verified
1. fail to report CI activities of concern as
true
outlined in encolsure 4 of DoD directive
5240.06 are subject to disciplinary action
under regulations
2. counter intelligence as defined in the national
secu- true rity act of 1947 is "information
gathered and activi- ties conducted against
espionage other intelligence activities sabotage
or assassination conducted by
or on behalf of foreign govs or elements
thereof foreign orgs or foreign persons or
international ter- rorist activites
3. foreign intelligence activities seldom use internet or false
other comms including social networking
services as a collection method
4. cyber vulnerabilities to DoD Systems may include disgruntled or co-
opted em-
ployees
weak passwords
viruses
illegal downloads
5. collection methods of operation frequently used by unsolicited
requests for infor-
foreign intelligence entities to collect mation
information from DoD on the critical international conventions sem-
techology being produced within the inar exhibits
cleared defense contractor facilities we solicitation and marketing ser-
support include vices
cyber attacks
1/
3