Grammar—Lowenthal Flashcards

(121 cards)

1
Q

Definition of Intel

A

The process by which specific types of information important to national security are requested, collected, analyzed, and provided to policy makers; the products of that process; the safeguarding of these processes and this information by counterintelligence activities; and the carrying out of operations as requested by lawful authorities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mirror Imaging

A

Assuming that other states or individuals will act just the way a particular country or person does.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Politicized Intel

A

Intelligence officers’s analyses reflecting their preference for a certain policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

National Intel

A

A nationally-based intel system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Competitive Analysis

A

Having analysts from several different backgrounds and perspectives work on one issue to counter narrow views.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Groupthink

A

Making decisions in a group in a way that discourages creativity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

National technical means

A

A variety of satellites and other collectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Monitoring

A

Keeping track of activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Verification

A

The ability to determine whether treaty obligations are being kept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Render

A

Deliver/transport (terrorists, in this context)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IRTPA

A

The Intelligence Reform and Terrorism Prevention Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NIP

A

National Intelligence Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MIP

A

Military Intelligence Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Principals Committee

A

The senior coordinating body of the NSC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Deputies Committee

A

Made up of the deputies of the PC and works on issues before PC covers them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

USDI

A

United States Director of Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Supplementals

A

Appropriations above the amount approved by Congress in the regular budget process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Requirements

A
  1. Defining policy issues/areas that intelligence is expected to make a contribution to;
  2. Deciding which of these issues has priority.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Collection

A

Gathering information (not intelligence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Processing and exploitation

A

The process by which information becomes intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Analysis and production

A

The process by which analysts turn intelligence into reports that correspond with the need of policy-makers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Consumption & feedback

A

The process by which policymakers are briefed on intel reports and have a dialogue with the intel producers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Priority creep

A

The problem where issues cannot be properly dealt with until they become a high priority, and then must compete with attention for other high-priority issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Ad hocs

A

A new issue that arises and is pressured into becoming high-priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Tyranny of the ad hocs
The problem that arises when ad hocs control policy/intelligence discussions.
26
Footnote wars
The process by which a separate point of view is supported regardless of the importance of the issue.
27
Dissemination
Moving the intelligence from the producers to the consumers.
28
Analyst agility/fungibility
The need for analysts with multiple areas of expertise so they can be shifted during times of crisis.
29
Analytic stovepipes
The process where raw intel data is presented without proper context.
30
Clientism
The flaw that occurs when analysts become so caught up in their subjects that they lose the ability to view issues with proper criticality.
31
Opportunity analysis
Policymakers wanting to act and make progress, rather than just react to issues.
32
Current & Long-term intel
Current: reports and anlayses on issues that may not extend more than a week or two into the future. Long-term: reports and analyses that extend longer.
33
Estimates & assessments
The participation of more than one analyst on an intel product before it is sent to the client.
34
Global coverage
The requirement to cover any and all issues.
35
Layering
The use of judgments in one analysis as the basis for judgments in another analysis without also carrying over the uncertainties that may be involved.
36
NSC
National Security Council
37
HSC
Homeland Security Council
38
wheat versus chaff
sweeping up a great deal of information within which may be the intelligence being sought.
39
noise versus signals
the signals one wishes to receive are often embedded in a great deal of surrounding noise.
40
spies
collection platforms
41
swarm ball
the tendency of all collectors or collection agencies to collect on an issue that is deemed to be important, whether their information or imput is important or not.
42
Sources and methods
the details of collection capabilities
43
Five eyes
United States, Britain, Australia, Canada, New Zealand
44
LEO
Low earth orbit: orbit from 200-1000 miles
45
MEO
Medium Earth Orbit: 1000-22,000 miles
46
GEO
Geosynchronous orbits: 22,000 miles
47
Sun-synchronous orbit
orbit moving in harmony with the Earth's rotation so as to always remain where there is daylight
48
HEO
Highly Elliptical orbit: orbit that comes close to the Earth over the Southern Hemisphere and is much farther away from the earth over the northern hemisphere. More time is spent over the northern hemisphere, which is beneficial because most targets are in the northern hemisphere
49
Espionage
HUMINT
50
Denial
using knowledge about the collection capabilities of an opponent to avoid collection
51
Deception
Lying about collection capabilities
52
Resolution
quality of image
53
denied targets
target areas to which one does not have ready access
54
ASAT
Anti-satellite
55
debris field
scattered remains from an aerial crash
56
self-reveal
make themselves available
57
negation search
looking at past imagery to determine when an activity commenced
58
automatic change extraction
computers comparing images in a negation search
59
shutter control
US control over commercial satellites operated by US companies
60
FMV
Full motion video: long duration, close-in video collected by UAVs
61
ABI/ pattern of life
activity based intelligence: intelligence collection based on observed behaviors likely to indicate that an activity of interest is taking place in that location
62
content analysis
Reading messages and analyzing what they mean
63
indication and warning
tracking communications
64
traffic analysis
analyzing volume and pattern of communications
65
encrypt
to code
66
cryptographers
codebreakers
67
steganopraphy
"concealed writing": the message itself is hidden
68
key-word search
collected data are fed into computers that filter out specific words or phrases
69
risk versus take
need to consider the value of the intelligence that is going to be collected against the rest of discovery
70
USGs
Unattended Ground Sensors: small acoustic and seismic sensors used to detect motion
71
agent acquisition cycle
the process of managing spies
72
asset validation system
gaining an asset's confidence and assessing their weaknesses
73
pitch
recruiting an agent
74
source
agent
75
developmental
a potential source who is being brought along to assess his/her value
76
sub sources
sources of the source
77
official cover
Intelligence officers who hold another government job
78
Nonofficial cover
cover that avoids any overt connection between the officer and his/her government
79
sleepers
agents that spend long periods of time integrating themselves into the target country
80
walk-ins
HUMINT sources that volunteer
81
Dangles
an "agent" used as a means of entrapment
82
foreign liaison
the usage of HUMINT capabilities of allied nations
83
denied areas
closed societies
84
echo/circular reporting
the effect of a single media story being picked up and repeated by other media sources until the story gains exaggerated importance
85
social media
sharing of information, views, and ideas via virtual communities
86
information operations
conflict in cyberspace
87
backdoor encryption
government access to commercial security keys
88
cyber OPE
Cyber operation preparation of the environment
89
BDA
battle damage assessment
90
CNE
computer network exploitation
91
CNA
computer network attack
92
attribution
determined responsibility (for CNE/CNA)
93
chatter
patterns of intelligence: communications and movements of known or suspected terrorists
94
link analysis
establishing connections between various people to get a sense of their broader social networks
95
JTTFs
Joint Terrorism Task Forces: fusion centers created to help federal/local liason
96
industrial espionage
HUMINT undertaken by businesses
97
ECHELON
searches through collected SIGINT (key word searching)
98
RMA
revolution in military affairs
99
Bioterror
outbreaks of sudden diseases artificially created as terrorist attacks
100
counterintelligence
information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage
101
Counterespionage
countering penetrations of one's service
102
asset validation
confirming the bonds fides of HUMINT sources
103
disinformation
putting out false information to support penetrations
104
optional tradecraft
the skills learned from experience in a trade, often used to refer to the skills spies use to avoid being detected
105
oversight
supervising intelligence collection
106
PFIAB
President's Foreign Intelligence Advisory Board: carries out more objective oversight than NSC
107
PIAB
President's Intelligence Advisory Board: can respond to problems or can initiate activities... often former senior intelligence officials
108
global findings
broad presidential findings
109
executive orders
legal declarations/ requirements made by the president
110
PIOB
President's Intelligence Oversight Board: a subset of the PIAB
111
PCLOB
Privacy and Civil Liberties Oversight Board: ensures that concerns about privacy and civil liberties are considered when counterterror policies are employed
112
authoriziation
congressional approval of specific programs and activities
113
appropriation
allocating specific dollar amounts to authorized programs
114
hollow budget authority
an authorized plan that has no significant funds
115
appropriated but not authorized
when appropriators vote money for programs or activities that have not been authorized
116
no-year appropriations
money that does not have to be spent by the end of the fiscal year
117
supplemental appropriations
make avi
118
supplemental appropriations
bills that make available to agencies funds per and above the amount originally planned
119
Gang of 4
House and Senate leadership
120
Gang of 8
House and Senate leadership plus the chairs and ranking members of the intelligence committtees
121
special access programs
programs the Government Accountability Office was given access to