Data Abyss Solutions for Research Security


"Our nation faces a dramatically different threat landscape than it did even a couple of
decades ago. Today’s foreign intelligence threats are not just targeting the government,
but are increasingly looking at the private sector to gain a technological edge over our
key industries. As much as $600 billion worth of US intellectual property is stolen each
year. New threats and emerging technologies mean that we need to make serious and
substantive adjustments to how we address the issue of counterintelligence if we are to
protect America’s national and economic security." - Mark Warner Chairman U.S. Senate Select Committee on Intelligence

"Foreign governments and adversaries are targeting nearly every sector of U.S. society to steal secrets, none more so than China under the control of the Chinese Communist Party (CCP).
This marks a dramatic shift from decades past when adversaries primarily focused on accessing state secrets held by governments. But now, some of the most valuable information is controlled by private entities, not governments. Using old and new methods of collection, foreign entities routinely target private industry, technology firms, and higher education and research institutions for their
intellectual property, trade secrets, and research. The United States faces a drastically different counterintelligence threat landscape today than it did just a few years ago and our government is not currently set up to properly deal with the scale and scope of this counterintelligence threat." - Marco Rubio Vice Chairman U.S. Senate Select Committee on Intelligence

"Academia has come a long way in understanding, accepting, and addressing the research security threat over the past five years. The danger facing university professors, students, and institutions from malign foreign actors and foreign intelligence is widely understood and accepted today. Still, work remains to improve the state of security and transparency across the research enterprise to allow us to continue to operate in an open and collaborative environment on the international stage. National Security Presidential Memorandum-33 (NSPM-33) will help in these efforts by setting forth the actions required by research institutions, including academia, to mitigate risks and enhance the protection of the US research enterprise." Dr. Kevin Gamache Associate Vice Chancellor and Chief Research Security Officer Texas A&M University System

WHAT IS NATIONAL SECURITY PRESIDENTIAL MEMORANDUM 33?

WHAT IS NSPM-33? NSPM-33 is a directive from the President requiring all federal research funding agencies to strengthen and standardize disclosure requirements for federally funded awards. In addition, it also mandates the establishment of research security programs at major institutions receiving federal funds. 
WHY IS IT NEEDED? There has been an increasing need to protect U.S-funded scientific research from foreign interference and exploitation, including espionage and intellectual property theft. 

WHAT ARE THE GOALS OF NSPM-33?

PROTECTION 
To protect America’s national security while promoting openness in the research community 
CLARITY 
To make it clear so that well-intentioned researchers can easily and properly comply
CONSISTENCY 
To ensure that policies do not fuel xenophobia or prejudice

THE THREAT

About 80 percent of all economic espionage prosecutions brought by the U.S. Department of Justice (DOJ) allege conduct that would benefit the Chinese state, and there is at least some nexus to China in around 60 percent of all trade secret theft cases.
In June 2018, the White House Office of Trade and Manufacturing Policy issued a report on “How China’s Economic Aggression Threatens the Technologies and Intellectual Property of the United States and the World,” documenting “the two major strategies and various acts, policies, and practices Chinese industrial policy uses in seeking to acquire the intellectual property and technologies of the world and to capture the emerging high- technology industries that will drive future economic growth."

PRC’S RESEARCH INTERESTS
  • Active recruitment of professors and related scientists by the PRC
  • Undisclosed links to foreign employment, foreign military, intelligence, and recruitment programs
  • Economic espionage and conspiracy to Export U.S. technology
  • Grant fraud
  • Theft of trade secrets to sell to China
  • Acting as an illegal agent of the PRC
SOLUTIONS

Data Abyss specializes in collection and analysis of Open Source Intelligence (OSINT) or Publicly Available Information (PAI). Data Abyss gathers, sorts and filters relevant PAI through its proprietary platform. We offer a suite of solutions, which we further customize to meet the specific needs of each of Data Abyss client. Our team has a history of working with customers in the government sector especially in intelligence, security, defense, and the commercial sector. Teams ranging from supply chain risk management, foreign policy analysts, and threat intelligence analysts, will find that Data Abyss allows them to uncover new entities that were previously unknown.


Our Rivalry Platform is unparalleled because of its backend processing engines which assist in solving the problems of analyzing and identifying potential areas of PRC risk and opportunity. The goal of the platform is to generate automated actionable risk analysis to help identify, prioritize, and guide the development of courses of action for U.S. government stakeholders, allies, and partners. Our risk determination & impact engines have a unique way to check relationships for signs of Chinese military association and transnational organizational impacts. This allows the processing of billions of data points, building trillions of connections and viewing the results from various angles and dimensions in order to identify the intelligence that you need for your task. The Data Abyss platform is built to provide all the necessary data and tools to support you with your investigations and analysis into the China’s defense industrial base and academic landscape.

DATA ABYSS CAPABILITIES
  • Automated and AI-assisted data-curation processes and algorithms
  • Billions of standardized, corrected, linked, and translated data points from advanced open-source to deep web sources
  • Discovery, collection, storage, indexing, and search capabilities for open-source data found across the open web and deep web
  • Vital information to support intelligence analysts, investigators, and researchers
  • Historical archived copies of deep web PRC publications
  • Complete, exportable visualizations & graphs
  • Secure Elasticsearch API Endpoint

KEY BENEFITS

Winning this era of Great Power Competition with China is our mission. We want our customers to get ahead and achieve their respective mission objectives.
  • Understand foreign collaborators at scale
  • Plan and strategize with whom we are collaborating with
  • Monitor who is funding those collaborators
  • Assess if there is a foreign government nexus
  • Monitor the risks to the institution
  • Determine if the risks can be mitigated
  • Informed data for reviewing and approving foreign collaborations and agreements
Knowledge Graph Analytics
  • Defining Risk
  • Assessing Risk
  • Assessing the People & R&D factors
University of Central Florida researching with China’s NUDT on dual-use technologies


University of North Dakota researching with PLA Unit 93212 on NASA atmospheric datasets



About Parallax Advanced Research

Parallax is a 501(c)(3) nonprofit research institute that tackles global challenges by accelerating innovation and developing technology and solutions through strategic partnerships with government, industry, and academia across Ohio and the Nation. Together with academia, Parallax accelerates innovation that leads to new breakthroughs. Together with the government, Parallax tackles critical global challenges and delivers new solutions. Together with the industry, Parallax develops groundbreaking ideas and speeds them to market.


LJ Eads is a retired U.S. Air Force Intelligence Officer, Signals Intelligence Analyst, and the Founder of Data Abyss. He has developed artificial intelligence capabilities in the domains of Space, Cyber, and Open-Source Intelligence for the Intelligence Community. He currently develops capabilities that are directly improving capabilities to collect, analyze, and provide intelligence products in the areas of China’s strategic science and technology development using multi-lingual open sources.



Comments