Security & IntelligenceAnswer Key

Alms Tarp Training

39 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Threat Awareness and Reporting Program (TARP)

ANSWER

An Army regulation providing policy and responsibilities for threat awareness and education and establishes a requirement for Dept. of Army personnel to report any incident of known or suspected espionage, int'l terrorism, sabotage, subversion, theft or diversion of mil. tech., info. systems intrusions, and unauthorized disclosure of classified information

QUESTION 2

Terrorism

ANSWER

The calculated use of violence or threat of violence to inculcate fear, intended to coerce or to intimidate governments or societies. They seek to gain publicity for their cause

QUESTION 3

Subversion

ANSWER

Actively encouraging Military or Civilian personnel of the DoD to violate laws, disobey lawful orders or regulations or disrupt military activities, with the willful intent to impair loyalty, morale or discipline of U.S. military forces.

QUESTION 4

Espionage

ANSWER

Intentionally obtaining, delivering, transmitting, communicating, or receiving national defense related information with reason to believe that the information may be used to the injury of the United States or to the advantage of any foreign nation.

QUESTION 5

Treason

ANSWER

Violation of the allegiance owed to one's sovereign or state; betrayal of one's country. Aiding or attempting to aid the enemy. Knowingly harboring, protecting or giving intelligence to, communicating or corresponding with the enemy.

QUESTION 6

Sedition

ANSWER

Knowingly or willfully advocating or teaching the duty or necessity of overthrowing the U.S. government or any political subdivision therein by force or violence.

QUESTION 7

Sabotage (Foreign Intelligence Service Involvement)

ANSWER

Acts to injure or destroy material or facilities including human or natural resources that would damage national security.

QUESTION 8

Insider Threat

ANSWER

A malicious danger to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.

QUESTION 9

Foreign Adversaries

ANSWER

This category encompasses nations with a significant conventional military capacity such as a standing Army. Most nations with which the United States has less than friendly relations could fall into this category.

QUESTION 10

Foreign Intelligence Services

ANSWER

Agencies from foreign governments, such as the Pakistani ISI or the Chinese Ministry of State Security, collect a wide array of information and technology at the behest of their respective governments that can constitute a significant threat to national security.

QUESTION 11

International Terrorists Organizations

ANSWER

These are what most people think of when they hear the word 'terrorist.' Most are based on some type of religious fundamentalism, but others may be based on other platforms such as nationalism or ethnicity. Examples of well-known terrorist groups are Al Qaeda, Hezbollah, and Hamas

QUESTION 12

Domestic Terrorism

ANSWER

Since the bombing of a federal building in Oklahoma in 1995, a new category has been created to fully address the new threat. Similar to other terrorist organizations, domestic groups use violence for their own ends. The motivation varies greatly among domestic groups, ranging from ecological concerns to resentment of government authority.

QUESTION 13

Traditional Allies/Economic Competitors

ANSWER

Not every ally of the United States is necessarily a friend. Some relationships between governments exist as a matter of political or economic expediency where each has something that it wants or needs from the other. These countries may use methods such as industrial espionage to gain access to materials and technologies in order to gain a significant political or economic advantage.

QUESTION 14

Greed or Financial Need

ANSWER

A belief that money can fix anything. Excessive debt or overwhelming expenses.

QUESTION 15

Anger/Revenge

ANSWER

Disgruntlement to the point of wanting to retaliate against the organization

QUESTION 16

Problems at work

ANSWER

A lack of recognition, disagreements with co-workers or managers, dissatisfaction with the job, a pending layoff

QUESTION 17

Ideology/Identification

ANSWER

A desire to help the "underdog" or a particular cause

QUESTION 18

Divided Loyalty

ANSWER

Allegiance to another person or company, or to a country besides the United States

QUESTION 19

Adventure/Thrill

ANSWER

Want to add excitement to their life, intrigued by the clandestine activity

QUESTION 20

Vulnerability to blackmail

ANSWER

Extra-martial affairs, gambling, fraud

QUESTION 21

Ego/Self-Image

ANSWER

An "above the rules" attitude, or desire to repair wounds to their self-esteem. Vulnerability to flattery or the promise of a better job.

QUESTION 22

Ingratiation

ANSWER

A desire to please or win the approval of someone who could benefit from insider information with the expectation of returned favors

QUESTION 23

Compulsive and destructive behavior

ANSWER

Drug or alcohol abuse, or other addictive behaviors

QUESTION 24

Antiterrorism

ANSWER

Defensive measures used to reduce the vulnerability of individuals and property to terrorist acts, to include limited response and containment by local military forces (AR 525-13).

QUESTION 25

Contact

ANSWER

Any form of meeting, association, or communication, in person, by radio, telephone, letter or other means, regardless of who started the contact or whether it was for social, official, private or other reasons (DODI 5240.6).

QUESTION 26

Counterintelligence

ANSWER

Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage or assassinations conducted for or on behalf of foreign powers, organizations, or persons or their agents, or international terrorist organizations or activities (EO 12333, amended 30 July 2008).

QUESTION 27

Counterintelligence investigation

ANSWER

A duly authorized, systematic, detailed examination or inquiry to uncover facts to determine the truth of a matter regarding a person or other entity who is or may have engaged in espionage; to detect and identify foreign intelligence collection against the U.S. Army; to detect and identify other threats to national security; to determine the plans and intentions of any international terrorist group or other foreign adversary which presents a threat to lives, property, on security of Army forces or technology; to neutralize terrorist operations against U.S. Forces; to collect evidence for eventual prosecution for national security crimes; to determine the extent and scope of damage to national security; and to identify systemic vulnerabilities (AR 381-20).

QUESTION 28

Counterterrorism

ANSWER

Offensive measures taken to prevent, deter, and respond to terrorism (AR 525-13).

QUESTION 29

Critical program information

ANSWER

Elements or components of a research, development, and acquisition program that, if compromised, could cause significant degradation in mission or combat effectiveness; shorten the expected combat-effective life of the system;reduce technological advantage; significantly alter program direction; or enable a foreign adversary to defeat, counter, copy, or reverse engineer the technology or capability (AR 381-20).

QUESTION 30

Force protection

ANSWER

Security program to protect Soldiers, civilian employees, Family members, information, equipment, and families in all locations and situations (AR 525-13).

QUESTION 31

Foreign diplomatic establishment interest

ANSWER

Any embassy, consulate, or interest section representing a foreign country (DODI 5240.6).

QUESTION 32

Foreign power

ANSWER

Any foreign government, regardless of whether recognized by the United States; foreign-based political party, or faction thereof; foreign military force; foreign-based terrorist group; or organization composed, in major part, of any such entity or entities (DOD 5240.1-R).

QUESTION 33

PORTICO

ANSWER

A program managed by the Defense Counterintelligence and Human Intelligence Center, DIA, to provide automation support to the DOD CI community through Web-enabled software (DODI 5240.6).

QUESTION 34

Special agent, counterintelligence

ANSWER

Personnel holding MOS 35L, 351L, and 35E as a primary specialty, and civilian personnel in the GG-0132 career field, who have successfully completed the Counterintelligence Special Agent Course and whe are authorized to be issued counterintelligence badge and credentials (AR 381-20).

QUESTION 35

Suspicious activity

ANSWER

Any behavior that is indicative of criminal activities, intelligence gathering, or other preoperational planning related to a security threat to DOD interests (DTM 08-007). (See UCMJ, Art. 106a.)

QUESTION 36

False flag approach

ANSWER

An intelligence officer or agent who represents themselves as a person of another nationality in order to foster trust and lessen suspicion about the contact.

QUESTION 37

Supporting counterintelligence office

ANSWER

A CI office assigned responsibility for supporting a command, facility, program, installation, or geographic area.

QUESTION 38

Threat

ANSWER

The activities of foreign intelligence services, foreign adversaries, international terrorist organizations, or extremists that may pose a danger to the Army, DOD, or the United States; any person with access to Soldiers, DOD installations, and facilities who may be positioned to compromise the ability of a unit to accomplish its mission where there is evidence to indicate that he may be acting on bechalf of or in support of foreign intelligence, foreign adversaries, international terrorists, or extremist causes (insider threat).

QUESTION 39

Unauthorized disclosure

ANSWER

Intentionally conveying classified documents, information, or material to any unauthorized person (one without the required clearance, access, and need to know).

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials