Alms Tarp
39 community-sourced questions and answers. Free — no login.
Threat Awareness and Reporting Program (TARP)
An Army regulation providing policy and responsibilities for threat awareness and education and establishes a requirement for Dept. of Army personnel to report any incident of known or suspected espionage, int'l terrorism, sabotage, subversion, theft or diversion of mil. tech., info. systems intrusions, and unauthorized disclosure of classified information
Terrorism
The calculated use of violence or threat of violence to inculcate fear, intended to coerce or to intimidate governments or societies. They seek to gain publicity for their cause
Subversion
Actively encouraging Military or Civilian personnel of the DoD to violate laws, disobey lawful orders or regulations or disrupt military activities, with the willful intent to impair loyalty, morale or discipline of U.S. military forces.
Espionage
Intentionally obtaining, delivering, transmitting, communicating, or receiving national defense related information with reason to believe that the information may be used to the injury of the United States or to the advantage of any foreign nation.
Treason
Violation of the allegiance owed to one's sovereign or state; betrayal of one's country. Aiding or attempting to aid the enemy. Knowingly harboring, protecting or giving intelligence to, communicating or corresponding with the enemy.
Sedition
Knowingly or willfully advocating or teaching the duty or necessity of overthrowing the U.S. government or any political subdivision therein by force or violence.
Sabotage (Foreign Intelligence Service Involvement)
Acts to injure or destroy material or facilities including human or natural resources that would damage national security.
Insider Threat
A malicious danger to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.
Foreign Adversaries
This category encompasses nations with a significant conventional military capacity such as a standing Army. Most nations with which the United States has less than friendly relations could fall into this category.
Foreign Intelligence Services
Agencies from foreign governments, such as the Pakistani ISI or the Chinese Ministry of State Security, collect a wide array of information and technology at the behest of their respective governments that can constitute a significant threat to national security.
International Terrorists Organizations
These are what most people think of when they hear the word 'terrorist.' Most are based on some type of religious fundamentalism, but others may be based on other platforms such as nationalism or ethnicity. Examples of well-known terrorist groups are Al Qaeda, Hezbollah, and Hamas
Domestic Terrorism
Since the bombing of a federal building in Oklahoma in 1995, a new category has been created to fully address the new threat. Similar to other terrorist organizations, domestic groups use violence for their own ends. The motivation varies greatly among domestic groups, ranging from ecological concerns to resentment of government authority.
Traditional Allies/Economic Competitors
Not every ally of the United States is necessarily a friend. Some relationships between governments exist as a matter of political or economic expediency where each has something that it wants or needs from the other. These countries may use methods such as industrial espionage to gain access to materials and technologies in order to gain a significant political or economic advantage.
Greed or Financial Need
A belief that money can fix anything. Excessive debt or overwhelming expenses.
Anger/Revenge
Disgruntlement to the point of wanting to retaliate against the organization
Problems at work
A lack of recognition, disagreements with co-workers or managers, dissatisfaction with the job, a pending layoff
Ideology/Identification
A desire to help the "underdog" or a particular cause
Divided Loyalty
Allegiance to another person or company, or to a country besides the United States
Adventure/Thrill
Want to add excitement to their life, intrigued by the clandestine activity
Vulnerability to blackmail
Extra-martial affairs, gambling, fraud
Ego/Self-Image
An "above the rules" attitude, or desire to repair wounds to their self-esteem. Vulnerability to flattery or the promise of a better job.
Ingratiation
A desire to please or win the approval of someone who could benefit from insider information with the expectation of returned favors
Compulsive and destructive behavior
Drug or alcohol abuse, or other addictive behaviors
Antiterrorism
Defensive measures used to reduce the vulnerability of individuals and property to terrorist acts, to include limited response and containment by local military forces (AR 525-13).
Contact
Any form of meeting, association, or communication, in person, by radio, telephone, letter or other means, regardless of who started the contact or whether it was for social, official, private or other reasons (DODI 5240.6).
Counterintelligence
Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage or assassinations conducted for or on behalf of foreign powers, organizations, or persons or their agents, or international terrorist organizations or activities (EO 12333, amended 30 July 2008).
Counterintelligence investigation
A duly authorized, systematic, detailed examination or inquiry to uncover facts to determine the truth of a matter regarding a person or other entity who is or may have engaged in espionage; to detect and identify foreign intelligence collection against the U.S. Army; to detect and identify other threats to national security; to determine the plans and intentions of any international terrorist group or other foreign adversary which presents a threat to lives, property, on security of Army forces or technology; to neutralize terrorist operations against U.S. Forces; to collect evidence for eventual prosecution for national security crimes; to determine the extent and scope of damage to national security; and to identify systemic vulnerabilities (AR 381-20).
Counterterrorism
Offensive measures taken to prevent, deter, and respond to terrorism (AR 525-13).
Critical program information
Elements or components of a research, development, and acquisition program that, if compromised, could cause significant degradation in mission or combat effectiveness; shorten the expected combat-effective life of the system;reduce technological advantage; significantly alter program direction; or enable a foreign adversary to defeat, counter, copy, or reverse engineer the technology or capability (AR 381-20).
Force protection
Security program to protect Soldiers, civilian employees, Family members, information, equipment, and families in all locations and situations (AR 525-13).
Foreign diplomatic establishment interest
Any embassy, consulate, or interest section representing a foreign country (DODI 5240.6).
Foreign power
Any foreign government, regardless of whether recognized by the United States; foreign-based political party, or faction thereof; foreign military force; foreign-based terrorist group; or organization composed, in major part, of any such entity or entities (DOD 5240.1-R).
PORTICO
A program managed by the Defense Counterintelligence and Human Intelligence Center, DIA, to provide automation support to the DOD CI community through Web-enabled software (DODI 5240.6).
Special agent, counterintelligence
Personnel holding MOS 35L, 351L, and 35E as a primary specialty, and civilian personnel in the GG-0132 career field, who have successfully completed the Counterintelligence Special Agent Course and whe are authorized to be issued counterintelligence badge and credentials (AR 381-20).
Suspicious activity
Any behavior that is indicative of criminal activities, intelligence gathering, or other preoperational planning related to a security threat to DOD interests (DTM 08-007). (See UCMJ, Art. 106a.)
False flag approach
An intelligence officer or agent who represents themselves as a person of another nationality in order to foster trust and lessen suspicion about the contact.
Supporting counterintelligence office
A CI office assigned responsibility for supporting a command, facility, program, installation, or geographic area.
Threat
The activities of foreign intelligence services, foreign adversaries, international terrorist organizations, or extremists that may pose a danger to the Army, DOD, or the United States; any person with access to Soldiers, DOD installations, and facilities who may be positioned to compromise the ability of a unit to accomplish its mission where there is evidence to indicate that he may be acting on bechalf of or in support of foreign intelligence, foreign adversaries, international terrorists, or extremist causes (insider threat).
Unauthorized disclosure
Intentionally conveying classified documents, information, or material to any unauthorized person (one without the required clearance, access, and need to know).
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials