I Hate CBT's

View Original

JKO Counterintelligence Awareness and Reporting (Pre-Test)

select all that apply. counterintelligence (CI) pre- and post-foreign travel briefs support you by providing:

_ defensive actions needed to defeat threats
_ information on local and regional threat environments
_ reportable activity guidelines
_ travel area intelligence and security practices and procedures

communicating information about the national defense to injure the U.S. or give advantage to a foreign nation is called:

espionage

it is acceptable to discuss sensitive information such as travel plans in taxis, buses, or other public transportation while traveling in foreign countries.

false

terrorist organizations are considered foreign intelligence entities by the U.S..

true

unclassified information can be collected to produce information that, when put together, would be considered classified.

true

all requests to transport media back to the U.S. on behalf of a foreign country must be reported to your counterintelligence representative.

true

foreign adversary use of social networking services causes which of the following concerns?

all of the answers are correct

select all that apply. human intelligence (HUMINT) targeting methods include which of the following?

_ relationship building
_ elicitation
_ cold pitching
_passive collection

a foreign power activity or knowledge that is inconsistent with the expected norms that suggest prior foreign knowledge of U.S. national security information, processes or capabilities is defined as:

anomaly

what percentage of information collected is unclassified?

80 - 85%

impairment of a signals intelligence collection platform or an unexplained compromise of U.S. intelligence operations are examles of:

an anomaly

the internet and social networking services have allowed:

all of the above

elicitation can be best described as a guided conversation with a concealed purpose.

true

espionage is described as:

the act of obtaining transmitting, communication or receiving information about the national defense with the intent, or reason to believe, that the information may be used to the injury of the U.S. or to the advantage of any foreign nation

information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or international terrorist activities, but not including personnel, physical, document or communications security programs is the definition:

counterintelligence

modus operandi of foreign intelligence entities regarding physical surveillance can be conducted at work, home and hotels.

true

when traveling overseas do not attempt to connect to government networks using cyber café due to the possibility of foreign intelligence entities, cyber criminals and hackers accessing your wireless gadgets.

true

although not all encompassing per DoDD 5240.06 which of the following must be reported to your counterintelligence representative:

all of the answers are correct


GOVT 482 Counterintelligence Test 1

Manipulation, disinformation, & falsifying of evidence would be counted as what time of operation?

Deception Operations designed to conceal ones disposition, capabilities, and intentions

Contrast the goals of law enforcement with the goals of counter intelligence.

Law enforcement seeks to arrest a target to serve justice, while intelligence seeks to unravel the enemies operations and may choose not to apprehend an enemy spy.

What was the lesson of the Ahmed Ghailani trial in New York City in 2010?

Information gathered covertly cannot be used in court. That is why intelligence targets should not be tried in civilian courts.

Be able to define a live drop.

People are recruited to receive letters or packages to be forwarded elsewhere. Frequent dummy letters are sent to maintain security.

Be able to identify activities and efforts to deceive an enemy.

Manipulation, disinformation, & falsifying of evidence can be used as well as distortion of friendly activities. Such as using false radio signals, inflatable dummies, or spreading false information through news outlets.

Case officers generally require at least how many identities and "William Martin" in The Man Who Never Was required how many items of documentation to establish his identity?

Case officers require at least 3 identities; William Martin had 41 pieces of identifying information.

Be able to explain how the KGB established the Gordon Lonsdale identity.

The actual Gordon Lonsdale was Canadian but died while in the Soviet Union. The NKVD used that identity and gave it to Konon Molody since he had lived in the US for years and could easily pose as Gordon.

Understand the accomplishment of Security and surprise within the context of military operations.

Speed of movement and diminishing the enemy's capability of moving against friendly forces.

Be able to define Deception.

Deception is an operation designed to conceal our dispositions, capabilities and intentions.

Understand key aspects of SECRECY DISCIPLINE.

This is the training of all personnel against divulging classified information. It involves at a basic level just not talking about classified or really any aspect of the job. Locking up information and making sure that no one without clearance can access information.

Be able to cite an examples of civilian counter intelligence operations.

Distribution of ration cards, work permits, travel permits.

Distinguish between value, threat, vulnerability, & countermeasures.

-Value: The worth of information.
-Threat: entities that target friendly assets.
-Vulnerability: Organizational weaknesses.
-Countermeasures: Steps taken to minimize vulnerabilities.

Understand shortcomings of the polygraph.
For which of these people ~ sociopath, professional intelligence officer, victim of torture ~ would be polygraph be lease reliable?

A polygraph can "catch" innocent people and prevent them from having jobs. A sociopath could easily pass a test because he feels no guilt and would not be nervous during the test.

Be able to explain key aspects of operations security (OPSEC).

identify critical information, analyze threats and vulnerabilities and manage the risk.

Know the guidelines for use of the polygraph including rehearsing of questions.

Questions are asked that are informal and easy for the purpose of creating a baseline. Interspersed among that are questions that will trip up people who are lying such as "are you a Russian Spy?" Rehearsing questions before they are asked can help an answer that is truthful to appear as truthful even if it is shocking.

What must be done if interrogating a person in his home or office?

Place a guard at the door, move furniture in such a way as to be in a commanding location. Make the person being interrogated feel isolated.

Know the functions and history of the Counter Intelligence Field Activity (CIFA)

2002 through 2008 the CIFA oversaw all DOD counter intelligence operations; it was absorbed by the DIA.

The polygraph actually measures what things?

(a) blood pressure & pulse, (b) perspiration rate, and (c) breathing pattern

William Melville

Britain's first spy catcher worked against the IRA.

Nicholai Yezhov

Head of the NKVD that oversaw the purge of the security apparatus. Killed over a million people

Genrich Yagoda

NKVD head that oversaw the purge of Old Bolsheviks.

Nikolai Khokhlov

KGB officer, who defected to the United States in 1954. He testified about KGB activities

James Jesus Angleton

Head of CIA counter intel, forced into retirement. Coined the term "wilderness of mirrors"

Felix Dzerzhinsky

Polish born brutal founder of the Cheka.

Explain the objectives of a security program.

Achieving security while maintaining a cost effective level of risk. Guarding intelligence without spending more money or effort than it is worth.

Distinguish between the three types of drops:

A live drop is when people recruited to receive letters or packages to be forwarded elsewhere.
A dead drop is any hiding place from which an agent can retrieve material.
A Phone drop is either prepay phones, or a listen number forwarded to a different place to protect the agents identity. Equivalent of dead drop but with phone instead.

Be able to identify the four components of the risk equation.

Value, threat, vulnerability, and countermeasures.


Counter Intelligence Operations

Brush pass

A brief operational encounter (seconds or less) in which the case officer passes something (verbally or physically) to or receives something from the agent, or a two-way exchange takes place.

What is tradecraft?

Specialized methods and equipment used in the organization and activity of intelligence organizations, especially techniques and methods for handling communications with agents

cipher

the generic term for a technique (or algorithm) that performs encryption

Letters and words under an algorithm that has a method of hiding words or text with encryption by replacing original letters with other letters, numbers and symbols through substitution

dangle operations

is a person controlled by one intelligence service who is made to appear as a lucrative and exploitable target to an opposing intelligence service -- KGB trying to get one of their guys to be recruited by the CIA as a source, but is really collecting info on the CIA

Dead Drop

A secret location where materials can be left in concealment for another party to retrieve. This eliminates the need for direct contact in hostile situations.

double agent

an agent who pretends to act as a spy for one country or organization while in fact acting on behalf of an enemy.

dry cleaning

Actions taken to determine if one is under surveillance -- counter surveillance

false flag operation

describes covert operations that are designed to deceive in such a way that the operations appear as though they are being carried out by entities, groups, or nations other than those who actually planned and executed them -- ex: FBI agents disguised as KBG agents who then attack an Air Force base, giving the FBI the justification to attack the Soviets

honey trap

A covert operation that is intended to sexually compromise an opponent. It is usually done to compromise someone so that he or she can be blackmailed.

counterintelligence

information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers

Defensive Counterintelligence

Thwarting efforts by hostile intelligence services to penetrate your service

negative counterintelligence

the attempt to stop the collection of information or fool those getting that information by ensuring that they got false news/information -- counter-espionage

Offensive Counterintelligence

having identified an opponent's efforts against one's own system, trying to manipulate these attacks either by turning the opponent's agents into double agents or by feeding them false information that they report home

Church Committee

A precursor to the U.S. Senate Select Committee on Intelligence, the committee investigated intelligence gathering for illegality by the Central Intelligence Agency (CIA) and Federal Bureau of Investigation (FBI) after certain activities had been revealed by the Watergate affair.

Secret Service

metaphor for detectives, police officers, spies, etc. in the 1800s

Senate Select Committee on Intelligence

U.S. Senate Committee that oversees the intelligence activities and programs of the United States Government

Mole

A member of an organization who is spying and reporting on his/her own organization on behalf of a foreign country; also called a penetration

British Security Coordination (BSC)

-1940, established and led by William Stephenson in NY
-was a covert organization set up in New York City by the British Secret Intelligence Service (MI6) in May 1940 upon the authorization of the Prime Minister, Winston Churchill
-Its purpose was to investigate enemy activities, prevent sabotage against British interests in the Americas, and mobilize pro-British opinion in the Americas
-Worked with William Donovan (OSS)

handler

An intelligence officer or co-opted worker directly responsible for the operational activities of an agent; also agent handler or case officer

cover

Those measures necessary to give protection to a person, plan, operation, formation, or installation from enemy intelligence effort and leakage of information

code

a system of substitution to make a text secret that consists of "words, phrases, letters and syllables with the codewords or codenumbers (or, more generally, the codegroups) that replace the plaintext elements."

collection

gaining information about an opponent's intelligence collection capabilities that may be aimed at one's own country

James Angleton

CIA Counterintelligence Chief from 1954-74 who was convinced a Soviet "Mole" had penetrated the CIA. Searched within CIA caused a lot of disruption due to lack of trust among employees

Yuri Nosenko

Defector from the USSR and CIA source who claimed to have seen Lee Harvey Oswald's KGB file. He was set to testify before the Warren Commission until information from Golitsyn led the CIA to suspect Nosenko of being a KGB plant, which led to his intensive interrogation and solitary confinement from 1964-67, during which he never broke

Anatoly Golitsyn

defected from the Soviet Union in 1961, told the US that all spies after him would be a false defector

Kim Philby

high-ranking member of British intelligence who worked as a double agent before defecting to the Soviet Union in 1963 -- he exposed Golitsyn as a double agent

Allen Pinkerton

a Scottish American detective and spy, best known for creating the Pinkerton National Detective Agency (1850 in Chicago) -- private detective agency

Benjamin Tallmadge

an American military officer, spy master, and politician. He is best known for his service as an officer in the Continental Army during the American Revolutionary War -- leader of the Culper Spy Ring

Herbert Yardley

-Father of Signal, genius coder, Clerk in State Department
-Built Black Chamber to intercept and break Japanese diplomatic codes
-Eventually turned and told Japan how we decrypted all of their messages
-Could not be charged for treason because it wasn't a civilian crime at the time

William Sebold

-Double agent responsible for uncovering Ritter/Duquesne ring (1941)
-Forcibly recruited by the Germans
-February 1940 walks into FBI and offers to become a double agent
-Exposes full extent of German and Japanese espionage in the US
-Identified and successfully help prosecute 33 Abwehr spies

Ritter/Duquesne ring (1941)

massive ring of Nazi spies operating on U.S. soil—33 in all

By December 13, 1941 -- every member of the group had either pled guilty or been convicted at trial, including its ringleader Fritz Duquesne

National Counterintelligence and Security Center

leads all counterintelligence operations in the US

is part of the Office of the Director of National Intelligence (ODNI).

Attorney General Guidelines for Counterintelligence

-provide the framework for ensuring that the CIA engages in its foreign intelligence, counterintelligence, and covert action missions in support of national security objectives in a manner that respects Americans' privacy rights and civil liberties, it is critical to note that the Attorney General Guidelines represent only one aspect of the authorizations and restrictions on the CIA's intelligence activities

John Jay

directed clandestine operatives and ran counterintelligence missions during the American Revolution -- first chief of American counterintelligence

X-2 aircraft

-plane to explore aerodynamic problems of supersonic flight
-Formed in 1943
-Responsible for identifying and neutralizing German intelligence activity abroad
-Penetrate the German military

BOURBON/TOP HAT

Dmitri Fyodorovich Polyakova
-ranking GRU officer, and a prominent Cold War spy who revealed Soviet secrets to the FBI and the Central Intelligence Agency
-In the CIA, he was known by code names BOURBON
while FBI knew him as TOPHAT

Culper Spy Ring

A group of spies that pretend to be normal people and collect information for George Washington, commander of the Continental Army who proved capable of using many different tactics to win the war.

Operation Bodyguard

-Code name for a WWII deception plan employed by the Allied states before the 1944 invasion of north-west Europe
-Plan was to intend to mislead the German high command as to the time and place of the invasion -- Fake "D-Day" Invasion

Operation CHAOS (1967)

-CIA operation within the country from 1965 to 73 that collected information on and disrupted anti-Vietnam war elements
-although it is illegal for the CIA to operate within the US, it collected files on over 7000 Americans
-mission was to uncover possible foreign influence on domestic race, anti-war and other protest movements

Operation SOLO

-long-running FBI program to infiltrate the Communist Party of the United States and gather intelligence about its relationship to the Union of Soviet Socialist Republics, China, and other communist nations
-It officially began in 1958 and ended in 1977, although Morris and Jack Childs, two of the principal agents in the operation, had been involved with the Bureau for several years prior

Zimmerman Telegram

March 1917. Sent from German Foreign Secretary, addressed to German minister in Mexico City. Mexico should attack the US if US goes to war with Germany (needed that advantage due to Mexico's promixity to the US). In return, Germany would give back Texas, NM, Arizona etc to Mexico.

Venona Project

-a counter-intelligence program initiated by the United States Army Signal Intelligence Service (a forerunner of the National Security Agency) that lasted from 1943 to 1980
-The program attempted to decrypt messages sent by Soviet Union intelligence agencies, including its foreign intelligence service and military intelligence services

Double Cross Program

-WW2 counter-espionage and deception operation run by British Security Services (MI5)
-Nazi agents in Britain - real and false - were captured, turned themselves in or simply announced themselves, and were then used by the British to broadcast mainly disinformation to their Nazi controllers

COINTELLPRO

series of covert and illegal projects conducted by the FBI aimed at surveilling, infiltrating, discrediting, and disrupting domestic American political organizations such as the US Communist Party, the KKK and the Black Panther Party

Federal Communications Act of 1934

The Congressional act that turned the Federal Radio Commission into a larger Federal Communications Commission, with responsibilities for regulating the telephone and telegraph industry as well as the radio broadcasting industry.

FOIA -1966-Freedom of Information Act

-US federal law that grants the public access to information possessed by government agencies
-government officials are required to disclose data unless it falls under one of the nine exceptions:
1. Classified information - damages national security
2. Internal information involving personnel rules and agency practices
3. Material specifically shielded from disclosure by another law
4. Confidential commercial or financial data (trade secrets)
5. Records that would be privileged in litigation
6. Information that would invade someone's privacy
7. Law enforcement records
8. Information related to government regulation of financial institutions
9. Certain geological/geographical data

FISA (Foreign Intelligence Surveillance Act)

establishes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers" suspected of espionage or terrorism.

CIPA (Classified Information Procedures Act) 1978

balances the right of a criminal defendant with the right of the state to know in advance of a potential threat from a criminal prosecution to its national security

FARA 1938 -- Foreign Agents Registration Act

-requiring that agents representing the interests of foreign powers in a "political or quasi-political capacity" disclose their relationship with the foreign government and information about related activities and finances. --
-The purpose is to facilitate "evaluation by the government and the American people of the statements and activities of such persons."

Olmsted v. United States (1928)

Supreme Court reviewed whether the use of wiretapped private telephone conversations, obtained by federal agents without judicial approval and subsequently used as evidence, constituted a violation of the defendant's rights provided by the 4th & 5th Amendment

U.S. v U.S. District Court (Keith case) (1972)

-The Supreme Court upheld the prior rulings in the case, holding that the wiretaps were an unconstitutional violation of the Fourth Amendment and as such must be disclosed to the defense
-This established the precedent that a warrant needed to be obtained before beginning electronic surveillance even if domestic security issues were involved
-Note that the decision applied only to domestic issues; foreign intelligence operations were not bound by the same standards

The "Wilderness of Mirrors"?

-the confusion of the world of intelligence and espionage
- James Angleton wrote that the "Wilderness of Mirrors" consists of the myriad stratagems, deceptions and all the other devices of disinformation that the Soviet Union and its coordinated intelligence services used to confuse and split the West, producing an ever-fluid landscape where fact and illusion merge.

What is FancyBear/Apt28

a Russian cyber espionage group associated with the Russian military intelligence agency GRU
thought to be responsible for cyber attacks on the German parliament, the Norwegian parliament, the French television station TV5Monde, the White House,

What is a damage assessment?

Damage assessments are used within the counterintelligence (Cl) and security communities to evaluate actual or potential damage to national security resulting from the unauthorized disclosure or compromise of classified national intelligence.

What was operation CKTAW?

was a wiretap on underground communications lines that linked the Krasnaya Pakhra Nuclear Weapons Research Institute in the closed city of Troitsk to the Soviet Ministry of Defense in Moscow

What is Operation Famish?

- was the FBI codename for a series of national security policy decisions implemented March-November 1986
Eighty KGB and GRU officers were ordered to leave the United States
- response to increasing Soviet espionage that culminated in 1985 in what the media called the Year of the Spy

What was the Midyear Review?

FBI opened a criminal investigation into Hillary Clinton's handling of classified information while secretary of state

Parlor Maid

Katrina Yueng

Had affairs with 2 FBI Agents (Cleveland and Smith) -- relationship with Cleveland led to her downfall

who was Katrina Yueng?

since the 80s she had been regarded as one of the most valuable assets in the FBI's Chinese espionage network

Had affairs with her FBI handlers & was a double agent working for the Chinese

Operation Ghost Stories

SVR "illegals," as they were called, never got their hands on any classified documents, their intent from the start was serious, well-funded by the SVR, and far-ranging

2010 - 10 Russian spies were arrested

What are the Pentagon Papers?

a secret Department of Defense study of U.S. political and military involvement in Vietnam from 1945 to 1967

Church Committee

A precursor to the U.S. Senate Select Committee on Intelligence, the committee investigated intelligence gathering for illegality by the Central Intelligence Agency (CIA) and Federal Bureau of Investigation (FBI) after certain activities had been revealed by the Watergate affair.

Who was Vitaly Yurchenko?

- Former KGB officer in the Soviet Union who defected to the United States during an assignment in Rome
- Yurchenko identified two American intelligence officers as KGB agents: Ronald Pelton & Edward Lee Howard
- Defected back to the USSR -- announced he had been kidnapped and drugged by the Americans -- is possible that his defection was staged to fool the CIA with wrong leads, to protect Aldrich Ames, an American who worked for the CIA and was then one of the Soviet Union's most important moles within the CIA

who is Paul Redmond?

Led the investigation to find Ames

In the 1980s, Paul Redmond was chief of the counterintelligence group in the Soviet-East European

Who is Brian Regan?

- Worked for the NRO
- former Air Force intelligence officer who stole thousands of classified documents and tried to sell them to China, Iraq, and Libya
- He was unsuccessful --- unknown informant at the Libyan consulate in NYC mailed the documents to Steve Carr in DC
- Arrested 2 weeks prior to 9/11

Brian Kelley

US counterintelligence expert at CIA who helped focus attention on a possible Russian spy in Washington

Was wrongly suspected of being a K.G.B. mole himself --- interrogated, suspended, and told that he might well be charged with a capital offense ---- he was looking for Robert Hanssen

Who was Robert Hanssen?

Worked in the FBI counterintelligence office, primarily against the USSR before he turned in 1979 and started spying for USSR

Spied off and on for a period of 20 years

J. Edgar Hoover

The director of the Federal Bureau of Investigation who investigated and harassed alleged radicals

issued directives governing COINTELPRO, ordering FBI agents to "expose, disrupt, misdirect, discredit, or otherwise neutralize" the activities of these movements and especially their leaders

Daniel Ellsberg, Pentagon Papers

Leaked the Pentagon Papers to the Press

Who is Sandra Grimes?

former CIA officer who participated in a small team that investigated and uncovered the actions of Aldrich Ames

Jean Vertefeuille

CIA analyst

Ames tried in the late 1980s to divert the attention of mole hunters to CIA officer Jeanne Vertefeuille

Aldrich Ames (CIA)

This former CIA employee and his wife were involved in espionage activities with the Russian government for over 9 years:

Ana Montes

former senior analyst at the DIA & Cuba expert

In 2001, she was arrested and subsequently charged with espionage for Cuba.

Jim Milburn

FBI counterintelligence who specialized in Soviet counterintelligence

assigned to read the debriefings of Soviet defectors and reports of Soviet intelligence sources who had, over the years, been recruited as spies by the FBI

Sergei Motorin

supplied names of KGB officers at the embassy in return for $100 to $200 a meeting and $500 in an escrow account

He returned to Moscow under normal rotation in 1984, a year after his FBI recruitment -- Six months later he was exposed by Ames, arrested, and later executed

Michael Rochford

worked Foreign Counter Intelligence (FCI) cases for most of his career

solved cases as Aldrich Ames and Earl Pitts, and worked to identif y six unknown subjects, government spies the FBI and CIA had been for years trying to uncover

He recruited the source, a Russian agent of the KGB/SVR, who provided the information that led to Hanssen's identification

Economic Espionage Act (1996)

a law that makes the theft of trade secrets by foreign entities a federal crime in the United States

defines the term "economic espionage" as the theft or misappropriation of a trade secret with the intent or knowledge that the offense will benefit any foreign government, foreign instrumentality, or foreign agent

CIPA (1980) Classified Information Procedures Act

limit the practice of graymail by criminal defendants in possession of sensitive government secrets. "Graymail" refers to the threat by a criminal defendant to disclose classified information during the course of a trial.


Counter-Intelligence Midterm

Attorney General Guidelines

Guidelines concerning the FBI's domestic operations. The guidelines were created by the attorney general and help by emphasizing early detection, prevention, and interagency cooperation.

British Security Coordination

A covert organization set up in New York City by the British Intelligence Agency. The purpose was to investigate enemy activities, prevent sabotage of British interests, and increase pro-British feelings in the US.

Church Committee

A 1975 US Senate committee that investigates the CIA and other agencies, abuses. The effort led to a permanent establishment of the US senate select committee on Intelligence.

CounterIntelligence

Information gathered and activities conducted to identify, deceive, exploit, disrupt or protect against espionage and other activities carried out by foreign states or non-state actors.

Defensive Counterintelligence

Thwarting efforts by hostile intelligence services to penetrate your service.

Molehunt

An investigation that has the ultimate goal of catching moles or other informants.

National Counterintelligence and Security Center

Leads national counterintelligence for the US government. It is part of the office of the Director of National Intelligence. Allows the counterintelligence community to asses, prioritize, and counter intelligence threats all over the world. It was formed in 2001.

Negative Intelligence

Prior to the 1920s, intelligence was referred to as positive intelligence. Negative intelligence was its opposite. It is the attempt to stop the collection of information or fool foreign agents by giving false information. It was a early synonym for counter-Intelligence.

Offensive CounterIntelligence

Consists of attempting to turn enemy agents into double agents or giving them false/misleading information once they've been identified.

Secret Service

A metaphor for detectives, spies, and police in the late 1800s-early 1900s.

SSCI

US Senate Select Committee on Intelligence. It is dedicated to overseeing the intelligence community. Membership is temporary and rotating. They conduct investigations, audits, and inspections of intelligence activities and programs.

Wilderness of Mirrors

A metaphor that explains counterintelligence. The agent is a spider. The weevil is the mole, and the field is a wilderness of mirrors. The spider is always trying to catch the weevil however, he can easily become confused due to all the distractions.

X-2

The program created units that passed intelligence between the army and the OSS. The officers handled collecting and exploiting enemy intelligence as well as supplying information on axis intelligence agencies to the army.

Brush Past

Also known as a brush contact. Used to exchange intelligence without having to stop, talk to the person, or be seen with them for an amount of time.

Cipher

An algorithm used for preforming encryption or decryption. Involves hiding words or phrases in encryption by replacing original letters with other letter, numbers, or symbols through substitution.

Dangle Operation

Involves trying to get recruited as a double agent to collect information on other agents and discover how the foreign intelligence service works.

Dead Drop

Used to pass items or information between two individuals using a secret location. Allows for indirect meetings and therefore, increased security.

Double Agent

An agent who pretends to act as a spy for one country or organization while in fact acting on behalf of an enemy. A spy in the service of two rival countries.

Dry Cleaning

A technique that helps discern how many tails an agent has. Once the number has been determined, the agent uses different maneuvers to loose the tails.

False Flag Operation

Describes covert operations that are designed to deceive in such a way that the operations appear as though they are being carried out by entities, groups, or nations other than those who actually planned and executed them.

Honey Trap

Involves a covert agent (usually female) creating a sexual or romantic relationship to compromise a foreign enemy target (usually male).

COINTELPRO

An FBI program that began in 1956 and continued until 1971. It sought to expose, disrupt, and discredit groups considered to be radical political organizations. It also used extralegal means to criminalize various forms of political struggle, and derail several socialist movements. Used physical surveillance, anonymous mailings, and police harassment.

Culper Spy Ring

Allowed the continental army to gather intelligence efficiently in New York while it was occupied by the British. It was created by Talmadge and used a set of codes/signals to pass information through New York.

Double Cross Program

A WWII anti-espionage operation of MI5. Involved using turned nazi agents to relay misinformation to their nazi superiors. Originally began as a way to gather enemy information. However, the efforts eventually switched to outright misinforming the Germans.

BODYGUARD

A WWII Allies plan. It began before the invasion of north-west Europe. It involved misleading the Nazi command on the time and place of the invasion force. Culminated with the landing on Normandy beaches on D-day and the ally victory.

CHAOS

A CIA project designed to uncover foreign influence on anti-war and other protest movements. It was a domestic operation that ran for almost ten years and involved physical surveillance and electronic eavesdropping.

SOLO

An FBI program to infiltrate the communist party of the US and gather information on its relationship to foreign powers such as Russia and China.

Vernona Decrypts

Ran from 1943-1980. It was used to decrypt messages sent by various Russian agencies. During the 37 years of operation, over 3,000 messages were translated.

Zimmerman Telegram

A telegram sent from Germany to Mexico that outlined an alliance in the event the US entered WWI. Intercepted by the British and led to the US's entrance into the war. Widely considered the most significant intelligence triumph of the British during the war.

Allen Pinkerton

Served as the head of the Union army's intelligence. Helped identify and thwart a plot to kill Lincoln and also identified enemy troop size. Served undercover in the confederate army. Later formed the Pinkerton National Detective Agency.

Benjamin Tallmadge

George Washington's spymaster and leader of the Culper Spy Ring. Led the ring so well that none of his agents were discovered. Eventually served in the House of Representatives.

BOURBON/TOP HAT

Dimitri Polyakov was a Cold War spy who told the FBI soviet secrets. He was known as BOURBON by the CIA and TOPHAT by the FBI. He was eventually captured and executed by the KGB.

Herbert Yardley

He was an American cryptologist who founded the Black Chamber which helped to crack many Japanese codes.

James Angleton

Chief of counterintelligence at the CIA. He wanted to find moles within the CIA and led many intensive searches to find them. Famously known for the phrase "Wilderness of Mirrors".

John Jay

The father of American Counterintelligence. He created a committee dedicated to rooting out spies in the revolutionary war. He was also the first chief justice of the US.

John Wilkie

Chief of the US secret service and an American journalist.

Willian Sebold

US citizen who became a German Spy and later a double agent for the FBI. Another agent informed him of 33 other agents working against the US. Due to Sebold's efforts, all were caught and incarcerated.

CIPA (1978) (Classified Information Protection Act)

-Act designed to protect classified information from exposure while providing protections to the defendants civil rights in US courts.
-Enacted to prevent "graymail"

FARA (1938)
(Foreign Agents Run Away)

- Sought to expose foreign influence in American politics.
- Wanted to make a public record of attempts to spread propaganda and foreign agenda.

Federal Communications Act (1934)
(Frisky Communications Anonymous)

- Regulated wired and wireless transmissions and carriers.
- Made is illegal to intercept/divulge private communications.

FISA/FISC

(Finally Invented Secret Cooperation/Agency)

- Created a special court over issuance of warrants for electronic surveillance in foreign intelligence issues.
- Meets in secret and hears warrant applications.
- Decisions remain secret.

FOIA (1966)

- Freedom of information act.
- Gives the US public the right to request records from any federal agency.
- Keeps citizens in the know about their government.

Olmsted v. United States (1928)
(Let Olmsted Protect his Homestead)

- Dealt with the issues of using wiretapped telephone conversations as evidence.
- USSC rules that wiretapping wasn't illegal therefore evidence from wiretaps was not inadmissible under the fourth amendment.

U.S. v. U.S. District Court (Keith Case)
(District Court hates Domestic Security)

- Government officials must obtain a warrant before electronic surveillance even if it involves domestic security.


ACQ101 Module Counter Intelligence Support and Resources

Intelligence community organizations fall into one of three groups. Which of the following organizations execute national intelligence at the department level?

treasury office of intelligence and analysis

Which of the following organizations provides geospatial intelligence in support of counterintelligence activities?

director, national geospatial intelligence agency

Select the milestone acquisition document that describes the plan, responsibilities, and decision for all critical program information protection activities?

PPP program protection plan

Program Protection Plans are required by the dodi 5000.02 and the ?

dodi 5200.39

If a critical intelligence parameter CIP is breached the program office must be notified in accordance with DIAI 5000.002?

true

Select the dod reference that address the risk management framework RMF for information technology IT systems

dodi 8510.01

What is a sub-unified command subordinate to USSTRATCOM?

United states cyber command USCYBER

This statement best describes which pillar of cybersecurity? Protection against an individual falsely denying having performed a particular action. Provides the capability to determine if an individual took a particular action.

non-repudiation

Which of the following organizations provides signals intelligence in support of CI activities?

Director, National security agency chief, central security service DIRNSA/CHCSS

The Program Protection Plan (PPP) is the milestone acquisition document that describes the plan, responsibilities, and decisions for all program protection activities.

true

The Under Secretary of Defense for Acquisition, Technology andLogistics, USD (AT&L) is responsible for ensuring that policy andprocedures for developing program protection plans required by DoDI5200.39 address cybersecurity in accordance with DoDI 8500.01.

true

ODNI is?

office of the director national intelligence

Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication refers to:

cybersecurity

Counterintelligence CI organizations need information that describes the Critical Program Information (CPI) and its projected use to determine the foreign collection threat to an acquisition program and subsequently the program acquisition strategy.

true

USCYBERCOM is a sub-unified command subordinate to USSTRATCOM?

true

Given periodic CI updates, the PM has to stay abreast of those updates as they impact the Acquisition Strategy in terms of overall program risk; and cost, schedule and performance.

true

Nearly all defense systems incorporate information technology (IT) in some form, and can be vulnerable to cyber-attack. This means that cybersecurity applies to weapons systems and platforms; Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) systems; and information systems and networks

true

Select the DoD reference that addresses cybersecurity for Information Technology (IT) Systems?

dodi 8510.01

The overall efforts of the Intelligence Community (IC) are administered by the Office of the Director of National Intelligence (ODNI), which is led by the Director of National Intelligence (DNI)?

true

Built in

built in furniture
elevators
heating systems
electrical systems

loose

loose furniture
filing cabinets
telephones

DoD's goals are to obtain private capital to:

leverage govt dollars
make efficient use of limited resources
use private sector approaches to build and renovate military housing faster and at lower cost

life cycle of a facility phases

planning
design
construction
facilities
sustainment
disposal

this is applied to emergencies caused by natural disasters, terrorist, subversives, or military operations

contingency engineering

this issue is one of the Special Considerations

housing

this unit includes the group known as Prime BEEF

Air Force Engineers

its phases include Planning, Design, Construction, Facilities Sustainment, and Disposal

life cycle of a facility

Compliance w/ ESOH

facility's life cycle

natural resources are one example

special considerations in a life cycle of a facility

planning, rapid response, and special procedures are parts of this

contingency engineering

this area can cause someone to be held personally and criminally liable both for improper actions and for failing to take actions required by law

environmental area

consideration is given to impacts on utility requirements at this stage

when proposing changes to an installation's mission or weapon system

Intelligence Community organizations fall into one of three groups. Which of the following organizations belong to the Program Managers group?

central intelligence agency and the national reconnaissance office are program managers. Other program managers include the Defense Intelligence Agency, the FBI National Security Branch, the National Geospatial- Intelligence Agency, and the national Security agency.

which of the following manages the Execution of National Intelligence at the Departmental level?

treasury office of intelligence and analysis supports national intelligence by serving their parent dept. and managing their intelligence needs. DNI coordinates w/ all IC agencies. NRO is at the Program management level and advises ODNI. ONI operates at the service level

five pillars of cyber security

availability integrity authentication confidentiality non- repudiation

which term is defined as "preventation of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including info contained therein, to ensure its availability integrity, authentication, confidentiality, and nonrepudiation."

cybersecurity

which DoD instructions stress the need for cybersecurity throughout the acquisition and IT life cycle?

Dodi 5000.02
5200.39
8500.01
8510.01
5240.10

which organization serves as the defense Counterintelligence manager to provide for centralized management of DoD CI activites

director, Defense Intelligence Agency

which organization provides CI functional services and analysis in support of international arms control agreements

director, defense threat reduction agency

Select the DoD reference that address the risk management framework for information technology systems

DoDI 8510.01

as of 4 may 2018, was designated as a full and independent Unified Combatant Command

united states cyber command (USCYBERCOM)

departmental level

at this level there are IC components within govt dept outside of the DoD that supports the execution of National Intelligence, but whos focus is serving and managing their parent dept intelligence

CTA

capstone threat assessments

DoDI

5240.10 supports the combatant commands with CI

director, national security agency/ chief, central security service

under the authority, direction, and control of the USD (I) provides signals intelligence in support of CI activities

DoD component heads

est. and resource CI elements to conduct CI activities as authorized. they may request CI support in accordance with DODI 524.10

director of national intelligence

oversees the 17 federal org. that make up the ci