Counterintelligence Awareness and
Reporting
Cyber Vulnerabilities to COC Systems may include:
-Disgruntled or Co-opted employee
-Weak passwords
-Illegal Downloads
-All of these ✔✔All of these
Personnel who fail to
...
Counterintelligence Awareness and
Reporting
Cyber Vulnerabilities to COC Systems may include:
-Disgruntled or Co-opted employee
-Weak passwords
-Illegal Downloads
-All of these ✔✔All of these
Personnel who fail to report CI activities of concern as outlined in Enclosure 4 of DOD Directive
5240.06 are subject to appropriate disciplinary action under regulations.
-True
-False ✔✔True
Foreign Intelligence Entities seldom use elicitation to extract information from people who have
access to classified or sensitive information.
-True
-False ✔✔False
Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that 'may be
indicative' of potential espionage activities by an individual who may have volunteered or been
recruited by a foreign entity as a writing espionage agent. Examples of PEI include:
-Unexplained affluence, Concealing foreign travel, Unusual work hours, Avoiding polygraph
-Taking classified material home, Illegal downloads, Unreported contact with foreign nationals
-Disgruntled employee, Attempting to gain access without need-to-know, Taking short trips
-Copying files, Unexplained absences, Terminating employment
-All of these ✔✔All of these
Foreign Intelligence Entities (FEI) seldom use the Internet or other communications including
social networking services as a collection method.
-True
-False ✔✔False
Foreign Intelligence Entities (FEI) is defined in DOD Directive 5240.06 as "any known or
suspected foreign organization, person, or group (public, private, or governmental) that conducts
intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection,
influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign intelligence
and security services and international terrorists."
-True
-False ✔✔True
Which of the following is not an example of an anomaly?
-Foreign diplomat attempts to defect
-An adversary uses technical countermeasures to block a previously undisclosed or classified U.S.
intercept technology
-Foreign officials reveal details they should not have known
-An adversary conducts activities with precision that indicates prior knowledge ✔✔Foreign
diplomat attempts to defect
DOD personnel who suspect a coworker of possible espionage should:
-Start recording their conversation to gather evidence
-Report directly to your CI or Security Office
-Discuss situation with others to get second opinion
-Call the FBI Hot Line ✔✔Report directly to your CI or Security Office
If you feel you are being solicited for information, which of the following should you do?
-Never answer questions which make you fell uncomfortable
-Without indicating that you are uncomfortable, change any conversation that might be too probing
with respect to your duties, private life, and cowork
[Show More]