National Counterintelligence and Security Center

Features

National Counterintelligence and Security Center

PhysicalSecurity

 

eLearning Courses

  • Workplace Security Awareness
    This course provides guidance to individuals and organizations on how to improve the security in your workplace. Noworkplace—be it an office building, construction site, factory floor, or retail store—is immune from security threats.

Posters

Resources

 InformationSecurity2

 

Resources

  • ISOO CUI Resources
    This site provides resources for safeguarding Controlled Unclassified Information, including cover sheets, labels, andeducation materials.

 

Toolkits

  • Controlled Unclassified Information
    This toolkit provides current information regarding Controlled Unclassified Information.
  • Unauthorized Disclosure Toolkit
    This toolkit will help you learn the difference between whistleblowing and unauthorized disclosure. Unauthorized disclosure is a crime and may involve classified or unclassified information.

Games

Graphic Novel

  • Dangerous Disclosure
    While this graphic novel is focused on the Department of Defense, it illustrates the consequences of unauthorized disclosure.

Posters

threat

eLearning Courses

Job Aids

 

Reports

  • Foreign Economic Espionage in Cyberspace 2018
    This National Counterintelligence and Security Center (NCSC) report focuses on foreign economic and industrial espionage against the United States; foreign intelligence services and threat actors working on their behalf; and disruptive threat trends that warrant attention. This report is more applicable for network administrators, information technology and security personnel, and senior leaders.
  • Targeting U.S. Technologies: A report of Foreign Targeting of Cleared Industry 2019
    The Defense Counterintelligence and Security Agency (DCSA) produces an annual report of trends from the suspicious contact reporting coming in from cleared industry. Although this is geared for cleared industry, there is a discussion of the basic methods of operation and contact used. This report is best suited for security personnel.
  • (NEW) DCSA: Foreign Intelligence Recruitment of Cleared Academia
    Foreign Intelligence entities (FIE), specifically China and Russia, use academic talent recruitment plans and academic excellence initiatives to collect U.S. scientific research and technologies in a strategic effort to enhance their militaries and economies. China and Russia often utilize foreign students accepted to U.S. universities or at postgraduate research programs to collect sensitive U.S. Government information and/or technology. Additionally, Iran uses government-sponsored initiatives to persuade students studying abroad to return and share their knowledge. FIE target U.S. subject matter experts (SMEs), professors, and researchers in order to obtain sensitive U.S. Government information and technology.

Toolkits

  • DCSA Threat Awareness Products
    This Defense Counterintelligence and Security Agency (DCSA) toolkit houses several job aids applicable to the financial sector. It links to job aids on Academic Solicitation, CI Awareness, Conferences, Conventions & Tradeshows, Cyber Threats, Exploitation of Business Activities, Exploitation of Global Supply Chain, Exploitation of Insider Access, Foreign Visits, and Personal Contact.

Watch & Learn

  • Suspicious Emails
    This 10 minute interactive video details the threat of suspicious emails and gives countermeasures and indicators. The video is more focused on solicitation and the attempted illicit acquisition of facility assets or information.
  • Counterintelligence Video Lesson: Request for Information and Suspicious Emails
    This is a three minute news video on YouTube detailing an actual arrest of a foreign national for smuggling, moneylaundering, and conspiracy to commit espionage. Although the example concerns export controlled items, this is applicable to any facility in any sector as the methods used to illicitly acquire the goods are universal.
  • Economic Espionage
    This 36 minute YouTube video and accompanying information from the Federal Bureau of Investigation is the dramatization of a true story concerning the attempted recruitment of an employee to commit economic espionage.

Webinars

  • Counterintelligence and Insider Threat in the Time of COVID-19
    This hour long webinar focuses on the CI and Insider Threat and highlights some of the evolving threat vectors because of the COVID-19 Pandemic. This webinar is applicable for all employees.
  • 2019 Targeting U.S Technologies Report
    This hour long webinar focuses on foreign efforts to compromise and/or exploit cleared personnel in order to obtain unauthorized access to sensitive and classified information. This unclassified format provides analysis of the technology targeted, the methods of operation used, and the geographical regions targeting cleared industry and is based off of the Defense Counterintelligence and Security Agency (DCSA) annual trends report. Although this webinar is geared for cleared industry, there is a discussion of the basic methods of operation and contact used. This report is best suited for security personnel.
  • Counterintelligence Support to Personnel Security
    This hour long webinar discusses the Personnel Security (PERSEC) mission by identifying foreign intelligence entity(FIE) threats to personnel and enacting efforts to detect, deter, and neutralize the threat. This webinar is applicable for all facility personnel.

SCRM

 

Job Aids

  • Deliver Uncompromised: Supply Chain Risk Management
    This job aid delivers the basics on Supply Chain Risk Management (SCRM), which is essential to protect supply chains and deliver uncompromised. It defines the supply chain, highlights external supply chain threats, and helps you make a self-assessment of your own supply chain security.
  • Exploitation of Global Supply Chain
    This job aid from the Defense Counterintelligence and Security Agency (DCSA) and National Counterintelligence and Security Center (NCSC) focuses on the perils of supply chain exploitation. This job aid is best suited for facility security personnel, senior leaders, and employees in acquisitions-type roles.
  • Software Supply Chain Attacks
    This is a more advanced job aid from the Office of the Director of National Intelligence (ODNI) that details the compromise of software code that may come from legitimate sources. This job aid is best suited for security personnel, network administrators/information technology personnel, and technically minded employees.

Toolkits

  • Supply Chain Risk Management
    This toolkit from the National Counterintelligence and Security Center (NCSC) on Supply Chain Risk Management(SCRM) hosts multiple resources for developing a more advanced supply chain center security plan. This toolkit is best suited for facility security personnel, senior leaders, and employees in acquisitions-type roles.
  • CDSE Supply Chain Risk Management
    This toolkit from the Defense Counterintelligence and Security Agency (DCSA) Center for Development of Security Excellence (CDSE) contains resources, including policy documents pertaining to supply chain risk management.

Watch & Learn

Webinars

  • Counterintelligence, the Supply Chain, and You
    This hour long webinar provides the basics on Supply Chain Risk Management (SCRM). A Defense Counterintelligence and Security Agency (DCSA) CI Special Agent (CISA) also talks about some tactics, techniques, and procedures for SCRM as seen in the field. This is a good introductory for anyone involved in the facility’s supply chain.
  • Supply Chain Resiliency
    This hour long webinar conducted by the Defense Counterintelligence and Security Agency (DCSA) Center for Development of Security Excellence (CDSE) and National Counterintelligence and Security Center (NCSC) gives amore holistic look at Supply Chain Risk Management within the Federal Government. This webinar may be especially helpful for those in a facility’s acquisitions department.

Insider Risk Guy pushing Button 1

 

eLearning Courses

Job Aids

Policy

Resources

  • Full Catalog of Training Materials for Insider Threat Practitioners
    Insider Threat Programs are designed to deter, detect, and mitigate actions by insiders who represent a threat to national security. CDSE has provided an extensive catalog of insider threat resources for your use.
  • Insider Threat Mitigation
    This CISA site is designed to assist individuals, organizations, and communities in improving or establishing an insider threat mitigation program.
  • National Infrastructure Protection Plan
    This job aid discusses the risk management framework and how it is implemented within the context of the unique characteristics and risk landscape of the sector. This website provides the sector specific plan and links to sector resources.
  • National Insider Threat Task Force
    This site provides insider risk resources to assist you in developing your Insider Risk Program.

Promote Awareness in Your Organization

 

Case Studies

  • Case Study Library
    Explore a growing repository of U.S. case studies. Learn about the crimes, the sentences, the impact, and the potential risk indicators that, if identified, could have mitigated harm.

eLearning Courses

Job Aids

  • Potential Insider Risk Indicators: Insider Threat
    Most insider threats exhibit risky behavior prior to committing negative workplace events. If identified early, many risks can be mitigated before harm to the organization occurs. This job aid provides information about the potential risk indicators for which you should be looking.
  • Potential Risk Indicators: Kinetic Violence
    In the weeks and months before an active shooter attack, many active shooters engage in behaviors that may signal impending violence. While some of these behaviors are intentionally concealed, others are observable and — if recognized and reported — may lead to a disruption prior to an attack.

Mobile Applications

  • Insider Threat Sentry Mobile Application
    (Download on Apple App Store or Google Play) This mobile application provides up-to-date awareness material on deterring, detecting, and mitigating potential risks associated with insider threats.

Posters

Games

 

Play these engaging and entertaining games to test your knowledge of insider risk.

Watch & Learn

  • Insider Threat Training Videos
    This repository contains 18 training videos about insider threat, including the 4-part award-winning series “Turning People Around, Not Turning Them In.”
  • Active Shooter Awareness
    Active shooter situations are unpredictable and evolve quickly, often before law enforcement personnel can arrive. Your goal in responding is to quickly determine the most reasonable way to protect your life and the lives of those around you. This video will help you make the best decision possible for your safety and the safety of those around you.

Additional Resources

  • National Insider Threat Awareness Month
    Participating in Insider Threat Awareness Month can help your program detect, deter, and mitigate insider risk by increasing awareness and promoting reporting. This website will help you identify a variety of activities and engagements available to your organization.
  • More Awareness Materials
    Instilling a sense of vigilance in the general workforce is a basic tenet of establishing an insider risk program. Developing avigilance campaign for your organization is an effective solution. Deploying regular messaging, awareness, and communications materials ensures that the general workforce is prepared to recognize and respond to the insider risk.

Counterintelligence

 

Job Aids

Although oriented for Department of Defense (DOD) personnel, these address universal principles applicable anywhere:

Posters

Reports

Toolkits

  • Build Security In
    This toolkit by the Cybersecurity & Infrastructure Security Agency (CISA) has several articles and tools to assist in building security into a program. This toolkit is more applicable for network administrators and information technology and security personnel.
  • Computer Security Resource Center
    The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) toolkit for computer security resources has a wealth of information for incorporating both CI and cyber into a security program. This toolkit is more applicable for network administrators and information technology and security personnel.

Watch & Learn

  • CDSE Counterintelligence Awareness Video Lesson
    This four minute YouTube video is a basic primer on Counterintelligence and Security. This job aid is suited for all facility personnel.
  • CI and Insider Threat Support to Security
    This seven minute YouTube video gives the basic “why” on Insider threat and Counterintelligence. The first four and a half minutes are more universal, and after this mark, the video becomes more Department of Defense (DOD) centric. This resource is best suited for facility security personnel and senior leaders.

Games

Test your knowledge and encourage CI Awareness at your organization with these two engaging games.

 

National Counterintelligence and Security Center