National Counterintelligence and Security Center

NCTC Resources

Threat Awareness for Industry & Academia

threat

eLearning Courses

Job Aids

Reports

  • Foreign Economic Espionage in Cyberspace 2018
    This National Counterintelligence and Security Center (NCSC) report focuses on foreign economic and industrial espionage against the United States; foreign intelligence services and threat actors working on their behalf; and disruptive threat trends that warrant attention. This report is more applicable for network administrators, information technology and security personnel, and senior leaders.
  • Targeting U.S. Technologies: A report of Foreign Targeting of Cleared Industry 2019
    The Defense Counterintelligence and Security Agency (DCSA) produces an annual report of trends from the suspicious contact reporting coming in from cleared industry. Although this is geared for cleared industry, there is a discussion of the basic methods of operation and contact used. This report is best suited for security personnel.
  • DCSA: Foreign Intelligence Recruitment of Cleared Academia
    Foreign Intelligence entities (FIE), specifically China and Russia, use academic talent recruitment plans and academic excellence initiatives to collect U.S. scientific research and technologies in a strategic effort to enhance their militaries and economies. China and Russia often utilize foreign students accepted to U.S. universities or at postgraduate research programs to collect sensitive U.S. Government information and/or technology. Additionally, Iran uses government-sponsored initiatives to persuade students studying abroad to return and share their knowledge. FIE target U.S. subject matter experts (SMEs), professors, and researchers in order to obtain sensitive U.S. Government information and technology.

Watch & Learn

  • Suspicious Emails
    This 10-minute interactive video details the threat of suspicious emails and gives countermeasures and indicators. The video is more focused on solicitation and the attempted illicit acquisition of facility assets or information.
  • Counterintelligence Video Lesson: Request for Information and Suspicious Emails
    This is a three minute news video on YouTube detailing an actual arrest of a foreign national for smuggling, moneylaundering, and conspiracy to commit espionage. Although the example concerns export controlled items, this is applicable to any facility in any sector as the methods used to illicitly acquire the goods are universal.
  • Economic Espionage
    This 36 minute YouTube video and accompanying information from the Federal Bureau of Investigation is the dramatization of a true story concerning the attempted recruitment of an employee to commit economic espionage.

Webinars

  • Counterintelligence and Insider Threat in the Time of COVID-19
    This hour long webinar focuses on the CI and Insider Threat and highlights some of the evolving threat vectors because of the COVID-19 Pandemic. This webinar is applicable for all employees.
  • 2019 Targeting U.S Technologies Report
    This hour long webinar focuses on foreign efforts to compromise and/or exploit cleared personnel in order to obtain unauthorized access to sensitive and classified information. This unclassified format provides analysis of the technology targeted, the methods of operation used, and the geographical regions targeting cleared industry and is based off of the Defense Counterintelligence and Security Agency (DCSA) annual trends report. Although this webinar is geared for cleared industry, there is a discussion of the basic methods of operation and contact used. This report is best suited for security personnel.
  • Counterintelligence Support to Personnel Security
    This hour long webinar discusses the Personnel Security (PERSEC) mission by identifying foreign intelligence entity(FIE) threats to personnel and enacting efforts to detect, deter, and neutralize the threat. This webinar is applicable for all facility personnel.

Supply Chain Risk Management for Industry & Academia

SCRM

Job Aids

  • Deliver Uncompromised: Supply Chain Risk Management
    This job aid delivers the basics on Supply Chain Risk Management (SCRM), which is essential to protect supply chains and deliver uncompromised. It defines the supply chain, highlights external supply chain threats, and helps you make a self-assessment of your own supply chain security.
  • Exploitation of Global Supply Chain
    This job aid from the Defense Counterintelligence and Security Agency (DCSA) and National Counterintelligence and Security Center (NCSC) focuses on the perils of supply chain exploitation. This job aid is best suited for facility security personnel, senior leaders, and employees in acquisitions-type roles.
  • Software Supply Chain Attacks
    This is a more advanced job aid from the Office of the Director of National Intelligence (ODNI) that details the compromise of software code that may come from legitimate sources. This job aid is best suited for security personnel, network administrators/information technology personnel, and technically minded employees.

Toolkits

  • Supply Chain Risk Management
    This toolkit from the National Counterintelligence and Security Center (NCSC) on Supply Chain Risk Management(SCRM) hosts multiple resources for developing a more advanced supply chain center security plan. This toolkit is best suited for facility security personnel, senior leaders, and employees in acquisitions-type roles.
  • CDSE Supply Chain Risk Management
    This toolkit from the Defense Counterintelligence and Security Agency (DCSA) Center for Development of Security Excellence (CDSE) contains resources, including policy documents pertaining to supply chain risk management.

Watch & Learn

Webinars

  • Counterintelligence, the Supply Chain, and You
    This hour long webinar provides the basics on Supply Chain Risk Management (SCRM). A Defense Counterintelligence and Security Agency (DCSA) CI Special Agent (CISA) also talks about some tactics, techniques, and procedures for SCRM as seen in the field. This is a good introductory for anyone involved in the facility’s supply chain.
  • Supply Chain Resiliency
    This hour long webinar conducted by the Defense Counterintelligence and Security Agency (DCSA) Center for Development of Security Excellence (CDSE) and National Counterintelligence and Security Center (NCSC) gives amore holistic look at Supply Chain Risk Management within the Federal Government. This webinar may be especially helpful for those in a facility’s acquisitions department.

Counterintelligence Program for Industry & Academia

Counterintelligence

The National Counterintelligence and Security Center (NCSC) provides resources and best practices for organizations looking to implement counterintelligence (CI) programs. These resources cover various aspects related to CI awareness, risk mitigation, and countering foreign intelligence threats. Please review the following information:

  1. Enterprise Risk Mitigation Blueprint for Non-Intelligence Agencies: Although geared towards federal agencies, this 2023 brochure from the NCSC provides best practices for any organization looking to implement an enterprise risk mitigation program.
  2. Countering Foreign Intelligence Threats – Implementation and Best Practices Guide: This job aid gives best practices for implementing a CI Program. It is well-suited for facility security personnel and senior leaders.
  3. Counterintelligence (CI) Awareness Integration Plan: This job aid provides basic guidelines on setting up a CI program. It addresses universal principles applicable anywhere, not just within the Department of Defense (DOD).
  4. Understanding Espionage and National Security Crimes: This resource discusses the difference between economic espionage, trade secret theft, and violations related to Export Administration Regulation (EAR) or International Traffic in Arms Regulation (ITAR).
  5. Computer Security Resource Center Toolkit: The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) toolkit for computer security resources has a wealth of information for incorporating both CI and cyber into a security program. It is more applicable for network administrators and information technology and security personnel.
  6. Watch & Learn CDSE Counterintelligence Awareness Video Lesson: A four-minute YouTube video that serves as a basic primer on Counterintelligence and Security. It is suited for all facility personnel.

These resources provide valuable insights and best practices for implementing effective counterintelligence measures in both industry and academia.

Establish an Insider Risk Program

Insider Risk Guy pushing Button 1

eLearning Courses

Job Aids

Policy

Resources

  • Full Catalog of Training Materials for Insider Threat Practitioners
    Insider Threat Programs are designed to deter, detect, and mitigate actions by insiders who represent a threat to national security. CDSE has provided an extensive catalog of insider threat resources for your use.
  • Insider Threat Mitigation
    This CISA site is designed to assist individuals, organizations, and communities in improving or establishing an insider threat mitigation program.
  • National Infrastructure Protection Plan
    This job aid discusses the risk management framework and how it is implemented within the context of the unique characteristics and risk landscape of the sector. This website provides the sector specific plan and links to sector resources.
  • National Insider Threat Task Force
    This site provides insider risk resources to assist you in developing your Insider Risk Program.

Promote Awareness in Your Organization

Case Studies

  • Case Study Library
    Explore a growing repository of U.S. case studies. Learn about the crimes, the sentences, the impact, and the potential risk indicators that, if identified, could have mitigated harm.

eLearning Courses

Job Aids

  • Potential Insider Risk Indicators: Insider Threat
    Most insider threats exhibit risky behavior prior to committing negative workplace events. If identified early, many risks can be mitigated before harm to the organization occurs. This job aid provides information about the potential risk indicators for which you should be looking.
  • Potential Risk Indicators: Kinetic Violence
    In the weeks and months before an active shooter attack, many active shooters engage in behaviors that may signal impending violence. While some of these behaviors are intentionally concealed, others are observable and — if recognized and reported — may lead to a disruption prior to an attack.

Watch & Learn

  • Insider Threat Training Videos
    This repository contains 18 training videos about insider threat, including the 4-part award-winning series “Turning People Around, Not Turning Them In.”

Additional Resources

  • National Insider Threat Awareness Month
    Participating in Insider Threat Awareness Month can help your program detect, deter, and mitigate insider risk by increasing awareness and promoting reporting. This website will help you identify a variety of activities and engagements available to your organization.
  • More Awareness Materials
    Instilling a sense of vigilance in the general workforce is a basic tenet of establishing an insider risk program. Developing avigilance campaign for your organization is an effective solution. Deploying regular messaging, awareness, and communications materials ensures that the general workforce is prepared to recognize and respond to the insider risk.