The National Industry Security Program (NISP) serves as a multi-faceted, federal program that aims to protect classified information within the confines of the United States and its industry partners.
Encompassing a broad spectrum of private companies, defense contractors, and academic institutions, the NISP establishes a standardized protocol for safeguarding classified information that these entities might access or store in the course of fulfilling contracts or research with the federal government.
At its core, the NISP is an integral part of the nation’s defense against external and internal threats, aiming to:
- Uphold the Integrity of Classified Information: By enforcing a uniform security protocol across the entire industry landscape, the NISP ensures that classified data, regardless of where it resides, remains uncompromised.
- Foster Collaborative Defense: By bringing both public and private sectors under a unified security umbrella, the NISP encourages collaborative efforts in national defense, intelligence, and research.
- Streamline Security Protocols: The NISP provides a standardized approach to security clearance, information handling, and threat response, thereby making it easier for industries to comply and cooperate.
Protecting Assets In The NISP Answers
Question | Answer |
---|---|
The NISPOM requires that adverse information concerning cleared employees and any suspicious contacts be reported to DCSA. | True. The National Industrial Security Program Operating Manual (NISPOM) does require cleared contractors to report certain adverse information concerning cleared employees and any suspicious contacts to the Defense Counterintelligence and Security Agency (DCSA). This ensures the continuous assessment of a cleared individual’s eligibility and helps in identifying potential threats. |
CI is the information gathered and activities conducted to protect against what? Select all that apply. Espionage, sabotage, terrorism Assassinations conducted for or on behalf of foreign governments, organizations, or persons Activities by large companies to obtain operating capital within a foreign country International terrorist activities | Espionage, sabotage, terrorism Assassinations conducted for or on behalf of foreign governments, organizations, or persons International terrorist activities |
Integrating CI and threat awareness into a security program helps to accomplish which of the following? Select all that apply. □ Assist DoD in maintaining a tactical advantage over foreign intelligence operatives □ Protect valuable company assets from loss and compromise □ Identify which assets need protecting □ Establish countermeasures | Protect valuable company assets from loss and compromise Identify which assets need protecting Establish countermeasures |
The NISPOM does which of the following for industry? Select all that apply. Controls the disclosure of classified information to contractors Identifies the cost associated with particular contracts Protects special classes of classified information Requires contractors to hire counterintelligence special agents | Controls the disclosure of classified information to contractors Protects special classes of classified information |
CI helps security officials to manage risk in which of the following ways? Select all that apply. Focus on assets and identify the threats to them Identify vulnerabilities Develop and apply countermeasures Develop investigation procedures Develop security classification guides | Focus on assets and identify the threats to them Identify vulnerabilities Develop and apply countermeasures |
The NISPOM requires that adverse information concerning cleared employees and any suspicious contacts be reported to DCSA. Select the best answer. o True o False | True |
Which of the following are foreign collection methods? □ Requests for information □ Suspicious Network Activity □ Seeking employment □ Foreign visits □ Abduction and interrogation | |
Match foreign collection methods with corresponding activities. requests for information Academic solicitation Elicitation and Recruitment Solicitation and seeking employment Foreign visit Conferences, Conventions, and Trade Shows May use joint ventures or research partnerships Involves establishing emotional relationship with the target Exchange employees or foreign business associates Unsolicited employees or foreign business associates Experts may receive all-expense-paid invitations to lecture | Unsolicited and direct requests often submitted via email is an example of requests for information. Application to degree programs associated with cleared facilities or programs is an example of academic solicitation. Establishing an emotional relationship with a target is an example of elicitation and recruitment. Using joint ventures or research partnerships is an example of solicitation and seeking employment. Experts receiving all-expense-paid invitations to lecture are an example of conferences, conventions, and trade shows. Exchange employees or foreign business associates are an example of foreign visit. |
Match potential countermeasures with foreign collection methods. Conduct audits at least weekly Use mock-ups instead of actual equipment Brief hosts and escorts on approved procedures Share the minimum amount of information appropriate to the scope of venture Solicitation and seeking employment Suspicious network activities Conference, Conventions, and Trade Shows Foreign visits | Solicitation and seeking employment – Share the minimum amount of information appropriate to the scope of venture Suspicious network activities – Conduct audits at least weekly Conference, Conventions, and Trade Shows – Use mock-ups instead of actual equipment Foreign visits – Brief hosts and escorts on approved procedures |
You decide that you need three specific types of information for the training session that you are planning. Match the information that you need with the source from which you can obtain the information: Trends related to what is targeted and methods used. Threat assessment for your current contract. Identify the current national security concerns that may affect your facility Determine the types of crimes that are being committed at facilities close to your company. FBI State or Local Law Enforcement Government Contracting Activity DCSA CI Directorate | Trends related to what is targeted and methods used – DCSA CI Directorate Threat assessment for your current contract – Government Contracting Activity Identify the current national security concerns that may affect your facility – FBI Determine the types of crimes that are being committed at facilities close to your company – State or Local Law Enforcement |
Which of the following activities can you use to promote CI awareness within your facility? □ Enlist your DCSA CI Special Agent to brief employees □ Post CI-related material throughout the workplace □ Share actual targeting examples with employees □ Remind employees that anyone who appears “foreign” is a threat | Enlist your DCSA CI Special Agent to brief employees Post CI-related material throughout the workplace Share actual targeting examples with employees |
Foreign travel increases the risk of FIE targeting. o True o False | True Although employees may be targeted at any time or any place, FIEs have greater access to employees during foreign travel. |
The National Industrial Security Program Operating Manual (NISPOM) requires employees of cleared industry to report which of the following events? □ Suspicious contacts □ Lost or compromised classified information □ Actions/events that may affect the status of an employee’s personnel security clearance □ Actions/events that may affect the status of the facility’s clearance □ Actual, probable, or possible espionage, sabotage, terrorism, of subversive activities | □ Suspicious contacts □ Lost or compromised classified information □ Actions/events that may affect the status of an employee’s personnel security clearance □ Actions/events that may affect the status of the facility’s clearance □ Actual, probable, or possible espionage, sabotage, terrorism, of subversive activities |
Which of the following groups are vulnerable to foreign intelligence entity targeting? □ Information technology □ Facility management □ Employees traveling abroad □ Administrative assistants | Information technology Facility management Employees traveling abroad Administrative assistants |
What is the role of reporting in counterintelligence and threat awareness? | Reporting helps to disrupt foreign collection activity. Reporting identifies threats so that countermeasures can be developed. |
An employee observes coworkers sharing images of and discussing a component that is in development in an unsecured location with a person she didn’t recognize. | Yes |
Hello. This is Victor from Facilities Management. I’m in the Engineering Department. None of the engineers are here and the classified storage container is open. It’s not just unlocked; the drawer is pulled out and there are several folders visible. To whom should you report this incident? □ FSO □ FBI □ DCSA □ Local Law Enforcement | FSO FBI DCSA |
Carolyn was approached by a stranger… | Yes |
You learn from a security bulletin that a foreign country is using university students applying for low level jobs to gain entry into companies in your industry. Which group might you alert first? Human Resources Information Technology Business Development Engineers and Research & Development | You would alert Human Resources when a foreign country is using university students applying for low level jobs to gain entry into companies in your industry. |
Foreign entities stepped up attempts to purchase export-controlled technology, including technology your facility develops. Who should you alert? Human Resources Information Technology Business Development Engineers and Research & Development | You would alert Business Development when foreign entities step up attempts to purchase export-controlled technology, including technology your facility develops. |
You learn of a threat from a business competitor to steal blueprints and schematics. Which group might you alert first? Human Resources Information Technology Business Development Engineers and Research & Development | You would alert Engineers or the R&D when you learn of a threat from a business competitor to steal blueprints and schematics. |
There is an increase in cyber-attacks against companies in your industry. Who should you alert? Human Resources Information Technology Business Development Engineers and Research & Development | You would alert IT when there is an increase in cyber-attacks against companies in your industry. |
NISP Final Exam Answers
- Personnel from this group are targeted because of their access to the company’s supply chain.
– Facility management
– Manufacturing
– Purchasing
– Research and Development
Answer: Personnel from the Purchasing group are targeted because of their access to the company’s supply chain. - Security requirements for industry Partners are found in which of these documents?
– Counterintelligence Awareness and Reporting (CIAR) (DoD Policy Directive 5240.06)
– NISPOM
– NISCI
– NIS Policy Directive
Answer: Security requirements for industry Partners are found in the NISPOM (National Industrial Security Program Operating Manual). - The NISPOM requires reporting of which of the following?
– Daily arrival and departure times of cleared employees
– Actual, probable, or possible espionage, sabotage, terrorism or subversive activities
– Adverse information concerning cleared employees
– Suspicious contacts
Answer: The NISPOM requires reporting of: Actual, probable, or possible espionage, sabotage, terrorism or subversive activities; Adverse information concerning cleared employees; Suspicious contacts. - A successful CI program adopts a Risk-based approach…
Answer: Risk. - Steps in the risk management process include:
– Identify assets and determine the impact of loss or compromise
– Develop and apply countermeasures
– Identify threats
– Identify vulnerabilities, assess risk
Answer: All of the above. - The _______ provides CI functional services to cleared industry and is a key resource for your company.
– FBI
– DOD Counterintelligence Command
– DCSA Counterintelligence Directorate
– Department of Homeland Security
Answer: DCSA Counterintelligence Directorate provides CI functional services to cleared industry and is a key resource for your company. - Which of the following are types of threats facing industry?
– Threats from foreign intelligence entities
– Terrorist Organizations
– Insider Threats
– Criminal Activities
– Business Competitors
Answer: All of the options listed are types of threats facing industry. - Which group is targeted because of access to personnel info and the hiring process?
– Facility management
– Human Resources
– Business Development
– Purchasing
Answer: Human Resources - Personnel from this group are targeted because of their access to the company’s supply chain.
– Research and Development
– Purchasing
– Manufacturing
– Facility Management
Answer: Personnel from the Purchasing group are targeted because of their access to the company’s supply chain. - A request to add someone to a visiting foreign delegation at the last minute is a potential indicator of a foreign intelligence collection method.
Answer: True. - Suspicious network activity is the fastest growing collection method for foreign entities seeking to gain information about U.S. interests.
Answer: True. - Which of these documents summarizes the threat reports received from cleared contractor facilities and provides information on trends related to what is targeted and the methods used?
– DCSA CI Directorate annual trend report
– Defense Intelligence Agency (DIA) ThreatCon Report
– National Counterintelligence and Security Center (NCSC) CI Awareness Briefing
– Department of Homeland Security (DHS) Security Bulletin
Answer: DCSA CI Directorate annual trend report. - Which of the following agencies has primary responsibility for counterintelligence investigations within the United States?
– DIA
– FBI
– DHS
– NCSC
Answer: FBI. - Which of the following is/are strategies for the implementation of countermeasures?
– Share your technology control plan (TCP) with visitors.
– Respond to any active threat action Control access to the target
– Train employees to recognize and report potential threats
– Deter foreign intelligence entities from acting
Answer: Respond to any active threat action; Control access to the target; Train employees to recognize and report potential threats; Deter foreign intelligence entities from acting. - The purpose of countermeasures is to adjust the behavior of potential foreign intelligence entities so that they do not pose a threat to your company. True or false?
Answer: True. - The purpose of a foreign travel program is to:
– Discourage personnel from travel to certain countries
– Arm travelers with strategies to handle events
– Prepare travelers to conduct intelligence activities overseas
– Prepare travelers for any events they may encounter
– Reduce security requirements for foreign visitors
Answer: Arm travelers with strategies to handle events; Prepare travelers for any events they may encounter. - Which of the following may not be covered in a Foreign Travel Debriefing?
Answer: Internal U.S travel warnings. - The NISPOM requires all contractors to do all of the following for CI training except:
Answer: Train employees only upon initial access to classified. - Which of the following are ways for an FSO to effectively CI and threat awareness training?
Answer: Visual awareness reminders; Implementing a vigilance campaign; Sharing security information. - A cleared employee who meets frequently with a foreign national may be an example of which reportable event?
Answer: Foreign influence
Key Stakeholders and Participants in the NISP
The NISP operates as a collective effort among several entities:
- U.S. Government Agencies: Various federal agencies play a role in oversight, policy formulation, and compliance monitoring.
- Private Industries and Defense Contractors: Entities that engage in contracts or projects that require access to classified data.
- Research Institutions: Academic and research entities that collaborate on government projects requiring access to sensitive data.
Role of CI in Ensuring the Security of Classified Information
Counterintelligence (CI) operates as the shield against espionage, sabotage, and other malicious activities aimed at compromising national security. Within the NISP:
- Detection and Deterrence: CI activities help in identifying potential threats, providing a proactive line of defense against espionage attempts.
- Information Safeguarding: CI ensures that classified data, whether in transit or at rest, remains outside the reach of adversaries, thus maintaining the integrity of the information.
- Response and Recovery: Should a security incident occur, CI provides mechanisms for swift response, mitigation, and recovery, ensuring minimal damage and swift return to normal operations.
Benefits of Heightened CI Awareness for Industry Personnel
- Enhanced Security Posture: A well-informed workforce, aware of CI principles, can act as the first line of defense against potential threats.
- Efficient Threat Identification: With heightened CI awareness, industry personnel can better identify and report suspicious activities, ensuring timely interventions.
- Robust Collaboration: An understanding of CI promotes better coordination between industry entities and government agencies, fostering a collaborative approach to national security.
- Risk Mitigation: By being aware of the tactics, techniques, and procedures of adversaries, personnel can avoid potential pitfalls and traps set up to compromise information or operations.