Counterintelligence Awareness and Security Brief: Opening
Counterintelligence Awareness and Security Brief: Opening
1
Counterintelligence Awareness and Security Brief Student Guide CI112
together with other pieces of information, it may reveal sensitive, or even classified,
information.
Because of this, we must protect not only classified information, but also sensitive,
unclassified information and proprietary information. Loss of any of these directly affects
not only our companies’ economic viability, but also affects national security. You can find
details on how to protect your information in the Resources.
Classification Levels
Top Secret: Top Secret information is information or material of which unauthorized
disclosure could reasonably be expected to cause exceptionally grave damage to the
national security that the Original Classification Authority is able to identify or describe.
Secret: Secret information is information or material of which unauthorized disclosure could
reasonably be expected to cause serious damage to the national security that the Original
Classification Authority is able to identify or describe.
Confidential: Confidential information is information or material of which unauthorized
disclosure could reasonably be expected to cause damage to the national security that the
Original Classification Authority is able to identify or describe.
Targeted Information and Technologies
Let’s talk more specifically about the technology and information targeted by adversaries.
As a former foreign intelligence officer, I know a lot about this.
While adversaries are interested in anything that will strengthen their advantage— whether
it is a military, competitive, or economic advantage—technology assets are the greatest
target. Both classified and unclassified technologies are targeted. We also seek out
contingency plans, personnel information, and information on programs, deployments, and
response procedures.
When adversaries are able to collect enough information, they can piece it together and
learn things—even classified things—which have serious consequences to U.S. national
security.
Targeted information and technology includes:
• Technology information, classified and unclassified
o Critical Technology
o Dual Use Technology
o Industrial Base Technology List
o Emerging Science & Technologies
o Proprietary Research and Development
• Contingency plans
• Personal and personnel information
• Programs, deployments, response procedures
2
Counterintelligence Awareness and Security Brief Student Guide CI112
Critical Technology
• Technology or technologies essential to the design, development, production,
operation, application, or maintenance of an article or service that makes or could
make a significant contribution to the military potential of any country, including the
United States
• Includes, but not limited to, design and manufacturing know-how, technical data,
software, keystone equipment, and inspection and test equipment
• May be export controlled and subject to the International Traffic in Arms
Regulations (ITAR)
Dual Use Technology
• Technology that has both military and commercial use
• Export is strictly controlled and enforced under the Export Administration
Regulations (EAR)
• Illegal export of this technology often results in fines and/or criminal
• charges
Sources of Threat
Threats come in many forms and may materialize in different ways. As a CI Special Agent,
I see examples of this every day. For example, some threats are found within your office
and look just like you and your coworkers. In fact, they may be your coworkers. Others
originate within foreign intelligence entities. Threats may be physical and come in the form
of terrorist activity or they may be electronic and carried out by hackers and cyber
criminals.
Other threats come from those seeking to damage your business while building their own. In
order to identify these threats, you must understand what or whom to look for, and must
understand how they operate.
Collection Methods
Consider This
Would you consider any of these scenarios to be suspicious?
Your company’s sales department receives a purchase request from an unknown
vendor.
A scientist at your facility receives a request to review a research paper.
During a conference overseas, a researcher’s laptop is stolen.
As you arrive at your building early one morning, you encounter a coworker leaving
the building. The coworker nervously explains that he sometimes prefers to work
overnight without the distraction of others.
Your organization’s network service is disrupted following a denial of service
attack.
3
Counterintelligence Awareness and Security Brief Student Guide CI112
5
Counterintelligence Awareness and Security Brief Student Guide CI112
6
Counterintelligence Awareness and Security Brief Student Guide CI112
• Requests to review research papers, in hopes the expert will correct any mistakes
Collection via foreign academics may involve:
• Foreign students accepted to a U.S. university or at postgraduate research programs
who are recruited by their home country to collect information, and may be offered
state- sponsored scholarships as an incentive for their collection efforts
• Overqualified candidates seeking to work in cleared laboratories as interns
• Candidates seeking to work in cleared laboratories whose work is incompatible with
the requesting individual’s field of research
If you suspect you, a coworker, or your company may have been a target of this method,
report it to your FSO.
The following countermeasures may guard against this collection method:
• Review all documents being transmitted; use a translator, when necessary
• Provide foreign representatives with stand-alone information systems
• Share the minimum amount of information appropriate to the scope of the research
• Be aware of project scope and how to handle and report elicitation
• Attend threat awareness training
• Refuse to accept unnecessary foreign representatives into the facility
• Comply with the measures in your company’s Technology Control Plan (TCP),
including badging systems to identify both foreign and domestic visitors
A Technology Control Plan:
• Stipulates how a company will control access to its export-controlled technology
• Outlines the specific information that has been authorized for release
• May be required by the National Industrial Security Program Operating Manual
(NISPOM) and the International Traffic in Arms (ITAR) under certain
circumstances
• Protects classified and export-controlled information
• Controls:
o Access by foreign visitors
o Access by employees who are foreign persons
Information on this collection method is available in the Resources. If you suspect you, a
coworker, or your company may have been a target of this method, report it to your FSO.
Request for Information (RFI) / Solicitation
Adversaries employ requests for information and solicitations to establish a connection and
collect protected information by directly or indirectly asking or eliciting personnel or
protected information and technology.
Adversaries may do this through simple requests, usually via email, requests for technical
information and manuals, or intertwined with sales, representation, agency offers, or
responses to technical or business services. Adversaries may also directly request
7
Counterintelligence Awareness and Security Brief Student Guide CI112
information under the guise of price quotes, marketing surveys, or other direct and indirect
efforts.
Adversaries primarily request this information using email, phone, or web form submissions
approaches. While not every request is an indication you are being targeted, adversaries
often use this method and you must be alert to the potential threat.
There are several possible indicators of this collection method, including, but not limited to,
those listed below.
The requestor:
• Sends a request using a foreign address
• Has never met recipient
• Identifies self as a student or consultant
• Identifies employer as a foreign government
• States that work is being done for a foreign government or program
• Asks about a technology related to a defense program, project, or contract
• Asks questions about defense-related programs using acronyms specific to the
program
• Insinuates the third party he/she works for is "classified" or otherwise sensitive
• Admits he/she could not get the information elsewhere because it was classified or
controlled
• Advises the recipient to disregard the request if it causes a security problem, or the
request is for information the recipient cannot provide due to security classification,
export controls, etc.
• Advises the recipient not to worry about security concerns
• Assures the recipient that export licenses are not required or not a problem
If you suspect you, a coworker, or your company may have been a target of this method,
report it to your FSO.
The following countermeasures can protect against requests for information and solicitation
of services:
• View unsolicited and direct requests with suspicion, especially those received via the
Internet
• Respond only to people who are known after verifying their identity and address
• If the requestor cannot be verified, do not respond in any way and report the incident
to security personnel
Information on this collection method is available in the Resources. If you suspect you, a
coworker, or your company may have been a target of this method, report it to your FSO.
Foreign Visit
Using foreign visits as a collection methodology, adversaries attempt to gain access to and
collect protected information that goes beyond what is permitted and intended for sharing.
This applies both to visits to cleared contractor facilities that are pre-arranged by foreign
contingents and also to unannounced visits. It is important that your organization have
8
Counterintelligence Awareness and Security Brief Student Guide CI112
procedures in place for foreign visits. During a visit, your information and technology may
be vulnerable.
Suspicious or inappropriate conduct during foreign visits can include:
• Requests for information outside the scope approved for discussion
• Hidden agendas associated with the stated purpose of the visit
• Visitors/students requesting information and becoming irate upon denial
• Individuals bringing cameras and/or video equipment into areas where no
photographs are allowed
• Individuals providing last-minute changes to visitor list
• Individuals attempting to access areas that are not part of the visit
If you suspect you, a coworker, or your company may have been a target of this method,
report it to your FSO.
The following countermeasures can protect cleared defense contractors against unauthorized
access by foreign visitors:
• Contractors may coordinate with DCSA prior to visit
• Prior to visit: attend briefings on approved visit procedures
• Prior to visit: walk visitor route and identify vulnerabilities
• Be aware of restrictions on the visitors, and the nature of the threat
• Participate in post-visit debriefs
• Ensure visitors do not bring recording devices, including cell phones, into the
facility
Information on this collection method is available in the Resources. If you suspect you, a
coworker, or your company may have been a target of this method, report it to your FSO.
Foreign Travel
Americans are frequently targeted while traveling abroad for both work-related and personal
reasons. In countries with very active intelligence and security services, everything foreign
travelers do—including inside the hotel room—may be monitored and recorded. Travel is
also often used as an opportunity for an initial contact. It is much easier for a foreign entity
to contact foreign travelers away from home where they may be more vulnerable.
The following are suspicious indicators related to foreign travel:
• Bugged hotel rooms or airline cabins
• Intercepts of communications and email transmissions
• Recording of telephone calls/conversations
• Unauthorized access and downloading, including outright theft of hardware and
software
• Installation of malicious software
• Intrusions into or searches of hotel rooms, briefcases, luggage, etc.
• Recruitment attempts via bribery, blackmail, or coercion
9
Counterintelligence Awareness and Security Brief Student Guide CI112
If you suspect you, a coworker, or your company may have been a target of this method,
report it to your FSO.
The following countermeasures can be taken to guard against this collection method:
• Do not publicize travel plans and limit sharing of this information to people who
need to know
• Conduct pre-travel security briefings
• Maintain control of sensitive information, media, and equipment
o Do not pack these types of articles in checked baggage; carry them with you at
all times
o Do not leave them unattended in hotel rooms or stored in hotel safes
• Keep hotel room doors locked; note how the room looks when you leave
• Limit sensitive discussions; public areas are rarely suitable for discussion of
sensitive information
• Do not use information systems at foreign hotels or business centers for sensitive
matters
• Ignore or deflect intrusive or suspicious inquiries or conversations about
professional or personal matters
• Keep unwanted sensitive material until it can be disposed of securely
Information on this collection method is available in the Resources. If you suspect you, a
coworker, or your company may have been a target of this method, report it to your FSO.
Insider Threat
The threat that an insider will use his or her authorized access to do harm to the security of
the United States makes the insider threat the most potentially damaging of all collection
methods. This threat can cause damage through espionage, terrorism, unauthorized
disclosure of national security information, or through the loss or degradation of resources
or capabilities. The threat can come either wittingly or unwittingly from employees,
contractors, or anyone with legitimate access to an organization. There are certain
personality traits and life experiences that are more likely to lead a person to become an
insider threat.
There are also certain lifestyle cues to watch out for. While certainly not everyone
exhibiting these characteristics is a spy – and most are not – you need to be familiar with the
indicators.
Potential espionage indicators include, but are not limited to:
• Alcohol or other substance abuse or dependence
• Mental health issues
• Extreme, persistent interpersonal difficulties
• Hostile or vindictive behavior
• Criminal behavior
• Financial difficulties
• Unexplained or sudden affluence
• Unreported foreign contact and travel
10
Counterintelligence Awareness and Security Brief Student Guide CI112
Recruitment
Methods and Indicators
Now that you’re aware of the various collection methods, it’s important you are also aware
of recruitment methodology. In my foreign intelligence days, I used these methods myself.
Foreign entities are constantly looking for people to recruit.
They use elicitation as a technique to subtly extract information about you, your work, and
your colleagues. When done well, elicitation can seem like small talk. Social networking is
an excellent tool for elicitation and is often used in recruitment. An adversary’s recruitment
efforts often play to their target’s background, ego, and ideological beliefs or fears—
including job security. When elicitation uncovers an exploitable weakness, blackmail or
bribery may be used. Recruitment often involves contacts with individuals or organizations
from foreign countries. However, an already committed U.S. spy may attempt to recruit
colleagues.
Some indicators of recruitment include signs of sudden or unexplained wealth and
unreported foreign travel. There is information specifically about elicitation available to you
within the Resources.
Reportable indicators of recruitment include, but are not limited to:
• Request for critical assets outside official channels
11
Counterintelligence Awareness and Security Brief Student Guide CI112
Reporting
Consider This
DCSA relies on reports from cleared industry. If you were personally targeted, or you
became aware of targeting of your company or a co- worker, would you know what to do?
Would you know how to report it?
o Yes; I know exactly what to do and would report it immediately.
o I’m not sure; I’d have to look it up or check with somebody.
o No; I have no idea what I should do… maybe call the hotline?
If you suspect a possible threat, you must report it. You cannot assume someone else will do
so.
Reporting Procedures
Every one of us is an owner of security—both the security of information and the security of
personnel. We are all responsible for its safekeeping.
The National Industrial Security Program Operating Manual (NISPOM) outlines the
reporting requirements that apply to industry. Employees of cleared industry must report
potential threats to their FSO. Depending on the situation, the FSO will then report the
possible threat to the facility’s DCSA Industrial Security Representative and DCSA
Counterintelligence Special Agent. If the possible threat includes actual, probable or
possible espionage, sabotage, terrorism, or subversive activities, the FSO will report it to the
FBI and copy DCSA.
As you learned earlier, you must be aware of potential espionage indicators. You also must
be familiar with reportable cyber issues and reportable counterterrorism issues. There are
examples of reportable events or behaviors available here and also in the Resources.
12
Counterintelligence Awareness and Security Brief Student Guide CI112
13
Counterintelligence Awareness and Security Brief Student Guide CI112
Recruitment
Report events or behaviors including, but not limited to:
• Contact with an individual associated with a foreign intelligence, security, or
terrorist organization
• Offers of financial assistance by a foreign national other than close family
• Requests for classified or unclassified information outside official channels
• Engaging in illegal activity or a request to do so
Information Collection
Report events or behaviors including, but not limited to:
• Requests to obtain classified or protected information without authorization
• Requests for witness signatures for destruction of classified information when
destruction was not witnessed
• Operating unauthorized cameras, recording devices, information systems, or
modems in areas where classified data are stored, discussed, or processed
• Presence of any listening or surveillance devices in sensitive or secure areas
• Unauthorized storage of classified material
• Unauthorized access to classified or unclassified automated information systems
• Seeking access to sensitive information inconsistent with duty requirements
Information Transmittal
Report events or behaviors including, but not limited to:
• Unauthorized removal of classified or protected material from the work area
Transmission of Classified material via unsecured means
• Improper removal of classification markings from documents
• Discussions involving classified information over a nonsecure means
Suspicious Behavior
Report behavior including, but not limited to:
• Attempts to expand access to classified information by repeatedly
volunteering for assignments or duties beyond the normal scope of
responsibilities
• Extensive use of copy, facsimile, or computer equipment to reproduce or transmit
classified material that may exceed job requirements
• Repeated or un-required work outside of normal duty hours
• Unexplained or undue affluence
• Sudden reversal of financial situation or sudden repayment of large debts
• Attempts to entice DoD personnel into situations that could place them in a
compromising position
• Attempts to place DoD personnel under obligation through special treatment,
favors, gifts, money, or other means
• Short trips to foreign countries or travel within the United States to cities with
foreign diplomatic activities for reasons that appear unusual or inconsistent with a
person’s interests or financial means
• Indications of terrorist activity
• Concealment of foreign travel
• Making statements expressing support of or sympathy for a terrorist group
14
Counterintelligence Awareness and Security Brief Student Guide CI112
15
Counterintelligence Awareness and Security Brief Student Guide CI112
If you are unsure of what you are required to report, contact your FSO. When in
doubt, report an event or behavior to your FSO.
What to Report
DoD 5220.22-M, the National Industrial Security Program Operating Manual, or
NISPOM, outlines the reporting requirements that apply to industry.
Potential Espionage Indicators include:
• Unauthorized access to classified information, systems, or technologies
• Unusual requests for International Traffic in Arms Regulations (ITAR), Export
Administration Regulations (EAR), Dual Use technologies or equipment or any
request from embargoed countries
• Attempted exploitation by a Foreign
Intelligence Entity (FIE)
• Contact with a known or suspected foreign intelligence officer
• Information of planned, attempted, actual, or suspected terrorism, espionage,
sabotage, subversion, or other intelligence activities against defense, U.S. facilities,
organizations, or citizens
• Close, continuing associations with foreign nationals
• Contact with foreign diplomatic establishment
• Attempts to gain access without need-to-know
• Unreported foreign travel
• Unexplained affluence
• Unauthorized downloads of information or odd download patterns not consistent
with general office policy
• Association with anomalies
Whom to Report To
Report to your:
• Facility Security Officer (FSO)
16
Counterintelligence Awareness and Security Brief Student Guide CI112
Conclusion
Conclusion
You have just learned how cleared industry and people like you may be targeted. You need to be
aware of the threats you and your organization may face. You need to consider your facility, its
technology, networks and programs, and the information you know. How might you be targeted?
If you suspect a potential threat, you must report it. To review additional information on
collection methods, recruitment and elicitation, or reporting procedures, refer to the Course
Resources.
17