UPDATE 2015-03-07: from US DoD PERSEREC: Counterintelligence Reporting Essentials (CORE) – A Practical Guide for Reporting Counterintelligence and Security Indicators (.pdf, 2005; mirror) and Reporting of Counterintelligence and Security Indicators by Supervisors and Coworkers (.pdf, 2005; mirror).
The below is an excerpt from the United States DoD Directive 5240.06 on Counterintelligence Awareness and Reporting (CIAR) (.pdf, 2011; updated 2017; mirror) as published at
www.dtic.mil www.esd.whs.mil: “All DoD personnel shall receive CIAR training in accordance with this Directive (…) within 90 days of initial assignment or employment (…) and every 12 months thereafter“. Table 3 is specifically related to cyber threats.
5. REPORTABLE CONTACTS, ACTIVITIES, INDICATORS, AND BEHAVIORS.
Tables 1 through 3 contain reportable contacts, activities, indicators, behaviors, and cyber threats associated with FIEs.
a. Table 1. Personnel who fail to report the contacts, activities, indicators, and behaviors in items 1 through 22 are subject to punitive action in accordance with section 2 of this enclosure. The activities in items 23 and 24 are reportable, but failure to report these activities may not alone serve as the basis for punitive action.
Table 1. Reportable Foreign Intelligence Contacts, Activities, Indicators, and Behaviors
- When not related to official duties, contact with anyone known or believed to have information of planned, attempted, actual, or suspected espionage, sabotage, subversion, or other intelligence activities against DoD facilities, organizations, personnel, or information systems. This includes contact through SNS that is not related to official duties.
- Contact with an individual who is known or suspected of being associated with a foreign intelligence or security organization.
- Visits to foreign diplomatic facilities that are unexplained or inconsistent with an individual’s official duties.
- Acquiring, or permitting others to acquire, unauthorized access to classified or sensitive information systems.
- Attempts to obtain classified or sensitive information by an individual not authorized to receive such information.
- Persons attempting to obtain access to sensitive information inconsistent with their duty requirements.
- Attempting to expand access to classified information by volunteering for assignments or duties beyond the normal scope of responsibilities.
- Discovery of suspected listening or surveillance devices in classified or secure areas.
- Unauthorized possession or operation of cameras, recording devices, computers, and communication devices where classified information is handled or stored.
- Discussions of classified information over a non-secure communication device.
- Reading or discussing classified or sensitive information in a location where such activity is not permitted.
- Transmitting or transporting classified information by unsecured or unauthorized means.
- Removing or sending classified or sensitive material out of secured areas without proper authorization.
- Unauthorized storage of classified material, regardless of medium or location, to include unauthorized storage of classified material at home.
- Unauthorized copying, printing, faxing, e-mailing, or transmitting classified material.
- Improperly removing classification markings from documents or improperly changing classification markings on documents.
- Unwarranted work outside of normal duty hours.
- Attempts to entice co-workers into criminal situations that could lead to blackmail or extortion.
- Attempts to entice DoD personnel or contractors into situations that could place them in a compromising position.
- Attempts to place DoD personnel or contractors under obligation through special treatment, favors, gifts, or money.
- Requests for witness signatures certifying the destruction of classified information when the witness did not observe the destruction.
- Requests for DoD information that make an individual suspicious, to include suspicious or questionable requests over the internet or SNS.
- Trips to foreign countries that are: a. Short trips inconsistent with logical vacation travel or not part of official duties. b. Trips inconsistent with an individual’s financial ability and official duties.
- Unexplained or undue affluence. a. Expensive purchases an individual’s income does not logically support. b. Attempts to explain wealth by reference to an inheritance, luck in gambling, or a successful business venture. c. Sudden reversal of a bad financial situation or repayment of large debts.
b. Table 2. Personnel who fail to report the contacts, activities, indicators, and behaviors in items 1 through 9 are subject to punitive action in accordance with section 2 of this enclosure. The activity in item 10 is reportable, but failure to report this activity may not alone serve as the basis for punitive action.
Table 2. Reportable International Terrorism Contacts, Activities, Indicators, and Behaviors
- Advocating violence, the threat of violence, or the use of force to achieve goals on behalf of a known or suspected international terrorist organization.
- Advocating support for a known or suspected international terrorist organizations or objectives.
- Providing financial or other material support to a known or suspected international terrorist organization or to someone suspected of being an international terrorist.
- Procuring supplies and equipment, to include purchasing bomb making materials or obtaining information about the construction of explosives, on behalf of a known or suspected international terrorist organization.
- Contact, association, or connections to known or suspected international terrorists, including online, e-mail, and social networking contacts.
- Expressing an obligation to engage in violence in support of known or suspected international terrorism or inciting others to do the same.
- Any attempt to recruit personnel on behalf of a known or suspected international terrorist organization or for terrorist activities.
- Collecting intelligence, including information regarding installation security, on behalf of a known or suspected international terrorist organization.
- Familial ties, or other close associations, to known or suspected international terrorists or terrorist supporters.
- Repeated browsing or visiting known or suspected international terrorist websites that promote or advocate violence directed against the United States or U.S. forces, or that promote international terrorism or terrorist themes, without official sanction in the performance of duty.
c. Table 3. Personnel who fail to report the contacts, activities, indicators, and behaviors in items 1 through 10 are subject to punitive action in accordance with section 2 of this enclosure. The indicators in items 11 through 19 are reportable, but failure to report these indicators may not alone serve as the basis for punitive action.
Table 3. Reportable FIE-Associated Cyberspace Contacts, Activities, Indicators, and Behaviors
- Actual or attempted unauthorized access into U.S. automated information systems and unauthorized transmissions of classified or controlled unclassified information.
- Password cracking, key logging, encryption, steganography, privilege escalation, and account masquerading.
- Network spillage incidents or information compromise.
- Use of DoD account credentials by unauthorized parties.
- Tampering with or introducing unauthorized elements into information systems.
- Unauthorized downloads or uploads of sensitive data.
- Unauthorized use of Universal Serial Bus, removable media, or other transfer devices.
- Downloading or installing non-approved computer applications.
- Unauthorized network access.
- Unauthorized e-mail traffic to foreign destinations.
- Denial of service attacks or suspicious network communications failures.
- Excessive and abnormal intranet browsing, beyond the individual’s duties and responsibilities, of internal file servers or other networked system contents.
- Any credible anomaly, finding, observation, or indicator associated with other activity or behavior that may also be an indicator of terrorism or espionage.
- Data exfiltrated to unauthorized domains.
- Unexplained storage of encrypted data.
- Unexplained user accounts.
- Hacking or cracking activities.
- Social engineering, electronic elicitation, e-mail spoofing or spear phishing.
- Malicious codes or blended threats such as viruses, worms, trojans, logic bombs, malware, spyware, or browser hijackers, especially those used for clandestine data exfiltration.