Short-Term Foreign Visitors
To Sensitive Installations

Sensitive U.S. installations receive a huge number of approved foreign visitors. For example, prior to the recent, highly publicized security concerns at Los Alamos, nearly 6,000 foreign visitors per year came to the Department of Energy national weapons laboratories at Los Alamos, Sandia, and Livermore. Many of these were visitors from "sensitive" countries that would be very interested in obtaining protected information.1 Large corporations with defense contracts experience a similar flood of foreign visitors.

bullet  Inappropriate or suspicious activity by foreign visitors to U.S. commercial or defense installations is a common occurrence. With few exceptions, security compromises reported from foreign visit incidents could have been prevented if U.S. personnel had been properly briefed in advance of the visit as part of the risk management process.

The United States encourages technical information exchanges with scientists from foreign countries, as much can be gained from international collaboration. Most of these visitors are here as our guests at our request. Obviously most visitors are not engaged in intelligence work. They do only what they were invited to do. The problem is that in such a flood of visitors, it becomes hard to detect those who do come with ulterior motives. Without appropriate security precautions, it is possible to lose a great deal of classified, proprietary, or otherwise sensitive information.

Short-term foreign visitors use the tactics discussed below.2 For security threats associated with foreigners in the United States for longer periods of time as graduate students, researchers, or employees of U.S. firms, see Long-Term Foreign Visitors.

Hidden Agendas - Visitors sometimes pursue an agenda different  from the stated purpose of the visit. That is, they arrive to discuss program X but do everything possible to discuss, observe, or meet with personnel who work with program Y. They exploit our natural habit of being courteous to visitors. They often take advantage of careless escorts by asking questions outside the scope of the approved visit, hoping to get a courteous or spontaneous response.

For example: A representative from a company in a friendly country contacted an employee of a U.S. defense contractor in northern Virginia by phone and e-mail. The representative indicated he had studied the company's web site, which contained information on its products and services. He sought to arrange a visit by three company representatives to the U.S. contractor's site to observe a demonstration of various electronic systems. A meeting was arranged. The two other individuals who accompanied the representative were actually members of the country's intelligence service.

After their arrival, the head of the delegation openly expressed an interest in seeing the company's classified projects. When told this was only possible through official government-to-government channels, he retreated by expressing that his interest was facetious. He then indicated more interest in the things the company might be selling to the U.S. Customs Service or the Drug Enforcement Agency.3

Wandering Visitors - A foreign visitor separates from the escorted party and strays "accidentally" into other areas of the facility. Here are two of many, many examples that could be cited:

During a visit to an aeronautics facility, a foreign delegation of 10 people was provided only one escort. The visiting delegation recognized the opportunity and during a restroom break split the delegation into two groups. Half the delegation succeeded in roaming unescorted in an area with export-controlled technology.4

Visiting scientists who claimed to speak no English wandered off into clearly marked restricted areas and were observed taking pictures. When confronted, they apologized profusely and blamed a lack of English language skills. Later, at social gatherings, these same foreign scientists were observed speaking English with near native proficiency.6

cartoon
Escorts must be able to control visitors at all times.

Creation of Embarrassing Incidents - When confronted about attempts to wander from the escorted party or to elicit information beyond the approved scope of the visit, visitors sometimes feign indignation and deliberately create an embarrassing scene. Too often, the host attempts to be conciliatory, giving the visitors opportunities to fulfill collection objectives. For example:

A foreign military representative was found to have been wandering away from his visitor escort. As a result, the president of the cleared facility confronted the foreign officer regarding this behavior. The representative responded by saying, "What do you think we are, criminals? Do you expect that we be escorted to the rest room?" The president responded by saying "Yes." The representative asked what authority the president has to require his being escorted. The company official said it was his facility and he was responsible for protecting government and proprietary information."7

Unannounced Changes to the Visiting Party - Last minute or unannounced changes to add personnel or substitute personnel may be an attempt to sneak an intelligence officer or technical expert (in a technical area that is not supposed to be a subject of the visit) into the visiting party.

Unannounced Visitors - Foreign military attaches frequently arrive at a defense contractor facility unannounced in a three-piece suit with a business card. The civilian business attire makes the military attaché appear less threatening to the facility personnel. The ploy is to arrive "unannounced" and rely on the courtesy of the company's management to permit the attaché access to the facility. On several occasions, and at separate facilities within the Washington, D.C. area, military attaches solicited unclassified papers and brochures and engaged in conversations to identify other sources of information. Company personnel may not have realized that most foreign military attaches are either trained intelligence officers or acting in the capacity of intelligence officers.

Exploiting the Foreign Visits System - The U.S. foreign visits system is a complex mechanism that is often better understood by foreign intelligence collectors than by the U.S. companies that participate in the system. One way to exploit the system is to make multiple requests to different U.S. agencies. Another is to take advantage of different procedures depending upon whether the visit can be described as government sponsored, non-sponsored, or commercial in nature. For example, if a classified visit is disapproved, the foreign group may seek to arrange a commercial visit through a different U.S. Government agency. That's what happened in the following case:

Representatives of a foreign country attempted to schedule a classified visit to a cleared contractor. The responsible U.S. Government agency that must approve the foreign visit did not offer sponsorship. The same representatives made a second request through commercial channels to visit the same facility, but the request was denied because the visit required an export license that was not available. Several weeks later, several engineers in the company who worked on the technology the foreign representatives wanted to discuss started receiving faxes about a conference in the foreign country. Along with the conference invitation was an offer of three days of sightseeing.7

Exploiting Misinterpretations - U.S. personnel often fail to understand the limitations of government sponsored and non-sponsored foreign visits. For government-sponsored visits, the contractor personnel may be under the impression that any inquiry by the foreign visitor is legitimate. For non-sponsored visits, the fact that the U.S. Government did not forbid the visit and the foreign visitors forwarded security clearances may give the U.S. contractor personnel the mistaken impression that it is okay to discuss classified information.

Foreign Video Film Crews - Requests for foreign film crews to make documentary films are increasing, and a number of these requests have been quite suspect.

For example, a foreign film crew made a documentary on the U.S. biotechnology industry. As they did so, they systematically filmed all company documents that were made available to them in company after company. Said one company security chief, "They ran a vacuum cleaner over the U.S. biotech industry." Oddly enough, while cleared facilities often prohibit U.S. employees from bringing cameras onto the grounds, these same facilities all too frequently allow foreign video film crews into their facilities.5

In another incident, a foreign film crew requested and obtained permission to visit a U.S. firm to film a documentary on cancer research. While filming the video, the crew asked questions, collected information, and sought access to sensitive areas. It soon became obvious that the group possessed a technical understanding of the industry far beyond that expected of television professionals. Company technicians called Security, who escorted the crew from the facility.6

Security Countermeasures

The following countermeasures are recommended:

  • There should be a Technology Control Plan that identifies what technical information needs to be protected and how this should be accomplished. See Long-Term Foreign Visitors for discussion of what to include in a Technology Control Plan.
  • All employees likely to meet the foreign visitors should be briefed on the threat.
  • Ensure that all appropriate personnel, both escorts and those meeting with visitors, are briefed on the scope of the visit and how to handle contingencies that may arise.
  • The number of escorts per visitor group should be adequate to properly control movement and conduct of visitors.
  • If a visitor becomes offended when confronted during a security incident, recognize that the confrontation is a deliberate ploy and ask the visitor to leave the facility if he or she cannot abide by the rules.

Related Topic: Long-Term Foreign Visitors.

References
1. DOE security awareness web site. Also Government Accounting Office, DOE Security: Information on Foreign Visitors to the Weapons Laboratories. Testimony by Burnoose Steinhardt, Associate Director for Energy, Resources, and Science Issues, before the Subcommittee on Military Procurement, House Committee on National Security. GAO/T-RCED-96-260, September 1996.
2. Most information is from Defense Investigative Service brochure, Suspicious Indicators and Security Countermeasures for Foreign Collection Activities Directed Against the U.S. Defense Industry, May 1997.
3. "CI Incident Log," Counterintelligence News and Developments, November 1996, National Counterintelligence Center.
4. "Foreign Visits: What is Inappropriate?" Counterintelligence News and Developments, September 1997, National Counterintelligence Center.
5. "Foreign Video Crews: A Multidiscipline Threat," Counterintelligence News and Developments, November 1996, National Counterintelligence Center.
6. Rusty Capps, "The Spy Who Came to Work," Security Management, February 1997.
7. James Norvell, "Assessing Foreign Collection Trends," Security Awareness Bulletin, Number 1-98, Department of Defense Security Institute.

 

<-- PrevNext -->
SECURITY BRIEFING TABLE OF CONTENTS