Counterintelligence Awareness
We may think it only happens in movies, but espionage is a very real threat. Spies are out there, they are targeting our nation’s most valuable information and technology, and they are more active than ever before.
The truth is that U.S. information and technologies are targeted every day. Advancements in technology have only made the modern day spy’s job easier. Every one of us plays a role in protecting our country and we must be vigilant.
What is Counterintelligence?
Counterintelligence is information gathered, and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons, or their agents, or international terrorist organizations or activities.
The goal of counterintelligence is to:
- Protect U.S. sensitive, controlled unclassified, and classified information and technology
- Protect our nation’s critical assets: our people, advanced technologies, and protected information
- Counter the activities of foreign spies
- Keep weapons of mass destruction from falling into the wrong hands
Are You a Potential Target?
In short, anyone that has, or could have, access to targeted information, knowledge of information systems, or security procedures, is a potential target to foreign intelligence services. This includes:
- Developers that research and develop leading technologies
- Information Systems Personnel with access to cleared facility networks
- Business Development Personnel supporting marketing and sales
- Human Resources and Recruiting Personnel
- Senior Managers and company owners
- Subject Matter Experts involved with targeted technology
- Administrative Staff with access to leadership calendars and proprietary information
- Anyone that has access to national defense information
MCMO (Methods of Contact and Methods of Operation)
Common collection methods include:
Requests for Information (RFI) and Solicitations: Attempts to collect protected information by asking, petitioning, requesting, or eliciting protected information, technology, or persons.
Exploitation of Business Activities: Attempts to establish or leverage relationships to obtain access to protected information. Most commonly through joint ventures, partnerships, mergers and acquisitions.
Exploitation of Cyber Operations: Attempts to compromise or risk confidentiality, integrity, or availability of targeted networks, applications, credentials, or data.
Exploitation of Experts: Requests for peer or scientific review, invites to participate in foreign conferences, requests to collaborate with foreign academic institutions.
Exploitation of Insider Access: Attempts by trusted insiders to exploit their authorized placement or access.
Resume Submission: Applications by foreign individuals seeking academic or professional placement that could facilitate access to protected information.
Surveillance: Observation of equipment, facilities, sites, or personnel associated with classified contracts.
Clearance Advertising is Prohibited
Organizations that have been granted facility clearance under the National Industrial Security Program (NISP) are bound by 32 CFR Part 117 (NISPOM), which states that a cleared contractor may not use its favorable entity eligibility determination for advertising or promotional purposes.
“Advertising” that a company has a facility clearance is strictly prohibited. You may never state that your organization is a cleared facility, nor include any facility clearance information in any public facing space.
Countermeasures
A strong countermeasures plan utilizes defensive, offensive, and investigative measures to both detect and deter threats. Countermeasures may include:
- Security Education and Counterintelligence Briefings
- Physical Security measures
- Cybersecurity measures
- Personnel Security measures and training
- Insider Threat Programs
- Supply Chain Security
- Technology Control Plans (TCPs)
- OPSEC Plans
Resources and Additional Learning
- DCSA CI MCMO Countermeasures Matrix
- Counterintelligence Awareness and Reporting Course for DOD
- Counterintelligence Tool Kit
- 32 CFR Part 117 (NISPOM Rule)
As always, if you have any questions, ask your FSO! FSO PROS is here to help you navigate things to ensure you fulfill all requirements.
