Vocab 9 - Protecting Assets in the NISP (Glossary) Flashcards

1
Q

Access

A

The ability and opportunity to obtain knowledge of classified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Acquisition Special Access Program (ASAP)

A

A Special Access Program (SAP) established primarily to protect sensitive research, development, testing, and evaluation or procurement activities in support of sensitive military and intelligence requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Acquisition Systems Protection (ASP)

A

The safeguarding of defense systems anywhere in the acquisition process as defined in Department of Defense (DoD) Directive 5000.1; defense technologies being developed that could lead to weapon or defense systems; and defense research data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Adjudication

A

Evaluation of personnel security investigations and other relevant information to determine if it is clearly consistent with the interests of national security for persons to be granted or retain eligibility for access to classified information and continue to hold positions requiring a trustworthiness decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Adjudication Facility

A

A facility with assigned adjudicators certified to evaluate
Personnel Security Investigations (PSI) and other relevant information to determine if granting or continuing national security eligibility is clearly consistent with the interests of national security. The DoD consolidated adjudications facility is known as the DoD Central Adjudication Facility (CAF).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Alternative Compensatory Control Measures (ACCM)

A

Measures designed to safeguard sensitive intelligence and operations when normal security measures are either not sufficient to achieve strict controls over access to information or where strict SAP access controls are either not required or are too stringent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Analysis

A

The process by which information is transformed into intelligence; a systemic examination of information to identify significant facts, make judgments, and draw conclusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Anomaly

A

Activity or knowledge, outside the norm, that suggests a foreign entity has foreknowledge of U.S. information, processes, or capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Antiterrorism (AT)

A

Defensive measures used to reduce the vulnerability of individuals and property to terrorist acts, to include rapid containment by local military and civilian forces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Assets

A

A person, structure, facility, information, material, or process that has value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Caveat

A

A designator used with or without a security classification to further limit the dissemination of restricted information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Central Intelligence Agency (CIA)

A

An independent U.S. Government agency responsible for providing national security intelligence to senior U.S. policymakers. Primary mission: collect, analyze, evaluate, and disseminate foreign intelligence to assist the President and senior U.S. government policymakers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Classification

A

The determination that official information requires, in the interests of national security, a specific degree of protection against unauthorized disclosure, coupled with a designation signifying that such a determination has been made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Classified Information

A

Information that has been determined pursuant to Executive Order (EO) 13526, or any successor order, EO 12951, or any successor order, or the Atomic Energy Act of 1954 (42 U.S.C. 2011) to require protection against
unauthorized disclosure and that is marked to indicate its classified status when indocumentary form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Classified Information Spillage

A

Security incident that occurs whenever classified data is spilled either onto an unclassified information system or to an information system with a lower level of classification or different security category.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Clearance

A

Formal security determination by an authorized adjudicative office that an individual has authorized access, on a need to know basis, to a specific level of
collateral classified information (TOP SECRET, SECRET, CONFIDENTIAL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cleared Contractor (CC)

A

A person or facility operating under the National Industrial Security Program (NISP) that has had an administrative determination that they are eligible, from a security point of view, for access to classified information of a certain level (and all lower levels).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cleared Contractor Facility

A

Any industrial, educational, commercial facility, or other

entity that has been granted a facility security clearance under the U.S. NISP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cleared Defense Contractor (CDC)

A

A subset of contractors cleared under the NISP who have contracts with the Department of Defense. Therefore, not all cleared contractors have contracts with DoD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cleared Employee

A

A person who has been granted access to classified information, other than the President and Vice President, employed by, or detailed or assigned to, a
department or agency, including members of the Armed Forces; an expert or consultant to a department or agency; an industrial or commercial contractor, licensee, certificate holder, or grantee of a department or agency, including all subcontractors; a personal services contractor; or any other category of person who acts for or on behalf of a department or agency as determined by the appropriate department or agency head.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Communications Security (COMSEC)

A

The protection resulting from all measures designed to deny unauthorized persons’ information of value that might be derived from the possession and study of telecommunications or to mislead unauthorized persons in their interpretation of the results of such possession and study.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Compromise

A

An unauthorized disclosure of classified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Contact

A

Any form of meeting, association, or communication in person by radio, telephone, letter, computer, or other means, regardless of who initiated the contact for social, official, private, or other reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Confidential

A

Confidential information is information or material of which unauthorized disclosure could reasonably be expected to cause damage to the national security that the Original Classification Authority (OCA) is able to identify or describe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Counterintelligence (CI)

A

Information gathered and activities conducted to identify,
deceive, exploit, disrupt, or protect against espionage or other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons or their agents, or international terrorist organizations or activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Countermeasure

A

The employment of devices or techniques that impair the operational effectiveness of enemy activity. Countermeasures may include anything that effectively negates an adversary’s ability to exploit vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Critical Program Information (CPI)

A

U.S. capability elements that contribute to the warfighters technical advantage, which if compromised, undermines U.S. military preeminence. U.S. capability elements may include, but are not limited to, software
algorithms and specific hardware residing on the system, its training equipment, or maintenance support equipment.

28
Q

Critical Technology

A

Technology or technologies essential to the design,
development, production, operation, application, or maintenance of an article or service that makes or could make a significant contribution to the military potential of any country, including the U.S.

29
Q

Damage Assessment

A

A determination of the effect of a compromise of classified information on national security.

30
Q

Declassification

A

The authorized change in the status of information from classified information to unclassified information.

31
Q

Defense Advanced Research Projects Agency (DARPA)

A

A Defense Agency that serves as the research and development (R&D) organization in DoD with a primary
responsibility of maintaining U.S. technological superiority over our adversaries.

32
Q

Defense Industrial Base (DIB)

A

The Department of Defense, government, and private sector worldwide industrial complex with capabilities to perform research and development and design, produce, and maintain military weapon systems,
subsystems, components, or parts to meet military requirements.

33
Q

Department of Homeland Security (DHS)

A

A cabinet department of the U.S. federal government. DHS has five missions: (1) Prevent terrorism and enhance security; (2) Secure and manage U.S. boarders; (3) Enforce and administer immigration laws; (4) Safeguard and secure cyberspace; and (5) Ensure resilience to disasters.

34
Q

Defense Intelligence Agency (DIA)

A

A DoD agency and a member of the U.S. Intelligence Community responsible for providing timely, objective, and cogent military intelligence to warfighters, defense planners, and defense and national security policymakers.

35
Q

Defense Personnel Security Research Center (PERSEREC)

A

A DoD entity dedicated to improving the effectiveness, efficiency, and fairness of the DoD personnel security
system.

36
Q

Deliberate Compromise

A

The act, attempt, or contemplation of intentionally conveying classified documents, information, or material to any unauthorized person, including public disclosure, or the intentional misuse or mishandling of classified information.

37
Q

Dual-use

A

Technology and articles that are potentially used either for commercial/civilian purposes or for military, defense, or defense-related purposes.

38
Q

Economic Espionage

A

The knowing misappropriation of trade secrets with the
knowledge or intent that the offense will benefit a foreign government, foreign instrumentality, or foreign agent. Misappropriation includes, but is not limited to, stealing, copying, altering, destroying, transmitting, sending, receiving, buying, possessing, or conspiring to obtain trade secrets without authorization.

39
Q

Economic Espionage Act (EEA)

A

The Economic Espionage Act of 1996 criminalizes two
forms of trade secret theft: 1) theft for the benefit of a foreign entity (economic espionage – 18 U.S. Code §1831) and 2) theft for pecuniary gain (theft of trade secrets – 18 U.S. Code §1832), commonly referred to as industrial espionage.

40
Q

Elicitation

A

In intelligence usage, the acquisition of information from a person or group in a manner that does not disclose the intent of the interview or conversation.

41
Q

Employee

A

For purposes of the National Insider Threat Policy, “employee” has the meaning provided in section 1.1(e) of EO 12968; specifically: a person, other than the
President and Vice President, employed by, detailed or assigned to, a department or agency, including members of the Armed Forces; an expert or consultant to a department or agency; an industrial or commercial contractor, licensee, certificate holder, or grantee of a department or agency, including all subcontractors; a personal services contractor; or
any other category of person who acts for or on behalf of a department or agency as determined by the appropriate department or agency head.

42
Q

Espionage

A

Espionage is a national security crime; specifically, it violates Title 18 USC, §§ 792-798 and Article 106a, Uniform Code of Military Justice (UCMJ). Espionage
convictions require the transmittal of national defense information with intent to aid a foreign power or harm the U.S. However, even gathering, collecting, or losing national defense information can be prosecuted under Title 18.

43
Q

Espionage Indicators

A

Warning signs that an insider may be working for or is
susceptible to control by a Foreign Intelligence Entity (FIE). These warning signs are the result of an insider’s actions, activities, and behaviors that may be indicative of potential espionage-related activity.

44
Q

Essential Elements of Friendly Information (EEFI)

A

Key questions likely to be asked by adversary officials and intelligence systems about specific friendly intentions, capabilities, and activities, so they can obtain answers critical to their operational effectiveness.

45
Q

Executive Order 12333

A

Authorizes elements of the Intelligence Community to collect, retain, or disseminate information concerning U.S. persons only in accordance with procedures established by the head of the Intelligence Community element concerned or by the head of a department containing such element and approved by the Attorney General.

46
Q

Export Administration Regulations (EAR)

A

EAR-controlled items are those that can be

used both in military and other strategic uses and in commercial applications.

47
Q

Facility Security Officer (FSO)

A

The security officer for a cleared defense contractor
facility; the FSO supervises and directs security measures necessary for implementing requirements for classified information.

48
Q

FIVE EYES (FVEY)

A

Australia, Canada, New Zealand, United Kingdom, and the US.

49
Q

Foreign Intelligence Entity (FIE)

A

Any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair US intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs.

50
Q

Foreign Intelligence Threat

A

The all-source intelligence threat posed by foreign

intelligence entities to U.S. interests.

51
Q

Foreign Interest

A

Any foreign government, agency of a foreign government, or representative of a foreign government; any form of business enterprise or legal entity organized, chartered or incorporated under the laws of any country other than the U.S. or its territories, and any person who is not a citizen or national of the U.S.

52
Q

Foreign Military Sales (FMS)

A

That portion of U.S. security assistance for sales
programs that require agreements/contracts between the U.S. Government and an authorized recipient government or international organization for defense articles and services to be provided to the recipient for current stocks or new procurements under DoD-managed contracts, regardless of the source of financing.

53
Q

Foreign Ownership, Control or Influence (FOCI)

A

A U.S. company is considered
under foreign ownership, control, or influence whenever a foreign interest has the
power, direct or indirect, whether or not exercised and whether or not exercisable through ownership of the U.S. company’s securities, by contractual arrangements or other means, to direct or decide matters affecting the management or operations of that company in a manner that may result in unauthorized access to classified information or may affect adversely the performance of classified matters.

54
Q

Federal Bureau of Investigation (FBI)

A

The FBI has primary responsibility for CI investigations within the U.S. DoD.

55
Q

Foreign Visit

A

A foreign national enters or proposes to enter a DoD Component or cleared contractor facility or to meet with employees or representatives of the facility.

56
Q

FOUR EYES (ACGU)

A

Australia, Canada, United Kingdom, and the U.S.

57
Q

Front Company

A

A company or business entity that is established, used, or co-opted for an illicit purpose; wherein the management, control, influence, or criminal activities
are being directed by a hidden or disguised individual or group.

58
Q

Government-Owned Contractor Operated (GOCO)

A

A manufacturing plant that is owned by the government and operated by a civilian organization under contract to the government.

59
Q

Hacker

A

Unauthorized user who attempts to or gains access to an information system.

60
Q

Human Intelligence (HUMINT)

A

Human Intelligence uses people to gather information.

61
Q

Imagery Intelligence (IMINT)

A

Imagery Intelligence uses satellite imagery, photographs,

and other images to collect information.

62
Q

Industrial Espionage

A

The knowing misappropriation of trade secrets related to, or included in, a product that is made for or placed in interstate or foreign commerce to the economic benefit of anyone other than the owner, with the knowledge or intent that the offense will injure the owner of that trade secret.

63
Q

Information Security

A

The security discipline concerned with implementation of a system of administrative policies and procedures for identifying, controlling, and protecting from unauthorized disclosure information that is authorized protection by EO, statute, or regulation. Information security includes protection of classified, controlled unclassified, and sensitive compartmented information.

64
Q

Insider

A

Any person with authorized access to any U.S. Government resource, to include personnel, facilities, information, equipment, networks, or systems.

65
Q

Insider Threat (InT)

A

The threat that an insider will use their authorized access, wittingly or unwittingly, to do harm to the security of the U.S. This threat can include damage through espionage, terrorism, unauthorized disclosure of national security information, or through the loss or degradation of departmental resources or capabilities.

66
Q

Intelligence Community Directive (ICD) 700

A

Establishes Intelligence Community policy for the protection of national intelligence and provides framework for greater coordination and communications between CI and security activities of the Intelligence Community to strengthen the ability to identify, deter, disrupt, mitigate, and counteract intelligence activities directed against U.S. interests by foreign powers or activities.

67
Q

Intelligence Community Directive (ICD) 750

A

Establishes the baseline for CI programs across the Intelligence Community to create a strategic approach to CI that will enhance the national security posture of the U.S. The ICD 750 recommends CI to be functionally integrated with security programs per the ICD 700.