Back to AI Flashcard MakerOther Subjects /Counterintelligence Awareness and Reporting

Counterintelligence Awareness and Reporting

Other Subjects12 CardsCreated 4 months ago

A quick-reference flashcard set covering key cyber threats, foreign intelligence tactics, and espionage indicators. Includes DoD CI reporting rules, vulnerabilities (e.g., weak passwords, insider threats), and common FIE methods like elicitation and online targeting. Ideal for awareness and training.

Cyber Vulnerabilities to COC Systems may include:
-Disgruntled or Co-opted employee
-Weak passwords
-Illegal Downloads
-All of these

All of these

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/12

Key Terms

Term
Definition

Cyber Vulnerabilities to COC Systems may include:
-Disgruntled or Co-opted employee
-Weak passwords
-Illegal Downloads
-All of these

All of these

Personnel who fail to report CI activities of concern as outlined in Enclosure 4 of DOD Directive 5240.06 are subject to appropriate disciplinary action under regulations.
-True
-False

True

Foreign Intelligence Entities seldom use elicitation to extract information from people who have access to classified or sensitive information.
-True
-False

False

Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that 'may be indicative' of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity as a writing espionage agent. Examples of PEI include:
-Unexplained affluence, Concealing foreign travel, Unusual work hours, Avoiding polygraph
-Taking classified material home, Illegal downloads, Unreported contact with foreign nationals
-Disgruntled employee, Attempting to gain access without need-to-know, Taking short trips
-Copying files, Unexplained absences, Terminating employment
-All of these

All of these

Foreign Intelligence Entities (FEI) seldom use the Internet or other communications including social networking services as a collection method.
-True
-False

False

Foreign Intelligence Entities (FEI) is defined in DOD Directive 5240.06 as "any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign intelligence and security services and international terrorists."
-True
-False

True

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

Cyber Vulnerabilities to COC Systems may include:
-Disgruntled or Co-opted employee
-Weak passwords
-Illegal Downloads
-All of these

All of these

Personnel who fail to report CI activities of concern as outlined in Enclosure 4 of DOD Directive 5240.06 are subject to appropriate disciplinary action under regulations.
-True
-False

True

Foreign Intelligence Entities seldom use elicitation to extract information from people who have access to classified or sensitive information.
-True
-False

False

Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that 'may be indicative' of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity as a writing espionage agent. Examples of PEI include:
-Unexplained affluence, Concealing foreign travel, Unusual work hours, Avoiding polygraph
-Taking classified material home, Illegal downloads, Unreported contact with foreign nationals
-Disgruntled employee, Attempting to gain access without need-to-know, Taking short trips
-Copying files, Unexplained absences, Terminating employment
-All of these

All of these

Foreign Intelligence Entities (FEI) seldom use the Internet or other communications including social networking services as a collection method.
-True
-False

False

Foreign Intelligence Entities (FEI) is defined in DOD Directive 5240.06 as "any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign intelligence and security services and international terrorists."
-True
-False

True

Which of the following is not an example of an anomaly?
-Foreign diplomat attempts to defect
-An adversary uses technical countermeasures to block a previously undisclosed or classified U.S. intercept technology
-Foreign officials reveal details they should not have known
-An adversary conducts activities with precision that indicates prior knowledge

Foreign diplomat attempts to defect

DOD personnel who suspect a coworker of possible espionage should:
-Start recording their conversation to gather evidence
-Report directly to your CI or Security Office
-Discuss situation with others to get second opinion
-Call the FBI Hot Line

Report directly to your CI or Security Office

If you feel you are being solicited for information, which of the following should you do?
-Never answer questions which make you fell uncomfortable
-Without indicating that you are uncomfortable, change any conversation that might be too probing with respect to your duties, private life, and coworkers
-Be observant - Note as much as possible about person asking questions
-Do not probe for information - Nonchalantly ask questions about them
-All of these

All of these

Counterintelligence as defined in Executive Order 12333, as amended, is "information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations or foreign persons, or international terrorist activities."
-True
-False

True

Under DODD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators, and Behaviors; which of the following is not reportable?
-Contact with Known or Suspected Foreign Intelligence
-Removing of classified markings
-Unexplained or undue affluence
-Frequent questionable foreign travel
-None of these

None of these

Collection methods of operation frequently used by Foreign Intelligence Entities (FIE) to collect information from DOD on the critical technology being produced within the cleared defense contractor facilities we support include:
-Unsolicited request for information,
-International conventions, seminars, and exhibits
-Solicitation and marketing of services
-Cyber attacks
-All of these

All of these