• eLearning: Counterintelligence Awareness and Reporting Course for DoD Employees CI116.06
    Department of Defense (DoD) Components are required by DoD Directive 5240.06 to provide Counterintelligence Awareness and Reporting training to all personnel within 90 days of initial assignment, or employment to the Component, and every 12 months thereafter.  When an experienced Counterintelligence Agent is not available to provide such training in person, this web-based training may be used to meet the training requirement.
  • eLearning: Counterintelligence Awareness and Security Brief CI112.16
    The "Counterintelligence Awareness and Security Brief" course was developed for employees at cleared defense contractor facilities.  This eLearning training enables these employees to complete the training at any time, to fulfill their initial or annual security training requirement.  The emphasis of the training is on awareness of potential threats directed against U.S. technology; it also explains common suspicious activities, including insider threats that should be reported to the Facility Security Officer (FSO) in compliance with NISPOM 1-302.  FSOs are encouraged to use this training to meet the Security Training and Briefings requirement outlined in NISPOM Chapter 3.
  • Certificate: Counterintelligence Awareness Certificate CI201.CU
    The curriculum addresses counterintelligence awareness and reporting, insider threat awareness, the integration of counterintelligence into security programs, counterintelligence concerns in personnel security and foreign travel, research and technology protection, and threats to defense industry.
  • Toolkit: Counterintelligence Awareness
    This toolkit will quickly point you to the resources for Counterintelligence Awareness.
  • Webinar: Recognition and Reporting of CI Anomalies
    The timely recognition and reporting of counterintelligence (CI) anomalies is everyone's responsibility. Often times, actions by foreign individuals or governments provide suspicion that classified or otherwise sensitive information has been compromised. If properly reported and investigated, this may lead to the identification and neutralization of a foreign intelligence operation. Previous experience has demonstrated time and time again that unexpected activity or technological advancements occurring can be indicators of foreign intelligence knowledge or illicit acquisition of critical information or technology.