UNCLASSIFIED

Targeting U.S. Technologies

Executive Summary


Regional Collecting Trends

According to the U.S. State Department, there are 200 independent countries in the world. In FY06-FY07, entities within over half of these countries attempted, at least once, to acquire U.S. defense technologies or information in a suspicious manner. DSS organized these attempts into the State Department's six regional groupings (See Reference Map for information about the countries within the State Department's regional bureaus). For FY06-FY07, the six regions DSS most frequently affiliated with validated Suspicious Contact Reports were, in descending order of occurrence:

Regions

Also, five percent of traditional collection attempts were from entities of unknown origin. It is noteworthy that the regions affiliated with the suspicious requests may not always be the ultimate end user of the targeted technology. Collectors may use anonymous proxies or base their collection activity in another region to conceal their intentions or the identity of the ultimate end-user.

Reporting and analysis indicated "East Asia and the Pacific" as the region of the world most actively attempting to illegally acquire U.S. defense technologies. This region was responsible for 36 percent of traditional collection attempts in FY06-FY07 and is historically the most active collector. This area had the largest portion of overall reporting with a slight increase from 30 percent to 36 percent from previous years. Although reporting from "East Asia and the Pacific" increased, reporting from the other regions either stayed constant or slightly decreased.

Once again, in FY06-FY07, the "Near East" region was the second most active area with 20 percent of the reporting, followed by "Europe and Eurasia" and "South and Central Asia" with 17 and 16 percent respectively. (Note: The minimal number suspicious contacts reports from the remaining two regions, Africa and the Western Hemisphere regions, did not justify inclusion in this year's report of most prolific collectors.)

Additionally throughout FY06-FY07, the most suspicious cyber entities had Internet Protocol (IP) addresses suggesting origination in the following regions, listed in descending order:

Regions

Back to Top

UNCLASSIFIED