Insider Threat
Reporting Requirements
Cybersecurity
Counterintelligence
Security Personnel
100

Deliberate disclosures of classified or unclassified information to the media.

What are Leaks?

100

A person with whom an individual resides and shares bonds of affection, obligation, or other commitment, as opposed to a person with whom an individual resides for reasons for convenience.

What is a Cohabitant?

100

A fraudulent email purportedly from a reputable company attempting to get personal information.

What is phishing?

100

An adversary having the intent, capability, and opportunity to cause loss or damage

What is a Threat?

100

The New Facility Security Officer (FSO)

Who is Stephanie Lezman?

200

The disclosure of classified information to persons not authorized access thereto

What is Compromise?

200

Any suspected or alleged violation of policy or of other related order, policies, procedures or applicable law, for which there is credible information

What is Compromise?

200

Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.

What is Smishing?

200

An act or acts with intent to injure, interfere with, or obstruct the national defense of a country by willfully injuring or destroying, or attempting to injure or destroy any national defense or war materiel, premises, or utilities, to include human and natural resources.

What is Sabotage?

200

Site DoD Clearance POC

Who is Bruce Willis?

300

Broadly defined, individuals with intellectual or emotional commitments to another country through cultural affinity (two words)

What is Divided Loyalty?

300

Notification of derogatory information concerning an individual who has been granted national security eligibility that is developed or otherwise becomes available to any DOD element.

What is a Referral? 

300

A type of malicious software designed to block access to a computer system until a sum of money is paid.

What is Ransomware?

300

Intelligence activity directed towards the acquisition of information through clandestine means.

What is Espionage?

300

Site Security Director

Who is Jerrica Gadsden?

400

FWAC

What is the acronym for Fraud, Waste, Abuse and Corruption?

400

A financial action of concern must be reported by all civilians and contractors with access to classified information.

What is Bankruptcy?

What is Debt?

What is Unexplained Affluence/Significant Monetary Gains?

400

Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.

What is Vishing?

400

Warning signs that an insider may be working for or is susceptible to control by a Foreign Intelligence Entity (FIE).

  • Unusual spending habits
  • Frequent contact with foreign nationals
  • Absence during critical events

What is Potential Espionage Indicators (PEIs)?

400

AS Security Director

Who is Brian Mannix?

500

Establishes the single, common adjudicative criteria for all covered individuals who require initial or continued eligibility for access to classified information or to hold a sensitive position.

What is SEAD-4?

500

This policy establishes reporting requirements for individuals who have access to classified information or hold a sensitive position,

What is SEAD-3?

500

The “A” in the C-I-A Triad. It ensures authorized users have access.

What is Availability?

500

Gaining a method of operation. access to personnel or protected information and technology via requests for, or arrangement of, peer or scientific board review of academic papers or presentations; requesting a consult with faculty members or subject matter experts; or attempting to invite or otherwise entice subject matter experts to travel abroad or consult for foreign entities.

What is Exploitation of Experts?

500

Security Vice President 

Who is Terry Phillips?

M
e
n
u