Podcast
Questions and Answers
When transporting classified information, the courier must have a DD Form 2501 and as a minimum use a locked briefcase or zippered pouch made of canvas or other heavy-duty material.
When transporting classified information, the courier must have a DD Form 2501 and as a minimum use a locked briefcase or zippered pouch made of canvas or other heavy-duty material.
True
What are the three classification levels of information?
What are the three classification levels of information?
Confidential, Secret, Top Secret.
What is the purpose of the SF 701 'Activity Security Checklist' and the SF 702 'Security Container Check Sheet'?
What is the purpose of the SF 701 'Activity Security Checklist' and the SF 702 'Security Container Check Sheet'?
Used as part of the end-of-day security checks for classified material.
If you find classified material out of proper control, you should take custody of the material and safeguard it, if possible, and immediately notify your security representative or supervisor.
If you find classified material out of proper control, you should take custody of the material and safeguard it, if possible, and immediately notify your security representative or supervisor.
Signup and view all the answers
In the event of a natural disaster, what is the first priority concerning an emergency action procedure for classified material?
In the event of a natural disaster, what is the first priority concerning an emergency action procedure for classified material?
Signup and view all the answers
Using curbside mailboxes is an approved method for mailing classified information.
Using curbside mailboxes is an approved method for mailing classified information.
Signup and view all the answers
Which of the following statements concerning security containers, vaults, or open storage areas are true? (Select all that apply)
Which of the following statements concerning security containers, vaults, or open storage areas are true? (Select all that apply)
Signup and view all the answers
Which of the following are approved methods of discussing and transmitting classified material? (Select all that apply)
Which of the following are approved methods of discussing and transmitting classified material? (Select all that apply)
Signup and view all the answers
Which of the following methods are routinely used for destroying classified information? (Select all that apply)
Which of the following methods are routinely used for destroying classified information? (Select all that apply)
Signup and view all the answers
Which statement must be on the front of a GSA-approved security container for storing classified information?
Which statement must be on the front of a GSA-approved security container for storing classified information?
Signup and view all the answers
Personnel who fail to report CI Activities of concern as outlined in Enclosure 4 of DoD Directive 5240.06 are subject to appropriate disciplinary action under regulations.
Personnel who fail to report CI Activities of concern as outlined in Enclosure 4 of DoD Directive 5240.06 are subject to appropriate disciplinary action under regulations.
Signup and view all the answers
Cyber Vulnerabilities to DoD Systems may include?
Cyber Vulnerabilities to DoD Systems may include?
Signup and view all the answers
DoD personnel who suspect a coworker of possible espionage should?
DoD personnel who suspect a coworker of possible espionage should?
Signup and view all the answers
Under DoD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators and Behaviors; which of the following is not reportable?
Under DoD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators and Behaviors; which of the following is not reportable?
Signup and view all the answers
Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that may be indicative of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity. Examples of PEI include?
Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that may be indicative of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity. Examples of PEI include?
Signup and view all the answers
A Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as any known or suspected foreign organization, person, or group that conducts intelligence activities to acquire U.S. information.
A Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as any known or suspected foreign organization, person, or group that conducts intelligence activities to acquire U.S. information.
Signup and view all the answers
Counterintelligence is defined as information gathered to protect against espionage or intelligence activities conducted by foreign governments.
Counterintelligence is defined as information gathered to protect against espionage or intelligence activities conducted by foreign governments.
Signup and view all the answers
If you feel you are being solicited for information, what should you do?
If you feel you are being solicited for information, what should you do?
Signup and view all the answers
Foreign Intelligence Entities seldom use the Internet or communications for collection methods.
Foreign Intelligence Entities seldom use the Internet or communications for collection methods.
Signup and view all the answers
Foreign Intelligence Entities seldom use elicitation to extract information.
Foreign Intelligence Entities seldom use elicitation to extract information.
Signup and view all the answers
Collection methods or operations frequently used by Foreign Intelligence Entities include?
Collection methods or operations frequently used by Foreign Intelligence Entities include?
Signup and view all the answers
Which of the following is not an example of an anomaly?
Which of the following is not an example of an anomaly?
Signup and view all the answers
Which statements are correct concerning why a person would need to obtain a security clearance? (Select all that apply)
Which statements are correct concerning why a person would need to obtain a security clearance? (Select all that apply)
Signup and view all the answers
All DoD civilian positions are categorized into which following security groups?
All DoD civilian positions are categorized into which following security groups?
Signup and view all the answers
Which procedures are used to monitor personnel for new information or changes that could affect their eligibility for a security clearance?
Which procedures are used to monitor personnel for new information or changes that could affect their eligibility for a security clearance?
Signup and view all the answers
Which organization is the sole authority for determining clearance eligibility for non-intelligence agency DoD?
Which organization is the sole authority for determining clearance eligibility for non-intelligence agency DoD?
Signup and view all the answers
Which of the following are part of the 13 national security adjudicators used to determine clearance eligibility? (Select all that apply)
Which of the following are part of the 13 national security adjudicators used to determine clearance eligibility? (Select all that apply)
Signup and view all the answers
When a security clearance is denied or revoked, the decision is final.
When a security clearance is denied or revoked, the decision is final.
Signup and view all the answers
What are you expected to do when you hold a secret clearance or fill a national security sensitive position? (Select all that apply)
What are you expected to do when you hold a secret clearance or fill a national security sensitive position? (Select all that apply)
Signup and view all the answers
Which statements are true concerning continuous evaluation? (Select all that apply)
Which statements are true concerning continuous evaluation? (Select all that apply)
Signup and view all the answers
Which statement is true concerning self-reporting for an individual who holds a security clearance?
Which statement is true concerning self-reporting for an individual who holds a security clearance?
Signup and view all the answers
A security clearance determination is based on a pattern of behavior and not a single action.
A security clearance determination is based on a pattern of behavior and not a single action.
Signup and view all the answers
What is the primary goal of OPSEC?
What is the primary goal of OPSEC?
Signup and view all the answers
Which of the following are threats to our critical information? (Select all that apply)
Which of the following are threats to our critical information? (Select all that apply)
Signup and view all the answers
Which of the following are considered critical information? (Select all that apply)
Which of the following are considered critical information? (Select all that apply)
Signup and view all the answers
How often do J or D code, major subordinate command, and regional command update their unique critical information list?
How often do J or D code, major subordinate command, and regional command update their unique critical information list?
Signup and view all the answers
Which of the following are effective countermeasures to protect critical information? (Select all that apply)
Which of the following are effective countermeasures to protect critical information? (Select all that apply)
Signup and view all the answers
Friendly detectable actions are critical information.
Friendly detectable actions are critical information.
Signup and view all the answers
Geolocation applications are not authorized for use in?
Geolocation applications are not authorized for use in?
Signup and view all the answers
Official documents may be thrown away in recycle bins.
Official documents may be thrown away in recycle bins.
Signup and view all the answers
It is illegal for someone to rummage through your trash when you leave it outside for pickup.
It is illegal for someone to rummage through your trash when you leave it outside for pickup.
Signup and view all the answers
All DLA personnel work with critical information.
All DLA personnel work with critical information.
Signup and view all the answers
Which of the following are key objectives of DLA's Counterintelligence Mission? (Select all that apply)
Which of the following are key objectives of DLA's Counterintelligence Mission? (Select all that apply)
Signup and view all the answers
Which term describes information gathered to identify, deceive, exploit, or protect against espionage?
Which term describes information gathered to identify, deceive, exploit, or protect against espionage?
Signup and view all the answers
Which term includes foreign intelligence and security services and is defined as any known or suspected foreign organization that conducts intelligence activities to acquire U.S. information?
Which term includes foreign intelligence and security services and is defined as any known or suspected foreign organization that conducts intelligence activities to acquire U.S. information?
Signup and view all the answers
What is an activity or knowledge outside the norm that suggests a foreign entity has foreknowledge of U.S. information?
What is an activity or knowledge outside the norm that suggests a foreign entity has foreknowledge of U.S. information?
Signup and view all the answers
Foreign visits to DoD facilities should be coordinated how many days in advance?
Foreign visits to DoD facilities should be coordinated how many days in advance?
Signup and view all the answers
Which technique is used to subtly and inconspicuously gather information about you or your mission?
Which technique is used to subtly and inconspicuously gather information about you or your mission?
Signup and view all the answers
An unexplained and sudden reversal of large debt is an indicator of counterintelligence concern and should be reported for further investigation.
An unexplained and sudden reversal of large debt is an indicator of counterintelligence concern and should be reported for further investigation.
Signup and view all the answers
To whom are all DoD personnel required to report all projected foreign travel?
To whom are all DoD personnel required to report all projected foreign travel?
Signup and view all the answers
Any deviation from foreign travel itineraries must be reported within how many days of returning from travel?
Any deviation from foreign travel itineraries must be reported within how many days of returning from travel?
Signup and view all the answers
A one-time encounter with a foreign national involving the exchange of contact information must be reported to your security representative.
A one-time encounter with a foreign national involving the exchange of contact information must be reported to your security representative.
Signup and view all the answers
Which term describes a known or suspected foreign organization conducting intelligence activities to acquire U.S. information?
Which term describes a known or suspected foreign organization conducting intelligence activities to acquire U.S. information?
Signup and view all the answers
Study Notes
Security Protocols and Procedures
- Couriers must have a DD Form 2501 for transporting classified information and use secured containers like locked briefcases or heavy-duty pouches.
- Three classification levels of information are Confidential, Secret, and Top Secret.
- SF 701 and SF 702 are checklists used for end-of-day security checks in locations handling classified material.
Handling Classified Material
- If classified material is found uncontrolled, it should be secured and reported to a security representative immediately.
- In emergencies, protecting life takes precedence over protecting classified material.
- Curbside mailboxes are not approved for mailing classified information.
Security Containers and Communication
- Security containers must protect their combinations at the highest classification level stored within. Only non-classified items should be stored separately from classified materials.
- Approved methods for discussing classified information include SIPRnet, Secure Fax, and Secure Telephone.
Destruction and Clearance Procedures
- Methods for destroying classified information include burning, approved cross-cut shredding, and wet-pulping.
- GSA-approved security containers must be clearly labeled as such.
Counterintelligence and Cybersecurity
- Failure to report Counterintelligence activities can lead to disciplinary actions.
- Cyber vulnerabilities within DoD systems are a significant concern; all elements must be monitored for potential security threats.
- DoD personnel suspecting espionage should report directly to the Counterintelligence or Security Office.
Reporting and Monitoring Framework
- All foreign intelligence contacts or suspicious activities must be reported; nothing is exempt from scrutiny.
- Potential Espionage Indicators include unusual behaviors that suggest foreign recruitment.
- Continuous evaluation is essential to monitor personnel for changes affecting their eligibility for security clearances.
Security Clearance Requirements
- Security clearances categorize DoD civilian positions into Special Sensitive, Critical Sensitive, Non-Critical Sensitive, and Non-Sensitive.
- The DoD Consolidated Adjudications Facility is the sole authority for clearance eligibility for non-intelligence agency personnel.
- Self-reporting changes in personal circumstances is mandatory for individuals holding security clearances.
Operational Security (OPSEC)
- The primary goal of OPSEC is to enhance mission efficiency while safeguarding critical information from adversaries.
- Threats to critical information include private organizations, terrorists, and friendly foreign governments.
- Effective countermeasures to protect critical information consist of encryption, shredding, and enforcing need-to-know policies.
Administrative and Reporting Protocols
- Friendly detectable actions are classified as critical information and require protection.
- Foreign visits to DoD facilities should be coordinated 30 days in advance.
- Any foreign travel must be reported to a security representative, with deviations noted within five days of return.
Counterintelligence Activities
- Elicitation is a covert technique used to gather sensitive information.
- Counterintelligence seeks to identify, disrupt, and mitigate threats from foreign intelligence entities.
- Anomalies can indicate foreign entities' knowledge of U.S. capabilities and should be thoroughly investigated.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on security and counterintelligence with these flashcards. Covering essential topics like classification levels and necessary documentation, this quiz is perfect for those involved in handling classified information. Enhance your understanding and awareness of security protocols today!