Counterintelligence Training Materials
Classified threat information concerning cyber threats is available by contacting your local DSS Industrial Security Field Office.
- Thwarting the Enemy: Providing Counterintelligence and Threat Awareness to the Defense Industrial Base
DSS developed threat awareness web-based training for employees working at cleared contractor facilities. This WBT course will allow employees to complete the training at any time. The goal of the training is to make employees aware of potential threats directed against U.S. technology. It also explains common suspicious activities which should be reported to the Facility Security Officer in compliance with NISPOM 1-302.
- Co-opting Former Employees: Who Do They Work for?
This short article provides reasons why foreign entities may view former employees of U.S. cleared facilities as being excellent prospects for collection operations (DSS CIO).
- Counterintelligence and Security Countermeasures
As more US contractor facilities are becoming involved with foreign entities, the Defense Security Service (DSS) has noticed many of these companies are reporting counterintelligence (CI)-related incidents involving foreign visitors and joint ventures and research...
Security Countermeasures: The Final Step in Risk Management
This brief article categorizes security countermeasures and explains that such measures have costs associated with them that can be measured in terms of dollars, inconvenience, time or personnel (DSS CIO).
- Foreign Visits: What Is Inappropriate?
This brief article describes how visiting foreign scientists and engineers can engage in a variety of inappropriate conduct as a modus operandi for foreign collection activity (DSS CIO).
- Front Companies: Who Is the End User?
This short article discusses that front companies can present a serious problem to the U.S. Government and the defense industry because they can potentially be used to circumvent export restrictions and embargoes (DSS CIO).
- Internet: The Fastest Growing Modus Operandi for Unsolicited Collection
This short article explains why the Internet is the fastest growing method of operation of unsolicited correspondence using computer elicitation between foreign entities and cleared U.S. companies and their employees (DSS CIO).
- Scholarly Approaches to Collect Scientific and Technical Information from Cleared
This brief article summarizes incidents of scholarly approaches to collection of sensitive and classifies information from 1996 and 1997, lists targets, and compares associated indicators (DSS CIO).
- Suspicious Indicators and Security Countermeasures for Foreign Collection Activities
Directed Against the U.S. Defense Industry
The purpose of this brochure from May 1997 is to provide information and assist security professionals, counterintelligence personnel, and cleared contractors in recognizing suspicious contacts, and implementing threat - appropriate, cost-effective, and rational security countermeasures (DSS CIO).
- Use of Contract Bidding to Elicit Information
This brief article explains that the possibility exists that foreign governments are interested in obtaining technical, sometimes proprietary, information through detailed contract bids with the intention of never awarding contracts to the U.S. companies making the bid (DSS CIO).
- What Are We Protecting?
This short article helps to identify general types of assets a U.S. company should endeavor to protect and assists one in thinking about asset vulnerabilities and the allocation of security countermeasures (DSS CIO).