Chapter 19 Flashcards
Why does OPSEC identify, analyze and control critical information indicating friendly actions, whether military operations or other activities
Identify actions that can be observed by adversary intelligence systems
Determine what indicators could be used to derive critical information useful to adversaries
Eliminate the vulnerabilities of friendly actions to adversary exploitation
Closely integrate and synchronize with other influence operations capabilities
_____ must be closely integrated and synchronized with other influence operations capabilities and all aspects of the protect operations
OPSEC
OPSEC is not a collection of specific rules and instructions applicable to every operation T/F
True
What is OPSEC purpose
To eliminate or reduce adversary collection and exploitation of critical information
OPSEC applies to all activities that prepare, sustain or employ forces during which phases of operations
All phases
Why should CC and other decision makers apply OPSEC analysis to the planning, preparation, execution and post execution phases of any operation or activity from the earliest stages of planning
To enhance operational effectiveness
OPSEC analysis helps decision makers weigh the ___ they will accept in specific operational circumstances
Risks
In what four situations are AF forces vulnerable to observation
At peacetime bases and locations
In training or exercises
While moving
When deployed during actual operations
Why is OPSEC incorporated into day to day operations
To ensure a seamless transition to contingency operations
What five distinct steps constitute the OPSEC process
Identify Critical information Analyze threats Analyze vulnerabilities Assess risk Apply appropriate OPSEC measures
What five basic characteristics of OPSEC indicators make them potentially valuable to an adversary
Signatures Associations Profiles Contrasts Exposure
Who is personally and individually responsible for protecting classified information and controlled unclassified Information under their custody and control
All personnel in the AF
Information is only classified to protect
National Security
What are the three levels of classified information
Top secret
Secret
Confidential
By what tow ways may information be classified
Original or derivative classification
Information classified as ___ can cause exceptionally grave damage to national security if it is disclosed
Top secret
Information classifieds as ____ can cause serious damage to national security if it is disclosed
Secret
Information classified as ___ can cause damage to national security if it is disclosed
Confidential
_____ classification is the initial decision by an original classification authority that an item of information could reasonably be expected to cause identifiable or describable damage to the national security subjected to unauthorized disclosure and requires protection in the interest of national security
Original Classification
Who may originally classify information
Only official who are designated in writing
The AF handles its classified information and Controlled Unclassified Information according to AF specific polices T/F
False
What documents provide guidance for managing classified information and controlled unclassified information
DoDM 5200.01 Volumes 1 and 4
DoDM 5200.01 Volumes 2 and 3
AFI 31-401
All cleared DoD personnel are authorized to derivatively classify information provided they have received initial training before making derivative classification decision and a refresher at least once every ___ years
Two
When is information derivatively classified
When it is incorporated, paraphrased, restated or generated in a new form or document
Photocopying, mechanically or electronically reproducing classified material is not derivative classification T/F
True
What is one of the most important respoiinsiblites of a derivative classifier
To observe and respect the classification determinations made by an original classification authority
How should all classified information be clearly identified
By marking, designation or electronic labeling
What are the purposes of marking on classified material
Alert holders to the presence of classified information
Identify the exact information needing protection
Indicate the assigned classification level
Provide any guidance on downgrading and declassification
Give information on the sources and reason for classification
Warn of special access, control or safeguarding requirements
Every classified document must be marked to show the ___ classification of information it contains
Highest
What are the three most common markings on a classified document
Banner lines
Portion marks
Classification authority block
Where are the banner lines placed on a classified document
at the top and bottom of the first page and if applicable on the front cover, title page and outside back cover or last page
What are the three most common portion marks unused on a classified document
TS - Top Secret
S Secret
C Confidential
Where is the classification authority block located on a classified document
On the face of each classified US document unless otherwise stated in DoDM 5200.01 Volumes 1-4
What are the two types of classification authority blocks for classified documents
Original classification and derivative classification
What lines appear in an original classification authority block on a classified document
Classified by
Reason
Downgrade to
Declassify on
What lines appear in a derivative classification authority block on a classified document
Classified by
Derived from
Downgrade to
D3eclassify on
What should you do if there is substantial evidence that a document has been classified erroneously
Submit challenges of classification to your security manager or the classifier of the information
Who is responsible for taking proper precautions to ensure that unauthorized persons do not gain access to classified information
Everyone who works with it
Classified information must be protected at all times by doing what
Storing it using approved means or having it under the personal observation and control of an authorized individual
What must a person have before gaining access to classified information
A security clearance
A signed Standard form 312
A need to know
Classified material must be kept under ___ surveillance by authorized persons cone removed from storage
Constant
What are the three forms used to cover classified information outside of storage
SF 703 - TS
SF 704 - S
SF 705 - C
What form is used to record end of day security checks of classified material
SF 701
What must you do if you find classified material out of proper control
Take custody of and safeguard the material
Immediately notify your commander, supervisor or security manager
What should you do if classified information appears in the public media or you are approached by a media representative
Be carful not to make any statement or comment that confirms its accuracy or verifies the information
What sanctions are DoD military and civilian personnel subject to if they knowingly, willfully or negligently disclose classified information to unauthorized persons
Sanctions include Warning, reprimand, suspension without pay, forfeiture of pay, removal, discharge, loss or denial of access to classified information , removal of classification authority, and actions taken under the UCM and under applicable criminal laws
Who is responsible for determining at origination whether the information may qualify for Controlled Unclassified Information status
The originator of a document
What is the most commonly used Controlled Unclassified Information Category
FOUO
FOUO is a ____ control applied by the DoD to unclassified information when disclosure to the public of that particular record, or portion thereof, would reasonably be expected to cause foreseeable harm to an interest protected by one or more the freedom of information Act exception 2 through 9
Dissemination
When may a person access information designated as FOUO
If he or she has a valid need for access in connection with the accomplishment of a lawful and authorized government purpose
With whom rests the final reasonability for determining whether an individual has a valid need for access to information designated for official us Only status
The individual who has authorized possession , knowledge or control of the information
During work hours, how should For official Use information be stored
Reasonable steps shall be taken to minimize the risk of access by authorized person
If a building is provided security by government or government contract personnel, where should for official Use only Info be stored after working hours
Unlocked containers, desks or cabinets
What program determines the reliability, trustworthiness, good conduct and character of individuals before they have access to classified information or are assigned to sensitive duties
The personnel Security Program
Once you receive a security clearance, are you subject to continual assessment of trustworthiness
Yes
Who grants denies and revokes security clearance eligibility
The DoD Central Adjudication Faculty
Personnel security clearances are recorded within what system
The Joint Personnel Adjudication System (JPAS)
What is the AF policy on industrial security
To specify in its classified contracts government information and sensitive resources that must be protected against compromise or loss while entrusted to industry
Which AFI assigns functional responsibilities and establishes a system of review that identifies outdated inappropriate and unnecessary contractual security requirements
AFI 31-601