Counterintelligence Awareness

12345678
Across
  1. 2. cleared contractors should remain what
  2. 3. what is one method used by the bad guys to collect information
  3. 5. majority of suspicious contacts are from what area
  4. 7. what is identifying intelligence threats and developing mitigation strategies
  5. 8. foreign intelligence collectors are what
Down
  1. 1. what is it called when someone is trying to obtain information they should not have access to
  2. 4. what are you protecting
  3. 6. you report suspicious contacts to who