CI & Threat Awareness Flashcards
What Act did President Truman sign into law that addresses CI and created the National Security Council
and the Central Intelligence Agency?
The National Security Act of 1947.
What is Counterintelligence?
CI is the process of: - identifying, - understanding, - prioritizing, and - counteracting foreign intelligence threats the United States faces.
Executive Order _______ provides the legal requirement to use all reasonable and lawful means to ensure that the United States receives the best intelligence available. CI is part of this requirement.
12333
What two regulations implement Executive Order 12333?
DoD 5200.1-R, the Information Security Program, outlines required security education and training as well as procedures for addressing compromised classified information.
DoD 5200.2-R, the Personnel Security Program, includes requirements for continuing security education and reporting requirements.
In addition, DoD Instruction 5240.6, CI Awareness, Briefing, and Reporting Programs, provides further guidance.
Special requirements for contractors are provided in DoD 5220.22-M, the National Industrial Security Program Operating Manual (NISPOM.)
DoD 5220.22-M covers what?
the National Industrial Security Program Operating Manual (NISPOM.)
What agency provides CI support to cleared defense contractors?
The DSS CI Office
True or False: Information from the DSS CI office can supplement CI support from other government agencies?
True
You must protect any information, technology, or system that, if compromised, would:
� Significantly damage national security
� Alter program direction
� Compromise the program or system capabilities
� Shorten the expected life of the system
� Require research, development, testing, and evaluation to counter the loss’s
impact
Technology that has both military and commercial use is called
dual use technology
Which regulations cover export controlled information?
- International Traffic in Arms Regulations (ITAR)
- Export Administration Regulations
Types of CI threats
� Insider threats � Threats from foreign intelligence service � Terrorist organizations � Criminal activities � Business competitors
Five general categories of information collection methodologies.
� Human Intelligence uses people to gather information.
� Signals Intelligence involves the collection of electronic signals, including phone calls and e-mails.
� Imagery Intelligence uses satellite imagery, photographs, and other images to collect information.
� Open Source Intelligence gathers information that is legally and publically available, including information from the news media and Internet.
� Measures and Signatures Intelligence is technically derived intelligence that uses the unique characteristics of fixed and dynamic target sources.
Six CI collection methods
� Unsolicited requests � Joint ventures and research � Cyber threats � Visits to facilities � Seminars, conventions, and exhibits � Targeting insiders
NISPOM states that contractors are required to report certain events that:
� Impact on the status of the facility clearance
� Impact the status of an employee’s personnel security clearance
� Affect proper safeguarding of classified information
� Indicate classified information was lost or compromised
What four broad categories of espionage indicators need to be reported?
- recruitment
- information collection
- information transmittal
- suspicious behaviors