View important principles and tasks; about 5 -10 minutes. Please note, you will not receive a certificate of completion for watching these videos.
Counterintelligence Awareness
Threats to individual privacy, global commerce, and national security are as rampant as they are diverse, dynamic and complex. CDSE provides Counterintelligence Awareness training and related materials on recognizing the threat, reporting procedures, and much more.
Counterintelligence and Insider Threat Support to Security
Counterintelligence, Insider Threat, and Security work together to manage risk in support of national security. Learn how CI and Insider Threat can support your security program and discover resources for training and awareness at your organization.
Know the Risk - Raise Your Shield: Supply Chain Risk Management
Supply Chain Risk Management is a systematic process for managing supply chain risk by identifying susceptibilities, vulnerabilities and threats throughout DOD’s "supply chain" and developing mitigation strategies to combat those threats whether presented by the supplier, the supplied product and its subcomponents, or the supply chain.
Request for Information and Suspicious Emails
The loss of U.S. defense technology puts our warfighters, economy, and Nation at risk. This illicit collection of information by our adversaries occurs on a daily basis. Frequently, this collection goes unnoticed as our adversaries are turning away from conventional methods of espionage and are using less risky and more successful approaches. As a cleared employee or a facility security officer of a defense contractor, you too could be the target of a request for information or direct request email. Report all suspicious contacts to your facility security officer, DSS CI Special Agent, or your Counterintelligence Office. Watch the video below to learn about a recent case involving illicit information collection by a foreign adversary.
Deliver Uncompromised: Supply Chain Risk Management
Deliver Uncompromised aims to protect critical technology from cradle-to-grave by establishing security as a fourth pillar in acquisition, on par with cost, schedule, and performance, and to embrace security, not as a "cost center" but as a key differentiator. Watch the video as Mr. William Stephens, Director of Counterintelligence, Defense Counterintelligence and Security Agency, discusses Supply Chain Security Threats, Solutions, and the Goal of Deliver Uncompromised.
Deliver Uncompromised: Response to Military Technology Transfer
On June 21, 2018, a panel of experts addressed the U.S. House Armed Services Committee to discuss the problem and ongoing activities to help counter the illicit transfer of critical military technology. Watch the video and learn about the DOD's response as The Honorable Kari A. Bingen, Deputy Under Secretary of Defense for Intelligence, briefs the U.S. House Armed Services Committee.