Army OPSEC Level 1 Flashcards

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is OPSEC?

Operations security that is used to protect critical information.

What is an example of sharing or asking for sensitive information?

Asking about the physical training schedule.

Select the following correct answer regarding critical information:

  • For official use only (correct)
  • Critical information list (correct)
  • Social security card (correct)

Can you share project details with a coworker from a different department?

<p>False (B)</p> Signup and view all the answers

Can you share U.S. operation plans with allied commanders?

<p>False (B)</p> Signup and view all the answers

Terrorists can be both domestic and international.

<p>True (A)</p> Signup and view all the answers

What are examples of criminals?

<p>Scam artist, identity thieves, hackers.</p> Signup and view all the answers

What defines examples of terrorists?

<p>Can be domestic or international.</p> Signup and view all the answers

What are examples of insiders?

<p>Disgruntled employees, Chelsea Manning.</p> Signup and view all the answers

What are examples of foreign governments?

<p>Allied nations, foreign intelligence service.</p> Signup and view all the answers

What does CALI stand for?

<p>Capabilities, Activities, Limitations, Intentions.</p> Signup and view all the answers

What are other assets?

<p>Specific operation plans, future force structure, Tactics, Techniques, Procedures (TTPs).</p> Signup and view all the answers

Match the following puzzle answers with their descriptions.

<p>WHEN = The question word that describes a time PROCEDURES = The 'P' in the acronym TTP WHERE = The question word that describes a place TECHNIQUES = The second 'T' in the acronym TTP LIMITATIONS = The 'L' in the acronym CALI HOW = The question word that describes a method WHO = The question word that describes a person or group</p> Signup and view all the answers

Match the following down puzzle answers with their descriptions.

<p>CAPABILITIES = The 'C' for CALI TACTICS = The first 'T' in the acronym TTP INTENTIONS = The 'I' in the acronym CALI ACTIVITIES = The 'A' in the acronym CALI WHAT = The question word that describes a thing or event</p> Signup and view all the answers

What is sensitive information?

<p>Ft. Leonard Wood, seven in the morning, tomorrow, CBRN tear gas training, a bunch of soldiers.</p> Signup and view all the answers

What is non-sensitive information?

<p>Party, it's going to be so brutal.</p> Signup and view all the answers

What is critical information?

<p>The names of family members, high-risk targets, non-public Army events, shortfalls in funding for training.</p> Signup and view all the answers

What is non-critical information?

<p>Public events, visitors information.</p> Signup and view all the answers

Should you disclose VIP itinerary information?

<p>Yes.</p> Signup and view all the answers

What is an ID badge used for?

<p>Identify the critical information by selecting items on the screen.</p> Signup and view all the answers

What is SAFE?

<p>Burning, shredding confidential files.</p> Signup and view all the answers

What is Not Safe?

<p>Throwing it in the trash, using phones in public areas.</p> Signup and view all the answers

Which action could potentially result in the compromise of critical information?

<p>Receiving business emails on your cell phone.</p> Signup and view all the answers

Which of the following should you NOT bring to a secret briefing?

<p>Smartwatch.</p> Signup and view all the answers

What information should you leave out of a social media post at a restaurant?

<p>Do not include sensitive location details.</p> Signup and view all the answers

What is sensitive information at DFW Airport?

<p>At 2 PM.</p> Signup and view all the answers

What is a mandated OPSEC measure before leaving your work area?

<p>Log off your computer.</p> Signup and view all the answers

What is a mandated OPSEC measure before sending an email?

<p>Encrypting the email.</p> Signup and view all the answers

Flashcards

What is OPSEC?

Operations Security, used to protect critical information from adversaries.

Sensitive Information Example?

Asking or revealing details about schedules (like physical training) can expose vulnerabilities.

Critical Information Marking

Information designated 'For Official Use Only' requires protection.

Share Project Details?

Sharing project details across departments is generally prohibited to maintain security.

Signup and view all the flashcards

Share U.S. Operation Plans?

Sharing operation plans, even with allies, is restricted to authorized personnel only.

Signup and view all the flashcards

Terrorist Origins

Threats can originate from within or outside national borders.

Signup and view all the flashcards

Examples of Criminals

Individuals involved in fraudulent activities, theft, or unauthorized system access.

Signup and view all the flashcards

Examples of Terrorists

Domestic or international actors using violence to achieve political goals.

Signup and view all the flashcards

Examples of Insiders

Employees or individuals with privileged access who misuse their position.

Signup and view all the flashcards

Examples of Foreign Governments

Nations or intelligence agencies engaged in gathering information.

Signup and view all the flashcards

What is CALI?

Capabilities, Activities, Limitations, Intentions

Signup and view all the flashcards

What are Other Assets?

Operational plans, force structure details, and specific procedures employed.

Signup and view all the flashcards

Sensitive Information

Ft. Leonard Wood, seven in the morning, tomorrow, CBRN tear gas training, a bunch of soldiers.

Signup and view all the flashcards

Non-Sensitive Information

Information that poses little to no risk if disclosed.

Signup and view all the flashcards

Critical Information

Family names, high-risk targets, non-public events, funding shortfalls.

Signup and view all the flashcards

Non-Critical Information

Public events, visitor details.

Signup and view all the flashcards

Disclose VIP Itinerary?

No, this could expose them to potential threats.

Signup and view all the flashcards

ID Badge Purpose

Identify critical information

Signup and view all the flashcards

What is SAFE?

Burning or shredding confidential documents.

Signup and view all the flashcards

What is NOT SAFE?

Throwing files in the trash or using phones in public.

Signup and view all the flashcards

Compromise Risk

Can allow unauthorized access to sensitive data.

Signup and view all the flashcards

Do NOT Bring

Smartwatches can be hacked.

Signup and view all the flashcards

Social Media at Restaurants

Avoid including specific location details.

Signup and view all the flashcards

Sensitive Information at DFW Airport

A reference to a specific time.

Signup and view all the flashcards

Mandated OPSEC Measure?

Protecting your work area.

Signup and view all the flashcards

Mandated OPSEC Measure?

A security measure required before sending emails.

Signup and view all the flashcards

Study Notes

OPSEC Overview

  • OPSEC (Operations Security) is essential for safeguarding critical information.

Sensitive Information and Responses

  • Examples of sensitive inquiries include discussing physical training schedules or unit details.
  • Responses about operational specifics should be avoided to prevent information leaks.

Types of Threats

  • Terrorists can originate from domestic or international backgrounds.
  • Insiders, such as disgruntled employees or specific individuals like Chelsea Manning, may pose internal risks.
  • Criminal threats include scam artists, identity thieves, and hackers.

Key Concepts and Acronyms

  • CALI stands for Capabilities, Activities, Limitations, and Intentions, highlighting factors critical to assessing risks.
  • ASSETS include Specific operation plans, Future force structure, and Tactics, Techniques, and Procedures (TTPs).

Handling Information

  • Critical information encompasses names of family members, high-risk targets, non-public Army events, and funding issues.
  • Non-critical information pertains to public events and visitor details.

Security Measures

  • Sensitive information requires secure handling, which includes burning or shredding confidential files.
  • Unsafe practices involve discarding documents in the trash or using phones in public spaces.

Operational Security Measures

  • Log off computers when leaving work areas to protect critical information.
  • Encrypt emails before sending to maintain confidentiality.

Situational Awareness

  • Avoid sharing sensitive information in social situations, such as restaurant outings, and consider what to post online.

Items to Avoid

  • Personal devices like smartwatches should not be taken to secret briefings to minimize risk.

General Security Protocols

  • Always assess the sensitivity of information and take proper action to protect it, such as avoiding revealing operational plans even to allied governments.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser