The “CI Awareness and Reporting” course is an eLearning program that provides an overview of counterintelligence, including potential threats from Foreign Intelligence Entities (FIE), Potential Espionage Indicators (PIE), and terrorism warning signs.
The course explains the role of each individual in counterintelligence, outlines reporting responsibilities, and includes information on Anomalous Health Incidents (AHI).
The course is 60 minutes long and is designed for cleared industry security professionals, DOD security professionals, and Federal agency partner security professionals.
There are no clearance or attendance requirements, and a passing grade of 75% is required on the final examination to receive a certificate of completion.
Counterintelligence Awareness and Reporting for DOD CI116.16 Answers
Personnel who fail to report CI Activities of concern as outlines in Enclosure 4 of DoD Directive 5240.06 are subject to appropriate disciplinary action under regulations
True
Cyber Vulnerabilities to DoD Systems may include:
All of the above
DoD personnel who suspect a coworker of possible espionage should:
Report directly to your CI or Security Office
Under DoDD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators and Behaviors; which of the following is not reportable?
None of the above
Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that ‘may be indicative’ of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity as a writing espionage agent. Examples of PEI include:
All of the above
Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as “any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign intelligence and security services and international terrorists.”
True
Counterintelligence as defined in the National Security Act of 1947, is “information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations or foreign persons, or international terrorist activities.”
True
If you feel you are being solicited for information which of the following should you do?
All of the Above
Foreign Intelligence Entities seldom use the Internet or other communications including social networking services as a collection method
False
Foreign Intelligence Entities seldom use elicitation to extract information from people who have access to classified or sensitive information
False
Collection Methods or operation frequently used by Foreign Intelligence Entities to collect information from DoD on the critical technology being produced within the cleared defense contractor facilities we support include:
All of the above
Which of the following is not an example of an anomaly?
Foreign diplomat attempts to defect.
Failure to report Foreign Intelligence Entity (FIE) threats may result? Select all that apply.
1. Judicial punishment. 2. Administrative Seperation.
Which of the following terms is defined as the act of obtaining, delivering, transmitting, communicating or receiving national defense-related information with the intent to harm the United States or to provide advantage to any foreign nation?
Espionage.
Which of the following terms include foreign intelligences and security services and international terrorists and is defined as any known or suspected foreign organization, person, or group (public, private or governmental) that conducts intelligence activities to acquire U.S. information collection, influence U.S. policy, or disrupt U.S. systems and programs?
Foreign Intelligence Entity *FIE).
Bradley Manning and Edward Snowden are examples of which of the following categories?
Insider Threats.
The Defense Logistics Agency relies in you to protect national security by reporting any behavior that you observe that maybe related to a potential compromise of sensitive information. Select as True or False.
True.
Foreign Intelligence Entity collect information to do what? Select all that apply.
1. Defeat our objectives. 2. Advance their interests. 3. Manipulate the intelligence we gather.
Some methods of operation or “MO” frequently used by Foreign Intelligence Entities to collect information include which of the following? Select all that apply.
1. Solicitation of services. 2. Marketing of services. 3. Elicitation.
Obtaining information under the guise of a social or professional conversation, when the subject remains unwitting of the collector’s goal is known by which of the following terms?
Elicitation.
Elicitation is an effective method of collection because of which of the following reasons?
People underestimate the value of information.
Which of the following is NOT an internal cyber threat to DLA?
Complex password.
Which of the following terms identity information gathered and activities conducted to identify, deceive exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons, or their agents, or international terrorists organizations or activities?
Counterintelligence.
Sources
- Counterintelligence Awareness and Reporting for DOD CI116.16
- Test Assessment
Let us know if this was helpful. That’s the only way we can improve.