FOREIGN INTEL THREAT (ATFP-2001A) Flashcards
DEFINE FOREIGN INTELLIGENCE ENTITY
A FOREIGN ORGANIZATION, PERSON, OR GROUP THAT CONDUCTS INTELLIGENCE ACTIVITIES TO ACQUIRE U.S. INFORMATION, BLOCK, OR IMPAIR U.S. INTELLIGENCE COLLECTION, INFLUENCE U.S. POLICY, DISRUPT U.S. SYSTEMS AND PROGRAMS, OR GAIN A COMPETITIVE EDGE
DEFINE ESPIONAGE
IS THE ACT OF OBTAINING, DELIVERING, TRANSMITTING, COMMUNICATING, OR RECEIVING INFORMATION IN RESPECT TO THE NATIONAL DEFENSE WITH AN INTENT OR REASON TO BELIEVE THAT THE INFORMATION COULD BE USED TO THE INJURY OF THE U.S. OR TO THE ADVANTAGE OF ANY FOREIGN NATION
DEFINE INSIDER THREAT
IS THE THREAT THAT AN INSIDER—ANY PERSON WITH AUTHORIZED ACCESS TO ANY U.S. GOVERNMENT RESOURCE, TO INCLUDE PERSONNEL, FACILITIES, INFORMATION, EQUIPMENT, NETWORKS, OR SYSTEMS—WILL USE HIS/HER AUTHORIZED ACCESS, WITTINGLY OR UNWITTINGLY, TO DO HARM TO THE SECURITY OF THE U.S.
IDENTIFY TRADITIONAL INTELLIGENCE COLLECTION METHODS
-OPEN-SOURCE INTEL (OSINT): NEWSPAPERS & BLOGS, MEDIA & PHOTOS, MAPS & GOOGLE SEARCHES, SOCIAL MEDIA/APPS
-OSINT CAN BE USED TO PROVIDE INFO ABOUT PERSONAL INTERESTS, PREFERENCES, MOTIVATIONS, ACTIVITIES, AND PROVIDE ADDITIONAL TARGETS AND POTENTIAL VULNERABILITIES
-HUMAN INTEL (HUMINT): ELICIATION, EAVESDROPPING/ELECTRONIC SURVEILLANCE, RECRUITMENT
IDENTIFY THE FOREIGN INTELLIGENCE RECRUITMENT CYCLE
SPOTTING: IDENTIFYING A POTENTIAL TARGET. ASSESSING: DETERMINING PLACEMENT AND ACCESS. DEVELOPING: DETERMINING SUSCEPTIBILITY TO RECRUITMENT
RECRUITMENT: ESTABLISHING CLANDESTINE RELATIONSHIP
HANDLING: CONTROLLING, DIRECTING, TRAINING, AND TESTING
TERMINATION: ENDING THE CLANDESTINE RELATIONSHIP
IDENTIFY THE PRIME INTELLIGENCE TARGETS FOR A FOREIGN INTELLIGENCE ENTITY
-CONTRACTORS, COMMUNICATORS, SECRETARIES, FOREIGN SERVICE NATIONALS, DOD PERSONNEL/MSGS
-PLACEMENT INDICATES THAT A PERSON WORKS IN OR IS ASSOCIATED WITH A PLACE OR ORGANIZATION THAT DEALS WITH SENSITIVE OR CLASSIFIED MATERIAL.
-ACCESS INDICATES THE PERSON PLACED IN A SENSITIVE POSITION ALSO CAN OBTAIN SENSITIVE OR CLASSIFIED INFORMATION.
IDENTIFY THE MOTIVATORS FOR COMMITTING ESPIONAGE
-IDEOLOGY & PERSONAL GAIN
-PROTECTION OF SELF/FAMILY TIES
-FEAR, REVENGE, & MENTAL INSTABILITY
IDENTIFY INDICATORS THAT A PERSON IS COMMITTING ESPIONAGE
-DISGRUNTLED, DIVIDED LOYALTIES, WORKING ODD HOURS
-UNAUTHORIZED REMOVAL OF CLASSIFIED MATERIAL
-UNAUTHORIZED DEVICES, NO NEED-TO-KNOW
-SEEKING INFORMATION & UNECCESSARY COPYING
-UNEXPLAINED AFFLUENCE, BRAGGING, FOREIGN TRAVEL, & UNREPORTED CONTACTS
IDENTIFY WAYS TO PROTECT AGAINST FOREIGN ESPIONAGE
-THINK BEFORE YOU TALK/LIMIT INFO YOU POST
-NEVER SPEAK ABOUT SENSITIVE INFO IN PUBLIC
-SHRED SENSITIVE INFO, PII
-AVOID COMPROMISING SITUATIONS
-BE SUSPICIOUS OF CASUAL ACQUAINTANCES AND QUICK FRIENDSHIPS
-UPDATE AND USE SECURITY SOFTWARE
-FOLLOW THE NEED-TO-KNOW PRINCIPLE
-FOLLOW ALL SECURITY AND IA POLICIES