Foreign intelligence entities, as well as terrorist groups non-state actors, use ____ means, both overtly and covertly, to steal U.S. national security information. correct answers human and technical
We know they are actively seeking acquired data on a range of sensitive topics of vital importa...
CRIM 350 Final || A Verified A+ Pass.
Foreign intelligence entities, as well as terrorist groups non-state actors, use ____ means, both
overtly and covertly, to steal U.S. national security information. correct answers human and
technical
We know they are actively seeking acquired data on a range of sensitive topics of vital
importance to our security -- from ____ from U.S. business and institutions in the fields of
energy, finance, defense, and dual-use technology. correct answers advanced weapons systems
and intelligence capabilities, to proprietary information
We also know that cyber tools and ____ are giving our adversaries new ways to steal valuable
data form the United States Government, academic institutions, and business -- oftentimes from
the safety of a computer thousands of miles away. correct answers new technologies
As the recent cyber intrusion against the Office of Personnel Management illustrated, even data
are at increased risk of being targeted by foreign adversaries. correct answers Federal agencies
that hold sensitive but not classified
The National Counterintelligence Strategy of the United States of America 2016 sets fort a
coordinated plan to detect, deter, and disrupt foreign threats by ____. correct answers
strengthening bonds and information sharing among government, academic institutions, and the
private sector
The National Counterintelligence Strategy of the United States of America 2016 (Strategy)
represents an ____ in our approach to a whole-of-government awareness of and response to
foreign intelligence entity (FIE) threats. correct answers evolution
The efforts to modernize and adapt have likewise provided opportunities for FIEs to expand their
scope of ____ against the U.S. Government. correct answers collection and operations
The United States remains vulnerable if it is only capable of ____ the threat. correct answers
recognizing
Recognition must be followed by means to ____ such threats. correct answers counter
Fully integrating counterintelligence (CI) and security into our business practices - from ____ - is
essential to preserving our national security. correct answers information technology and
acquisition to personnel decisions
We must work with our information ____ to defend our networks from FIEs attempting to steal
or compromise our sensitive data, information, and assets. correct answers assurance
professionals
We must bolster our ____ to disrupt the operations of FIEs, and foster widespread awareness and
application of CI. correct answers collection and analytic efforts, improve targeting
, The National Counterintelligence Strategy of the United States of America 2016 (Strategy) was
developed in accordance with the ____ (Pub.L.
No. 107-306, 116 Stat. 2283 (as amended) codified at 50 U.S.C.
sec. 3383 (d)(2)). (Purpose) correct answers Counterintelligence Enhancement Act of 2002
The Strategy sets forth how the United States (U.S.) Government will ____ foreign intelligence
entity (FIE) threats. (Purpose) correct answers identify, detect, exploit, disrupt, and neutralize
Each U.S. Government department and agency has a role in ____ this Strategy in the context of
its own mission and through application of its unique responsibilities and authorities. (Purpose)
correct answers implementing
Our adversaries include not only foreign intelligence services and their surrogates but also ____
with known or suspected ties to these entities. (Strategic Environment) correct answers terrorists,
cyber intruders, malicious insiders, transnational criminal organizations, and international
industrial competitors
Many use sophisticated ____ methods to compromise our national security. (Strategic
Environment) correct answers overt, covert, and clandestine
____ have enabled our adversaries to both broaden and tailor their approach to subvert our
defensive measures, harm and penetrate our information systems, steal sensitive data, and
otherwise degrade our instruments of national power. (Strategic Environment) correct answers
Technological advances
Successfully countering threats from FIEs requires the U.S., both ____, to ____ the threat
environment and ____ appropriate countermeasures.(Strategic Response) correct answers public
and private sectors ; recognize ; implement
While the authorities that govern CI and security and the programs they drive are distinct, their
respective actions must be ____ and coordinated to achieve results. (Strategic Response, Force
Multipliers) correct answers synchronized
CI and security interdependent and mutually supportive disciplines with ____ objectives
responsibilities associated with the protection of sensitive information and assets. (Strategic
Response, Force Multipliers) correct answers shared
Defending the increasingly complex networks and technology that house and process our
sensitive information against sophisticated 21st century threats requires a seamless and well-
coordinated four-pronged defensive approach compromising ____ working together as a team.
(Strategic Response, Force Multipliers) correct answers CI, security, information assurance (IA),
and cyber-security professionals
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.49. You're not tied to anything after your purchase.