personnel who operate out of commercial space inn the larger cities, such as Tokyo, Seoul, Singapore, and Hong Kong; and those who are actually working in foreign industry. Aside from dealing directly with the numerous user agencies, OISI-FE also deals with industrial security representatives of the various foreign governments with whom the United States has friendly ties.
OISI-FE serves as a central point of clearance records pertaining to contractor personnel. Additionally, it provides security briefings and other advice on industrial matters to U.S. contractors and their overseas employees. Becoming involved in issues before classified information is placed in jeopardy, rather than after, is the key to safeguarding American technology.
The competitive spirit of the Far East presents a demanding challenge to government security professionals. The quest for economic, military, and technical data continues unabated. The vulnerabilities imposed by such an environment require ever-present vigilance.
John F. Donnelly is director of the Defense Investigative Service.
|Printer friendly Cite/link Email Feedback|
|Title Annotation:||Pentagon Corner; security management of advanced US technology|
|Author:||Donnelly, John F.|
|Date:||May 1, 1993|
|Previous Article:||Eight rules of computer security.|
|Next Article:||Fraud Examination: Investigative and Audit Procedures.|