COUNTERINTELLIGENCE
AWARENESS AND REPORTING
COURSE FOR DOD EXAM
Collections methods of operations frequently used by foreign intelligence entities to
collect information from dod on the critical technology being produced within the cleared
defense contractor facilities we support include: - Correct Answers -All of the above
-Unsolicited requests
-Attending international events
-Solicitation of services
-Cyber attacks
Counterintelligence as defined in Executive Order 12333, as amended, is "information
gathered and activities conducted to protect against espionage, other intelligence
activities, sabotage, or organizations or foreign persons, or international terrorist
activities." - Correct Answers –True
Foreign Intelligence Entity (FIE) is defined in DOD Directive 5240.06 as "any known or
suspected foreign organization, person, or group (public, private, or governmental) that
conducts intelligence activities to acquire U.S. information, block or impair U.S.
intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The
term includes foreign intelligence and security services and international terrorists." -
Correct Answers -True
Personnel who fail to report CI activities of concern as outlined in Enclosure 4 of DOD
Directive 5240.06 are subject to appropriate disciplinary action under regulations. -
Correct Answers -True
Which of the following is not an example of an anomaly? - Correct Answers -Foreign
diplomat attempts to defect
Under DODD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators
and Behaviors; which of the following is not reportable? - Correct Answers -None of
these
Foreign Intelligence Entities seldom use elicitation to extract information from people
who have access to classified or sensitive information. - Correct Answers -False
AWARENESS AND REPORTING
COURSE FOR DOD EXAM
Collections methods of operations frequently used by foreign intelligence entities to
collect information from dod on the critical technology being produced within the cleared
defense contractor facilities we support include: - Correct Answers -All of the above
-Unsolicited requests
-Attending international events
-Solicitation of services
-Cyber attacks
Counterintelligence as defined in Executive Order 12333, as amended, is "information
gathered and activities conducted to protect against espionage, other intelligence
activities, sabotage, or organizations or foreign persons, or international terrorist
activities." - Correct Answers –True
Foreign Intelligence Entity (FIE) is defined in DOD Directive 5240.06 as "any known or
suspected foreign organization, person, or group (public, private, or governmental) that
conducts intelligence activities to acquire U.S. information, block or impair U.S.
intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The
term includes foreign intelligence and security services and international terrorists." -
Correct Answers -True
Personnel who fail to report CI activities of concern as outlined in Enclosure 4 of DOD
Directive 5240.06 are subject to appropriate disciplinary action under regulations. -
Correct Answers -True
Which of the following is not an example of an anomaly? - Correct Answers -Foreign
diplomat attempts to defect
Under DODD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators
and Behaviors; which of the following is not reportable? - Correct Answers -None of
these
Foreign Intelligence Entities seldom use elicitation to extract information from people
who have access to classified or sensitive information. - Correct Answers -False