Counterintelligence Video Lesson: Request for Information and Suspicious Emails
If you are having trouble viewing the video, access it directly from YouTube.
Additional Resources for you to Explore
Request for Information: Unsolicited requests for information via phone, email, or in-person may be attempts to illicitly collect protected information under the guise of price quotes, marketing surveys, or other efforts. These requests are often received from unknown parties who are hesitant to reveal their affiliation and request detailed information about specific projects or programs.
Suspicious Emails/Direct Request Emails: Foreign collectors may attempt an outright purchase of sensitive technology by sending an email directly to employees. These emails may hide the identity of the end user or use other means to affect a sale that would otherwise be prohibited. Once in possession of sensitive components, they can reverse engineer the technology to enhance their military capabilities or sell it on the open market. This practice is highly profitable for the adversary as no time or money has been spent on research and development. It also endangers the warfighter and undermines the profitability of the U.S. Company that produced the technology.
Contact the CDSE
Counterintelligence Awareness Training Team!