How do adversaries use social media against the U.S. military?

Prepare for the USNA Professional Competency Board Test. Use resources like flashcards and multi-choice questions. Achieve success with detailed explanations and hints for every question. Boost your confidence and excel on your exam!

Multiple Choice

How do adversaries use social media against the U.S. military?

Explanation:
Social media serves as open-source intelligence that adversaries can exploit to learn where people are, how they move, and what activities they’re involved in. Posts, photos, and even comments can reveal location data, travel schedules, routines, and connections that paint a picture of operations, base activity, and personnel whereabouts. Geotags, timestamps, and check-ins can help an observer map patterns, identify vulnerabilities, and anticipate movements or shifts in readiness. This is exactly why this option is the best answer: it describes a real and direct way that adversaries use social media to gather actionable information about the U.S. military. The other ideas don’t fit the threat profile. Posting only official press releases would be a standard, legitimate use by an organization, not a malicious tactic. Generating counterfeit currency and storing data backups in the cloud are unrelated to how social media is used to collect intelligence.

Social media serves as open-source intelligence that adversaries can exploit to learn where people are, how they move, and what activities they’re involved in. Posts, photos, and even comments can reveal location data, travel schedules, routines, and connections that paint a picture of operations, base activity, and personnel whereabouts. Geotags, timestamps, and check-ins can help an observer map patterns, identify vulnerabilities, and anticipate movements or shifts in readiness. This is exactly why this option is the best answer: it describes a real and direct way that adversaries use social media to gather actionable information about the U.S. military.

The other ideas don’t fit the threat profile. Posting only official press releases would be a standard, legitimate use by an organization, not a malicious tactic. Generating counterfeit currency and storing data backups in the cloud are unrelated to how social media is used to collect intelligence.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy