General Security Flashcards

1
Q

Define Counterintelligence

A

Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or their agents, or international terrorist organizations or activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Executive Order 12333

A

Provides the legal requirement to use lawful means to ensure U.S. receives the best intelligence available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DoDD 5240.06, Counterintelligence Awareness and Reporting (CIAR)

A

Regulation mandating the reporting of suspicious activities or potential espionage indicators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DoDD 5205.16, Insider Threat Program

A

Regulation mandating the establishment of an insider threat program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the Steps of CI Risk Management?

A

Step 1: Identify Assets

Step 2: Identify Threats

Step 3: Identify Vulnerabilities

Step 4: Assess Risk

Step 5: Develop and Apply Countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protect any information, technology, or system that, if compromised, would:

A
  • Significantly damage national security
  • Alter program direction
  • Compromise the program or system capabilities
  • Shorten the expected life of the system
  • Require research, development, testing, and evaluation to counter the loss’s impact
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Examples of unclassified information that requires protection

A

Proprietary

Personal

Critical Program Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Militarily Critical Technology?

A
  • Technology that would allow significant advances in the development, production, and use of military capabilities of potential adversaries
  • DoD maintains a list of this technology
  • Export is strictly controlled by the International Traffic in Arms Regulations (ITAR)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Dual Use Technology?

A
  • Technology that has both military and commercial use
  • May be used to develop weapons and weapons of mass destruction or other military equipment.
  • Export is strictly controlled and enforced under the Export Administration Regulations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the greatest target of our adversaries?

A

Technology Assets

  • Classified and Unclassified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who enforces International Traffic in Arms Regulations (ITAR)?

A

The Department of State

  • Dictates that information and material pertaining to Defense and military-related technologies may not be shared with foreign persons without authorization from the Department of State or special exemption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of International Traffic in Arms Regulations (ITAR)?

A
  • Implements the provisions of the Arms Export Control Act (AECA)
  • Controls export and import of defense-related articles and services on the U.S. Munitions List
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who enforces Export Administration Regulations (EAR)?

A

The Department of Commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of Export Administration Regulations (EAR)?

A

Restricts access to dual use items by countries or persons that might apply such items to uses against U.S. interests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List 5 Threat Types

A

Insider Threats

Foreign Intelligence Service Threats

Terrorist Organizations

Criminal Activities

Business Competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name the 5 Categories of Information Collection Methodologies

A
  • Human Intelligence - Uses people to gather information
  • Signals Intelligence - Electronic signals, including phone calls and e-mails
  • Imagery Intelligence - Satellite imagery, photographs, and other images to collect information
  • Open Source Intelligence - Information that is legally and publically available, including information from the news media and Internet
  • Measures and Signatures Intelligence - Technically derived intelligence that uses the unique characteristics of fixed and dynamic target sources
17
Q

Name 3 Foreign Intelligence Collection Methods

A
  • Unsolicited requests
  • Joint ventures and research
  • Cyber threats
  • Visits to facilities
  • Conferences, conventions, and trade shows
  • Targeting insiders
18
Q

What is the most frequently reported method of operation associated with foreign collection activity?

A

Unsolicited Requests

  • Involve emailing, phoning, or mailing directly to individual U.S. individuals rather than to corporate marketing departments
19
Q

Name 4 potential indicators of an unsolicited requestor

A
  • Foreign address
  • Never met recipient
  • Identifies self as a student or consultant
  • Identifies employer as a foreign government
  • States that work is being done for a foreign government or program
  • Asks about a technology related to a Defense program, project, or contract
  • Asks questions about Defense-related programs using acronyms specific to the program
  • Insinuates the third party he/she works for is “classified” or otherwise sensitive
  • Admits he/she could not get the information elsewhere because it was classified or controlled
  • Advises recipient to disregard the request if it causes a security problem
  • Advises recipient not to worry about security concerns
  • Assures recipient that export licenses are not required or not a problem
20
Q

How should one protect against unsolicited requests?

A
  • View unsolicited requests with suspicion, especially those received on the Internet
  • Respond only to people who are known after verifying their identity and address
  • If the requester cannot be verified, do not respond in any way and report the incident to security personnel
21
Q

What might be considered suspicious or inappropriate conduct during visits by foreigners?

A
  • Requests for information outside the scope of what was approved for discussion
  • Hidden agendas associated with the stated purpose of the visit
  • Visitors/students requesting information and becoming irate upon denial
  • Individuals bringing cameras and/or video equipment into areas where no photographs are allowed
22
Q

Examples on how to protect against unauthorized access by foreign visitors

A

Contractors may coordinate with DCSA prior to visit

  • Prior to visit, brief hosts and escorts on approved procedures
  • Walk visitor route and identify vulnerabilities
  • Prior to the visit, notify all employees about the visit, restrictions on the visitors and the nature of the threat
  • Debrief personnel in contact with visitors
  • Ensure visitors do not bring recording devices, including cell phones, into the facility
  • Develop a Technology Control Plan (TCP), that: - Stipulates how a company will control access to its exportcontrolled technology - Outlines the specific information authorized for release - May be required by the National Industrial Security Program Operating Manual (NISPOM) and the International Traffic in Arms Regulations (ITAR) under certain circumstances - Protects: o Classified and export-controlled information o Control access by foreign visitors o Control access by employees who are foreign persons
23
Q

During a foreign visit, restrict the following:

A

Foreign visitors request for:

  • Access to a local area network (LAN)
  • Unrestricted facility access
  • Company personnel information
  • Mailing or faxing documents written in a foreign language to a foreign embassy or foreign country
24
Q

Examples of countermeasues during foreign visits

A
  • Review all documents being faxed or mailed - use a translator, when necessary
  • Provide foreign representatives with stand-alone computers
  • Share the minimum amount of information appropriate to the scope of the joint venture/research
  • Educate employees extensively
  • Handle and report elicitation
  • Provide sustainment training
  • Refuse to accept unnecessary foreign representatives into the facility
  • Develop a TCP
25
Q

Define Actual Compromise

A

An unauthorized disclosure of information

26
Q

Define Potential Compromise

A

Possibility that compromise could exist but it is not known with certainty.

27
Q

Define Communications Security (COMSEC)

A

Protection measures designed to secure information derived from the possession or study of communications (telephonic/IT) to ensure the authenticity of such communications

28
Q

What is the DD Form 2501?

A

Courier Authorization Card

29
Q

List the 4 Identification levels of Assets and Threats

A

Critical

High

Medium

Low

30
Q

List 5 General Types of Vulnerabilities

A

Human

Operational

Information

Facility

Equipment

31
Q

List 3 Types of Countermeasures

A

Manpower

Equipment

Procedural

32
Q

List 3 Types of Countermeasures

A

Manpower

Equipment

Procedural

33
Q

OPSEC:

What question should be asked when trying to Identify Assets (Step 1)?

A

What requires protection?

34
Q

OPSEC:

What questions should be asked when Identifying Threats (Step 2)?

A

Can you identify your adversaries?

Do you know the capabilities and intentions of these adversaries?

Which of these are threats to your security program?

35
Q

OPSEC:

What questions should be asked when Identifying Vulnerabilities (Step 3)?

A

What types of weaknesses exist that create vulnerabilities?

36
Q

OPSEC:

What questions should be asked when Assessing Risk (Step 4)?

A

What is the impact of your assets being compromised?

What is the worst that could happen?

37
Q

OPSEC:

What question should be asked when Developing and Applying Countermeasures (Step 5)?

A

What countermeasures can I develop and apply to mitigate concerns?