
Security Intelligence
Security for Aerospace and Defence Contractors | CloseProtectionHire
Security for aerospace and defence contractor executives, engineers, and facilities: state-sponsored IP theft, classified information handling, export control criminal risk, facility security standards, and personal protection.
Written by James Whitfield
The aerospace and defence contracting sector operates at the intersection of high-value IP, government classified information, and persistent state-sponsored threat actors. Security for this sector extends across personnel security, facility security, information security, and personal protection for executives and cleared staff.
This guide addresses the security considerations for prime and sub-tier aerospace and defence contractors, their executives, cleared personnel, and facility security officers.
The State-Sponsored Threat Landscape
Defence contractor IP represents some of the highest-value intellectual property in the global economy. Advanced fighter jet designs, missile guidance systems, naval vessel architecture, satellite technology, and dual-use aerospace systems are priorities for foreign intelligence services who recognise that acquiring this technology through espionage is faster, cheaper, and more reliable than indigenous development.
PRC targeting. The US Department of Justice has published federal indictments against PRC-linked threat actors for intrusions into the networks of Boeing, Lockheed Martin, Raytheon, and Northrop Grumman, among others. The Hainan State Security Department-linked APT40 group has been publicly attributed by the US, UK, EU, Australia, and NATO to sustained campaigns against defence and aerospace targets. In the UK, the NCSC has attributed comparable campaigns to PRC-aligned actors targeting UK defence contractors.
Beyond digital intrusion, PRC collection operations targeting defence contractors include: targeted recruitment of cleared personnel (documented in multiple FBI and NCSC cases), placement of individuals in contractor roles at sub-tier suppliers, elicitation of cleared personnel at academic conferences and international events, and acquisition of defence-relevant companies or equity stakes to access technology legally.
Russian GRU and SVR. Russian military intelligence (GRU) and the foreign intelligence service (SVR) have conducted sustained campaigns against Western aerospace and defence contractors. The GRU cyberattack programme (publicly attributed in joint advisories by the US, UK, and NATO) has targeted defence contractors across the alliance. The Salisbury attack (GRU Unit 29155) demonstrates that Russian intelligence services will conduct lethal operations outside Russia against Western targets – a threat context relevant to senior executives at major contractors.
Iran and North Korea. Iranian threat actors (Charming Kitten/APT35) have targeted defence and aerospace contractors as part of broader economic and military espionage operations. North Korea’s Lazarus Group has targeted defence contractors for both financial theft (cryptocurrency) and technology acquisition.
ITAR and Export Control Criminal Risk
The International Traffic in Arms Regulations (ITAR, 22 CFR Parts 120-130) and the Export Administration Regulations (EAR, 15 CFR Parts 730-774) together regulate the export of US-origin defence articles, dual-use technology, and technical data. For individuals:
Personal criminal liability. ITAR violations by individuals who wilfully export or transfer controlled technical data without authorisation carry penalties of up to USD 1 million per violation and 20 years imprisonment under 22 U.S.C. 2778(c). The EAR similarly provides for individual criminal penalties. The “deemed export” rule under ITAR and EAR means that sharing controlled technical data with a foreign national inside the US (or within the company) is treated as an export to that individual’s country of nationality – a common compliance failure at companies with international workforces.
Pre-travel review. Before any international conference, technical briefing, or overseas business trip, executives and engineers with access to ITAR/EAR-controlled technology should confirm: whether any planned presentations or discussions involve controlled technical data, whether the destination country is subject to US arms embargo or sanctions (ITAR-prohibited countries include Cuba, Iran, North Korea, Russia, Syria, and others under Part 126.1), and whether any planned transfer of hardware, software, or technical data requires export licence authorisation.
Conference discipline. International defence exhibitions and conferences – Paris Air Show, DSEI (London), Euronaval (Paris), IDEX (Abu Dhabi), MSPO (Poland) – involve technical discussions in public or semi-public environments. The disclosure of controlled technical data in exhibition hall conversations is an ITAR risk. Pre-conference briefings for all attending staff on what can and cannot be discussed without prior authorisation are standard practice at ITAR-compliant contractors.
Personnel Security and Cleared Staff
The NISPOM (32 CFR Part 117) requires defence contractors holding government classified contracts to maintain an insider threat programme and to conduct personnel security vetting for all cleared staff. The insider threat profile for defence contractors combines the general insider threat typology with the specific risk of state-sponsored recruitment:
Foreign travel reporting. Cleared US personnel are typically required to report foreign travel and contacts with foreign nationals under the NISPOM and facility security officer (FSO) requirements. The reporting obligation exists because foreign travel creates contact opportunities with foreign intelligence services. The failure to report a foreign contact that subsequently proves to be an intelligence officer is both a security failure and a potential criminal matter under 18 U.S.C. 1001 (false statements to government investigators).
Counter-elicitation training. The standard approach by foreign intelligence services at conferences and social events is elicitation – drawing out controlled information through conversation rather than direct request. Cleared personnel should receive counter-elicitation training before attending international events. The signs of an elicitation approach include: excessive curiosity about specific technical programmes, repetitive questions on controlled topics framed as casual interest, flattery and appeals to professional pride, and gradual escalation of information requests across multiple meetings.
Honey-pot patterns. FBI and NCSC advisories document romantic and social honey-pot approaches targeting cleared defence personnel at conferences and online. LinkedIn approaches from individuals representing foreign academic or research institutions are a commonly documented pattern.
Facility Security Standards
NISPOM requirements. US defence contractors holding classified government contracts must comply with 32 CFR Part 117 (NISPOM). Physical security requirements include: SCIFs (Sensitive Compartmented Information Facilities) for classified programme work, meeting ICD 705 physical and technical standards; access control to classified areas with biometric or smart card systems; visitor control procedures; CCTV coverage of classified areas; and an insider threat programme with defined monitoring and reporting obligations.
UK standards. UK defence contractors operating with HMG classified information must comply with the HMG Security Policy Framework (SPF) and the relevant baseline technical and physical standards. Facility security officers (DSOs) in the UK apply the Government Functional Standard GovS 007: Security. The UK equivalent of a SCIF is a Protected Location, with standards set by CPNI.
Supply chain requirements. DFARS (Defense Federal Acquisition Regulation Supplement) in the US and the UK’s Cyber Essentials Plus requirement for classified contracts extend cybersecurity standards to the supply chain. Tier-2 and tier-3 suppliers are required to meet specified security standards as a contract condition.
Executive Personal Protection
Senior executives at major defence contractors have a personal threat profile that combines:
- General high-net-worth executive risk (KFR, robbery, targeted crime)
- Sector-specific risk from state-sponsored actors (surveillance, honey-pot, in extreme cases physical approach)
- Conference and international travel risk (ITAR, counter-intelligence targeting)
The close protection methodology for defence executives applies the standard executive protection framework with specific additions: counter-surveillance to detect state-sponsored surveillance teams (which are typically more professional than commercial criminal surveillance), TSCM sweeps of accommodation and meeting rooms during sensitive travel, and device security that reflects the ITAR and classified information environment.
For the technical surveillance countermeasures applicable to hotel rooms and meeting venues during sensitive defence negotiations and executive travel, see our TSCM guide. For the executive digital security framework including the clean device protocol for international travel to high-surveillance markets, see our executive digital security guide. For semiconductor and cleanroom manufacturing facilities – where EUV lithography IP carries the same state-level collection value as defence contractor IP, BIS export controls create personal criminal liability for technical staff, and insider recruitment through academic and industry channels mirrors the defence contractor threat model – see our security for semiconductor and cleanroom manufacturing guide.
Key takeaways
ITAR creates personal criminal liability for executives: compliance failures are not purely a corporate matter
ITAR violations can result in 20 years imprisonment for individuals who wilfully transfer controlled technical data to unauthorised persons. The most common personal exposure is discussing controlled technology with foreign national colleagues or at international conferences without checking export licence requirements. A pre-travel ITAR briefing for any executive travelling to international events with technical presentations is the minimum standard.
PRC state-sponsored actors have been indicted for targeting major aerospace and defence contractors: this is a documented and persistent threat
Federal indictments of PRC-linked threat actors (APT10, APT41) for intrusions into Boeing, Lockheed Martin, Raytheon, and other contractors are public record. The threat is not hypothetical. The clean device protocol, secure communications for sensitive discussions, and counter-elicitation briefing before international events are proportionate responses to a documented and ongoing threat.
Honey-pot approaches at defence conferences are a documented counter-intelligence concern
The FBI and NCSC regularly brief cleared personnel on the pattern of foreign intelligence service approaches at defence and aerospace conferences (Paris Air Show, DSEI, Euronaval, IDEX). The pattern involves individuals presenting as buyers, academics, or business partners who establish personal relationships and progressively seek access to technical information. Counter-elicitation awareness training for technical staff attending international events is standard good practice.
Cleared personnel in close protection environments require advance planning on access controls
If a CPO will be in proximity to classified discussions, the principal's organisation must decide in advance how to manage that access -- either by clearing the CPO at the appropriate level or by managing their presence to exclude them from classified environments. Attempting to resolve this at the point of a classified meeting is not the right approach.
The supply chain is the weakest link in defence contractor security
Major prime contractors have extensive, multi-tier supply chains that include SMEs with lower security maturity. State-sponsored actors target tier-2 and tier-3 suppliers to access classified programme data they cannot reach directly at the prime. Supply chain security assurance -- requiring NISPOM-equivalent standards or Cyber Essentials Plus from all controlled-technology suppliers -- is increasingly a DDTC and UK DSP requirement, not just a voluntary measure.
Frequently Asked Questions
Request a Consultation
Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.
Your enquiry has been received. A security consultant will contact you within 24 hours to discuss your requirements.
