Counterintelligence Awareness and Reporting
A quick-reference flashcard set covering key cyber threats, foreign intelligence tactics, and espionage indicators. Includes DoD CI reporting rules, vulnerabilities (e.g., weak passwords, insider threats), and common FIE methods like elicitation and online targeting. Ideal for awareness and training.
Cyber Vulnerabilities to COC Systems may include:
-Disgruntled or Co-opted employee
-Weak passwords
-Illegal Downloads
-All of these
All of these
Key Terms
Cyber Vulnerabilities to COC Systems may include:
-Disgruntled or Co-opted employee
-Weak passwords
-Illegal Downloads
-All of these
All of these
Personnel who fail to report CI activities of concern as outlined in Enclosure 4 of DOD Directive 5240.06 are subject to appropriate disciplinary action under regulations.
-True
-False
True
Foreign Intelligence Entities seldom use elicitation to extract information from people who have access to classified or sensitive information.
-True
-False
False
Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that 'may be indicative' of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity as a writing espionage agent. Examples of PEI include:
-Unexplained affluence, Concealing foreign travel, Unusual work hours, Avoiding polygraph
-Taking classified material home, Illegal downloads, Unreported contact with foreign nationals
-Disgruntled employee, Attempting to gain access without need-to-know, Taking short trips
-Copying files, Unexplained absences, Terminating employment
-All of these
All of these
Foreign Intelligence Entities (FEI) seldom use the Internet or other communications including social networking services as a collection method.
-True
-False
False
Foreign Intelligence Entities (FEI) is defined in DOD Directive 5240.06 as "any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign intelligence and security services and international terrorists."
-True
-False
True
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Cyber Vulnerabilities to COC Systems may include: | All of these |
Personnel who fail to report CI activities of concern as outlined in Enclosure 4 of DOD Directive 5240.06 are subject to appropriate disciplinary action under regulations. | True |
Foreign Intelligence Entities seldom use elicitation to extract information from people who have access to classified or sensitive information. | False |
Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that 'may be indicative' of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity as a writing espionage agent. Examples of PEI include: | All of these |
Foreign Intelligence Entities (FEI) seldom use the Internet or other communications including social networking services as a collection method. | False |
Foreign Intelligence Entities (FEI) is defined in DOD Directive 5240.06 as "any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign intelligence and security services and international terrorists." | True |
Which of the following is not an example of an anomaly? | Foreign diplomat attempts to defect |
DOD personnel who suspect a coworker of possible espionage should: | Report directly to your CI or Security Office |
If you feel you are being solicited for information, which of the following should you do? | All of these |
Counterintelligence as defined in Executive Order 12333, as amended, is "information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations or foreign persons, or international terrorist activities." | True |
Under DODD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators, and Behaviors; which of the following is not reportable? | None of these |
Collection methods of operation frequently used by Foreign Intelligence Entities (FIE) to collect information from DOD on the critical technology being produced within the cleared defense contractor facilities we support include: | All of these |