Which of the following must be reported to the Defense Counterintelligence and security Agency

Which of the following must be reported to the defense counterintelligence and security Agency and the FBI?

The following must be reported to the defense counterintelligence and security Agency and the FBI: Close and continuing associations with foreign nationals, [ Contact with an individual who is known or suspected of being associated with a foreign intelligence or security organization, and Attempts to obtain classified or sensitive information by an individual not authorized to receive such information. ]

Question

Asked 8/20/2020 7:57:26 PM

0 Answers/Comments

This answer has been confirmed as correct and helpful.

Rating

There are no new answers.

Try the new Google Books

Check out the new look and enjoy easier access to your favorite features


Page 2

rity. They also include sensitive ligence program to the security

In August 1988, as another

economic information and propriecountermeasures employed by de

step designed to increase espio- tary technologies of America's prifense contractors. Under this pro

nage awareness, the Industrial Se- vate sector. These technologies may gram, FBI resources are focused on curity Awareness Council (ISAC)

never be classified, but their loss the spys' targets-U.S. employees was formed. ISAC is a joint Gov

could have a negative impact on with access to classified informa- ernment/private sector working

ernment/private sector working those companies who developed tion—not on the intelligence officer

group whose membership includes them. A loss in the private sector, or the diplomatic establishment.

the Defense Investigative Service if significant enough to threaten The DECA Program operates (DIS), the FBI, and 11 defense a company's survival, could also in all 56 FBI Field Offices. In each contractors.

endanger national security. office, a DECA coordinator admini- ISAC's goal is to promote

The successes achieved by sters the program. The coordinator's security awareness in the defense Soviet and other foreign intelligence primary responsibility is to visit firms industry by focusing on the collec- services during the 1980s serve to that have been awarded classified tive resources of industry and gov- reinforce the fact that counterintellicontracts to update them on current ernment. Its members share aware- gence is a strategic issue that reforeign intelligence threats.

ness resources, thereby reducing quires a coordinated, effective naBecause of the dramatic in

tional response. Because the world crease in the threat posed by foreign

is so complex and is in a constant intelligence services, the focus of 66

state of flux, the FBI must be able the DECA Program has been ex

...DECA

to articulate clearly this evolving panded to now include American

intelligence threat and work with firms not engaged in classified gov

coordinators are America's private sector to meet ernment contracts and the public in now providing today's counterintelligence chalgeneral. Also, with the increase in espionage briefings lenges successfully. LEB exchange programs among Soviet

to...local police and East European governments departments. and U.S. Government agencies and

David Remnick, The Washington Post, local law enforcement agencies,

99 June 13, 1989, p. A 1.

- Ibid. DECA coordinators are now pro

Nicholas Daniloff, "Reforms In Soviet viding espionage briefings to other needless duplication of efforts that

Union Only Increase Appetites For Secrets

From The West,Los Angeles Times, August 9, Federal agencies and local police occur when companies operate 1989. departments. alone, without coordination and co

+ Hughes Aircraft Company, A Counterintel

ligence Awareness Primer, 1987, p. 5. At the beginning of 1990, the operation. This concept has since Hughes Aircraft Company and the FBI FBI appointed a national DECA been expanded by DIS and the FBI

jointly produced a video entitled “Espionage

2000." This 30-minute video contains coordinator (NDC) to manage the to other regions of the country and interviews of experts in the counterintelligence program throughout the country. A plans are in progress to make it a

and security countermeasures fields discussing

important awareness issues. It is available to short time later, a national DECA national organization.

any government agency or defense contractor advisory committee was organized.

for use in espionage awareness programs by

contacting the FBI, the Defense Investigative This committee, composed of DECA Conclusion

Service, or the Hughes Aircraft Company. coordinators from the larger FBI field The United States continues to

6 The 11 defense contractors are Aerospace

Corporation, Hughes Aircraft Company, Jet offices, assists the NDC with the have secrets that some foreign pow- Propulsion Laboratory, Lockheed Aeronautical ulation and implementation of ers seek and are willing to steal.

Systems Company, Logicon, McDonnell

Douglas Corporation, Northrop Corporation, DECA goals, training, slides, vid- These secrets go beyond the strate- Rockwell International Corporation, Science eos, and literature. gic military and technological infor

Applications International, Trident Data Corporation, and TRW.

What must be reported to the Defense Counterintelligence and Security Agency?

Cleared contractors must also report actual, probable, or possible espionage, sabotage, terrorism, or subversion promptly to the Federal Bureau of Investigation (FBI) and DCSA (NISPOM 1-301).

What does Defense counterintelligence and security agency do?

The Defense Counterintelligence and Security Agency provides industrial security engagement and counterintelligence support to secure the trustworthiness of the U.S. government's workforce, contract support, technologies, services, and supply chains.

What is the role of reporting in counterintelligence and threat awareness?

If you suspect you may have been targeted, report it immediately. Recognizing and reporting indicators is critical to disrupting CI threats and mitigating risks. Reporting allows us to share and address risks together.

Which of the following would be considered insider threat?

An insider threat is any employee, vendor, executive, contractor, or other person who works directly with an organization. A malicious insider is one that misuses data for the purpose of harming the organization intentionally.