Across
- 2. cleared contractors should remain what
- 3. what is one method used by the bad guys to collect information
- 5. majority of suspicious contacts are from what area
- 7. what is identifying intelligence threats and developing mitigation strategies
- 8. foreign intelligence collectors are what
Down
- 1. what is it called when someone is trying to obtain information they should not have access to
- 4. what are you protecting
- 6. you report suspicious contacts to who
