General Security Flashcards
Define Counterintelligence
Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or their agents, or international terrorist organizations or activities.
Executive Order 12333
Provides the legal requirement to use lawful means to ensure U.S. receives the best intelligence available
DoDD 5240.06, Counterintelligence Awareness and Reporting (CIAR)
Regulation mandating the reporting of suspicious activities or potential espionage indicators
DoDD 5205.16, Insider Threat Program
Regulation mandating the establishment of an insider threat program
What are the Steps of CI Risk Management?
Step 1: Identify Assets
Step 2: Identify Threats
Step 3: Identify Vulnerabilities
Step 4: Assess Risk
Step 5: Develop and Apply Countermeasures
Protect any information, technology, or system that, if compromised, would:
- Significantly damage national security
- Alter program direction
- Compromise the program or system capabilities
- Shorten the expected life of the system
- Require research, development, testing, and evaluation to counter the loss’s impact
Examples of unclassified information that requires protection
Proprietary
Personal
Critical Program Information
What is Militarily Critical Technology?
- Technology that would allow significant advances in the development, production, and use of military capabilities of potential adversaries
- DoD maintains a list of this technology
- Export is strictly controlled by the International Traffic in Arms Regulations (ITAR)
What is Dual Use Technology?
- Technology that has both military and commercial use
- May be used to develop weapons and weapons of mass destruction or other military equipment.
- Export is strictly controlled and enforced under the Export Administration Regulations
What is the greatest target of our adversaries?
Technology Assets
- Classified and Unclassified
Who enforces International Traffic in Arms Regulations (ITAR)?
The Department of State
- Dictates that information and material pertaining to Defense and military-related technologies may not be shared with foreign persons without authorization from the Department of State or special exemption
What is the purpose of International Traffic in Arms Regulations (ITAR)?
- Implements the provisions of the Arms Export Control Act (AECA)
- Controls export and import of defense-related articles and services on the U.S. Munitions List
Who enforces Export Administration Regulations (EAR)?
The Department of Commerce
What is the purpose of Export Administration Regulations (EAR)?
Restricts access to dual use items by countries or persons that might apply such items to uses against U.S. interests
List 5 Threat Types
Insider Threats
Foreign Intelligence Service Threats
Terrorist Organizations
Criminal Activities
Business Competitors