Official websites use .mil
A .mil website belongs to an official U.S. Department of Defense organization.

Secure .mil websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

​​

Insider Threat Reporting is a critical process designed to identify and mitigate potential threats posed by individuals within an organization who may misuse their authorized access to harm the organization's mission, resources, personnel, facilities, information, equipment, networks, or systems. These threats can manifest as violence, espionage, sabotage, theft, or cyber acts.

An insider threat refers to the potential for an insider to use their authorized access or knowledge to negatively impact the organization. This can include malicious, complacent, or unintentional acts that compromise the integrity, confidentiality, and availability of the organization's assets. Reporting concerning behaviors and risk indicators allows insider threat programs to take proactive measures to mitigate risks and protect the organization and its employees.

Why Report? Reporting suspicious activities or concerning behaviors is essential to deter and mitigate insider threats. Timely reporting can help reduce impacts such as financial instability, resource degradation, national security concerns, reduced mission readiness, and potential injury to persons. It is crucial to report potential insider threats to the appropriate authorities within the organization to ensure a swift and effective response.

​​ How to Report:

  • Use the provided form to report any suspicious activities or concerning behaviors.
  • Ensure that the report is detailed and includes relevant information to help the Threat Management Team assess the situation.
  • Reports will be reviewed by the appropriate authorities, and necessary actions will be taken to address the potential threat.
  • ​​
    Person of Interest - Name
    Person of Interest - Title*
    Person of Interest - Position
    Person of Interest - Phone Number
    Person of Interest – Email Address
    What, Where, When, and How do you know?
    Description of Situation
    Reporting Category
    Contact information
    Please complete this section if you want the Counter-Insider Threat Program to contact you. Provide your name, phone number and email address. Leave blank if you wish to remain anonymous.