FAS

Defense Employees Told to Report Suspicious Activities

05.24.11 | 2 min read | Text by Steven Aftergood

A new counterintelligence directive (pdf) requires all Department of Defense personnel to report a wide range of suspicious activities and behavior to counterintelligence officials.  The directive effectively deputizes millions of military and civilian employees of the Department as counterintelligence agents or informants.  If they do not report any of the specified activities, they themselves could be subject to punitive action.

“Potential FIE [Foreign Intelligence Entity] threats to the DoD, its personnel, information, materiel, facilities, and activities, or to U.S. national security shall be reported by DoD personnel,” the new directive states.

“DoD personnel who fail to report information as required… may be subject to judicial or administrative action, or both, pursuant to applicable law and regulation,” it says.  See DoD Directive 5240.06, “Counterintelligence Awareness and Reporting,” May 17, 2011.

The directive lists numerous actions that are subject to mandatory reporting including “attempts to obtain classified or sensitive information by an individual not authorized to receive such information” and “requests for DoD information that make an individual suspicious, to include suspicious or questionable requests over the internet or SNS [social networking services].”

The directive employs the relatively new term “Foreign Intelligence Entity,” which includes non-governmental organizations based abroad that use intelligence techniques to gather US government information or to influence US policy.  The new phrase did not appear in the official Department of Defense Dictionary of Military and Associated Terms as recently as a year ago (pdf), though it is included in the latest edition of the Dictionary (pdf).

A Foreign Intelligence Entity is defined in the directive as “any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs.  The term includes foreign intelligence and security services and international terrorists.”

publications
See all publications
Government Capacity
Blog
The National Security Council’s Decision-Making Process: When Consensus Becomes a Constraint

The emphasis on interagency consensus, while well-intentioned, has become a structural impediment to bold or innovative policy options. When every agency effectively holds veto power over proposals, the path of least resistance becomes maintaining existing approaches with minor modifications.

01.22.25 | 4 min read
read more
Environment
Press release
Position on the Re-Introduction of H.R. 471 – The Fix Our Forests Act

The Federation of American Scientists supports H.R. 471, the re-introduction of the Fix Our Forests Act.

01.17.25 | 2 min read
read more
Emerging Technology
day one project
Policy Memo
Fighting Fakes and Liars’ Dividends: We Need To Build a National Digital Content Authentication Technologies Research Ecosystem

As people become less able to distinguish between what is real and what is fake, it has become easier than ever to be misled by synthetic content, whether by accident or with malicious intent. This makes advancing alternative countermeasures, such as technical solutions, more vital than ever before. 

01.17.25 | 12 min read
read more
Government Capacity
Blog
Herding Unicorns: Sharing Resources Speeds Hiring

Throughout this phase of work, there are many actions hiring managers and staffing specialists can take to streamline the process and improve the quality of eligible candidates. Most importantly, hiring managers and staffing specialists can collaborate within and across agencies to expedite and simplify the process.

01.17.25 | 10 min read
read more