Define Counterintelligence
Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or their agents, or international terrorist organizations or activities.
Executive Order 12333
Provides the legal requirement to use lawful means to ensure U.S. receives the best intelligence available
DoDD 5240.06, Counterintelligence Awareness and Reporting (CIAR)
Regulation mandating the reporting of suspicious activities or potential espionage indicators
DoDD 5205.16, Insider Threat Program
Regulation mandating the establishment of an insider threat program
What are the Steps of CI Risk Management?
Step 1: Identify Assets
Step 2: Identify Threats
Step 3: Identify Vulnerabilities
Step 4: Assess Risk
Step 5: Develop and Apply Countermeasures
Protect any information, technology, or system that, if compromised, would:
Examples of unclassified information that requires protection
Proprietary
Personal
Critical Program Information
What is Militarily Critical Technology?
What is Dual Use Technology?
What is the greatest target of our adversaries?
Technology Assets
Who enforces International Traffic in Arms Regulations (ITAR)?
The Department of State
What is the purpose of International Traffic in Arms Regulations (ITAR)?
Who enforces Export Administration Regulations (EAR)?
The Department of Commerce
What is the purpose of Export Administration Regulations (EAR)?
Restricts access to dual use items by countries or persons that might apply such items to uses against U.S. interests
List 5 Threat Types
Insider Threats
Foreign Intelligence Service Threats
Terrorist Organizations
Criminal Activities
Business Competitors
Name the 5 Categories of Information Collection Methodologies
Name 3 Foreign Intelligence Collection Methods
What is the most frequently reported method of operation associated with foreign collection activity?
Unsolicited Requests
Name 4 potential indicators of an unsolicited requestor
How should one protect against unsolicited requests?
What might be considered suspicious or inappropriate conduct during visits by foreigners?
Examples on how to protect against unauthorized access by foreign visitors
Contractors may coordinate with DCSA prior to visit
During a foreign visit, restrict the following:
Foreign visitors request for:
Examples of countermeasues during foreign visits