Module 4 - Collection Flashcards

(93 cards)

1
Q

Define overt collection in intelligence gathering.

A

Overt collection is gathering intelligence openly from public or readily available sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a major benefit of overt collection?

A

It involves minimal risk and high accessibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why might overt collection be unreliable?

A

Public sources can be incomplete, biased, or censored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define covert collection.

A

Intelligence collection where the activity may be visible, but the source is hidden.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give examples of covert collection.

A

Surveillance, covert cyber operations, and some HUMINT activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s the key advantage of covert collection?

A

Access to non-public information while concealing the identity of the collector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a risk in covert operations?

A

Exposure can lead to escalated tensions and operational compromises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define clandestine collection.

A

Collection where both the operation and the collector’s identity are completely hidden.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are examples of clandestine operations?

A

Espionage, deep cover roles, and secret HUMINT sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the biggest benefit of clandestine collection?

A

Highest secrecy and access to denied or highly sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What makes clandestine operations risky?

A

Complex planning, high resource use, and severe consequences if exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When is overt collection preferable?

A

When transparency benefits diplomacy or public data suffices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What factors influence the method of collection chosen?

A

Risk/reward, operational security, and political/geographical context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the strategic goal in balancing all three collection types?

A

To gather critical intelligence effectively while minimizing fallout.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does SANDA stand for in intelligence?

A

SANDA means the source collection agencies eg ASIO, ASIS, Military Intel, AFP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary value of SIGINT?

A

Provides insights into adversary communications, intentions, and capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What makes HUMINT valuable?

A

Offers context, intentions, and insight unavailable from technical means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a limitation of HUMINT?

A

High risk to personnel and potential for deception or bias.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the uses of GEOINT?

A

Monitoring facilities, mapping terrain, and assessing movements and developments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why is OSINT becoming more important?

A

The explosion of digital information and social media provides valuable public data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is MASINT?

A

Measurement and Signature Intelligence; derived from technical sensors that detect emissions, sounds, or materials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What’s an example of MASINT?

A

Detecting radiation, identifying chemical signatures, or tracking seismic activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How do the INTs complement each other?

A

They provide diverse perspectives and cross-validation for more accurate assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why is SANDA integration essential in modern intelligence?

A

A multi-INT approach enhances reliability and covers different dimensions of the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the purpose of intelligence collection?
To gather information that supports national security, policy decisions, and operational planning.
26
What is the role of requirements in intelligence collection?
They guide what information needs to be collected and help prioritize efforts.
27
What is tasking in collection?
Assigning specific collection requirements to appropriate collectors or platforms.
28
What is collection management?
The process of planning, coordinating, and evaluating collection operations.
29
What is source validation in collection?
Assessing the reliability and credibility of sources and the information they provide.
30
What is multi-INT collection?
The integration of information from multiple intelligence disciplines for a fuller picture.
31
Why is collection planning important?
It ensures the right information is collected at the right time with minimal risk.
32
What are collection platforms?
The tools or systems used to collect intelligence, like satellites, aircraft, cyber tools, or agents.
33
What are denied areas in intelligence?
Locations or domains where access is restricted or hostile to foreign intelligence operations.
34
What is the difference between tactical and strategic collection?
Tactical supports immediate operations; strategic supports long-term decision-making.
35
What are collection gaps?
Areas where information is lacking due to limitations in reach, capability, or priority.
36
Why is risk management crucial in intelligence collection?
Because collection often occurs in high-stakes environments involving sensitive operations that could result in significant consequences if mishandled.
37
What are the main types of risks in intelligence collection?
1. Operational 2. technical 3. legal and ethical 4.reputational risks.
38
What are operational risks in the context of intelligence collection?
Risks to human sources, assets, and field operatives involved in covert operations.
39
What are technical risks in intelligence operations?
Risks related to technology failure, detection, or interception of collection tools like cyber operations and surveillance.
40
What constitutes legal and ethical risks in intelligence collection?
Potential breaches of laws or ethical standards, such as unauthorized interception of private communications.
41
How do reputational risks affect intelligence agencies?
They may lead to public backlash or damage an agency’s credibility and trustworthiness.
42
Why is contingency planning important in intelligence operations?
It prepares alternative responses for unexpected events, helping to maintain control if something goes wrong.
43
What is cost-benefit analysis in risk management?
A decision-making tool that weighs potential risks against the value of the information to be collected.
44
What is the overall goal of risk management in intelligence collection?
To balance the urgency and value of collected intelligence with the potential fallout or consequences.
45
In risk prioritization, why might operational risks take precedence?
Because they involve immediate, life-threatening risks to human lives.
46
What framework is used for managing risk in intelligence collection?
Identify risks, assess their likelihood and impact, and implement tailored mitigation strategies.
47
Define GEOINT.
The exploitation and analysis of imagery and geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on Earth
48
What types of information does GEOINT integrate?
Imagery, Imagery Intelligence (IMINT), and geospatial information
49
Name three applications of GEOINT.
Defense, intelligence, disaster response, policymaking, urban planning, environmental monitoring (any three)
50
What is the main difference between IMINT and GEOINT?
IMINT focuses on image analysis, while GEOINT integrates imagery with other geospatial data and intelligence sources for broader context and advanced analytics
51
List two strengths of GEOINT.
Provides visual intelligence; Real-time capabilities; Integrates multiple data sources; Supports predictive analytics; Wide applicability (any two)
52
List two limitations of GEOINT.
Data accuracy dependency; Requires expertise; Expensive; Data overload potential; Vulnerable in contested areas (any two)
53
How does GEOINT aid decision-making?
By providing actionable, visual intelligence, often in dynamic formats like 3D models, making complex situations easier to grasp
54
Why is integrating diverse data sources a key feature of GEOINT?
It allows for a more comprehensive understanding and in-depth analysis compared to relying on a single source like imagery alone
55
What are the two primary types of platforms used for GEOINT collection?
Satellites and Airborne systems (e.g., UAVs, reconnaissance aircraft)
56
Name two GEOINT collection techniques.
Remote sensing (active/passive) and Ground-based geospatial surveys
57
What do LiDAR and SAR stand for?
LiDAR: Light Detection and Ranging; SAR: Synthetic Aperture Radar
58
How does integrating SIGINT enhance GEOINT?
SIGINT provides context (communication patterns, electronic activity) to the visual/spatial data from GEOINT, creating a more comprehensive intelligence picture
59
Name the three types of SIGINT mentioned.
Communications Intelligence (COMINT), Electronic Intelligence (ELINT), and Cyber Intelligence (CYBINT)
60
What is COMINT primarily used for in conjunction with GEOINT?
Intercepting communications (radio, satellite) to reveal information like troop movements or plans that can be mapped spatially
61
What type of information does ELINT provide for GEOINT?
Tracks radar emissions and electronic systems, useful for identifying and mapping things like air defense systems
62
What are satellites good for in GEOINT collection?
Providing continuous coverage of large areas
63
What advantage do airborne systems like UAVs offer over satellites?
They are more agile, can fly lower for higher resolution, and offer persistent surveillance over specific targets
64
What is SIGINT?
SIGINT stands for Signals Intelligence, which involves intercepting signals for intelligence purposes.
65
What are the three main types of SIGINT?
COMINT (communications), ELINT (electronic signals), and FISINT (foreign instrumentation signals).
66
What does COMINT focus on?
Intercepting voice, text, and other forms of communication.
67
What does ELINT focus on?
Capturing non-communication signals such as radar and missile guidance systems.
68
What is the focus of FISINT?
Capturing telemetry data, such as signals from weapons testing.
69
What is a key strength of SIGINT in terms of timing?
It provides real-time or near real-time intelligence.
70
How does SIGINT enable remote data collection?
Through range of collection from high-risk or inaccessible areas.
71
Name two major limitations of SIGINT.
Overwhelming data volume and challenges in decrypting encrypted communications.
72
What are passive collection methods in SIGINT?
Monitoring signals without interference using radios, satellites, etc.
73
What are active collection methods in SIGINT?
Sending signals to provoke responses, e.g., using radar interrogations.
74
What are some key sources for SIGINT?
Radio frequencies, SATCOM, internet data, radar, and weapon system signals.
75
What are legal and ethical concerns in SIGINT collection?
Privacy issues and jurisdictional legal constraints.
76
What factors influence SIGINT task prioritization?
Mission urgency, operational feasibility, and associated risks.
77
What makes a SIGINT tasking request effective?
Being specific and actionable, ensuring relevant and useful data collection.
78
What factors can impact the effectiveness of SIGINT?
Time constraints, geography, tech limitations, resource allocation, and adversary countermeasures.
79
What is the definition of HUMINT?
HUMINT is the collection of intelligence through human sources.
80
What is the scope of HUMINT?
HUMINT ranges from friendly informants and debriefings to covert interactions in hostile environments.
81
What is the primary purpose of HUMINT?
To provide insights into human intentions, emotions, and cultural nuances.
82
What are the strengths of HUMINT in terms of human insights?
HUMINT offers personal perspectives and insights that are unavailable through technical means.
83
Why is HUMINT considered flexible?
Because it can adapt to different environments and objectives.
84
How does HUMINT provide nuanced understanding?
It reveals emotions, intentions, and cultural context that are not easily detected by technical intelligence.
85
What is a key limitation of HUMINT related to deception?
Sources may provide inaccurate information or be influenced by personal agendas.
86
Why are HUMINT operations considered high-risk?
They can endanger both operatives and their sources, especially in hostile environments.
87
Why is HUMINT resource-intensive?
It requires significant time, training, and resource investment for collection and handling.
88
What is elicitation in HUMINT collection methods?
Subtly gathering information through conversation without the other party knowing.
89
What is the purpose of debriefing in HUMINT?
Formal questioning of individuals with specific knowledge or experience.
90
What distinguishes an informant in HUMINT?
Informants voluntarily provide information, often motivated by MICE, and their reliability varies.
91
What are the three main criteria for selecting and managing a HUMINT source?
Reliability, motivation, and access.
92
What factors impact HUMINT tasking effectiveness?
Source availability, environmental constraints (e.g., political, geographical), and time sensitivity.
93
What are the key elements of communication between HUMINT collectors and analysts?
Clear tasking instructions, continuous feedback loop, and managing expectations to align with operational realities.