Counterintelligence Awareness Quiz
12 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Failing to report CI activities of concern as outlined in enclosure 4 of DoD directive 5240.06 is subject to disciplinary action under regulations.

True

Counterintelligence, as defined in the National Security Act of 1947, involves activities against espionage, other intelligence activities, sabotage, or assassination conducted by foreign entities.

True

Foreign intelligence activities seldom use the internet or other communications, including social networking services, as a collection method.

False

What are some cyber vulnerabilities to DoD systems?

<p>Disgruntled or co-opted employees, weak passwords, viruses, illegal downloads.</p> Signup and view all the answers

What are some collection methods used by foreign intelligence entities to gather information from DoD?

<p>Unsolicited requests for information, international conventions, seminar exhibits, solicitation and marketing services, cyber attacks.</p> Signup and view all the answers

If you feel you are being solicited for information, what should you do?

<p>Never answer questions, change the conversation without indication, be observant, do not probe for information.</p> Signup and view all the answers

Which is not an example of an anomaly?

<p>Foreign diplomat attempts to defect.</p> Signup and view all the answers

What should DoD personnel do if they suspect a coworker of possible espionage?

<p>Report directly to CI or Security Office.</p> Signup and view all the answers

Which is not a reportable foreign intelligence contract activity indicator?

<p>None of the above</p> Signup and view all the answers

Foreign intelligence entities seldom use elicitation to extract information from people who have access to classified information.

<p>False</p> Signup and view all the answers

FIE is defined in DoD 5240.06 as including foreign intelligence and security services and international terrorists.

<p>True</p> Signup and view all the answers

What are PEIs indicative of?

<p>Potential espionage activities by an individual who may have volunteered or been recruited by foreign entities.</p> Signup and view all the answers

Study Notes

Counterintelligence Overview

  • Disciplinary action may result from failing to report concerning counterintelligence (CI) activities as per DoD directive 5240.06.
  • Counterintelligence, according to the National Security Act of 1947, aims to gather information and conduct activities against espionage, sabotage, and assassination purported by foreign entities or terrorist organizations.

Misconceptions about Foreign Intelligence

  • It is a misconception that foreign intelligence activities rarely utilize the internet or social networking for information collection; they frequently do.
  • Foreign intelligence entities (FIE) actively employ elicitation techniques to extract classified information from knowledgeable individuals.

Cyber Vulnerabilities

  • Various potential cyber vulnerabilities affecting DoD systems include:
    • Disgruntled or co-opted employees.
    • Weak passwords that can be easily compromised.
    • Introduction of viruses and malware through various means.
    • Illegal downloads which may expose systems to threats.

Common Collection Methods

  • Foreign intelligence entities use several operational tactics to gather information on critical technology from cleared defense contractors, including:
    • Unsolicited requests for information that may appear benign.
    • Participation in international conventions, seminars, and exhibits for networking.
    • Solicitation and marketing strategies to engage contractors.
    • Cyber attacks aiming to breach systems safeguarding sensitive information.

Responding to Information Solicitation

  • If solicited for information:
    • Avoid answering questions directly.
    • Shift the conversation without revealing intent.
    • Remain observant of the interaction.
    • Do not attempt to gather more information in return.

Reporting Suspicious Activities

  • Department of Defense (DoD) personnel suspecting espionage from a coworker must report concerns directly to the Counterintelligence or Security Office.
  • There are no non-reportable indicators or behaviors regarding suspect foreign intelligence activities as outlined under DoD 5240.06.

Understanding Potential Espionage Indicators

  • Potential Espionage Indicators (PEIs) refer to activities or behaviors suggesting an individual may be engaged in espionage, especially if linked to foreign recruitment.
  • Examples of PEIs encompass a variety of suspicious activities and are critical for early detection of espionage threats.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on Counterintelligence practices and regulations with this informative quiz. Understand the crucial definitions and implications of failing to report CI activities as well as the historical context of Counterintelligence under U.S. law.

More Like This

Use Quizgecko on...
Browser
Browser