Final Exam Flashcards

(166 cards)

1
Q

Information that meets the stated or understood needs of policy makers and has been collected, processed and narrowed to meet those needs.

A

Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When intel officers present biased findings to support a desired policy outcome

A

Politicized intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Assuming others will act the same way as you

A

Mirror imaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Redefined after 9/11 into three categories: (1) Foreign intelligence (2) Domestic intelligence (3) Homeland security

A

National Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Different orientations focusing on the same issue provide more views and greater understanding. This is a guard against irrational decisions because of emotions.

A

Competitive analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When the value of consensus outweighs the value of critical thinking.

A

Groupthink

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A variety of satellites and other technical collectors used to verify adherence to treaties.

A

National technical means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

to ensure that agreements are honored, the ability to ascertain whether terms of the treaty are met

A

Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Keeping track of another nation’s activities, the means for verification.

A

Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Deliver for interrogation

A

Render

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Key pieces of information that led to the Iraq war and search for WMDs

A

Key Judgments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Broad evaluation in the intelligence community to relate means (resources) to outcomes (objectives).

A

National Intelligence Priorities Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Works with the NSC to support and advise the President.

A

Director of National Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Senior policy coordinating body of the NSC. Comprised of the Secretaries of State and Defense, chairman of the Joint Chiefs of Staff, DNI, assistant to the President for national security and other cabinet members that attend as necessary.

A

Principals Committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Deputies of the PC. Together, the PC and DC support policy decisions based on intelligence and give insight to intelligence officials about the course of policy.

A

Deputies Committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Efforts to coordinate and make decisions about programs between the DoD and DNI to reduce spending in the MIP and NIP.

A

Crosswalks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Appropriations above the amount approved by Congress in the original budget. Function as a means to take care of agreed-on needs without long-term budget commitments. The wars in Iraq and Afghanistan were funded in this manner.

A

Supplementals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Seven phases of the intelligence process

A

(1) ID Requirements (2) Collection (3) Processing and Exploitation (4) Analysis and Production (5) Dissemination (6) Consumption (7) Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Collection analysts that deal with information from a single source

A

Single-source analysts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Collection analysts that deal with information on a macro level

A

All-source analysts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Priority of issues moving up and down a priority system like the NIPF.

A

Priority creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Issues that pop up out of nowhere and intel officers exert pressure to give them high priorities.

A

Ad hocs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When ad hocs take over the focus of the intelligence community.

A

Tyranny of the ad hocs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The steps of P&E that follow collection in the intelligence process.

A

Downstream activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Multiple intelligence organizations will stress a different point of view in order to make their product unique.
Footnote wars
26
The means for collection (INTs)
Collection disciplines
27
Intelligence (general term for collection), surveillance (sit around and watch) and reconnaissance (a mission to acquire information)
ISR
28
When one means of collection provides cues to guide collection via other means
Collection synergy
29
Intel based on many collection sources to compensate for shortcomings of each and profit from combined strength.
All-source/fusion intel
30
Brings together different types of technical collection. It is more than a single INT, but not all-source/fusion intel.
Multi-INT
31
How to extract desired intel from a huge load of information. Noise vs. signals, wheat vs. chaff.
Vacuum cleaner analogies
32
Prioritization of collection requirements occurs because of a limited number of collection platforms (spies).
Competing collection priorities
33
Tendency of all collectors to collect on an important issue to enhance their standing regarding budget allocations.
Collection swarm ball
34
The details of collection capabilities and the existence of some capabilities.
Sources and methods
35
U.S., Britain, Australia, Canada, New Zealand
Five Eyes
36
200-1,000 miles above the earth; typically imagery satellites that are used for a detailed earth view
Low Earth Orbit (LEO)
37
Between LEO and GEO
Medium Earth Orbit (MEO)
38
22,000 miles above the earth, stays above the same spot on earth at all times.
Geosynchronous orbit (GEO)
39
Moving in harmony with earth's rotation so that it is always functioning in daylight.
Sun-synchronous orbit
40
Sits over the northern hemisphere longer than the southern hemisphere.
Highly elliptical orbit (HEO)
41
HUMINT, the use of spies
Espionage
42
When a targeted nation uses knowledge of collection capabilities to avoid collection.
Denial
43
When a targeted nation uses knowledge of collection capabilities to transmit information to that opponent.
Deception
44
Ability to distinguish between two points in an image, related to satellites
Resolution
45
Targets to which one does not have ready access. Collapse of the Soviet Union decreased the number of denied targets of OSINT
Denied targets
46
Delete satellite capability
Anti-satellite weapons (ASAT)
47
Orbiting pieces of debris in space that can destroy satellites
Debris field
48
Regarding how many targets make themselves known via imagery.
Self-reveal
49
Looking at past imagery ti determine when an activity commenced
Negation search
50
Using computers to do a negation search.
Automatic change extraction
51
When the U.S. limits commercial satellite functioning for national security reasons.
Shutter control
52
Long duration/close-in video and capabilities that can be used to derive as much information as possible form the videos.
Full motion video (FMV)
53
Also called "pattern of life," based on observed behaviors that are more likely to indicate that an activity of interest is taking place in a given location.`
Activity-based intelligence
54
Interception of signals between two or more entities. This is a broad category of intelligence.
SIGINT
55
Reading analyzing messages
Content analysis
56
Can be achieved through content analysis of intercepted messages.
Indication and warning
57
Monitoring changes in communications
Traffic analysis
58
Subunit of SIGINT, the interception of signals between two people through phone calls and email.
COMINT
59
Coding of communications
Encrypt
60
Code breakers
Cryptographers
61
The message is hidden.
Steganography
62
Collected data are fed into computers that look for specific words or phrases as indicators of the likely value of an intercept.
Key-word search
63
The need to consider the value of intel to be collected (the take) against the risk of discovery--either in political terms or in the collection technology that may be revealed to another country.
Risk versus take
64
Sensors disguised to blend with the environment that can be linked to a network.
Unattended grounds sensors
65
Using humans as sources of information, largely involves sending covert service officers to foreign countries to recruit spies (people with access to information that may be of benefit to U.S. policy makers).
HUMINT
66
Agent Acquisition Cycle
(1) Targeting (2) Assessing (3) Recruiting (4) Handling (5) Termination
67
Used to assess a potential source
Asset Validation System
68
Offering a relationship to a potential source
Pitch
69
Becomes this after accepting a pitch
Source
70
A potential source that is repeatedly contacted to asses value and consideration for a pitch.
Developmental
71
The sources that the primary source uses
Sub-sources
72
When the HUMINT officer holds another governmental position to hide his/her HUMINT position.
Official cover
73
When a HUMINT officer holds another non-governmental job to hide his/her HUMINT position.
Non-official cover
74
HUMINT officers that become active after integrating into the society.
Sleepers
75
HUMINT sources that volunteer
Walk-ins
76
Walk-ins that volunteer as a means of entrapment by providing false information.
Dangles
77
Resources of foreign or allied friendly services. HUMINT to HUMINT connections.
Foreign liaison relationships
78
Targets to which one does not have ready access
Denied areas
79
Single media story being picked up and reported by multiple media sources until the story takes on a much larger life of its own, appearing more important than it really is.
Echo/Circular reporting
80
Sharing of information via social networks online. This is a subset of OSINT.
Social Media
81
Intel that extends over a long time.
Long-term intelligence
82
Deals with events just a few weeks into the future. Increases during a war, shorter intelligence reports.
Current intelligence
83
Ease of replacing analysts. Also referred to as analyst agility.
Analyst fungibility
84
The acknowledged requirement to be able to cover any and all aspects of intelligence (no bait and switch). This can be misleading because it does not include any notion of the depth of knowledge of the subjects.
Global coverage
85
Assuming that others will behave just as the analyst and have the same goals.
Mirror imaging
86
A flaw that occurs when analysts become so immersed in their subjects that they are unable to view the issues with the needed criticality.
Clientism
87
Error that occurs when judgments or assumptions of one analysis are used as the factual basis for another analysis without carrying over the uncertainties or judgments of the first analysis.
Layering
88
Intelligence products that are written on a recurring basis; they establish benchmarks.
Estimates
89
Australian and British term for estimates.
Assessments
90
Groupthink
When the value of consensus overrides the value of critical thinking.
91
Ensure a balanced focus on priority intelligence missions by overseeing both collection and analysis on a givern issue.
National Intelligence Managers (NIMs)
92
When analysts serve separate clients and do not interact. The analysts get familiar with a certain client and get familiar with that client
Analytical stovepipes
93
Different orientations on the same issue provide greater views and better understanding. Guard against irrational decisions because of emotions.
Competitive analysis.
94
Compensates for insufficient sources by applying intense analytic rigor to the available sources.
Analytic penetration
95
The degree of confidence the analyst has in his or her judgments.
Confidence levels
96
Gives policy makers an advance notice of significant, usually military events. Can be achieved from content analysis of intercepted messages.
Indications and Warnings (I&W)
97
Intel analysis that helps the policy maker advance an agenda and be the actor (instead of reactor).
Opportunity analysis
98
When analysts embrace one perspective on an issue and are not open to other hypotheses.
Premature closure
99
When intel officers present biased findings to support a desired policy outcome.
Politicized intelligence
100
Efforts taken to prevent one's own intel operations from penetration and disruption by hostile nations
Counterintelligence
101
Countering penetration of one's service.
Counterespionage
102
Monitors pulse and breathing rate and notes changes in such physical responses as possible indications of falsehood or deception.
Polygraph
103
Category of polygraph that focuses on personal behavior
Lifestyle poly
104
Focuses on foreign contacts and handling of classified information
Counterintelligence poly
105
The U.S. intel system is segmented and access is on a need to know basis.
Compartmented
106
Intel agencies are evaluated by the degree to which they actively seek to share intel
Responsibility to provide
107
Agents sent to another nation to assume normal lives and later become active agents
Sleeper agents
108
Agents for one country that are turned against that country and provide intel on that country.
Double agents
109
Deeply hidden spy
Mole
110
Reasons why a spy went after certain information
Big CI
111
How a spy was able to get access to information and other issues of tradecraft.
Little CI
112
Determines what intel has been compromised after a spy is discovered.
Damage assessment
113
Occurs when accused spies threaten to reveal classified information in open court to avoid prosecution. The U.S. solved this issue through judicial review.
Graymail
114
Lists of people with access to certain categories of intelligence, which can be used to locate leaks.
Bigot lists
115
Requires the recipient to turn over records pertaining to other individuals and the recipient can't reveal the existence of it.
National Security Letters (NSLs)
116
An activity of the U.S. government to influence political, economic or military conditions abroad, but without its role being apparent or publicly acknowledged.
Covert action
117
A covert option that rests between doing nothing and military intervention
Third Option
118
Operational support structure.
Plumbing
119
A presidential order that approves a covert action as being necessary to support identifiable foreign policy objectives of the US and needed for national security.
Presidential Finding
120
Disseminating information that has been created with a specific political outcome in mind.
Propaganda
121
Seizure of individuals wanted by the U.S. and turned over to a third party.
Renditions
122
Being able to deny a covert action based on surrounding circumstances.
Plausible deniability
123
When a story is planted in a media outlet overseas so it will also be reported to the U.S.
Blowback
124
Military-style interventions that are difficult to execute as covert action because of their size.
Paramilitary operations.
125
Issues include; budget, quality of analysis, control of operations and propriety of activities.
Oversight
126
Does high level objective oversight by responding to problems or initiating activities to investigate issues; became the PIAB in 2004 with the reform of national intelligence. Advises the president.
President's Foreign Intelligence Advisory Board
127
Seeks to provide policy makers with intelligence that will give them an edge over their adversaries.
"Decision Advantage"
128
Broad presidential findings that deal with covert action involving transnational issues.
Global finding
129
Can be a source of an intelligence action
Executive Orders
130
Involves approving specific programs and activities
Authorization
131
Allocating specific dollar amounts to authorized programs
Appropriation
132
Authorized but not given enough, if any, funding.
Hollow budget authority
133
Appropriated but not authorized
Appropriated but not authorized
134
Legislative provisions directing funds to be spent on specific projects
Earmarks
135
Money that does not have to be spent by the end of the fiscal year.
No year appropriations
136
Make available funds over and above the amount originally planned.
Supplemental appropriations
137
Leaders of the Congressional intel committees
Gang of 4
138
Leaders of the Congressional intel committees and their ranking members
Gang of 8
139
Intelligence programs that the Government Accountability Office has access to review for performance evaluation.
Special Access Programs (SAPs)
140
The premise that if the USSR were contained within its borders, it would either change or collapse.
Containment
141
Russian tradition of obscuring the realities of the Russian state.
Maskirovka
142
Fake Russian villages built in the 1700s
Potemkin Villages
143
The current forces or those being planned.
Capabilities
144
The regularity and precision that govern each nation's military make them susceptible to intel collection. Forces exercise in regular and predictable patterns.
Self-reveal
145
Intel products that merely tally up the number of forces, equipment and manpower in foreign militaries.
Bean counting
146
U.S. was well informed of the Soviet capabilities, but not their intentions.
Capabilities versus intentions
147
Seeking to gauge the worst level of threat that could be posed by an opponent.
Worst-Case Analysis
148
U.S. effort to aid anti-Soviet guerrillas
Reagan Doctrine
149
A state in which there has been a breakdown in the legitimacy of the government to maintain a minimal level of control over its own territory
Failed states
150
Conflict in cyberspace
Information Operations
151
Exploitation of access to a computer to determine capabilities, collect data and/or take control of a network.
Computer Network Exploitation (CNE)
152
Shutting a network down and/or disrupting command, control or vital services within the target nation.
Computer Network Attack (CNA)
153
Includes military operations that intrude into the cyber responsibilities of intelligence agencies in advance of military attacks.
Cyber Operational Preparation of the Environment (Cyber OPE)
154
Forensic function that determines the extent of damage that an attack caused. Determined by GEOINT or SIGNIT on a battlefield, but difficult to determine the results of a cyber attack.
Battle Damage Assessment (BDA)
155
Key issue in cyberspace. It is difficult to determine attribution for non-state actors and in the case of CNE. This becomes an intelligence task and a policy question: What level of confidence is needed to determine that an attack came from a specific source?
Attribution
156
Not precise intelligence, but patterns of intelligence; communications and movements of known or suspected terrorists.
Chatter
157
Establishing connections between people to get a sense of the broader social networks. Used to identify the relationships among terrorists. Can examine phone calls between people along with the content of those calls.
Link analysis
158
Series of fusion centers that aim to improve the communication between the federal and local levels of government in order to prevent terrorist attacks.
Joint Terrorism Task Forces (JTTFs)
159
One of several categories relating economics to intelligence
Foreign Economic Espionage
160
Economic espionage undertaken by businesses.
Industrial Espionage
161
Searches through SIGINT using a key words search.
ECHELON
162
Using a biological weapon as a tool for terrorism.
Bioterror
163
Integration of IMINT, SIGINT and HUMINT to give commanders real-time or near real-time, all-weather, comprehensive, continuous surveillance and information about the battlefield in which they operate. This will reduce the fog of war.
Dominant Battlefield Awareness (DBA)
164
Doctrinal evolution and debate about the future of warfare encompassing technology, strategy, tactics and the use of intelligence.
Revolution in Military Affairs (RMA)
165
Responsible for intelligence integration, meaning collection and analysis, in their portfolios and are also responsible for crafting Unifying Intelligence Strategies (UIS) for their portfolios.
National Intelligence Managers (NIMs)
166
Responsibility of the NIMs
Unifying Intelligence Strategies (UIS)