Army OPSEC Level 1 Flashcards
28 Questions
102 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is OPSEC?

Operations security that is used to protect critical information.

What is an example of sharing or asking for sensitive information?

Asking about the physical training schedule.

Select the following correct answer regarding critical information:

  • For official use only (correct)
  • Critical information list (correct)
  • Social security card (correct)
  • Can you share project details with a coworker from a different department?

    <p>False</p> Signup and view all the answers

    Can you share U.S. operation plans with allied commanders?

    <p>False</p> Signup and view all the answers

    Terrorists can be both domestic and international.

    <p>True</p> Signup and view all the answers

    What are examples of criminals?

    <p>Scam artist, identity thieves, hackers.</p> Signup and view all the answers

    What defines examples of terrorists?

    <p>Can be domestic or international.</p> Signup and view all the answers

    What are examples of insiders?

    <p>Disgruntled employees, Chelsea Manning.</p> Signup and view all the answers

    What are examples of foreign governments?

    <p>Allied nations, foreign intelligence service.</p> Signup and view all the answers

    What does CALI stand for?

    <p>Capabilities, Activities, Limitations, Intentions.</p> Signup and view all the answers

    What are other assets?

    <p>Specific operation plans, future force structure, Tactics, Techniques, Procedures (TTPs).</p> Signup and view all the answers

    Match the following puzzle answers with their descriptions.

    <p>WHEN = The question word that describes a time PROCEDURES = The 'P' in the acronym TTP WHERE = The question word that describes a place TECHNIQUES = The second 'T' in the acronym TTP LIMITATIONS = The 'L' in the acronym CALI HOW = The question word that describes a method WHO = The question word that describes a person or group</p> Signup and view all the answers

    Match the following down puzzle answers with their descriptions.

    <p>CAPABILITIES = The 'C' for CALI TACTICS = The first 'T' in the acronym TTP INTENTIONS = The 'I' in the acronym CALI ACTIVITIES = The 'A' in the acronym CALI WHAT = The question word that describes a thing or event</p> Signup and view all the answers

    What is sensitive information?

    <p>Ft. Leonard Wood, seven in the morning, tomorrow, CBRN tear gas training, a bunch of soldiers.</p> Signup and view all the answers

    What is non-sensitive information?

    <p>Party, it's going to be so brutal.</p> Signup and view all the answers

    What is critical information?

    <p>The names of family members, high-risk targets, non-public Army events, shortfalls in funding for training.</p> Signup and view all the answers

    What is non-critical information?

    <p>Public events, visitors information.</p> Signup and view all the answers

    Should you disclose VIP itinerary information?

    <p>Yes.</p> Signup and view all the answers

    What is an ID badge used for?

    <p>Identify the critical information by selecting items on the screen.</p> Signup and view all the answers

    What is SAFE?

    <p>Burning, shredding confidential files.</p> Signup and view all the answers

    What is Not Safe?

    <p>Throwing it in the trash, using phones in public areas.</p> Signup and view all the answers

    Which action could potentially result in the compromise of critical information?

    <p>Receiving business emails on your cell phone.</p> Signup and view all the answers

    Which of the following should you NOT bring to a secret briefing?

    <p>Smartwatch.</p> Signup and view all the answers

    What information should you leave out of a social media post at a restaurant?

    <p>Do not include sensitive location details.</p> Signup and view all the answers

    What is sensitive information at DFW Airport?

    <p>At 2 PM.</p> Signup and view all the answers

    What is a mandated OPSEC measure before leaving your work area?

    <p>Log off your computer.</p> Signup and view all the answers

    What is a mandated OPSEC measure before sending an email?

    <p>Encrypting the email.</p> Signup and view all the answers

    Study Notes

    OPSEC Overview

    • OPSEC (Operations Security) is essential for safeguarding critical information.

    Sensitive Information and Responses

    • Examples of sensitive inquiries include discussing physical training schedules or unit details.
    • Responses about operational specifics should be avoided to prevent information leaks.

    Types of Threats

    • Terrorists can originate from domestic or international backgrounds.
    • Insiders, such as disgruntled employees or specific individuals like Chelsea Manning, may pose internal risks.
    • Criminal threats include scam artists, identity thieves, and hackers.

    Key Concepts and Acronyms

    • CALI stands for Capabilities, Activities, Limitations, and Intentions, highlighting factors critical to assessing risks.
    • ASSETS include Specific operation plans, Future force structure, and Tactics, Techniques, and Procedures (TTPs).

    Handling Information

    • Critical information encompasses names of family members, high-risk targets, non-public Army events, and funding issues.
    • Non-critical information pertains to public events and visitor details.

    Security Measures

    • Sensitive information requires secure handling, which includes burning or shredding confidential files.
    • Unsafe practices involve discarding documents in the trash or using phones in public spaces.

    Operational Security Measures

    • Log off computers when leaving work areas to protect critical information.
    • Encrypt emails before sending to maintain confidentiality.

    Situational Awareness

    • Avoid sharing sensitive information in social situations, such as restaurant outings, and consider what to post online.

    Items to Avoid

    • Personal devices like smartwatches should not be taken to secret briefings to minimize risk.

    General Security Protocols

    • Always assess the sensitivity of information and take proper action to protect it, such as avoiding revealing operational plans even to allied governments.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge of Operations Security (OPSEC) with these flashcards designed for newcomers and refresher training. Learn how to protect critical information and understand the importance of information sharing within the military context.

    More Like This

    Use Quizgecko on...
    Browser
    Browser