CI & Threat Awareness Flashcards
What Act did President Truman sign into law that addresses CI and created the National Security Council
and the Central Intelligence Agency?
The National Security Act of 1947.
What is Counterintelligence?
CI is the process of: - identifying, - understanding, - prioritizing, and - counteracting foreign intelligence threats the United States faces.
Executive Order _______ provides the legal requirement to use all reasonable and lawful means to ensure that the United States receives the best intelligence available. CI is part of this requirement.
12333
What two regulations implement Executive Order 12333?
DoD 5200.1-R, the Information Security Program, outlines required security education and training as well as procedures for addressing compromised classified information.
DoD 5200.2-R, the Personnel Security Program, includes requirements for continuing security education and reporting requirements.
In addition, DoD Instruction 5240.6, CI Awareness, Briefing, and Reporting Programs, provides further guidance.
Special requirements for contractors are provided in DoD 5220.22-M, the National Industrial Security Program Operating Manual (NISPOM.)
DoD 5220.22-M covers what?
the National Industrial Security Program Operating Manual (NISPOM.)
What agency provides CI support to cleared defense contractors?
The DSS CI Office
True or False: Information from the DSS CI office can supplement CI support from other government agencies?
True
You must protect any information, technology, or system that, if compromised, would:
� Significantly damage national security
� Alter program direction
� Compromise the program or system capabilities
� Shorten the expected life of the system
� Require research, development, testing, and evaluation to counter the loss’s
impact
Technology that has both military and commercial use is called
dual use technology
Which regulations cover export controlled information?
- International Traffic in Arms Regulations (ITAR)
- Export Administration Regulations
Types of CI threats
� Insider threats � Threats from foreign intelligence service � Terrorist organizations � Criminal activities � Business competitors
Five general categories of information collection methodologies.
� Human Intelligence uses people to gather information.
� Signals Intelligence involves the collection of electronic signals, including phone calls and e-mails.
� Imagery Intelligence uses satellite imagery, photographs, and other images to collect information.
� Open Source Intelligence gathers information that is legally and publically available, including information from the news media and Internet.
� Measures and Signatures Intelligence is technically derived intelligence that uses the unique characteristics of fixed and dynamic target sources.
Six CI collection methods
� Unsolicited requests � Joint ventures and research � Cyber threats � Visits to facilities � Seminars, conventions, and exhibits � Targeting insiders
NISPOM states that contractors are required to report certain events that:
� Impact on the status of the facility clearance
� Impact the status of an employee’s personnel security clearance
� Affect proper safeguarding of classified information
� Indicate classified information was lost or compromised
What four broad categories of espionage indicators need to be reported?
- recruitment
- information collection
- information transmittal
- suspicious behaviors
In espionage cases, the cornerstone of the defense is often:
that the defendant was unaware that the stolen information was classified, export-controlled, or proprietary.
Adversaries are interested in anything that may be used to weaken U.S. advantage. What specifically should be protected? Information, Technology, or systems that, if compromised would:
- significantly damage national security
- alter program direction
- compromise program or system capabilities
- shorten life span
- require RDTE to counter impact of loss
Technology that has both military and commercial use is known as:
dual-use technology
ITAR stands for:
International Traffic in Arms Regulations
Five types of collection methodologies
- HUMINT
- SIGINT
- IMINT
- OSINT
- MASINT
FBI resources include the Counterintelligence Strategic Partnership as well as InfraGard. Which of these two programs deals with Cyber Threats and Critical Infrastructure?
Infragard
Counterintelligence Support Activities (organizations) in the DoD include:
- AFOSI
- INSCOM (Army Intelligence Command)
- NCIS
- DCIS (Defense Criminal Investigative Service)
The first line against espionage for an organization is it’s _______________________
personnel
Industry security reporting requirements are listed in the _____________
NISPOM, Section 1-302
DoD security reporting requirements are listed in DoDI _____________
5240.6, CI Awareness, Briefing, and Reporting Programs (section 6.2)
There are four broad reportable event categories. They are…
- Recruitment
- Information Collection (including hacking)
- Information Transmittal
- Suspicious Behaviors
Imminent threats should be reported to _______________
the FBI