Department of Defense Directive Number 5240.06 dated May 17, 2011: Counterintelligence Awareness and Reporting (CIAR)
This DoD Directive applies to:
- OSD
- Military Departments
- Office of the Chairman of the Joint Chiefs of Staff
- Joint Staff
- Combatant Commands
- Office of the Inspector General of the Department of Defense
- Defense Agencies
- DoD Field Activities
- All other organizational entities within the DoD
- Active and reserve military personnel
- DoD civilian employees
- DoD contractors and contracts
The Directive states that DoD military and civilian personnel who fail to report the contacts, activities, indicators, and behaviors listed below may be subject to disciplinary actions:
“d. Establishes that persons subject to chapter 47 of title 10, United States Code, hereinafter referred to as the Uniform Code of Military Justice (UCMJ) (Reference (d)) who violate specific provisions of this issuance may be subject to punitive action under Article 92, UCMJ.
e. Establishes that civilian employees under their respective jurisdictions who violate specific provisions of this issuance may be subject to appropriate disciplinary action under regulations governing civilian employees.”
AWARENESS TRAINING REQUIREMENT
All of the above personnel are required to have Counterintelligence Awareness and Reporting (CIAR) training within 90 days of initial assignment and then EVERY 12 months. The instruction includes the:
- Threat from foreign intelligence entities (FIE)
- Methods, also known as “modus operandi,” of FIEs
- FIE use of the Internet and other communications including social networking services
- CI insider threat
- Reporting responsibilities regarding foreign travel and foreign contacts
- Reporting requirements below
Schedule a D*I*C*E Briefing that meets all of these requirements.
Download the below list in an Adobe pdf document
Reportable Foreign Intelligence Contacts, Activities, Indicators, and Behaviors
- When not related to official duties, contact with anyone known or believed to have information of planned, attempted, actual, or suspected espionage, sabotage, subversion, or other intelligence activities against DoD facilities, organizations, personnel, or information systems. This includes contact through social networking services (SNS) that is not related to official duties.
- Contact with an individual who is known or suspected of being associated with a foreign intelligence or security organization.
- Visits to foreign diplomatic facilities that are unexplained or inconsistent with an individual’s official duties.
- Acquiring, or permitting others to acquire, unauthorized access to classified or sensitive information systems.
- Attempts to obtain classified or sensitive information by an individual not authorized to receive such information.
- Persons attempting to obtain access to sensitive information inconsistent with their duty requirements.
- Attempting to expand access to classified information by volunteering for assignments or duties beyond the normal scope of responsibilities.
- Discovery of suspected listening or surveillance devices in classified or secure areas.
- Unauthorized possession or operation of cameras, recording devices, computers, and communication devices where classified information is handled or stored.
- Discussions of classified information over a non-secure communication device
- Reading or discussing classified or sensitive information in a location where such activity is not permitted.
- Transmitting or transporting classified information by unsecured or unauthorized means.
- Removing or sending classified or sensitive material out of secured areas without proper authorization.
- Unauthorized storage of classified material, regardless of medium or location, to include unauthorized storage of classified material at home.
- Unauthorized copying, printing, faxing, e-mailing, or transmitting classified material.
- Improperly removing classification markings from documents or improperly changing classification markings on documents.
- Unwarranted work outside of normal duty hours.
- Attempts to entice co-workers into criminal situations that could lead to blackmail or extortion.
- Attempts to entice DoD personnel or contractors into situations that could place them in a compromising position.
- Attempts to place DoD personnel or contractors under obligation through special treatment, favors, gifts, or money.
- Requests for witness signatures certifying the destruction of classified information when the witness did not observe the destruction.
- Requests for DoD information that make an individual suspicious, to include suspicious or questionable requests over the internet or SNS.
- Trips to foreign countries that are:
a) Short trips inconsistent with logical vacation travel or not part of official duties.
b) Trips inconsistent with an individual’s financial ability and official duties. - Unexplained or undue affluence.
a) Expensive purchases an individual’s income does not logically support.
b) Attempts to explain wealth by reference to an inheritance, luck in gambling, or a successful business venture.
c) Sudden reversal of a bad financial situation or repayment of large debts.
Reportable International Terrorism Contacts, Activities, Indicators, and Behaviors
- Advocating violence, the threat of violence, or the use of force to achieve goals on behalf of a known or suspected international terrorist organization.
- Advocating support for a known or suspected international terrorist organizations or objectives.
- Providing financial or other material support to a known or suspected international terrorist organization or to someone suspected of being an international terrorist.
- Procuring supplies and equipment, to include purchasing bomb making materials or obtaining information about the construction of explosives, on behalf of a known or suspected international terrorist organization.
- Contact, association, or connections to known or suspected international terrorists, including online, e-mail, and social networking contacts.
- Expressing an obligation to engage in violence in support of known or suspected international terrorism or inciting others to do the same.
- Any attempt to recruit personnel on behalf of a known or suspected international terrorist organization or for terrorist activities.
- Collecting intelligence, including information regarding installation security, on behalf of a known or suspected international terrorist organization.
- Familial ties, or other close associations, to known or suspected international terrorists or terrorist supporters.
- Repeated browsing or visiting known or suspected international terrorist websites that promote or advocate violence directed against the United States or U.S. forces, or that promote international terrorism or terrorist themes, without official sanction in the performance of duty.
Reportable FIE-Associated Cyberspace Contacts, Activities, Indicators, and Behaviors
- Actual or attempted unauthorized access into U.S. automated information systems and unauthorized transmissions of classified or controlled unclassified information.
- Password cracking, key logging, encryption, steganography, privilege escalation, and account masquerading.
- Network spillage incidents or information compromise.
- Use of DoD account credentials by unauthorized parties.
- Tampering with or introducing unauthorized elements into information systems.
- Unauthorized downloads or uploads of sensitive data.
- Unauthorized use of Universal Serial Bus, removable media, or other transfer devices.
- Downloading or installing non-approved computer applications.
- Unauthorized network access.
- Unauthorized e-mail traffic to foreign destinations.
- Denial of service attacks or suspicious network communications failures.
- Excessive and abnormal intranet browsing, beyond the individual’s duties and responsibilities, of internal file servers or other networked system contents.
- Any credible anomaly, finding, observation, or indicator associated with other activity or behavior that may also be an indicator of terrorism or espionage.
- Data exfiltrated to unauthorized domains.
- Unexplained storage of encrypted data.
- Unexplained user accounts.
- Hacking or cracking activities.
- Social engineering, electronic elicitation, e-mail spoofing or spear phishing.
- Malicious codes or blended threats such as viruses, worms, trojans, logic bombs, malware, spyware, or browser hijackers, especially those used for clandestine data exfiltration.
– – – – – – – – –
National Industrial Security Program (NISP)
NISP Operating Manual (NISPOM)
CHAPTER 3: Security Training and Briefings
Contractors shall provide all cleared employees with security training and briefings commensurate with their involvement with classified information.
Initial Security Briefings. Prior to being granted access to classified information, an employee shall receive an initial security briefing that includes the following:
a. A threat awareness briefing.
b. A defensive security briefing.
c. An overview of the security classification system.
d. Employee reporting obligations and requirements.
e. Security procedures and duties applicable to the employee’s job.
Refresher Training. The contractor shall provide all cleared employees with some form of security education and training at least annually. Refresher training shall reinforce the information provided during the initial security briefing and shall keep cleared employees informed of appropriate changes in security regulations. Training methods may include group briefings, interactive videos, dissemination of instructional materials, or other media and methods.
– – – – – – – – –
Executive Order 13587 — Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information (White House)