Counterintelligence  Awareness for Defense Critical Infrastructure

Counterintelligence Awareness for Defense Critical Infrastructure
PDF icon July 2016, 3 pages. This job aid provides an introduction to Defense Critical Infrastructure sectors, awareness of threats, and knowledge of reporting requirements to those providing security services to critical infrastructure assets within the Department of Defense (DoD).

Counterintelligence Awareness Video

Counterintelligence Awareness Video
PDF icon May 2016, 3 minute 48 second video. Threats to individual privacy, global commerce, and national security are as rampant as they are diverse, dynamic and complex.   CDSE provides Counterintelligence Awareness training and related materials on recognizing the threat, reporting procedures, and much more.

DoD Component Insider Threat Training Requirements and Resources

DoD Component Insider Threat Training Requirements and Resources
PDF icon May 2016, 3 pages. This job aid provides information on Insider Threat program management personnel training requirements and resources.

Foreign Intelligence Entity Targeting Recruitment Methodology

Foreign Intelligence Entity Targeting Recruitment Methodology
PDF icon March 2016, 1 page. Intelligence officers spot and assess individuals for potential recruitment.

Industrial Security Facilities Database (ISFD)

Industrial Base Technology List
PDF icon February 2016, 12 pages. The job aid introduces security practitioners to DSS's Industrial Base Technology List (IBTL).  The IBTL identifies and defines critical U.S. defense technology and crosswalks all categories to the legacy Military Critical Technology List. This job aid is an excellent resource for the protection of U.S. technology and the implementation of research, development and acquisition security practices.

Foreign Collection Methods: Indicators and Countermeasures

Foreign Collection Methods: Indicators and Countermeasures
PDF icon November 2015, 8 pages. Reporting contacts, activities, indicators, and behaviors associated with foreign in-telligence entities (FIEs), a term which includes international terrorists, is required under DoD Directive 5240.06 Counterintelligence Awareness and Reporting (CIAR).

Understanding Espionage and National Security Crimes

Understanding Espionage and National Security Crimes
PDF icon April 2015, 2 pages. This job aid provides information on understanding espionage and national security crimes.

Insider Threat Case Study: Kun Chun

Insider Threat Case Study: Kun Chun
PDF icon August 2016, 2 pages. These job aids reinforce the adverse effects of the Insider Threat and are suitable for printing or easy placement in a company or command newsletter, email, or training bulletin.

Insider Threat Cast Study: Hannah Robert

Insider Threat Case Study: Hannah Robert
PDF icon August 2016, 2 pages. These job aids reinforce the adverse effects of the Insider Threat and are suitable for printing or easy placement in a company or command newsletter, email, or training bulletin.

Insider Threat Case Study: Robert Mo

Insider Threat Case Study: Robert Mo
PDF icon April 2016, 1 page. These job aids reinforce the adverse effects of the Insider Threat and are suitable for printing or easy placement in a company or command newsletter, email, or training bulletin.

Insider Threat Case Study: Charles Eccleston

Insider Threat Case Study: Charles Eccleston
PDF icon April 2016, 1 page. These job aids reinforce the adverse effects of the Insider Threat and are suitable for printing or easy placement in a company or command newsletter, email, or training bulletin.

Insider Threat Case Study: Christopher Boyce

Insider Threat Case Study: Christopher Boyce
PDF icon January 2016, 1 page. These job aids reinforce the adverse effects of the Insider Threat and are suitable for printing or easy placement in a company or command newsletter, email, or training bulletin.

Insider Threat Case Study: Walter Liew

Insider Threat Case Study: Mostafa Awwad
PDF icon January 2016, 1 page. These job aids reinforce the adverse effects of the Insider Threat and are suitable for printing or easy placement in a company or command newsletter, email, or training bulletin.

Insider Threat Case Study: Walter Liew

Insider Threat Case Study: Walter Liew
PDF icon October 2015, 1 page. These job aids reinforce the adverse effects of the Insider Threat and are suitable for printing or easy placement in a company or command newsletter, email, or training bulletin.

Insider Threat Case Study: Wen Chyu Liu

Insider Threat Case Study: Wen Chyu Liu
PDF icon October 2015, 1 page. These job aids reinforce the adverse effects of the Insider Threat and are suitable for printing or easy placement in a company or command newsletter, email, or training bulletin.

Insider Threat Case Study: Bryan Underwood

Insider Threat Case Study: Bryan Underwood
PDF icon July 2015, 1 page. These job aids reinforce the adverse effects of the Insider Threat and are suitable for printing or easy placement in a company or command newsletter, email, or training bulletin.

Insider Threat Case Study: Yuan Li

Insider Threat Case Study: Yuan Li
PDF icon July 2015, 1 page. These job aids reinforce the adverse effects of the Insider Threat and are suitable for printing or easy placement in a company or command newsletter, email, or training bulletin.