CI & Threat Awareness Flashcards

1
Q

What Act did President Truman sign into law that addresses CI and created the National Security Council
and the Central Intelligence Agency?

A

The National Security Act of 1947.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Counterintelligence?

A
CI is the process of:
- identifying,
- understanding,
- prioritizing, and
- counteracting foreign
intelligence threats the United States faces.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Executive Order _______ provides the legal requirement to use all reasonable and lawful means to ensure that the United States receives the best intelligence available. CI is part of this requirement.

A

12333

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What two regulations implement Executive Order 12333?

A

DoD 5200.1-R, the Information Security Program, outlines required security education and training as well as procedures for addressing compromised classified information.
DoD 5200.2-R, the Personnel Security Program, includes requirements for continuing security education and reporting requirements.
In addition, DoD Instruction 5240.6, CI Awareness, Briefing, and Reporting Programs, provides further guidance.
Special requirements for contractors are provided in DoD 5220.22-M, the National Industrial Security Program Operating Manual (NISPOM.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DoD 5220.22-M covers what?

A

the National Industrial Security Program Operating Manual (NISPOM.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What agency provides CI support to cleared defense contractors?

A

The DSS CI Office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: Information from the DSS CI office can supplement CI support from other government agencies?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You must protect any information, technology, or system that, if compromised, would:

A

� Significantly damage national security
� Alter program direction
� Compromise the program or system capabilities
� Shorten the expected life of the system
� Require research, development, testing, and evaluation to counter the loss’s
impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Technology that has both military and commercial use is called

A

dual use technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which regulations cover export controlled information?

A
  • International Traffic in Arms Regulations (ITAR)

- Export Administration Regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of CI threats

A
� Insider threats
� Threats from foreign intelligence service
� Terrorist organizations
� Criminal activities
� Business competitors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Five general categories of information collection methodologies.

A

� Human Intelligence uses people to gather information.
� Signals Intelligence involves the collection of electronic signals, including phone calls and e-mails.
� Imagery Intelligence uses satellite imagery, photographs, and other images to collect information.
� Open Source Intelligence gathers information that is legally and publically available, including information from the news media and Internet.
� Measures and Signatures Intelligence is technically derived intelligence that uses the unique characteristics of fixed and dynamic target sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Six CI collection methods

A
� Unsolicited requests
� Joint ventures and research
� Cyber threats
� Visits to facilities
� Seminars, conventions, and exhibits
� Targeting insiders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NISPOM states that contractors are required to report certain events that:

A

� Impact on the status of the facility clearance
� Impact the status of an employee’s personnel security clearance
� Affect proper safeguarding of classified information
� Indicate classified information was lost or compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What four broad categories of espionage indicators need to be reported?

A
  • recruitment
  • information collection
  • information transmittal
  • suspicious behaviors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In espionage cases, the cornerstone of the defense is often:

A

that the defendant was unaware that the stolen information was classified, export-controlled, or proprietary.

17
Q

Adversaries are interested in anything that may be used to weaken U.S. advantage. What specifically should be protected? Information, Technology, or systems that, if compromised would:

A
  • significantly damage national security
  • alter program direction
  • compromise program or system capabilities
  • shorten life span
  • require RDTE to counter impact of loss
18
Q

Technology that has both military and commercial use is known as:

A

dual-use technology

19
Q

ITAR stands for:

A

International Traffic in Arms Regulations

20
Q

Five types of collection methodologies

A
  • HUMINT
  • SIGINT
  • IMINT
  • OSINT
  • MASINT
21
Q

FBI resources include the Counterintelligence Strategic Partnership as well as InfraGard. Which of these two programs deals with Cyber Threats and Critical Infrastructure?

A

Infragard

22
Q

Counterintelligence Support Activities (organizations) in the DoD include:

A
  • AFOSI
  • INSCOM (Army Intelligence Command)
  • NCIS
  • DCIS (Defense Criminal Investigative Service)
23
Q

The first line against espionage for an organization is it’s _______________________

A

personnel

24
Q

Industry security reporting requirements are listed in the _____________

A

NISPOM, Section 1-302

25
Q

DoD security reporting requirements are listed in DoDI _____________

A

5240.6, CI Awareness, Briefing, and Reporting Programs (section 6.2)

26
Q

There are four broad reportable event categories. They are…

A
  • Recruitment
  • Information Collection (including hacking)
  • Information Transmittal
  • Suspicious Behaviors
27
Q

Imminent threats should be reported to _______________

A

the FBI