The Counterintelligence (CI) Awareness Program's purpose is to make DOD and Industry Security personnel aware of their responsibility to report unusual activities or behaviors and various threats from foreign intelligence entities, other illicit collectors of US defense information, and/or terrorists.
These "shorts" are not intended for download. Please note, you will not receive a certificate of completion for watching a short.
- Academic Solicitation
Provides an opportunity to identify improper attempts to obtain sensitive or classified information and identify academic solicitation methods, determine countermeasures, and report suspicious activity.
- CI Foreign Travel Briefing
Assists facility security officers (FSOs) working in cleared defense contract facilities in the development of their own tailored briefs. This course provides an outline of topics, which are recommended for inclusion in a CI Foreign Travel Brief. A briefing template is included which FSOs may use, adding or subtracting information to fit their individual needs.
- Counterintelligence Concerns for National Security Adjudicators
Provides an opportunity to practice recognition of counterintelligence concerns relevant to the performance of their job tasks and raises awareness of these issues and their importance in the context of the adjudication process.
- Critical Program Information (CPI)
Provides security officers with an introduction to Critical Program Information (CPI) including: definition, requirement for enhanced security protection known as a Program Protection Plan (PPP), and direction to applicable supporting policies.
- Protecting Microelectronics
Defines Microelectronics, considers what microelectronic are, DOD’s microelectronic needs, existing threats, vulnerabilities, and associated reporting requirements.
- Suspicious Emails
Provides an opportunity to practice identifying what constitutes a suspicious email, while increasing awareness about the importance of reporting suspicious contacts.
- Talking with Academia About Security
Provides security personnel who work with scientists, engineers, and others within cleared academia about the unique challenges that present themselves when talking to academics about security.
Email questions or comments to email@example.com