Podcast
Questions and Answers
Failing to report CI activities of concern as outlined in enclosure 4 of DoD directive 5240.06 is subject to disciplinary action under regulations.
Failing to report CI activities of concern as outlined in enclosure 4 of DoD directive 5240.06 is subject to disciplinary action under regulations.
True (A)
Counterintelligence, as defined in the National Security Act of 1947, involves activities against espionage, other intelligence activities, sabotage, or assassination conducted by foreign entities.
Counterintelligence, as defined in the National Security Act of 1947, involves activities against espionage, other intelligence activities, sabotage, or assassination conducted by foreign entities.
True (A)
Foreign intelligence activities seldom use the internet or other communications, including social networking services, as a collection method.
Foreign intelligence activities seldom use the internet or other communications, including social networking services, as a collection method.
False (B)
What are some cyber vulnerabilities to DoD systems?
What are some cyber vulnerabilities to DoD systems?
What are some collection methods used by foreign intelligence entities to gather information from DoD?
What are some collection methods used by foreign intelligence entities to gather information from DoD?
If you feel you are being solicited for information, what should you do?
If you feel you are being solicited for information, what should you do?
Which is not an example of an anomaly?
Which is not an example of an anomaly?
What should DoD personnel do if they suspect a coworker of possible espionage?
What should DoD personnel do if they suspect a coworker of possible espionage?
Which is not a reportable foreign intelligence contract activity indicator?
Which is not a reportable foreign intelligence contract activity indicator?
Foreign intelligence entities seldom use elicitation to extract information from people who have access to classified information.
Foreign intelligence entities seldom use elicitation to extract information from people who have access to classified information.
FIE is defined in DoD 5240.06 as including foreign intelligence and security services and international terrorists.
FIE is defined in DoD 5240.06 as including foreign intelligence and security services and international terrorists.
What are PEIs indicative of?
What are PEIs indicative of?
Study Notes
Counterintelligence Overview
- Disciplinary action may result from failing to report concerning counterintelligence (CI) activities as per DoD directive 5240.06.
- Counterintelligence, according to the National Security Act of 1947, aims to gather information and conduct activities against espionage, sabotage, and assassination purported by foreign entities or terrorist organizations.
Misconceptions about Foreign Intelligence
- It is a misconception that foreign intelligence activities rarely utilize the internet or social networking for information collection; they frequently do.
- Foreign intelligence entities (FIE) actively employ elicitation techniques to extract classified information from knowledgeable individuals.
Cyber Vulnerabilities
- Various potential cyber vulnerabilities affecting DoD systems include:
- Disgruntled or co-opted employees.
- Weak passwords that can be easily compromised.
- Introduction of viruses and malware through various means.
- Illegal downloads which may expose systems to threats.
Common Collection Methods
- Foreign intelligence entities use several operational tactics to gather information on critical technology from cleared defense contractors, including:
- Unsolicited requests for information that may appear benign.
- Participation in international conventions, seminars, and exhibits for networking.
- Solicitation and marketing strategies to engage contractors.
- Cyber attacks aiming to breach systems safeguarding sensitive information.
Responding to Information Solicitation
- If solicited for information:
- Avoid answering questions directly.
- Shift the conversation without revealing intent.
- Remain observant of the interaction.
- Do not attempt to gather more information in return.
Reporting Suspicious Activities
- Department of Defense (DoD) personnel suspecting espionage from a coworker must report concerns directly to the Counterintelligence or Security Office.
- There are no non-reportable indicators or behaviors regarding suspect foreign intelligence activities as outlined under DoD 5240.06.
Understanding Potential Espionage Indicators
- Potential Espionage Indicators (PEIs) refer to activities or behaviors suggesting an individual may be engaged in espionage, especially if linked to foreign recruitment.
- Examples of PEIs encompass a variety of suspicious activities and are critical for early detection of espionage threats.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on Counterintelligence practices and regulations with this informative quiz. Understand the crucial definitions and implications of failing to report CI activities as well as the historical context of Counterintelligence under U.S. law.