FSO PROS
  • Home
  • About
    • Our Team
    • FAQs
  • SERVICES
    • Ask an FSO: One-Time Services
    • FSO Program Management
    • Security SME Advisory
    • Talent Acquisition & Training
    • GovCon Compliance Support
  • 351X
  • Employment
  • Contact

Threat Awareness and Trends

1/16/2026

 
Threat awareness is a critical part of annual security training. Effectively countering threats begins with understanding the threats the U.S faces every day.
 
Three key U.S. government assessments help us understand the scope, complexity, and persistence of threats confronting the United States. The Defense Counterintelligence and Security Agency (DCSA) Protecting U.S. Technologies in the Cleared Industrial Base highlights how foreign actors target U.S. technologies and cleared industry; The Department of Homeland Security (DHS) Homeland Threat Assessment outlines risks to public safety and critical infrastructure; and the Office of the Director of National Intelligence (ODNI) Annual Threat Assessment provides a global assessment of threats to U.S. national security.
 
Taken together, these reports underscore a central reality: foreign adversaries, criminal networks, and extremist actors are increasingly interconnected, technologically enabled, and willing to exploit U.S. vulnerabilities across domains—from cyber and supply chains to public discourse and physical infrastructure. They paint a picture of a strategic environment that is interconnected, multifaceted, and evolving more rapidly than many traditional policy responses. Below, we break down the important threat trends.
 
DCSA: Targeting U.S. Technologies
 
DCSA’s Targeting U.S. Technologies: A Report of Threats to Cleared Industry report assesses how foreign intelligence entities (FIEs) and other adversaries target the U.S. cleared industrial base (the network of companies, organizations, and research institutions that handle classified or sensitive information and technologies) and informs us about foreign efforts to compromise technology, classified information, and personnel.
 
KEY FINDINGS
 
Rising Threat Volume: Cleared contractor facilities report tens of thousands of suspicious contacts annually, reflecting sustained and persistent attempts to illicitly access sensitive and classified information and technologies.
 
Targeted Technologies: The most frequently targeted technologies include software, electronics, and aeronautic systems — collectively accounting for over one-third of all reports. Adversaries also pursue microelectronics, AI tools, advanced materials, and export-controlled devices. These remain prime targets due to their military and commercial value.
 
Primary Geographical Threat Sources: Entities from the East Asia and Pacific region and the Near East account for the largest share of reported incidents — roughly 62% of all targeting activity. These actors leverage formal and informal collection methods to acquire sensitive technologies.
 
Evolving Collection Methods: Adversaries increasingly rely on non-traditional collectors, including business partnerships, academic collaboration, supply chains, cyber intrusions, and recruitment of insiders. Foreign actors use a range of tactics including traditional espionage, supply chain exploitation, cyber intrusions, and non-traditional means such as employment recruitment, academic exchanges, and commercial partnerships. These methods blur the line between legitimate interactions and covert collection.
 
Why does this matter? Technological superiority underpins U.S. military readiness and economic strength. Successful exploitation of cleared industry shortens adversary development timelines, erodes deterrence, and introduces long-term strategic risk.
 
 
DHS: Homeland Threat Assessment
The Department of Homeland Security (DHS) Homeland Threat Assessment (HTA) examines risks directly affecting the U.S. population and domestic systems — from terrorism to drug trafficking and critical infrastructure attacks. It serves as a strategic overview of the nation’s security landscape to help us understand the evolving threat environment so we can better prepare for, prevent, and respond to risks to public safety and national security.
 
TOP THREAT AREAS

Terrorism & Violent Extremism: The assessment finds that the overall terrorism threat is expected to remain high, driven by domestic sociopolitical dynamics and international conflicts. Lone actors and small cells continue posing the most immediate risks, while extremist groups retain intent and capability to inspire or execute attacks on U.S. soil.
 
Illegal Drugs & Transnational Crime: Transnational criminal organizations trafficking illegal drugs — especially fentanyl and synthetic opioids — are a severe public safety and national risk. Seizures have increased significantly, and efforts are ongoing to enhance detection technologies and enforcement actions.
 
Influence Operations & Transnational Repression: Foreign state actors use digital platforms and social networks to influence U.S. public opinion, target communities, and undermine trust in institutions. These influence campaigns increasingly coincide with strategic geopolitical tensions.
 
Border & Immigration Security: While migrant encounters have declined, the risk of individuals posing security threats entering through irregular channels remains a focus of DHS screening and vetting efforts.
 
Critical Infrastructure Security: Cyber-attacks, physical threats, and preparation for disruptive operations against critical infrastructure — power grids, communications networks, and transportation systems — persist as priority concerns. Nation-state actors such as China, Russia, and Iran remain principal threats, alongside cybercriminal groups.
 
DNI: Annual Threat Assessment
The Director of National Intelligence (DNI) Annual Threat Assessment provides a comprehensive evaluation of the most direct and serious threats to U.S. national security. It informs us about evolving global risks so that informed strategic decisions can be made to protect American lives and interests at home and abroad.
 
KEY TAKEAWAYS
Diverse and Intensifying Threat Environment: The assessment highlights a broad spectrum of threats posed by both state and non-state actors that target U.S. citizens, critical infrastructure, economic strength, and government institutions.
 
Major State Adversaries: The report identifies China, Russia, Iran, and North Korea as the principal state actors challenging U.S. interests:
  • China is described as the most comprehensive military and cyber threat, with ambitions to expand regional power and surpass U.S. technological leadership, including in artificial intelligence.
  • Russia is assessed as leveraging its ongoing war in Ukraine and maintaining capabilities that could heighten tensions with NATO.
  • Iran continues to pursue regional influence with missile and proxy capabilities, though it is not currently rebuilding a nuclear weapons program.
  • North Korea advances its strategic weapons and cyber capabilities, posing risks to U.S. allies and interests in the region.
 
Transnational Criminal Organizations (TCOs): Transnational criminal groups — especially drug cartels — are identified as immediate threats to public safety, with illicit fentanyl and synthetic opioids linked to tens of thousands of U.S. deaths and significant social harm. These groups also exploit smuggling networks that contribute to irregular migration pressures.
 
Traditional Terrorism: Islamist extremist groups such as ISIS and al-Qa’ida remain active threats, with affiliates continuing to plan and inspire attacks against Western targets, including the United States.
 
Adversarial Cooperation: The assessment notes growing cooperation among these major adversaries, strengthening their collective capabilities and resilience against Western strategies, which can amplify threats to U.S. security.
 
Big Picture Threat Awareness
 
COMMON THEMES
Despite differing missions, the DCSA, DHS, and DNI assessments converge on several critical themes:
 
Threats are multi-domain: Cyber, economic, ideological, physical, and informational threats are deeply interconnected and reinforce one another.
 
Technology is both an asset and a vulnerability: AI, cyber tools, and global connectivity accelerate both innovation and exploitation.
 
State and non-state actors both matter: From sophisticated foreign intelligence services to lone extremists and criminal networks, adversaries exploit vulnerabilities at home and abroad. Non-traditional actors matter (criminal networks, lone offenders, insiders, and influence operators) play increasingly prominent roles.
 
Prevention depends on partnership: Effective risk mitigation requires coordination and collaboration is critical. Government agencies, the defense industrial base, academia, private sector partners, and local stakeholders must coordinate intelligence sharing, risk mitigation, and resilience planning across all levels of society.
 
LOOKING AHEAD: EMERGING TECHNOLOGIES AND CHALLENGES
Emerging technologies are expected to remain the most attractive targets for adversaries. Artificial intelligence, microelectronics, quantum computing, space systems, advanced manufacturing, and critical software supply chains are increasingly sought after for their military, economic, and strategic value.
 
At the same time, efforts to protect these technologies will be challenged by the growing sophistication of cyber operations, the use of trusted insiders and non-traditional collectors, and the difficulty of distinguishing legitimate collaboration from illicit technology transfer. Rapid innovation cycles, globalized supply chains, and the convergence of cyber and physical threats will further complicate detection and prevention.
 
Protecting national security will require Sustained vigilance, stronger partnerships, and adaptive security strategies across government and industry. We will need to implement holistic security strategies that address modern threats with an integrated approach that incorporates:
  • Stronger counterintelligence and insider threat awareness
  • Resilient critical infrastructure and cybersecurity defenses and best practice
  • Early detection of influence and disinformation campaigns
  • Community-based prevention and sustained collaboration across federal, state, local, private-sector, and industry contractor partners
 
CONCLUSION
As these reports collectively make clear, the threat environment facing the United States is persistent rather than episodic and expected to continue. The DCSA, DHS, and DNI assessments together offer a comprehensive picture of the challenges ahead. From foreign intelligence targeting U.S. technologies, to criminal and extremist threats at home, to strategic competition abroad, the risks facing the nation are interconnected and evolving. Awareness, preparedness, and collaboration remain the most effective tools for safeguarding U.S. security and resilience in 2026 and beyond.

Resources and Additional Learning:
DCSA Methods of Operation and Methods of Contact (MCMO)
2025 DNI Annual Threat Assessment
2025 DHS Homeland Threat Assessment
DCSA Counterintelligence Trend Analysis Reports
CDSE Thwarting the Enemy
DoD Annual Security Awareness Refresher
Counterintelligence Awareness and Security Briefing
 
As always, if you have any questions...ask your FSO! Your company’s FSO is the best person to help you navigate any questions you have about security compliance, briefing, and reporting requirements. As security professionals, we are here to help you navigate all things security and ensure you fulfill all security requirements.

Safeguarding Our Information: Protecting Classified and Controlled Unclassified Information (CUI)

12/16/2025

 
In today’s digital environment, information is one of our most valuable assets. It is also the most targeted. Protecting classified information and controlled unclassified information (CUI) is not just an IT responsibility; it is a shared obligation that applies to every employee, contractor, and partner within your organization.
 
Understanding What We Protect
Classified Information includes data formally designated as Confidential, Secret, or Top Secret and requires the highest levels of protection due to national security implications.
 
Controlled Unclassified Information (CUI) is sensitive information that is not classified but must be safeguarded under applicable laws, regulations, and government-wide policies. This includes personally identifiable information (PII), export-controlled data, proprietary information, certain technical or research data, and more.
 
Correctly identifying and marking information is the first step in ensuring it is protected appropriately.
 
Why Protection Matters
Threat actors are constantly seeking to exploit weak points. Whether through phishing emails, unsecured devices, or improper data handling. A single lapse can result in:
  • Legal and regulatory consequences
  • Loss of trust with partners and stakeholders
  • Operational disruptions
  • Damage to national security or organizational mission
 
Strong information security practices help prevent these outcomes and ensure compliance with applicable requirements.
 
Regulatory Frameworks That Guide Our Security Practices
Our information security requirements are grounded in established federal standards and regulations, including:
 
  • 32 CFR Part 117 (NISPOM - National Industrial Security Program Operating Manual): The NISPOM establishes requirements for safeguarding classified information within cleared contractor facilities, including personnel security, physical security, and information systems security.
  • NIST (National Institute of Standards and Technology): NIST Special Publication 800-171 defines the security requirements for protecting CUI in non-federal systems and organizations. These controls address access control, incident response, system security, and risk management.
  • CMMC (Cybersecurity Maturity Model Certification): CMMC builds upon NIST 800-171 and is required for many Department of Defense contracts. It ensures that defense contractors implement and maintain cybersecurity practices appropriate to the sensitivity of the information they handle.
  • EAR (Export Administration Regulations): EARs control the access, transfer, and dissemination of certain commercial and dual-use technologies, software, and technical data. EAR-controlled information must only be shared with authorized individuals and through approved methods. Unauthorized access or transfer, including to foreign persons, may constitute an export violation and must be reported immediately. When in doubt, stop and verify before sharing.
  • ITAR (International Traffic in Arms Regulations): ITAR governs the handling of defense-related technical data and restricts access to authorized U.S. persons. Improper storage, transmission, or sharing of ITAR-controlled data can result in significant legal and financial penalties.
 
Understanding these frameworks helps ensure compliance and supports our broader mission.
 
Everyday Actions That Make a Difference
Protecting sensitive information doesn’t always require complex tools—often, it starts with simple, consistent habits:
 
  • Think before you click: Phishing remains one of the most common attack methods. Be cautious of unexpected emails, links, or attachments, even if they appear to come from a trusted source.
  • Use approved systems: Store, transmit, and process Classified and CUI data only on authorized networks and devices.
  • Limit and control access: Share information strictly on a need-to-know basis.
  • Secure physical and digital workspaces: Lock screens when away, safeguard physical documents, and properly dispose of sensitive materials.
  • Report incidents promptly: If you suspect a data spill, phishing attempt, or security incident, report it to your FSO immediately. Early reporting helps limit impact.
 
Security Is a Shared Responsibility
Information security is not about slowing down operations, it is about protecting our mission, our partners, and our nation. Compliance with NIST, CMMC, ITAR, and NISPOM requirements depends on informed, vigilant individuals who understand their role in safeguarding sensitive information.
 
Every person in an organization plays a critical role in protecting the information entrusted to us. By staying alert, following established policies, remaining vigilant, and reporting concerns quickly, we each contribute to a stronger security posture and a safer information environment.
 
Together, we can strengthen our security posture and ensure that classified and controlled unclassified information remains protected—today and into the future.
 
Why Reporting is Critical & How to Report Concerns
Timely reporting is a critical component of information protection and is required under multiple security and regulatory frameworks, including NIST, CMMC, ITAR, and the NISPOM. Prompt reporting enables swift containment, reduces potential damage, and helps ensure regulatory compliance.
 
Report to your FSO, immediately, any actual or suspected incident involving Classified Information or Controlled Unclassified Information (CUI), including:
  • Suspected or confirmed data spills or unauthorized disclosures
  • Phishing emails, suspicious links, or social engineering attempts
  • Lost, stolen, or compromised devices (laptops, mobile devices, removable media)
  • Unauthorized access to systems, files, or facilities
  • Improper storage, transmission, or marking of sensitive information
  • Any situation where ITAR-controlled data may have been accessed by an unauthorized person
 
When in doubt, report the incident. Reporting a concern that turns out to be benign is always preferable to failing to report a real issue. Delays in reporting can significantly increase risk, impact investigations, and lead to compliance findings or penalties.
 
If you suspect an incident:
  • Stop and contain – Do not attempt to fix the issue yourself unless directed.
  • Report immediately to your Information Security, IT Security, or Facility Security Officer (FSO), following organizational procedures.
  • Preserve evidence – Do not delete emails, files, or logs related to the incident.
  • Cooperate fully with incident response and follow-up actions.
 
Reporting security concerns is not about blame; it is about protection. A strong security culture encourages early, honest reporting to safeguard information, support compliance obligations, and protect our mission.
 
Your awareness and prompt action play a vital role in keeping classified and controlled unclassified information secure.
 
Resources and Additional Learning
Information Protection Security Shorts
Suspicious Emails
Information Security Toolkit
Deliver Uncompromised Toolkit
Case Study Library
32 CFR Part 117 (NISPOM Rule)
32 CFR Part 147 (Adjudicative Guidelines)
 
As always, if you have any questions about whether or not a situation requires reporting, ask your FSO! Your company’s FSO is the best person to help you navigate any questions you have about security compliance, briefing, and reporting requirements. As security professionals, we are here to help you navigate things to ensure you fulfill all requirements.

Security for the Holiday Season

11/18/2025

 
The holiday season is approaching quickly! While maintaining strong security practices should be a primary focus throughout the year, it is important to understand the increased threats during the holiday season.
 
The hustle, bustle, general spirit of celebration and goodwill that we experience during the holidays can lead to distraction and lower our guard. Unfortunately, criminals and our adversaries don’t slow their nefarious goals simply because we are busy, distracted, or nurturing kindness during the holidays. In fact, this gives them a better opportunity to exploit us. 
 
It is vital that we be aware of increased risks during this time of year and take extra precautions while preparing for and celebrating year-end festivities.
 
Holiday OPSEC
As discussed in previous editions, OPSEC (Operations Security) is a five-step process used to identify and protect sensitive information from our adversaries.
 
  1. Identify What Needs Protection
  2. Analyze the Threat
  3. Analyze Vulnerabilities
  4. Assess Risk
  5. Apply Countermeasures
 
These same concepts can, and should, be used to protect ourselves, our families, our homes, and our data, during the holiday season.
 
Safety in Public and Crowded Places
Crowded malls and stores, and any place where people congregate, are prime targets for nefarious activities, from pick pocketing to threats of terrorism. We must always remain watchful and aware of our surroundings.
 
Furthermore, many people are simply stressed out this time of year. The pressure of holiday preparations, financial stressors, and even the desire to get a good deal, can lead to unruly and disorderly behavior.
 
Here are some basic things you can do to keep yourself and your loved ones safe.
  • Situational awareness! No matter where you are, you should always be mindful of your surroundings and those around you.
  • Have an exit plan and know how to contact the authorities if something goes sideways.
  • If anything feels off, say something. If you feel like you, or your location, are being threatened, call the authorities and extract yourself from the situation as quickly as possible.
  • Take care when carrying large amounts of cash. Keep some money separate Look out for “shoulder surfers” looking to steal your credit card information, ATM pin number, etc.
  • When out purchasing gifts, consider bringing items back to your vehicle as you shop. Place them in your trunk and out of sight.
 
Data Security
The holidays are not the time for us to lower our defenses regarding data security, personally or professionally. Here are some tips to keep information safe.
  • Always follow all company and government data security protocols.
  • Ensure all personal, company-issued, and government-furnished devices and equipment are protected.
  • Follow all company and government device and equipment usage policies company.
  • Never use company-issued or government-furnished equipment for online shopping.
  • Consider a personal VPN to help secure your data.
  • Use strong passwords, change them frequently, and never share them with anyone.
  • Whenever possible, you multi-factor authentication.
 
Online Shopping
Almost all of us participate in online shopping. Scammers and bad actors are at peak activity during the holiday season. They know we are distracted, which makes us far more vulnerable, offering them the perfect opportunity to catch us off-guard. Here are some tips to protect yourself when shopping online.
  • Know that scams and phishing are around us all throughout the year, but they are especially heightened during the holidays. Always validate the legitimacy of emails and text messages. Pay close attention to what you respond to and how.
  • Know how to identify safe and secure websites.
  • Always follow safe and proper cybersecurity practices.
  • Limited merchandise selection can make people especially vulnerable to cyber scams. Remember: If it sounds too good to be true, it probably is!
 
Securing Your Home During the Holidays
 
Home Security
Our home should be a safe space. Unfortunately, the threat of burglary, robbery, and home invasion are significantly higher during the holiday season. Here are some tips to deter and detect threats at home.
  • Protect and control your house keys, door codes, garage or entry access codes, with extreme caution.
  • Secure doors and locks, even when you are at home.
  • Keep a light on, even when you are not at home.
  • Keep valuables out of sight.
  • Have good exterior lighting.
  • Consider a home security system and video surveillance system.
  • Be wary of canvassers and anyone requesting access to your residence. Verify their identity before allowing them into your home.
  • Only use reputable and licensed companies for home services.
  • Be wary of strangers showing interest in your property or belongings.
  • Mind who is “hanging out” in your neighborhood. Report any suspicious activity or odd behavior to local law enforcement.
  • Maintain good relations with your neighbors and look out for each other.
  • Care what you share publicly and on social media. Don’t share information that could peak a malicious actor’s interest.
  • Monitor internet/social media activities of friends, family, and acquaintances. If they are post things about you that should not be public, make them take it down.
  • When socializing at parties, keep need-to-know in sight! Don’t “talk shop” and be wary of attempts to elicit information, even from friends and family.
 
Protect Your Home When You're Gone
It is estimated that more than 80 million Americans travel 50+ miles from home during the holidays, leaving our personal space vulnerable.
 
Studies show that 40% of burglaries do not involve forced entry and most burglars are deterred by simple safeguards that are easy to implement. Here are some tips to keep your home and valuables safe while you are away.
 
Secure your home:
  • Lock every door and window, including your garage door
  • Secure pet doors and sliding doors
  • Activate your home security system
  • Lock up ladders, tools, lawn furniture, etc.
  • Put valuables in a safe or safety deposit box
  • Remove “hidden” keys

Ask a trusted neighbor to:
  • Keep an eye on your house and hold onto your emergency contact information
  • Collect packages, newspapers, or mail that might arrive while you are gone
  • Park a car in your driveway

Don’t make it look like you are not home:
  • Never post travel plans on social media
  • Consider putting lights, TVs, or radios on intermittent timers
  • Trim overgrown trees or shrubbery
  • Consider installing motion-sensing lights
  • Don't leave trash and trash cans at the curb
 
Package Theft
Surveys suggest that 100 million+ packages have been stolen in the last year, amounting to more than $12 billion in lost merchandise. Those numbers are enormous! Package theft is a problem throughout the year, but the sheer volume of deliveries during the holidays, create a huge opportunity for porch pirates. Here are some tips to protect against package theft.
  • Track your packages
  • Don’t have packages delivered to a place where you are not going to be
  • Consider having your packages held at a protected location
  • Utilize purchase insurance for large ticket items
  • Consider setting up a live recording video camera aimed at your porch
 
Holiday Trash
It is fascinating what you can learn from a person’s trash. Don’t make yourself a target! Boxes from large ticket items tell criminals (and nosey neighbors) that you may have high value items in your home. Here are some tips to protect you.
  • Skip curbside pickup. Take packaging directly to a recycling center.
  • Use surveillance equipment. Even a visible doorbell camera can discourage people from snooping.
  • Break down boxes. Flatten and cut them into pieces. Place pieces inside a black or opaque trash bag. Cut out barcodes and pictures and dispose of them separately to help obscure product information.
  • Shipping labels can include names, addresses, and product info. Remove, shred, and dispose of separately.
  • Wait until pickup day. Don’t put boxes out early or the night before. Schedule bulk pickup if available.
 
Travel Safety and Foreign Travel
Travel can be frustrating. Heavy traffic, stranded vehicles, delayed or cancelled flights can increase tension. Delayed and stranded travelers may act out and cause disturbances in crowded airports, in hotels, or on roadways. This can also strain law enforcement resources.
 
Always maintain constant awareness of your surroundings and be prepared to protect yourself, your family, and your belongings.
 
Foreign Travel
If you are traveling outside the US, don’t forget to report it to your FSO! For most of us, all personal and professional foreign travel requires reporting. If you are traveling to any country outside the United States (including Mexico or Canada) you must contact your FSO and complete all briefing and reporting requirements. Ideally, foreign travel should be reported 30 days in advance of departure.
 
 
Why Reporting is Critical & How to Report Concerns
 
We must always keep company and government security policies and procedures in mind, even during the holidays. This includes reporting.
  • Suspicious contact…report it to your FSO.
  • Suspicious activity… report it to your FSO.
  • Odd device or equipment behavior…report it to IT and your FSO.
  • Fell victim to a scam…report it to your FSO.
  • Foreign Travel…report it to your FSO
 
Also important to remember…
 
Places where large groups of people congregate are at high risk for physical threats. If you suspect any danger at work, contact security immediately. If you suspect any danger when not at work, contact local law enforcement immediately.
 
Pay mind to your coworkers. Many struggle emotionally during the holiday season. While kindness and compassion go a long way, we must always be mindful of insider threat concerns. If a co-worker is displaying any concerning behavior, report it to your FSO immediately.
 
Report any concerns to your company’s FSO!
 
Want to learn more?
Resources and Additional Learning:
  • DLA Holiday Safety & Security
  • CISA Online Shopper Safety
  • FEMA/DHS Holiday Safety Social Media Toolkit
  • CISA Cybersecurity Best Practices
  • CISA Holiday Online Safety Tip Sheet
  • OSHA Holiday Workplace Safety
  • National Safety Council Holiday Safety
  • CDSE Pulse Holiday Tips for Safe Travel
  • DHS Personal Safety & Security While at Home
 

As always, if you have any questions about whether or not a situation requires reporting, ask your FSO! Your company’s FSO is the best person to help you navigate any questions you have about security compliance, briefing, and reporting requirements. As security professionals, we are here to help you navigate things to ensure you fulfill all requirements.

Cybersecurity Awareness Month

10/17/2025

 
Have you ever received a phishing email? If so, you have experienced an attempted cyber-attack.
 
Cyber threats are a very real and persistent risk to us all, both personally and professionally. Cyber-attack attempts happen every single day. They are low-risk, potentially high-reward, and advances in technology have made it easier than ever.
 
No one is immune to a cyber-attack and everyone is a target.  Even the most experienced technical professionals can fall victim to a cyber-attack, so vigilance is critical.
 
We must understand what a cyber-attack is, what cyber-criminals hope to gain, how to identify suspicious requests and network activity, and how to implement proper countermeasures to foil their attempts.
 
Understanding Cyber Threats and Attacks
A cyber-criminal is any individual or group that uses technology to commit illegal acts, such as stealing data, conducting fraud, or disrupting services. They can be petty criminals, hackers, terrorists, foreign intelligence agents, or even a compromised insider.
 
Cyber-criminals exploit vulnerabilities to obtain information they can sell or use to exploit people or organizations. They may be lone actors or part of organized, sophisticated teams. They will use anyone, they can attack from anywhere, they can obfuscate their trail and may target multiple assets at one time. Worse still, they do this behind a keyboard from place of total anonymity.
 
A cyber-threat is any malicious act with the intent to steal data, disrupt digital systems, damage information, or gain unauthorized access to a computer network or sensitive data.
 
A cyber-attack is any deliberate attempt to access, damage, or disrupt a computer system, network, or digital device. With technology, the possibilities are endless, and cyber-attacks can be carried out through various methods.
 
Common Types of Cyber-Attacks
  • Phishing/Spear Phishing/Spoofing: Deceptive emails, messages, or websites designed to trick individuals into revealing sensitive information, such as passwords or credit card numbers.
  • Malware: Malicious software like viruses, worms, and spyware that can steal data, disrupt systems, or gain unauthorized access.
  • Ransomware: A type of malware that encrypts a victim's files and demands a ransom for the decryption key.
  • Man-in-the-Middle (MitM) attacks: An attacker secretly intercepts and possibly alters communications between two parties who believe they are communicating directly.
  • Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS): Attacks that overwhelm a server, service, or network with traffic, making it unavailable to its intended users.
  • SQL Injection: A technique where attackers insert malicious code into a server's database to execute commands, which can reveal or damage data.
  • Zero-Day Exploit: An attack that targets a vulnerability in software before the developers are aware of it or have had a chance to create a patch.
  • Password Attacks: Attempts to gain access to accounts by guessing passwords or using other methods like "brute force" or keylogging to steal credentials.
 
Cyber-criminals intentionally design their actions to appear harmless and legitimate. They know that humans are a weak link in cybersecurity and count on us being uniformed or simply too busy to pay close attention to their attempts.
 
That email asking you to login and fix your account settings…could be a cyber-attack.
 
That text message from a manager asking you to send them a password they forgot…could be a cyber-attack.
 
That attachment or link you received…could be a cyber-attack.
 
That weird, unexpected phone call asking you to provide or verify information…likely a cyber-attack.
 
That unknown person looking to collaborate on a business opportunity…could be a cyber-attack.
 
 
What is the Goal of a Cyber-Attack?
Ultimately, cyber-criminals want to obtain or steal information that can be sold or used to exploit an individual or organization. They do this for many reasons, such as personal gain, financial gain, espionage, disruption, to damage reputations, etc. Some go for a simple cash grab. Some want to steal personal, sensitive, or even classified information or technology. Foreign intelligence agents will aggregate unclassified or proprietary data to paint a picture of CUI or classified.
 
Cyber criminals will seek personal data, business data, passwords, usernames, bank data, contract data, CUI, classified information, military information, defense information… anything that could lead to information they can use is of interest to a cyber-criminal and even partial data can be helpful.
 
High value targets include, but are not limited to:
  • User login IDs and passwords
  • Personally Identifiable Information (SSN, date of birth, addresses, etc.)
  • Personnel information (Names, contact information, rosters, phone directories, etc.)
  • Financial and Banking information
  • Sensitive organizational documents
  • Proprietary information (Business strategy, financial, human resource, email, and product data)
  • Information regarding U.S. government funded contracts
  • Administrative and user credentials (usernames, passwords, tokens, etc.)
  • Information and Technology (Classified, CUI, Sensitive, Export-Controlled, etc.)
  • Sensitive technological specification documents
  • Classified and unclassified networks (internal and extranets), partner and community portals, websites
  • Military Critical Technology: Any technology that would allow potential adversaries to make significant advances in the development, production, and use of military capabilities
  • Dual Use Technology: Technology that has, or could have, both military and commercial use
 
Spotting a Cyber-Attack
Identifying a potential cyber-attack can be tricky. Cyber-criminals have become increasingly sophisticated in their attempts and will do their best to hide their true intentions. Below are some examples of activities that should raise a red flag.
Phishing/Spear Phishing/Vishing/Smishing/Spoofing/etc.
  • Deceptive emails and messages: Any emails or messages that seem to be from a trusted source but are not. Look for email addresses or phone numbers that do not match with legitimate known info of the trusted source. Be cautious with suspicious links or attachments. Be wary of messages with odd verbiage, significant spelling or grammatical errors, etc.
  • Urgent and suspicious requests: Emails or messages asking you to take immediate action, offering something that seems too good to be true, or pressuring you to provide sensitive or personal information.
 
Unusual System and Performance Issues:
  • Slow performance: Your device or network becomes sluggish, freezes, or crashes more often than usual.
  • Disabled security software: Your antivirus, firewall, or endpoint protection suddenly turns off without your input, which indicates an attacker is trying to bypass security measures.
  • Unexpected system behavior: Applications begin crashing, files become inaccessible, or system settings change on their own.
  • Unknown software: New programs, browser toolbars, or applications appear that you did not install.
  • Constant pop-ups: You see frequent pop-up ads or error messages, which can be a sign of malware.
 
Suspicious Network and Internet Activity
  • Abnormal network traffic: You notice unexplained spikes in network activity, or your internet speed is unusually slow. This can indicate a Distributed Denial-of-Service (DDoS) attack or data exfiltration.
  • Redirected searches: Your browser redirects you to unfamiliar search engines or websites.
  • Outgoing spam: Your contacts report receiving strange emails from your account that you did not send.
  • Intelligent pointer movement: Your mouse pointer moves on its own, suggesting remote access by an attacker.
  • Frequent connection to the internet: Your computer or mobile device connects to the internet frequently even when you aren't using it.
  • Unauthorized hardware and software modifications
  • Unauthorized data storage or transmission
  • Unauthorized access to systems or system access attempts
  • Unauthorized disclosure of information
 
Unauthorized Access and Account Changes
  • Locked-out accounts: You find you cannot log in to your accounts, which indicates a password compromise.
  • Unusual account activity: Your credit card, bank statements, or online accounts show unfamiliar transactions or purchases you did not make.
  • Unauthorized payments: You receive requests for payments you did not approve.
  • Credential theft: Multiple failed login attempts occur from unusual locations or at strange times, indicating a brute-force attack.
 
All data is useful to a cyber-criminal in their efforts. They are patient, they are persistent, and they have time. This is why protecting both personal and professional is imperative.
 
Applying Countermeasures to Protect Against a Cyber-Attack
Countermeasures are critical to safeguarding against cyber-attacks. This is not an exhaustive list but, here are some things that you can do to protect yourself and your organization.
 
All Personnel
  • Remember that everyone is a potential target.
  • Never use default passwords. Make your passwords complex, change them regularly, and don’t reuse.
  • Never share your passwords with anyone.
  • Never open emails, attachments, or click links from unfamiliar sources, even if they look official.
  • Never install or connect any personal software or hardware to your organization’s network or equipment without permission from your IT department.
  • Report any suspicious or unusual issues with equipment or devices to your IT department immediately.
  • Be extremely cautious when connecting with unknown individuals on social networking sites.
  • Know that Phishing and Spoofing can happen on any account or device, including personal ones.
  • Know what to report and who to report it to within your organization.
 
Management and IT Departments
  • Implement Defense-in-Depth; a layered defense strategy that includes technical, organizational, and operational controls.
  • Apply technical defenses: firewalls, intrusion detection systems, internet content filtering, and a DNS proxy.
  • Update anti-virus software daily and download vendor security patches as soon as they are available.
  • Do not use manufacturer default passwords on software or hardware…change them!
  • Monitor, log, analyze and report attempted and successful intrusions to your systems and networks – even unsuccessful intrusions present a counterintelligence value!
  • Train all personnel on proper cybersecurity procedures, how to spot cyber threats, proper use of social networking, and how to report concerns.
  • Maintain open communication within your organization and encourage reporting of suspicious activity.
  • Be proactive and offensive in your security posture. Defense only is not a comprehensive strategy!
  • Comply with the measures in your company’s technical manuals and Technology Control Plan (TCP)
  • Conduct frequent computer audits - Ideally: Daily / At minimum: Weekly
  • Do not rely on firewalls to protect against all attacks.
  • Avoid responding to any unknown request and report these requests.
  • Disconnect computer system temporarily in the event of an attack.
  • Report any cyber intrusion attempts appropriately.
 
In many situations, attackers will attempt to disguise themselves as a trustworthy entity and contact their target via email, social media, phone calls (“vishing” / voice-phishing), and text messages (“smishing” / SMS-phishing). Don’t fall for it! Do not click on links in emails or text messages unless you know they are legitimate and safe. If it seems off in any way, verify with the individual through a known and confirmed email address or phone number!
 
Care what you share! Publicly available information helps cyber-criminals and foreign intelligence agents identify people who may potentially have access to information they want. Whether you have access, or not, every one of us is a potential steppingstone. Information on public facing sites can help them identify people of interest, and any information they can obtain from a person of interest is useful to them in putting together a bigger picture.
 
Why Reporting is Critical & How to Report Concerns
Personnel should report any suspected cyber-attack to the company’s IT department and their FSO immediately. A good rule of thumb is: If anything seems off, or you suspect you have been the target of a cyber threat, report it.
 
Organizations that do business with the U.S. Government must report any cyber intrusion or attempted intrusion through proper USG channels. Cyber intrusions must be reported within 24 hours of occurrence!
 
Report all Cyber threat concerns to your organization's IT Dept and FSO!
  
Want to learn more?
Resources and Additional Learning:
  • Cyber Awareness Challenge
  • CDSE Cybersecurity Shorts
  • The Triple Threat: Counterintelligence, Cybersecurity, and Insider Threat
  • Cybersecurity Toolkit
  • Suspicious Emails
  • DCSA Reporting the Threat Slick
  • CISA Cyber Incident Reporting Act
  • DCSA Cyber Threats
  • DFARS 252.204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting
  • DoD Cyber Crime Center – Report a Cyber Incident
  • Case Study Library
  • 32 CFR Part 117 (NISPOM Rule)
  • 32 CFR Part 147 (Adjudicative Guidelines)
 
As always, if you have any questions about whether or not a situation requires reporting, ask your FSO! Your company’s FSO is the best person to help you navigate any questions you have about security compliance, briefing, and reporting requirements. As security professionals, we are here to help you navigate things to ensure you fulfill all requirements

Insider Threat Awareness

9/16/2025

 
September is Insider Threat Awareness month! While insider threat is a significant concern that must be considered throughout the year, we would like to take a little time this month to emphasize the importance of deterring, detecting, and mitigating threats posed from trusted insiders, and foster a deeper understanding of indicators and reporting requirements related to insider threat.
 
What is an Insider? An insider is anyone that has, or has had access to an organization's resources, facilities and information, network or systems.
 
What is an Insider Threat? The threat that an insider will use their authorized access, wittingly or unwittingly, to do harm to their organization or the security of the United States.
 
Who is at risk of becoming an Insider Threat? Anyone can be at risk of becoming a threat, whether intentionally or unintentionally.
 
Who are our adversaries? Adversaries include foreign governments, foreign and domestic terrorist organizations, competitors, non-state actors, and anyone seeking to do harm to the U.S., our people, or your organization. Think back on our previous teachings about counterintelligence, suspicious contact, foreign activities, etc. Remember how and why adversaries seek to target us and elicit information. They will do whatever is necessary to get their hands on ANY non-public information that we, as insiders, can provide.
 
Understanding Insider Threat
Most insider threats do not start out as a threat; rather, they evolve into a threat over time. The pathway to an insider incident is often complex. Minor frustrations and stressors, both personal and professional, can add up and increase the possibility that an individual may become careless, negligent, or malicious.
 
Insider threats occur for a wide variety of reasons and can be deliberate or unintentional. Insiders do not need to hold a high rank or position to inflict grave damage. Technology can empower individuals at all levels and it is possible for one person, regardless of rank or position in an organization, to do a lot of damage. 
 
Some individuals blatantly seek to do harm. They may become so disillusioned that they act with malice. They may feel sympathy for or be swayed by an adversary. They may have gotten themselves into a bad situation and see no other way out.
 
Some individuals may have no active intent to do harm but commit unintentional acts, often through negligent or accidental behaviors, but the impact can be just as significant. If we are not careful with the information we share, we may unwittingly become an insider threat.
 
In addition, while we often focus on unauthorized disclosure and the threat of adversaries stealing information, we must also consider workplace violence.
 
Regardless of intent, an insider threat can cause grave and irrevocable damage. Damage from an insider threat can include, but may not be limited to resource degradation, harm to national security, reduced military strength and mission readiness; loss of organizational reputation, innovation, and industry advantage; financial instability; and even potential injury to persons or loss of life.
 
We can reduce risk by promoting awareness, establishing an effective Insider threat Program, training our workforce, effective reporting, and providing resources to support individuals who may be struggling. When we recognize and report concerning behaviors and indicators, we can work to detect, deter, and mitigate potential threats before they escalate.
 
Risk assessment must consider all possible threats, from theft of information to violent acts. Every organization should have an Insider Threat Program designed to deter, detect, and mitigate actions by insiders who may pose a threat. The Insider Threat Program must address and analyze information from multiple sources regarding behaviors and risks that could potentially do harm and should employ holistic and multidisciplinary responses for managing insiders who are at risk, while maintaining their privacy and civil liberties.
 
The organization’s Insider Threat Program Senior Official (ITPSO) implements insider threat program activities, including daily operations, management, and ensuring standards of compliance.
 
The Facility Security Officer (FSO) is in charge of managing security in the organization’s facilities.
 
Leadership is responsible for promoting a protective and supportive culture throughout the organization to support their workforce and encourage understanding and compliance with the Insider Threat Program.
 
Access Attributes: Access is at the heart of understanding and characterizing insider threats. Without access, there is no insider. That said, access comes in many forms. There is physical access to buildings, spaces, people, assets, etc., virtual access to computer networks and systems, access to organizational knowledge, acquired skills, specialized training, and more. In that light, every organization has some inherent insider threat risk. We cannot function without entrusting people with valuable tools and information, so every person within an organization typically has some form of access that could be exploited. Risk can be reduced when sensitive access is properly assigned, managed, and protected, and when individuals take their responsibility to report concerning behavior seriously.
 
Recognizing Reportable Insider Threat Indicators
As a staff member or employee of your organization, your responsibility is simple. You must report concerning behavior to the appropriate individuals within your organization. It is not your responsibility to know specifically what is going on, but you must be able to recognize concerning behaviors and know how to report them.
 
Concerning behaviors is a broad term to describe any observable behaviors or actions that suggest an individual may be at risk of becoming an insider threat, may be acting in a way that is risky or negligent, may be planning to take a malicious act, or may be actively carrying out a malicious act.
 
Some are easily defined and categorized, others are more subtle and difficult to identify. While we will not go into extreme detail here, we have listed below some common categories of concerning behaviors and shed a bit of light on some of the more nuanced categories. We encourage you to dive deeper on this list by reviewing the DCSA Insider Threat Indicators Job Aid and DITMAC – What Should I Report?
 
  • Professional Lifecycle and Performance Indicators
  • Security/Compliance Incidents
  • Technical Activities and Technology Related Indicators
  • Questionable Allegiance to the United States
  • Foreign Considerations, Influence, and Preference
  • Financial Considerations
  • Criminal, Violent, and Abusive Conduct
  • Substance and Alcohol Abuse or Misuse and Addictive Behaviors
  • Judgement, Character, and Psychological Conditions
  • Violent Behavior
  • Violent Extremist Mobilization Indicators
  • Outside Activities
  • Personal Conduct
  • Suspicious Contact
  • Unauthorized Disclosure
 
Interpersonal behaviors are actions, words, and body language we use when interacting with others in social situations.
 
Personal Predispositions are personal characteristics, personality traits, and circumstances that make a person more likely to engage in risky behavior.
 
Stressors are events or situations that cause an individual to feel pressure or anxiety and may lead them to act in ways they normally wouldn’t. Stressors can be personal, professional, financial, etc.
 
Some indicators involving interpersonal behaviors, predispositions, and stressors would be significant changes in personality, behavior, or work habits, disgruntlement that could lead to a desire to retaliate, engaging in arguments or altercations, engaging in risky or inappropriate behavior, history of rule violations, untruthfulness, social network risks, etc. Insider threat case studies indicate that individuals with medical or psychiatric disorders, or personality or social skills issues are more likely to engage in risky behavior.
 
Problematic Organizational Responses are a factor that should be considered. Inadequate organizational responses can escalate the actions of at-risk individuals who are more likely to plan and execute attacks. This includes, but is not limited to, inattention, lacking risk assessment processes, inadequate investigation, and other actions that escalate risk. Many past insider threat case studies indicate that there was insufficient concern prior to the incident, or a lack of organizational mechanism to organize and communicate potential threat information to the appropriate security officials to prevent, deter, detect, or mitigate malicious actions.
 
Many known insider threats have been associated with one or more reportable indicators and bits of information, from differing perspectives, can add up to a bigger picture of a concerning landscape.
 
Why Reporting is Critical & How to Report Concerns
Insider threats can cause grave damage to an organization, to people, and to our country. An organization’s workforce is the first line of defense against insider threats, and we are all obligated to report concerning behavior.
 
Any concerning behavior, any indicators, any information about any individual that could indicate that a person is, or could become, an insider threat, must be reported to your organization’s FSO and ITPSO immediately upon discovery.
 
NEVER assume someone else has or will report a concern!  If you have a concern or suspect someone is at risk of becoming a threat, you must report it. Failure to report can result in fines, prison, or both.
 
Security is everyone’s responsibility. Protecting our organization, our coworkers, and our country should always be our top priority.
 
Report all insider threat concerns to your organization’s FSO and ITPSO!
It is our job as security professionals to help you navigate any situations that arise.
 
Whistleblower Protection
It is important to note that making a protected disclosure does not indicate an insider threat.
 
Whistleblowing is the reporting of waste, fraud, abuse, corruption, or dangers to public health and safety to someone who is in the position to rectify the wrongdoing. Employees are protected from employer retaliation via the Whistleblower Protection Act and Security Executive Agent Directive (SEAD) 9: Whistleblower Protection.
 
It is unlawful for your employer to take any action affecting your access to classified information in reprisal for making a protected disclosure.
 
A disclosure is protected if it meets two criteria.
  • The disclosure must be based on the belief that wrongdoing has occurred.
  • The disclosure must be made to a person or entity that is authorized to receive it.

Organizations should have whistleblowing policies defining the correct way to report as opposed to releasing the information to the media or an unauthorized source. Releasing information to the media or an unauthorized source is unauthorized disclosure. It is a crime and is not whistleblowing nor applicable to whistleblower protection.
 
The DoD National Hot Line is always available to all individuals to report fraud, waste, abuse, corruption, or dangers to public health and safety. Email: [email protected] | Phone: 1-800-424-9098 | Website: https://www.dodig.mil/Hotline | Mail: Defense Hotline, The Pentagon, Washington, DC  20301-1900
 Resources and Additional Learning
 
Additional information about this topic can be found:
  • CDSE Insider Threat Awareness
  • CISA - Understanding the Insider Threat Video
  • Security Awareness Games
  • Behavioral Science in Insider Threat
  • User Behavior Identity: Why it Matters
  • Social Engineering: Why it Matters
  • CDSE Bystander Engagement and Insider Risk Video
  • CDSE Insider Threat Security Shorts
  • Insider Threat Toolkit
  • DITMAC - DOD Insider Threat Management and Analysis Center
  • Cybersecurity Attacks - The Insider Threat
  • Defense Insider Threat Management Analysis Center (DITMAC) Short
  • Insider Threat Fact Finding
  • Reporting Requirements at a Glance
  • HR and the Insider Threat
  • Suspicious Emails
  • Reporting Job Aid
  • NITAM Highlighted Case Studies
  • Case Study Library
  • 32 CFR Part 117 (NISPOM Rule)
  • 32 CFR Part 147 (Adjudicative Guidelines)
 
As always, if you have any questions about whether or not a situation requires reporting, ask your FSO! Your company’s FSO is the best person to help you navigate any questions you have about security compliance, briefing, and reporting requirements. As security professionals, we are here to help you navigate things to ensure you fulfill all requirements.

Suspicious Contact

8/19/2025

 
Every federal contractor facility has access to U.S. government information, in some form or fashion. As such, every person that works for or with a federal contractor facility has a direct impact on the security of our country and the safety of our people and technology.
 
Due to technological advances, the threat from adversaries looking to do harm to the United States has never been greater. The ease of connecting with people across the globe, and increasingly advanced capabilities to hide or steal someone’s identity, have made it simple for bad actors to contact, and potentially exploit, anyone that could potentially help them obtain information to further their malicious objectives.
 
Our work for the U.S. government, and all information obtained through that work, must be protected from these threats. Every person, at every level of business, plays an important role in that protection as we all have at least one piece of information that would be beneficial to a U.S. adversary.  You may think you don’t know anything that would be helpful but, one seemingly small piece of information could be the missing link that an adversary needs to do harm.
 
As such, we must all be aware of the ways that our adversaries will attempt to exploit us to obtain information. We must know what suspicious contact looks like and how to report it. It is important to consider the possibility of suspicious contact in every professional and personal interaction.
 
What is Suspicious Contact?
Consider this. You are out celebrating your promotion with some colleagues. A nice couple at the bar overhears your celebration, so they come over and engage you in conversation. Initially, they simply congratulate you and ask a few seemingly innocent questions, but their questions turn into deeper inquiries about your company and the work you do. Should you report this interaction to your FSO?
 
Now consider this. You are at a seminar. You strike up a conversation with a fellow attendee, who tells you that they are a college student looking to land an opportunity in your field. They ask a lot of questions about a government project you did work on. You evade the questions and turn the conversation elsewhere, however, after the seminar they begin emailing you, continuing to probe about your work and persistently ask if you can get them onto your latest project. Should you report this interaction to your FSO?
 
Finally, consider this. You are a recruiter considering candidates for a position supporting a government contract that states U.S. citizenship or security clearance is required. You receive a resume from an individual and it is evident that the person does not meet the citizenship requirements. Should you report this to your FSO?
 
In all of these scenarios, the answer is YES. These are all examples of reportable suspicious contact.
 
Suspicious contact is any effort by any individual, regardless of nationality, to obtain illegal or unauthorized access to information or to compromise an individual, as well as all contacts with known or suspected intelligence officers from any country, or any contact which suggests the individual concerned may be the target of an attempted exploitation.
 
Suspicious Contact Tactics
Not all suspicious contact is obvious. While it is possible that a foreign spy will walk up to you and simply ask for sensitive or classified information, elicitation is typically more subtle.
 
Elicitation is the strategic use of conversation to extract information from people, without giving them the sense that they are being interrogated, to facilitate future targeting attempts.
 
Information collectors for foreign intelligence entities (FIE) commonly use elicitation to collect sensitive and/or classified information through what appears to be normal, even mundane, social or professional contact. They attempt to confirm or expand upon their knowledge or gain clearer insight into a person’s placement and access to assess the possibility of exploitation or recruitment. These attempts can come in many forms, from many places, all of which are relevant and must be reported appropriately.
 
Information collectors come from all over the world, even from “friendly” countries. They target a variety of technologies and information, through many operational methods, utilizing a wide range of contact methods. DCSA and DNI both put out a report each year regarding the top threats and mechanisms. According to the DCSA 2024 Report on Targeting U.S. Technologies and the DNI 2025 Annual Threat Assessment, the following are the most prevalent concerns and methods.
 
Top 3 Information Collector Regions are:
  • East Asia and the Pacific
  • Near East
  • Europe and Eurasia
 
Top Targeted Technologies are:
  • Software
  • Electronics
  • Aeronautics Systems
  • Manufacturing Equipment & Processes
  • Services and Other Products
 
Top Methods of Operation are:
  • Resume Submission *Number 1 method*
  • RFI/Solicitation
  • Exploitation of Business Activities
  • Exploitation of Supply Chain
  • Exploitation of Experts
  • Exploitation of Cyber Operations
 
Top Methods of Contact are:
  • Email
  • Resumes – Academic & Professional
  • Web Form Submissions
  • Social Networking Services
  • Foreign Visits
 
Information Collectors may be commercial sector affiliated, foreign government affiliated, or individuals of unknown affiliation. Though these reports rate the top methods of contact, it is important to note that suspicious contact occurs through a wide variety of methods and all should be considered.
  • Social or Professional Networking
  • Resume/CV Submittal (Academic and/or professional)
  • In-person contact
  • Phone contact
  • Email contact
  • Phishing operations (Phishing, Spear, cloning, whaling, etc.)
  • Web Form Submissions
  • Conferences, Conventions, or Tradeshows
  • Exploitation of Foreign Travelers
  • Foreign Visits
  • Mail
 
Recognizing Suspicious Contact and Applying Countermeasures
Suspicious contact can occur by any means where a foreign actor, agent, or recruiter is in direct or indirect
contact with the target. They may even work through known and trusted contacts to do so.
 
Likely indicators of elicitation and suspicious contact include, but may not be limited to:
  • Business contact requesting information outside the contract scope, or through an increased or gradual progression of information initiated from legitimately authorized business discussions.
  • Hidden/obscured end use/end user data.
  • Offer of paid attendance at an overseas conference, keynote or guest speaker invitations.
  • A casual acquaintance appears to know more about your work or project than expected.
  • A casual contact shows an unusual interest in your work, facility, personnel, or family details.
 
Examples of reportable suspicious Contact include, but may not be limited to:
  • Any individual’s efforts, regardless of nationality, to obtain illegal or unauthorized access to sensitive or classified information or to compromise a cleared individual.
  • All contacts with known or suspected foreign intelligence services, operators, or information collectors.
  • Any contact that suggests foreign intelligence services may be targeting an individual for exploitation.
  • Any business contact requesting information outside the scope of an existing contract or agreement.
  • Any business or personal contact seeking information about your coworkers or job duties.
  • Any business or personal contact requesting you to violate company policy or security procedures.
  • Any illegal or unauthorized attempts to access export-controlled information and material.
 
Things you can do to reduce the risk of exploitation:
  • If you have any reason to believe that a person has requested restricted information or is attempting to place you in an exploitable situation, report it.
  • Know what information you cannot share and be suspicious of those who seek such information.
  • Do not share anything the elicitor is not authorized to know, including personal information about yourself, your family, or your coworkers.
  • Be aware that outreach may occur via social media.
  • Plan tactful ways to deflect probing or intrusive questions.
  • Never feel compelled to answer any question that makes you feel uncomfortable.
 
If you believe someone is actively attempting to elicit information from you, you can:
  • Change the topic
  • Refer them to public websites
  • Deflect the question
  • Provide a very vague answer
  • State that you do not know
 
At the heart of it all is this: No matter where you are, no matter who you are communicating with…Care what you share and report suspicious interactions! Do not take anything for granted when being asked for information. It is always important to be situationally aware when we are discussing work, and we should never assume that someone is simply curious when they are asking questions.
 
 
 
Why Reporting is Critical & How to Report Concerns
You are a target because of where you work, who you work with, and the sensitive or classified information you could potentially have access to. Every individual that works for or with an organization that performs on U.S. Government contracts should be wary of anyone that tries to obtain information that they are not authorized to have. 
 
Elicitation can be subtle. Requests from professional or personal contacts may seem harmless, however, you should report any odd or suspicious conversations to your company’s FSO immediately upon occurrence.
 
It is important to note that it is NOT your job to determine if suspicious communications present a legitimate concern or threat. It IS your responsibility to simply report any suspicious interactions to your FSO. The FSO is in the best position to assess the situation and ensure the information gets to the appropriate government officials for investigation.
 
A good rule of thumb when interacting with others, is this: If you have to say “No” let your Facility Security Officer know.
 
You must report the following to your FSO immediately:
  • Any suspicious emails, phone calls, or social interactions.
  • Any suspicious interactions
  • Any suspicious emails wherein the sender is asking for information about the company, current or projected contracts, your work, etc.
  • Any resumes received by foreign nationals wherein the person is applying to a position that requires U.S. citizenship or security clearance.
  • Any suspected elicitation attempts while at conferences, conventions, seminars, tradeshows, etc.
  • If any person asks you questions that seem strange, a bit too probing, or obviously inappropriate.
  • If you ever feel that you, or someone you know, may be a target of elicitation, exploitation, blackmail, coercion, or enticement to obtain sensitive or classified information.
 
Resources and Additional Learning:
DNI 2025 Threat Assessment Report
DCSA 2024 Targeting U.S. Technologies Report
Identifying Suspicious Contact
What to Report – Examples of Suspicious Contact
Suspicious Emails
Reporting Job Aid
Case Study Library
32 CFR Part 117 (NISPOM Rule)
32 CFR Part 147 (Adjudicative Guidelines)
 
 
As always, if you have any questions about whether or not a situation requires reporting, ask your FSO! Your company’s FSO is the best person to help you navigate any questions you have about security compliance, briefing, and reporting requirements. As security professionals, FSO PROS
® is here to help you navigate things to ensure you fulfill all requirements.

Counterintelligence Awareness

7/15/2025

0 Comments

 
We may think it only happens in movies, but espionage is a very real threat. Spies are out there, they are targeting our nation’s most valuable information and technology, and they are more active than ever before.
 
The truth is that U.S. information and technologies are targeted every day. Advancements in technology have only made the modern day spy’s job easier.
 
Our position as the dominant political, economic, and military force in the world means that every country, friendly or not, wants to know our secret sauce and they will do whatever it takes to get it.
 
Every one of us plays a role in protecting our country and we must be vigilant.
 
What is Counterintelligence?
Counterintelligence is information gathered, and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons, or their agents, or international terrorist organizations or activities.
 
The goal of counterintelligence is to:
  • Protect U.S. sensitive, controlled unclassified, and classified information and technology
  • Protect our nation's critical assets: our people, advanced technologies, and protected information in the defense, intelligence, economic, financial, public health, and science and technology sectors.
  • Counter the activities of foreign spies.
  • Keep weapons of mass destruction from falling into the wrong hands.
 
The U.S. technological lead, competitive edge, and strategic military advantage are at risk. If not protected, our national security interests could be compromised. Countering this threat requires knowledge of the threat and diligence on the part of all personnel charged with protecting information.
 
Are You a Potential Target?
In short, anyone that has, or could have, access to targeted information, knowledge of information systems, or security procedures, is a potential target to foreign intelligence services.
 
As individuals working in the U.S. government space, we are all part of the process and, as such, we are all targets. This includes, but is not limited to:
  • Developers that research and develop leading technologies
  • Technicians that operate, test, maintain, or repair targeted technologies
  • Supply Chain Personnel that source and purchase components integrated with deliverable defense products or technology
  • Information Systems Personnel that have access to cleared facility networks and knowledge of network security protocols
  • Business Development Personnel that support marketing and sales for both domestic and foreign markets
  • Human Resources (HR) and Recruiting Personnel that have access to sensitive information, serve as public company contacts, and may be initial screeners of prospective and current employees
  • Foreign Access Points, such as foreign travelers, personnel hosting or escorting foreign visitors, and personnel with foreign contacts
  • Senior Managers, such as company owners, leadership, managers, especially those listed on open source web content and business records
  • Subject Matter Experts (SMEs), especially those involved with targeted technology publishing in technical journals, participating in professional associations and/or academia, and patent owners
  • Administrative Staff that may have access to leadership calendars, contact lists, and company proprietary information
  • Janitorial, Maintenance, and Support Staff that may have access to personnel, information, and technology
  • Anyone that has access to national defense information
 
MCMO (Methods of Contact and Methods of Operation)
Those seeking to steal protected data and technology use a variety of collection methods to further their agenda. It is important to understand that protected information includes both Controlled Unclassified (CUI) and Classified information, as both are of interest to foreign entities and must be protected.
 
Common collection methods include, but may not be limited to:
 
Requests for Information (RFI) and Solicitations: Attempts to collect protected information, directly or indirectly, by asking, petitioning, requesting, or eliciting protected information, technology, or persons.
 
Exploitation of Relationships: Attempts to leverage personal or authorized relationships to gain access to protected information.
 
Attempted Acquisition of Technology: Attempts to acquire controlled information or technology through direct contact, front companies, or intermediaries. Of particular interest are equipment, diagrams, schematics, plans, or product spec sheets, etc.
 
Exploitation of Business Activities: Attempts to establish or leverage relationships to obtain access to protected information and/or technology. Most commonly through joint ventures, partnerships, mergers and acquisitions, foreign military sales, service providers.
 
Exploitation of Cyber Operations: Attempts to conduct actions that could compromise or risk confidentiality, integrity, or availability of targeted networks, applications, credentials, or data to obtain access to, manipulate, or exfiltrate protected information, technology, or personnel information.
 
Exploitation of Experts: Attempts to obtain access to protected information, technology, or people through requests for peer or scientific review of academic papers, presentations, requests to consult with faculty members or subject matter experts, invites to participate in foreign conferences, lectures, tradeshows, requests to collaborate with foreign academic institutions, or attempts to entice subject matter experts to travel abroad or consult for foreign entities.
 
Exploitation of Insider Access: Attempts by trusted insiders to exploit their authorized placement or access or to cause other harm to compromise protected information, technology, or persons.
 
Exploitation of Security Protocols: Attempts by visitors or unauthorized people to circumvent or disregard security procedures, or behaviors by cleared or otherwise authorized individuals that may indicate a risk to protected information, technology, or people.
 
Exploitation of Supply Chain: Any activities intended to compromise supply chains. May include introduction of counterfeit or malicious products or materials to gain unauthorized access to protected data, alter data, disrupt operations, or interrupt communications.
 
Resume Submission: Applications and/or submission of resumes by foreign individuals seeking academic or professional placement that could facilitate access to protected information, whether by need or proximity.
 
Search and Seizure: Temporarily accessing, taking, or permanently dispossessing an individual of property or restricting freedom of movement via tampering or physical searches of persons, environs, or property.
 
Surveillance: Observation of equipment, facilities, sites, or personnel associated with classified contracts to identify vulnerabilities and/or collect information, through visual, aural, electronic, photographic, or other means
 
Theft: Attempts to acquire protected information with no pretense or plausibility of legitimate acquisition.
 
Common methods of contact include, by may not be limited to:
  • Email requests
  • Phishing operations (Phishing, Spear, cloning, whaling, etc.)
  • Web Form Submissions
  • Conferences, Conventions, or Tradeshows
  • Resume/CV Submittal (Academic and/or professional)
  • Social or Professional Networking
  • Cyber Operations (Cyber network attacks, exploitation, collection; Exploiting Mobile Devices; Patch management; Water Holes (Using compromised websites to target visitors, including 3rd party or company websites, to access people of interest); Introduction of Backdoor Access Panels)
  • Foreign Travel
  • Foreign Visits
  • Foreign Sales
  • Personal contact (person to person via any means)
  • Phone
  • Mail
 
Countermeasures
Countermeasures are actions we can take to protect against threats that aim to neutralize or mitigate threats posed by foreign intelligence entities or individuals acting on their behalf. Deploying countermeasures is critical to protecting information, technology, and people.
 
A strong countermeasures plan utilizes defensive, offensive, and investigative measures to both detect and deter threats. The plan should be proactive, adaptive, and integrated throughout the organization.
 
Countermeasures may include:
  • Security Education and Counterintelligence Briefings
  • Physical Security measures
  • Cybersecurity measures
  • Personnel Security measures and training
  • Insider Threat Programs 
  • Supply Chain Security
  • Security Audits
  • Insider Threat Investigations
  • Foreign Collection Methods Analysis and Threat Assessments
  • Technology Control Plans (TCPs)
  • OPSEC Plans
  • HUMINT
  • Offensive Cyber Operations 
  • Offensive Disinformation
  • Offensive Counterespionage
  • Honey Pots
 
Clearance Advertising is Prohibited
The simple fact that an organization has been granted the ability to perform work in the U.S. Government space makes that organization, and everyone in it, a target for exploitation. Organizations that have been granted facility clearance under the National Industrial Security Program (NISP) are bound by 32 CFR Part 117 (NISPOM) which states that a cleared contractor may not use its favorable entity eligibility determination for advertising or promotional purposes.
 
“Advertising” that a company has a facility clearance is strictly prohibited. You may never state that your organization is a cleared facility, nor include any facility clearance information in any public facing space (on websites, social media, etc.), nor in any promotional or marketing materials.
 
Advertising that you, personally, have been granted a security clearance puts a bullseye on you and your organization. While not expressly prohibited, as with facility clearances, individuals that have been granted a security clearance should take extreme caution when sharing information about their clearance and the work that they do, with anyone, and should NEVER:
  • Include their security clearance information on their resume when posting it in a public forum
  • Post that they have a security clearance on social media, in chats, or on any public facing sites

Reporting Requirements
If you have any reason to suspect that you, someone you know, or your company is being targeted by a foreign intelligence service or any other potentially malicious actor, please contact your FSO immediately.
 
Recognizing and reporting indicators is critical to disrupting counterintelligence threats and mitigating risks.

Resources and Additional Learning
  • DCSA CI MCMO Countermeasures Matrix
  • CI MCMO Video
  • Counterintelligence Awareness and Reporting Course for DOD
  • Counterintelligence Job Aids
  • Counterintelligence Tool Kit
  • Unauthorized Disclosure (UD) of Classified Information and Controlled Unclassified Information 
  • OPSEC Awareness for Military Members, DOD Employees and Contractors GS130.16
  • DOD Unauthorized Disclosure Desk Reference
  • Unauthorized Disclosure Toolkit
  • Deliver Uncompromised Toolkit
  • Suspicious Emails
  • Case Study Library
  • 32 CFR Part 117 (NISPOM Rule)
  • 32 CFR Part 147 (Adjudicative Guidelines)
 
As always, if you have any questions about whether or not a situation requires reporting, ask your FSO! Your company’s FSO is the best person to help you navigate any questions you have about security compliance, briefing, and reporting requirements.  As security professionals, FSO PROS is here to help you navigate things to ensure you fulfill all requirements.
0 Comments

Foreign Travel, Foreign Considerations, Suspicious Contact, Outside Activities

6/15/2025

 
The United States is the dominant political, economic, and military force in the world. We have power, information, and technology that other countries want, and they will not hesitate to harm or exploit U.S. persons to obtain it.
 
The mission of foreign intelligence services is to obtain or steal any information that could be useful to their country, and they will exploit whomever they can to meet this objective. For a foreign intelligence agent, every interaction is a potential data mine. Even if a person does not have direct access to information, they are a step on the pathway to someone who does. Your spouse, children, relatives, and friends are steppingstone to you. You are a step toward your boss or a government customer. Foreign intelligence agents are patient. They will spend years cultivating relationships, and will use anyone they can get access to, to connect dots along the way.
 
Every U.S. person is a potential target for exploitation. Our work in the government space means that we are of particular interest to foreign actors. It makes us, and our loved ones, far more likely to be targeted. For this reason, we must take extra precautions when interacting with any foreign person(s), foreign entity, foreign business, or foreign organization. We must know what we are required to report and when we must report it.
 
Foreign Travel
U.S. Citizens are often targeted while traveling outside the U.S. Even in “safe” countries, there are risks and precautions we must take to ensure safety and awareness when traveling.
 
The threat landscape is vast. Tourist attractions and high traffic areas are prime targets for terrorist attacks. The presence of foreign intelligence agents is exponentially increased in other countries. Even simple criminal elements, like petty thieves, are a much greater risk to our safety and data when we are traveling. We are on their turf, and they know it, so it is crucial that we be hypervigilant in protect ourselves and our belongings when traveling.
 
Foreign intelligence agents may go for a quick grab, breaking into your vehicle or hotel room to see if there is easy info to steal. They will pose as friendly helpers such as tour guides, hotel workers, restaurant workers, taxi drivers, etc., just going about their business with open ears or waiting for an opportunity to connect and establish that first pathway toward exploitation. Foreign agents are often placed in positions where they have a strategic authoritative role such as police, emergency services, or airport security. Here they will have the ability to detain and questions U.S. citizens under laws that are much different than those we are accustomed to in the U.S. Any information we may have due to our work with the Federal government is of value to them.
 
The threat of targeting and exploitation is significantly higher when an individual travels outside the U.S. As such, federal contractor facilities and their personnel are subject to foreign travel briefing and reporting requirements as outlined in 32 CFR Part 117, SEAD 3, and certain program specific reporting guidelines. FSOs are required to provide travel safety briefings, country specific briefings, and post-travel debriefing. Travel to certain locations will require special pre and post travel briefings with a DCSA CISA and almost all travel must be formally reported to the DoD and/or the government customer prior to the person’s departure. These briefing and reporting requirements must be considered any time we are planning to travel outside the U.S., even to Mexico and Canada.
 
Whether your travel is personal in nature, business related, government contract related, etc., reporting it to your FSO will ensure proper briefing and reporting can be identified and administered relevant to your specific circumstances. For this reason, we recommend that all contractor personnel (employees and consultants) report any travel outside of the United States, both personal and professional, to their company’s FSO at least 30 days prior to departure (whenever possible). Your company’s FSO is in the best position to determine what types of briefing and reporting are required for you and your specific travel occurrence.
 
Pre-Travel: Ideally any travel outside the US should be reported to your FSO at least 30 days prior to your departure to allow appropriate time to prepare your travel briefings and complete any necessary reporting. When 30 days’ notice is not possible, the travel should be reported immediately upon booking.
 
For those that live in border areas, unexpected day trips to Mexico and Canada should still be reported prior to departure but MUST be reported within 5 days of return.
 
Changes to your travel itinerary should be reported to your company’s FSO as soon as possible.
 
Post-Travel: Foreign travel debriefing is required. Covered individuals should contact their company’s FSO immediately upon return to complete post travel debriefing requirements.
 
Also important to note: If you are assigned or stationed at a location outside of the US, and travel outside of the country of your duty location, this is required foreign travel reporting!
 
 
Foreign Considerations (Contact, Influence, Interests, Activities, Conflicts of Interest)
Foreign contact, foreign influence, and foreign activities are a significant consideration for anyone working in the U.S. Government space. Everyone working with a Federal Contractor facility should be aware of foreign considerations that they must report whether that information is about themselves or another person.
 
Covered individuals are required to self-report any contact with foreign nationals, potential foreign influence, foreign activities or interests, suspicious contact, any information that could raise concerns of a perceived conflict of interest, or any other information pertinent to connections with a foreign country or foreign persons.
 
Foreign considerations may be considered a national security concern if they increase the risk of divided allegiance, create circumstances in which the individual may be manipulated or induced to help a foreign person, group, organization, or government in any way that is inconsistent with U.S. interests, or if the circumstances could make the individual vulnerable to pressure or coercion by a foreign interest.
 
The U.S. Government assesses risk with consideration to the country involved. There are many factors to consider, such as, the foreign country’s history of criminal activity, government upheaval, terrorism, targeting U.S. Citizens to obtain classified or sensitive information, etc.
 
It is the government’s job to determine the level of acceptable risk in these situations, so all foreign considerations must be reported to your company’s FSO. Failure to report or fully disclose association with a foreign person, group, government or country when required, could result in loss of eligibility.
Foreign considerations can create a heightened risk of exploitation, inducement, manipulation, pressure, or coercion. They must be reported whether they are personal or business related. If it touches a foreign person, country, government, business, organization, etc., you will have reporting requirements.
 
Conditions that must be reported include, but may not be limited to:
  • Any contact (through any method including social media) with a foreign family member, business or professional associate, friend, acquaintance, or any other person who is a citizen or resident of a foreign country, whether they live in a foreign country of here in the United States.
  • Shared living quarters with any person(s), regardless of citizenship status, if that relationship could create a heightened risk of foreign inducement, manipulation, pressure, or coercion.
  • Any business, financial, or property interests in a foreign country, or in any foreign-owned or foreign-operated business.
  • Any unauthorized association with a suspected or known agent, associate, or employee of a foreign intelligence entity.
  • Any conduct, especially while traveling or residing outside the U.S., that may make an individual vulnerable to exploitation, pressure, or coercion by a foreign person, group, government, or country.
  • Any connection to any foreign person, group, government, or country that could potentially create a perceived conflict of interest to the individual’s obligation to protect classified or sensitive information or technology.
  • Any indication that an individual may desire to help a foreign person, group, or country by providing classified or sensitive information or technology.
  • Any indication that representatives or nationals of a foreign country are acting to increase the vulnerability of an individual for exploitation, inducement, manipulation, pressure, or coercion.
  • Any information that indicates that an individual’s access to classified information or eligibility for a sensitive position may be a risk to national security.
 
Foreign Preference
When and individual gives preference to a foreign country over the U.S., they are far more vulnerable to exploitation, more likely to provide information to malicious actors, and more susceptible to making decisions that could be harmful to U.S. interests. Foreign preference can raise concerns about an individual’s judgement, reliability, and trustworthiness, especially when they try to conceal it or become involved in activities that could conflict with U.S. interests.
 
Conditions that could raise concern, and must be reported, include but are not limited to:
  • Applying for and/or acquiring citizenship in any other country.
  • Failure to report or fully disclose to appropriate security officials the possession of a passport or identity card issued by any country other than the U.S.
  • Failure to use a U.S. passport when entering or exiting the U.S.
  • Assuming or attempting to assume any type of employment, position, or political office in a foreign government or military organization.
  • Any activity wherein the person is acting to serve the interests of a foreign person, group, organization, or government in any way that conflicts with U.S. national security interests.
  • Using foreign citizenship to protect financial or business interests in another country in violation of U.S. law.
  • Any act of expatriation from the U.S., such as declaring an intent to renounce U.S. citizenship, whether through words or actions.
  • Any indication, whether through works or actions, indicating that an individual shows preference to any foreign country over the U.S.
 
By itself, a U.S. citizen also having citizenship in another country is not necessarily disqualifying or derogatory, however, it must be reported so that it can be appropriately adjudicated. The same is true for U.S. citizens that may exercise any right or privilege of foreign citizenship or any action to acquire or obtain recognition of a foreign citizenship.
 
Suspicious Contact
Suspicious contact is any effort by any individual, regardless of nationality, to obtain illegal or unauthorized access to information or to compromise an individual. This includes any contact with known or suspected intelligence officers from any country, or any contact which suggests the individual concerned may be the target of an attempted exploitation.
 
Examples of Suspicious Contact that must be reported include, but are not limited to:
  • Any individual’s efforts, regardless of nationality, to obtain illegal or unauthorized access to sensitive or classified information or to compromise an individual.
  • All contact with known or suspected foreign intelligence operatives.
  • Any contact that suggests foreign intelligence services may be targeting an individual for exploitation.
  • Any request by a foreign national to visit a cleared facility, wherein there is no clear and logical purpose.
  • Any contact, including business contacts, requesting information outside the scope of a contract or agreement.
  • Any contact requesting a person to participate in a foreign conference, seminar, tradeshow, etc.
  • Any contact seeking information about your work, job duties, coworkers, etc.
  • Any contact requesting that a person violates company policies or security procedures.
  • Any illegal or unauthorized attempts to access export-controlled information and material.
 
If you have any reason to believe that you have received suspicious contact, you must report it to your company’s FSO immediately upon occurrence.
 
Outside Activities
Involvement in certain types of outside employment or activities, whether foreign entity related or not, could be a security concern if it poses a conflict of interest that could interfere with an individual’s responsibilities, or if it could increase the risk of unauthorized disclosure of classified or sensitive information.
 
Outside Activities Involving Foreign Entities (Foreign people, governments, businesses, organizations, etc.)
 
Some conditions that could raise concern, and must be reported, include but are not limited to:
  • Any employment or service, whether compensated or volunteer, with:
  • The government of a foreign country,
  • Any foreign nation, organization, or other entity,
  • A representative of any foreign interest; and
  • Any foreign, domestic, or international organization or person engaged in analysis, discussion, or publication of material on intelligence, defense, foreign affairs, or protected technology.
  • Any failure to report or fully disclose any foreign considerations or suspicious contact.
 
Outside Activities NOT related to Foreign Entities
Failure to report any employment or service with another organization, when required by your company or the government program you support, whether foreign related or not, whether compensated or volunteer, is considered a security risk. For example, if your organization or the government program you are supporting prohibits you from having a second job, speaking at conferences, having self-employment activities, moonlighting, etc., Failure to report raises a big red flag so, reporting is critical.
 
Why Reporting is Critical & How to Report Concerns
Full transparency and self-reporting about any foreign considerations is vital. All of the scenarios detailed above can raise concerns about a person’s suitability for access to classified or sensitive government information and must be thoroughly vetted by U.S. Government adjudicators.
 
Failure to report is always worse than reporting. Security clearance and suitability vetting are predicated on trust. If you have been entrusted with access to classified or sensitive government information, full transparency is expected.
 
Failure to report will always be viewed by Adjudicators from a lens of, “what is this person trying to hide and why?” If investigators find information on their own before you self-report, the red flag is much bigger and brighter and, the majority of the time, will garner steeper consequences than if you had simply reported the information yourself.
 
All covered individuals must report any foreign travel, foreign considerations, suspicious contact, and outside activities to their company’s FSO. Your company’s FSO is in the best position to ensure reporting is provided to the appropriate parties as required for individuals to maintain their eligibility for access to classified or sensitive information.
 
Should you have any question about how these reporting requirements may be relevant to you, please contact your company’s FSO!
 
Resources and Additional Learning
  • CDSE Foreign Travel Defensive Briefing
  • Foreign Contact - What is Reportable
  • DCSA Self-Reporting
  • Reporting Requirements at a Glance
  • NISP Reporting Requirements
  • SEAD 3 – Reporting
  • SEAD 3 ISL2021-02
  • SEAD 3 Short
  • SEAD 3 Toolkit
  • SEAD 4 – Adjudicative Guidelines
  • Adjudications – The Whole Person Concept
  • Personnel Security Toolkit
  • Reporting Job Aid
  • Suspicious Emails
  • Identifying Suspicious Contact
  • What to Report – Examples of Suspicious Contact
  • Reporting Requirements Crossword
  • Reporting Requirements Word Search
  • Case Study Library
  • 32 CFR Part 117 (NISPOM Rule)
  • 32 CFR Part 147 (Adjudicative Guidelines)
 
As always, if you have any questions about whether or not a situation requires reporting, ask your FSO! Your company’s FSO is the best person to help you navigate any questions you have about security compliance, briefing, and reporting requirements. As security professionals, we are here to help you navigate things to ensure you fulfill all requirements

Mental Health Awareness

5/15/2025

 
May is Mental Health Awareness Month!

Mental health is a critical part of a person's overall wellness. According to the CDC, mental illnesses are among the most common health conditions in the United States. Approximately 50% of the population will experience a mental health condition in their lifetime and 1 in 5 Americans are affected by mental illness each year.
 
In the past, there was a stigma about seeking mental health care. Psychological conditions can raise concerns about an individual’s eligibility for access to classified and sensitive information. For this reason, Federal workforce members may be apprehensive about seeking assistance when it is needed and beneficial for their overall wellbeing.
 
During this month of awareness, we would like to spotlight this topic as it pertains to government contractor workforce members and, hopefully, alleviate common concerns about seeking care for your mental wellbeing as a federal contractor.
 
Destigmatizing Mental Health Care
Mental health care is a positive course of action that often mitigates security concerns. Avoiding care can increase risk and create deeper concern.
 
In recent years, significant strides have been made within the federal government to destigmatize seeking support. The primary concern with psychological conditions is that certain emotional, mental, and personality ailments can impair judgement, reliability, or trustworthiness. While these factors do require consideration in the adjudicative process, DCSA is working diligently to raise awareness that seeking mental health care and services, on its own, does not affect one’s ability to obtain or hold clearance eligibility and will not impact your national security eligibility.
 
The Benefits of Mental Health Care and Stress Management Strategies
Developing healthy strategies to deal with difficult emotions or situations is critical to our overall well-being and mitigating the risk that these stressors will create deeper concerns. Seeking care that can help us develop healthy coping mechanisms and strong problem-solving skills allow us to feel healthier overall and perform better when we are under stress.
 
We are all individuals and developing strategies for navigating stress is a personal journey. What works well for one person, may not be helpful for another. Some techniques that many find beneficial are:
  • Meditation and Mindfulness techniques
  • Physical exercise
  • Deep breathing exercises
  • Yoga
  • Journaling
  • Positive self-talk
  • Healthy eating
  • Prioritizing sleep
  • Engaging in creative activities like painting, music, writing, etc.
  • Setting healthy boundaries both personally and professionally
  • Communicating stressors
  • Seeking professional assistance
 
There are numerous resources, books, apps, and such, readily available. These can be effective tools to help you explore and develop coping strategies that are healthy and work best for you. Important things to consider when developing your stress management strategy is to personalize your approach, be consistent, and seek professional help when needed.
 
You don’t have to do it alone! Seeking support when you need it is critical to your well-being. It can mitigate risk and provide significant benefit to your work performance, and life in general. Seeking professional help from therapists, counselors, or other mental health professionals can provide valuable tools and strategies for managing stress and anxiety.
 
Many companies offer Employee Assistance Programs (EAP) or other similar programs to assist their personnel when trouble arises. Don’t be afraid to tap into these resources if you need them. If you need support, please reach out to your company’s HR department or FSO. We’re here to help you navigate these waters.
 
When Are Mental Health Concerns Reportable
One of the biggest questions surrounding mental health and security is…What is reportable?
 
Security Executive Agent Directive 3 (SEAD 3) states you must report any apparent or suspected mental health issues where there is reason to believe it may impact a cleared individual’s ability to protect classified or other information specifically prohibited by law from disclosure.
 
The DoD Manual 5200.02, Enclosure 11, SEAD 3, and ISL 2021-02 outline possible thresholds for what would merit reporting. Examples of these include:
  • Declarations of mental incompetence by a court or administrative agency
  • Court-ordered mental health care or evaluation (inpatient or outpatient)
  • Hospitalizations for mental health conditions (voluntary or involuntary)
  • Diagnoses of the following conditions by a health care professional:
    • Psychotic disorders such as schizophrenia, schizoaffective disorder, or delusional disorder
    • Bipolar mood disorders
    • Personality disorders such as borderline personality disorder or antisocial personality disorder
  • Developing a mental health or other health condition that substantially affects judgment, reliability, or trustworthiness
 
SEAD 4 Adjudicative Guideline I, Psychological Conditions, also lists concerns as:
§  Any behavior that casts doubt on an individual’s judgment, stability, reliability, or trustworthiness.
§  An opinion by a medical professional that the individual has a condition that may impair their judgment, stability, reliability, or trustworthiness.
§  Voluntary or involuntary inpatient hospitalization.
§  Failure by the individual to follow a prescribed treatment plan.
§  Pathological gambling.
 
Other DoD Policies surrounding Insider Threat Indicators should also be considered. Insider threat policies were derived from security incidents that have occurred and the indicators leading up to those situations. Many of those indicators have involved mental health and psychological considerations.
 
Outside of government policies and security procedures, a primary reason to report mental health and psychological concerns is simply to help those in need. If you are struggling, or if you recognize that a colleague or co-worker might be having a difficult time, reporting these concerns could be the thing that helps someone get the support they need before a situation becomes dire.
 
Will Reporting a Mental Health Concern Affect an Individual’s Clearance or Public Trust?
History dictates that, in most cases, the answer is No.
 
Behavioral mental health treatment is not an automatic disqualifier for a security clearance. DCSA Adjudications looked at the 5.4 million adjudicative actions taken from 2012 to 2020 and found that 97,000 cases dealt with psychological-related issues. Of those cases, only 62 were denied or revoked for psychological concerns. This equates to only 0.00115% of the total adjudicative actions.
 
It is important to note that there can be mitigating circumstances that may ease security concerns. Examples include:
§  The person’s condition is controllable with treatment, and the person has demonstrated ongoing and consistent compliance with a treatment plan
§  The person voluntarily enters a counseling or treatment program
§  The opinion of a qualified mental health professional that the person’s condition is under control
§  The issue was temporary and has since been resolved
§  There is no indication of a current problem
 
Why Reporting is Critical & How to Report Concerns
Looking back on some of the most devastating security incidents that have occurred in our Nation's history, mental health and psychological considerations were prevalent pre-incident indicators. In almost all cases there were indicators but, unfortunately, other people around the individual either missed the warning signs or were simply afraid to report for fear the person would lose their clearance or get in trouble.
 
Covered individuals working in the federal contracting space, are required to self-report. If you are going through a difficult time, seeking treatment, have received a mental health diagnosis, etc., please DO NOT BE AFRAID to reach out to your company's FSO.
 
Reporting concerns about our co-workers and colleagues is equally important. Recognizing when someone is struggling, and reporting it appropriately, can be a critical piece toward getting them help before a bad situation occurs.
 
If you have any concerns about the mental health of yourself or anyone else, please seek guidance from your company’s Facility Security Officer (FSO). Reporting is about so much more than whether or not a person will lose their clearance or get in trouble.
 
Your FSO's job is to help you navigate compliance with security and reporting requirements. More importantly, we care about you and your well-being! If we can intervene to assist someone before a situation becomes dire, we may be able to mitigate a major security concern before it happens.
 
Reporting is the responsibility of every covered federal contractor, however, more importantly, REPORTING CAN SAVE LIVES.
 
 Report all concerns to your company’s FSO!
 
It is out job as FSOs to help you navigate any situations or concerns that arise.
 
 
Resources and Additional Learning
  • Personnel Vetting - Mental Health and National Security Eligibility
  • The Facts About Mental Health and Security Clearances
  • DCSA Mental Health Treatment Not an Automatic Disqualifier
  • DCSA Behavioral Science Branch - Destigmatizing Mental Health
  • DCSA What Do I Need to Self-Report
  • DCSA Adjudications "Mental Health and Security Clearances" fact sheet
  • CDSE Pulse May 2024 – Mental Health and National Security Eligibility
  • Reporting Job Aid
  • Case Study Library
  • 32 CFR Part 117 (NISPOM Rule)
  • 32 CFR Part 147 (Adjudicative Guidelines)
  • SAMHSA National Helpline
  • SAMHSA 988 Suicide & Crisis Lifeline
  • APA Crisis Hotlines and Resources

As always, if you have any questions about whether or not a situation requires reporting, ask your FSO! Your company’s FSO is the best person to help you navigate any questions you have about security compliance, briefing, and reporting requirements. As security professionals, we are here to help you navigate things to ensure you fulfill all requirements.

Financial Considerations and Life Changes

4/15/2025

 
Tax season is a great time to discuss financial considerations, and life changes that federal contractors and federal contractor personnel must report.
 
Every individual that works in and around the U.S. Government is a potential target for exploitation by malicious actors intending to do harm to the United States and its people. If you have been granted eligibility for access to classified or sensitive government information, you are a prime target for exploitation and attempts to elicit US Government information. In tandem, anyone in close proximity to any individual that has been granted eligibility could also be a target.
 
Certain situations make us more susceptible to compromise and we be aware of those that must be reported to our company’s Facility Security Officer (FSO).
 
Financial Difficulties and Distress
One of the easiest pathways for our adversaries to elicit information is through offers of gifts and money or threats of exposing our difficulties.
 
Financial distress can happen to anyone and may be caused by a variety of circumstances. While some situations may be created or exacerbated by poor self-control, lack of judgement, excessive gambling, mental health issues, or alcohol/drug/substance abuse/misuse or dependence, many people experience financial difficulty due to circumstances beyond their control such as job loss, medical debt, family crisis, or simply not having enough money coming in to meet their financial obligations.
 
Regardless of the reason, when a person is overextended, having difficulty satisfying debts, meeting financial obligations, living within their means, or is simply overextended, there is a greater risk that they might engage in illegal or questionable activity to generate additional funds. Financial pressure makes us a prime target for exploitation, as it can be incredibly tempting to take an easy path toward easing the burden.
 
Unexplained Affluence
Unexplained affluence refers to a lifestyle, standard of living, or accumulation of wealth that cannot be reasonably attributed to a person's known income or legal sources. It can be a red flag, suggesting that a person may have access to illegal or undisclosed sources of income, and raises concerns about the person’s trustworthiness or vulnerability to bribery or coercion. 
 
It can look like a sudden increase in net worth, lavish purchases, or the repayment of large debts that are inconsistent with a person's known income sources.
 
Financial Awareness and Reporting Financial Considerations
Keeping a close eye on your financial data and credit information can help you identify if you are running into financial difficulty and if there is any questionable activity happening in your name. Your social security number and other personally identifiable information (PII) can be used to steal your identity and even open lines of credit in your name. This is one of the reasons that protecting PII is so critical!
 
Maintain awareness of your financial situation, especially if you are not the person handling your finances. Credit monitoring can help you catch concerns before they get out of hand and before they come to the attention of the government. There are several credit monitoring services available that offer services to monitor your credit record regularly. In addition, all 3 credit bureaus will allow you to run your own credit report for free each year. We recommend you run all 3 annually.
 
Always keep data safety in mind with credit monitoring services. Be cautious of fake website that are just trying to steal your information. If you find an error on your credit report or if you see an account that you do not recognize, contact the credit bureau directly and file a dispute immediately.
 
If you suspect your Social Security number is being used fraudulently for income declaration purposes, we highly recommend that you contact the Social Security Administration at www.ssa.gov or call toll-free at 1-800-772-1213. They will review your earnings with you to ensure their records are correct.
 
Reporting Financial Considerations
The following circumstances must be reported to your company’s FSO, whether they are about yourself or another covered individual:
  • Excessive indebtedness
  • Inability to satisfy debts
  • Unwillingness to satisfy debts, regardless of ability to do so
  • History of not meeting financial obligations
  • Unpaid obligations over 120 days
  • Liens and judgements
  • Collections
  • Bankruptcies
  • Foreclosures
  • Wage garnishments
  • Deceptive or illegal financial practices (i.e. embezzlement, employee theft, check fraud, credit card fraud, timecard fraud, expense account fraud, mortgage fraud, filing deceptive loan statements, and other intentional financial breaches of trust.)
  • Consistent spending beyond one’s means or frivolous or irresponsible spending that could indicate excessive indebtedness, significant cash flow issues, a history of late payments or of non-payment, or other negative financial indicators.
  • Failure to file, failure to pay, or fraudulently filing of Federal, state, or local income tax returns.
  • Any indicator of unexplained affluence, as shown by a lifestyle, standard of living, increase in net worth, lavish purchases, repayment of large debts inconsistent with a person's known income sources, money transfers that are inconsistent with known legal sources of income, etc.
  • Borrowing money or engaging in significant financial transactions to fund gambling or pay gambling debts.
  • Concealing gambling losses, family conflict, or other problems caused by gambling.
  • Any other financial considerations that could potentially raise concern about financial difficulty or affluence.
  • Receipt of a large sum of money, property, or wealth that is not readily identifiable by your typical income. Examples may be an inheritance, significant lottery or gambling winnings, proceeds from sale of a home, etc.
  • Concern that your identity or credentials have been compromised.
 
Changes in Personal Status / Life Changes
If you have been granted security clearance or suitability for access to sensitive information (public trust, suitability vetting, contractor fitness, etc.) there are several basic life events and changes that must be reported to your company’s FSO.
 
The following circumstances must be reported to your company’s FSO, whether they are about yourself or another covered individual:
 
  • A name change, for any reason.
  • Marriage (All civil marriages, legally recognized civil unions, and legally recognized domestic partnerships.)
  • Separation
  • Divorce
  • Changes in cohabitation status (A cohabitant is defined as any person with whom the covered individual resides and shares bonds of affection, obligation, or other commitment.)
  • Cohabitation with any Non-U.S. citizen, regardless of reason
  • New relatives and additions to your family (new children by birth or adoption, mother/father in-law, etc.)
  • Adoption of Non-U.S. citizen children
  • Any change in U.S. citizenship status (including requests to obtain dual citizenship and citizenship by naturalization in another country)
  • Change in employment status
  • Change in need for access to classified information or level of access to classified information
  • Any change wherein access to classified information is no longer required
  • Any change wherein a person no longer wishes to be processed for eligibility determination or no longer wishes to perform classified or sensitive work.
 
Why Reporting is Critical & How to Report Concerns
Despite the cause, both financial difficulties and unexplained affluence can raise concerns about an individual’s reliability, trustworthiness and ability to protect classified or sensitive information, and can impact an individual’s clearance or eligibility for access to sensitive information.
 
Financial considerations must be reported immediately upon occurrence.
 
Changes in personal status (life changes) must be reported to your company’s FSO as soon as you become aware that the change will occur.
 
Don’t be afraid to lean on your FSO for support! We are here to help you. Your FSO can provide reporting guidance and/or point you toward company resources that may be able to assist you if you are in your time of need.
 
Resources and Additional Learning
  • CDSE Financial Considerations
  • DCSA Reporting Changes, Concerns, or Threats
  • CDSE Financial Considerations
  • CDSE Receive and Maintain Security Clearance
  • CDSE Annual Security Refresher
  • Experian Credit Bureau
  • Equifax Credit Bureau
  • Transunion Credit Bureau
  • Reporting Job Aid
  • Case Study Library
  • 32 CFR Part 117 (NISPOM Rule)
  • 32 CFR Part 147 (Adjudicative Guidelines)
 
As always, if you have any questions about whether or not a situation requires reporting, ask your FSO! Your company’s FSO is the best person to help you navigate any questions you have about security compliance, briefing, and reporting requirements. As security professionals, we are here to help you navigate things to ensure you fulfill all requirements

<<Previous
    Picture
    Sign up to receive our monthly Security Snippet Newsletter!
    Sign up

    Archives

    January 2026
    December 2025
    November 2025
    October 2025
    September 2025
    August 2025
    July 2025
    June 2025
    May 2025
    April 2025
    March 2025
    February 2025
    January 2025


    Categories

    All
    Controlled Unclassified Information (CUI)
    Counterintelligence (CI)
    Cybersecurity
    Financial & Life Changes
    Foreign Factors & Travel
    Holiday Security
    Information Security
    Insider Threat
    Mental Health Awareness
    Reporting Requirements
    Security Policy
    Suspicious Contact
    Threat Awareness And Trends


COMPANY INFO
​About Us
​Contact Us
​
Employment
​FAQs
​
SERVICE OFFERINGS
Ask an FSO:​ One-Time Services
​​FSO Program Management
Security SME Advisory
Training & Talent Acquisition
GovCon Compliance Support
Book Meeting
 Newsletter Signup
​
​​Referral Program
351X SaaS
​
© 2015-2026. All Rights Reserved.  |  FSO PROS® is a Registered Trademark of FSO Pros LLC  |  A Subsidiary of Dexterity Services Corp.   
Terms of Use & Privacy Policy
  • Home
  • About
    • Our Team
    • FAQs
  • SERVICES
    • Ask an FSO: One-Time Services
    • FSO Program Management
    • Security SME Advisory
    • Talent Acquisition & Training
    • GovCon Compliance Support
  • 351X
  • Employment
  • Contact