Terms Flashcards

1
Q

Actionable Intelligence

A

Information that can be acted upon quickly to counter an adversary’s actions, as opposed to information that assists in understanding an adversary’s plans and intentions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Agent (Communications)

A

An agent is a person unofficially employed by an intelligence service–often as a
source of information. Communicating with an agent can follow many different procedures to transfer that
information to the intelligence officer(s) with whom that agent has regular, professional contact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Agent

A

An individual covertly employed by an intelligence organization to assist in its activities. Often further identified by his or her role in the intelligence operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Analysis

A

The process by which information is transformed into intelligence; a systematic ex-amination of
information to identify significant facts, make judgments, and draw conclusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Assessments

A

Development of forecasts of behavior or recommended courses of action to the leadership of
an organization, based on a wide range of available information sources both overt and covert.
Assessments are developed in response to requirements declared by the leadership to inform decision
making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Clandestine Collection

A

Not to be confused with covert collection. The intent of clandestine intelligence collection is to keep the activity hidden from public view. While covert activity is also hidden, it is not necessarily denied if discovered–although the sponsor of the covert action is. No one claims responsibility for it. Clandestine means that the existence of an activity is wholly denied. It is meant to remain
undetected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Classification

A

The determination, in the interest of national security, that official information requires a
specific degree of protection against unauthorized disclosure, coupled with a designation signifying that
such a determination has been made; the designation is typically called a “security classification,” which
includes CONFIDENTIAL, SECRET, and TOP SECRET classification levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Collection Synergy

A

How different forms of technical, human, and open intelligence collection interact, and work together, to keep the intelligence/performance cycle moving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Competitive Analysis

A

An idea that is based on the belief that by having analysis in several agencies with different backgrounds and perspectives work on the same issue, parochial views more likely will be
countered—if not weeded out—and proximate reality is more likely to be achieved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Compromise

A

Not blackmail, in that American intelligence services don’t set people up. However, if we
knew they had made risky or illegal decisions that could put them in danger with the governments in their
countries (unprompted), we might use that information in understanding their motivation or making an approach based on helping get them out of their trouble.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Confidence Levels

A

are based on the quality of source, describe the amount of confidence an analyst has in his/her judgments. High, moderate, and low.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

High Confidence

A

The information is of high quality, or the nature of the issue makes solid (not
necessarily perfect) judgment possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Moderate Confidence

A

The information is susceptible to
multiple interpretations, or there may be alternative views – credible or plausible, but not totally
corroborated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Low Confidence

A

The information is scant, questionable, or fragmented, leading to
difficulties in making “solid analytic inferences,” or the information derived from sources that may be
problematic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Counterintelligence

A

1) The protection of sensitive information from all adversaries. In intelligence organizations, this is done defensively through security practices and internal monitoring of activities and offensively by recruiting penetration agents of the adversary to identify and thwart its efforts to obtain this information.
2) Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons or their agents, or international terrorist organizations or activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Countersurveillance

A

measures undertaken to prevent surveillance, including covert surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

EO 12333 Definition of Covert Action

A

Covert action means an activity or activities of the United States
Government to influence political, economic, or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Exclusions from EO 12333 Definition of Covert Action

A

a) Activities the primary purpose of which is to acquire intelligence, traditional
counterintelligence activities, traditional activities to improve or maintain the
operational security of United States Government programs, or administrative
activities;
b) Traditional diplomatic or military activities or routine support to such activities;
c) Traditional law enforcement activities conducted by United States Government law enforcement agencies or routine support to such activities; or
d) Activities to provide routine support to the overt activities (other than activities
described in paragraph (a), (b), or (c)) of other United States Government agencies
abroad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

General Definition of Covert Action

A

An intelligence activity that seeks to influence the decision making of an adversary through the use of propaganda, political action, or paramilitary activities. Covert action is not acknowledged by the country or service that carries it out. In the American context, covert action is authorized by the White House. Covert action generally falls under four categories (although this is flexible):
a. Propaganda
b. Political action
c. Information warfare (IW) – defined in other Key Terms documents
d. Paramilitary – defined in other Key Terms documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cryptography

A

The development and creation of algorithms (in the modern, computerized context) or codes used to protect information. The end product of cryptography is encryption. (Not to be confused with Cryptanalysis, which is the science of analyzing and breaking encryption schemes.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Dead Drop

A

Location where an item is placed in order to separate the physical contact between the agent
and the intelligence officer. For example, the agent places a report in a tin can and leaves it in underbrush
at an agreed-upon site, and a few hours later the intelligence officer retrieves the can.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Dead Drop

A

Location where an item is placed in order to separate the physical contact between the agent
and the intelligence officer. For example, the agent places a report in a tin can and leaves it in underbrush
at an agreed-upon site, and a few hours later the intelligence officer retrieves the can.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Deception Operation

A

Allowing an adversary to obtain information, which manipulates its actions to one’s benefit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Deception

A

The act of making someone believe something that is not true. Deception is a key tool in espionage and its operations. Sun Tzu, the famed Chinese military strategist, was among the earliest writers
to emphasize its importance to success (for troops and spies) in engagements with enemies.
“Hence, when able to attack, we must seem unable;
When using our forces, we must seem inactive;
When we are near, we must make the enemy believe we are far away;
When far away, we must make him believe we are near.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Decision Advantage

A

Provision of intelligence to policy-makers that will give them an advantage over their adversaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Denied Area

A

Areas in which the host government or controlling actor aims to deny intelligence efforts to opposing governments or actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Encryption

A

Coding of information or data to make it difficult, or impossible, to read and understand for
those who do not know the coding. EX: Instead of writing the word “enemy”, the word “blue”, or the
number “23” might be substituted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Estimates

A

Analytical products that serve two major purposes: Forecasting an issue or a trend over a determined time period; and presentation of the considered judgments of the Intelligence Community on those events or issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Executive Orders

A

Policies specifically prescribed by the White House. Related to intelligence, the issuance of Executive Order 12,333 is the explicit authorizing order for intelligence activities carried out by the United States. Executive orders are deemed to have the force of law unless a court rules their contents (in whole or in part) to be unconstitutional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Executive Order 12333

A

Executive Order 12,333 (commonly referred to as ‘twelve triple-three’) was signed by President Reagan on December 4, 1981. It is seen as the basis of explicit authority for all Intelligence Community activities. Although some of its provisions have been changed or updated, 12333 is still regarded as the foundational document detailing the responsibilities of each intelligence organization and what each member of the Intelligence Community is authorized to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Foreign Intelligence

A

Information relating to the capabilities, intentions, or activities or foreign
governments or elements thereof, foreign organizations, or foreign persons. (Warner 15; Quoting the
National Security Act of 1947)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Fusion Center

A

A collaborative effort of two or more agencies that provide resources, expertise, and
information to a center with the goal of maximizing the ability to detect, prevent, investigate, and respond
to criminal and terrorist activity. State and major urban area fusion centers are recognized as a valuable information-sharing resource. They are the focus, but not exclusive points, within the state and local environments for the receipt and sharing of terrorism information, homeland security information, and law
enforcement information related to terrorism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Global Coverage

A

This means that intelligence agencies and officers acknowledge their requirements to cover any and all issues or areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Groupthink

A

The practice of thinking or making decisions as a group in a way that discourages creativity or
individual responsibility and which a common set of assumptions go unstated or even unrecognized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Indications

A

In intelligence usage, information in various degrees of evaluation which bear on the intention of a potential enemy to adopt or reject a course of action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Influence Operation

A

An operation designed to effectively influence the attitudes and behavior of
particular foreign audiences while minimizing or avoiding combat. This can include elements of public
relations, persuasion (psychological operations, or PSYOPs), or diplomacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Information Warfare (IW)

A

A concept involving the use and management of information and communication technology in pursuit of a competitive advantage over an opponent. While there is no universal definition for IW, the generally accepted one looks like this: “The process of protecting one’s own sources of information and, at the same time, seeking to deny, degrade, corrupt, or destroy the enemy’s sources of information.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Intelligence

A

The process by which specific types of information important to national security are requested, collected, analyzed, and provided to policy makers; the products of that process;
the safeguarding of these processes and this information by counterintelligence activities; and the carrying
out of operations as requested by lawful authorities. (Lowenthal 10)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Intelligence Reform and Terrorism Prevention Act (IRTPA)

A

A 2004 law that reformed parts of the intelligence community. The law created the Office of the Director of National Intelligence (ODNI), the National Counterterrorism Center (NCTC), and the Privacy and Civil Liberties Oversight Board.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Intelligence Requirements

A
  1. Any subject, general or specific, upon which there is a need for the collection of information, or the production of intelligence.
  2. A requirement for intelligence to fill a gap in the command’s knowledge or understanding of the operational environment or threat forces. Also called IR. (JP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

International Human Rights Law (IHRL)

A

The body of international law designed to promote human rights at social, regional, and domestic levels. States that ratify human rights
treaties commit themselves to respecting those rights and ensuring that their domestic law is compatible with international legislation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

International Humanitarian Law (IHL) / Law of Armed Conflict (LOAC)

A

International humanitarian law is a set of rules which seek, for humanitarian reasons, to limit the effects of armed conflict. It protects persons
who are not or are no longer participating in the hostilities and restricts the means and methods of
warfare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Strategic

A

In the context of military operations, strategy develops an idea or set of ideas for employing the instruments of national power in a synchronized and integrated fashion to achieve theater, national, and/or multinational objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Operational

A

Links the tactical employment of forces to national and military strategic objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Tactical

A

Employment and ordered arrangement of forces in relation to each other. Joint doctrine focuses this term on planning and executing battles, engagements, and activities at the tactical level to achieve military objects assigned to tactical units or task forces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

MICE

A

Money, Ideology, Compromise, Ego. It is a useful way to divide why people spy, but it is not the way to approach a recruitment. CIA doesn’t use this as an operating concept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Mirror Imaging

A

assumption that other leaders, states, and groups share motivations or goals similar to those most familiar to the analyst. The statement “It would be irrational to do that, so they won’t,” might be
based on assumptions about how WE would act not our adversary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Noise versus Signals

A

Signals, in this context, are clear indications of wanted information that often warn us of threats. Although signals are helpful, picking them from a crowded stream of irrelevant and contradictory information constitutes the noise in which signals are often embedded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Open-Source Intelligence (OSINT)

A

Information gathered from publicly available (“open”) sources, such as
radio, television, newspapers, the Internet, etc. The collection of such information is used to augment intelligence analysis and reporting.

50
Q

Operations Officer (OO)

A

Individuals focus on clandestinely spotting, assessing, developing,
recruiting, and handling non-US-citizens having access to foreign intelligence vital to US foreign policy and
national security decision-makers. OOs build relationships based on rapport and trust using sound judgment, integrity, and the ability to assess character and motivation.”

51
Q

Operators

A

These are the people who do the on-the-ground, in-person work of intelligence and military operations

52
Q

Because policy-makers also want to be actors, to achieve goals, and not just to prevent negative occurrences, intelligence that switches the policy-maker from reactor to actor is __________. Sophisticated and difficult to produce, _______________ requires knowledge of
policy goals and usually means positing how adversaries will react to policy initiatives. _____________
requires an analyst to judge what possible courses of action might be available to achieve a policy-maker’s
stated policy goals.

A

Opportunity Analysis

53
Q

Paramilitary Activity

A

Activities of a military nature clandestinely supported, and often guided to some
degree, by an entity to influence the decision-making of an adversary. ____________ is different from Traditional Military Activity, or TMA, which is conducted by U.S. military personnel under the
direction and control of a U.S. military commander, and in which the U.S. role in an operation is
acknowledged publicly.

54
Q

Pitch

A

An offer made by an intelligence agency to recruit a spy. These can be taken after long
“developmental” periods or they can be “Cold Pitches.”

55
Q

Political Action Programs

A

Generally seek to achieve influence (by changing government behavior or policy) through covert activities that involve the manipulation–legitimate or
otherwise–of a foreign country’s political and/or economic systems.

56
Q

Concerns over ___________ arise when intelligence officers alter
their evidence (which is supposed to be offered objectively) to support the favored options or outcomes preferred by policy-makers or analysts.

A

Politicized Intelligence

57
Q

Propaganda

A

Intelligence agencies covertly disseminate specific information to advance foreign policy
goals. United States law prohibits, however, the use of intelligence agencies to influence domestic media
and opinion.

58
Q

Recruitment

A

A “pitch” and the formation of a relationship. The understanding that there is a formal agreement between an agent and a case officer for the provision of services.

59
Q

The __________ is composed of a group of people who are unfamiliar with an analytical product
whose role is to objectively view it and aim to find its flaws. This is a way to expose vulnerabilities in
analytic products and improve the accuracy of those products by viewing the issue or event in question through the perspective of the units of analysis (usually, our adversaries) and provide decision-making
expertise while identifying alternative analyses.

A

Red Team

60
Q

A __________ is granted to U.S. government personnel (and contractors) whose
work is supported by the knowledge of state secrets, otherwise referred to as ‘classified information’.
Eligibility for access to classified information is granted only to those for whom an appropriate personnel security background investigation has been completed. The nomenclature and background check
procedures for security clearances can vary somewhat within the Intelligence Community.

A

Security Clearance

61
Q

Signals Intelligence (SIGINT)

A

Consists of COMINT (communications intelligence) and ELINT (electronic
intelligence, or collection through electronic sensors). This is intelligence collection through the
interception of signals as used in communication between people–by phone, radio, text, etc.-or non-
nuclear/radioactive electromagnetic radiations. In the U.S. context, this complex, important contributor of
actionable intelligence developed out of the need to view enemy communications conducted by telegraph,
and later, “wireless telegraphy” (now called radio).

62
Q

Sources and Methods

A

Identifying information on who is reporting intelligence and how it is being collected. This is often some of the most sensitive information involved in intelligence operations. Its compromise often means a loss of the asset or information flow.

63
Q

The term used to define written laws, usually enacted by a legislative body. ___________ vary from regulatory or administrative laws that are passed by executive agencies, and
common law, or the law created by prior court decisions. An E.O is not a statutory law.

A

Statutory Law

64
Q

Strategic Warning

A

Message sent by the IC to decision makers, or from decision makers to the military, warning that war or hostile military action is a possibility or is imminent

65
Q

Surveillance

A

Continuous observation of a place, person, group, or activity in order to gather information.

66
Q

(Operational) Tradecraft

A

Techniques and methods used by members of the Intelligence Community for the conduct of their respective activities.

67
Q

Warner’s Definition of Intelligence

A

Secret, state activity to understand or influence foreign entities

68
Q

Warning Intelligence

A

Those intelligence activities intended to detect and report time sensitive intelligence information on foreign developments that forewarn of hostile actions or intention against United States entities, partners, or interests.

69
Q

Warning of War

A

Short-term warning of expected hostilities, outline of possible attacks, and includes an operational order

70
Q

Wheat Versus Chaff

A

A related concept to ‘signal versus noise.’ Refers to the process of wading through available information to find the intelligence that is necessary to have

71
Q

Four Purposes of Intelligence

A
  1. Maintain the secrecy of information, needs (requirements), and methods (counterintelligence)
  2. Avoid strategic surprise
  3. Provide long-term expertise
  4. Support executive, commanders, and the policy making process
72
Q

Four Key Characteristics of Intelligence (Sun Tzu discussion)

A
  1. Separate art beyond warfare or statecraft
  2. Secrecy is key otherwise you loose the advantage
  3. Goal is decision advantage (foreknowledge, or insight)
  4. Outcomes of war can depend on it so it is worth investment
73
Q

Intelligence is the information relevant to the policymaker, information itself is not intelligence

A

TRUE

74
Q

Strategic vs. Tactical Surprise

A

Strategic: an overarching goal or plan
Tactical: granular methods to achieve the higher goal

75
Q

What is the first duty of intelligence officers?

A

Detect and prevent surprise. IC learns and is shaped by surprises and failures. It largely exists due to failure of Pearl Harbor and was reshaped by 9-11.

76
Q

Four Ways Surprise Can be Accomplished

A
  1. Whether
  2. Where
  3. When
  4. How
77
Q

Daniel Kahneman on Decision Making

A

System 1: shorthand (heuristics) operating all the time; these create biases
System 2: slow thinking is deliberate, conscious, and effortful

78
Q

Effective Performance of Intelligence Requires

A

1) Actively Asking and Anticipating
2) Persuading and Warning vs. “Dissemination”
3) Hearing? Believing? Acting?

79
Q

Key Distinction Between Intelligence Cycles

A

Inclusion of the Policymaker

80
Q

Traditional Intelligence Cycle

A

Requirements ⤑ Collection/Exploitation ⤑ Analysis ⤑ Dissemination & “Feedback” ⤑ (repeats)

81
Q

Augmented Intelligence Performance Cycle

A

Ask/Anticipate ⤑ Collect/Exploit ⤑ Know/Analyze/Assess ⤑ Tell, Warn, Persuade ⤑ Hear? Act? Believe? ⤑ (repeat)

82
Q

External Causes of Intel Failure

A

Not enough info
Too much info (“signal to noise” problem”
Strategic deception by enemy

83
Q

Internal Causes of Intel Failure

A

human and organizational pathologies related to critical thinking: incorrect assumptions, biases, politicization, etc.

84
Q

Unmotivated Bias

A

individual is not aware of the bias (ex. recency bias or group think)

85
Q

Motivated Bias

A

intelligence actor is affected by something they want or want to avoid; deliberate distortion of intelligence or politicization (ie. “human agency”)

86
Q

Basic Information

A

reference material that answers “what” question;
Factual information or baseline knowledge on a subject to provide context, is periodically updated.
Ex. How large is the port?

87
Q

Current Reports

A

focus on recent developments; not just answering the “what” but also the “why” and “so what” questions
Ex. How many ships arrived today?

88
Q

Evaluative Assessments

A

primary goal is to evaluate, answers the “so what and the so what of the so what,” are often the most important part of assessment
Ex. Why are the ships arriving now?

89
Q

Estimative Reports

A

about the future, multiple perspectives integrated, can be “strategic” (long term trends or patterns) or “tactical” (the adversary’s likely next move).
Ex. When will the port be full?”

90
Q

Warning Assessments

A

communicate immediate threat; forewarn or sound alarm, predicated on presence
of indicators
Ex: Military
Maneuvers Suggest Preparations for Attack.

91
Q

Art of Analysis

A
  • Future Judgements
  • Render Complexity Intelligible (ex. foreign cultures)
  • Focus on Future not Marshal Facts
  • Support Decision-Makers
  • Written for Generalists
  • Meaningful Characterization
  • Begin with Conclusions and Explore Implications
92
Q

What are two ways analysis can stand out from other sources of information

A

Intel Sources and Value Added

93
Q

Analyst Fungibility

A

the tradeoff between analyst spending years developing expertise on a topic vs the need to move analytic firepower to the highest priority

94
Q

Indications and Warning Intelligence

A

lists made about possible events in the future (surprise attacks, missile launches, nuclear tests, etc.); idea is to analyze what the adversary would have to do to do this then watch for it

95
Q

Politicization of Intelligence

A

spinning the intelligence to get the answer one wants or one thinks the policymaker wants to hear

96
Q

Inboden on Lines

A

Bright, Clear, + Firm between Policy and Intelligence
Blurry + Permeable between Policymakers and Intelligence Officials

97
Q

Epistemology

A

How we know what we know; the theory of knowledge, especially with regard to its methods, validity, and scope. Epistemology is the investigation of what distinguishes justified belief from opinion.

98
Q

Optimism vs. Pessimism in tensions between policymakers and intelligence officials

A

Outcome in Iraq in 2004 election
2011 Clapper statement on Libya (war increases tension and the need for intelligence “to get on board)

99
Q

Human Intelligence (HUMINT)

A

oldest form of intelligence, is acquired from humans; is NOT always clandestine, can be overt

100
Q

George Washington

A

surveyor, knowing the land. White Post, VA; “first case officer,” created intel network that was judged to have made a vital difference in the outcome of the Revolution

101
Q

Advantages of HUMINT

A

Intent
Cheapest
Flexibility
Only Alternative
Development of Deep area of knowledge
Collection synergy

102
Q

Requirements or Operating Directive (based on location)

A

is the mission for collectors, where HUMINT begins

103
Q

Recruitment Cycle

A

Spot/Access, Develop, Recruit, Turnover or Terminate

104
Q

Traffic Analysis

A

analyze patterns of messaging even without content

105
Q

SIGINT

A

Radio @ Tannenberg
Underwater telegraph cables@ Zimmerman

106
Q

SIGINT is more broad than COMINT

A

YES, any type of info from machine, not just related to comms

107
Q

ELINT

A

electronic intelligence, ex. signal emanating from a particular radar or weapons system

108
Q

American Legal Order

A

Constitution ⤑ Statutes ⤑ Executive Orders ⤑ Agency Guidelines ⤑ Agency Procedures ⤑ Counsel ⤑ Civil Servant

109
Q

Article 1: Congress

A

highlighting on state powers
Section 8: To declare war…necssary and proper

110
Q

Article 2: The President

A

Section 1: executive power
Section 2 & 3: forms of diplomacy, office nominations (go later to Senate confirmation) but not explicitly given foreign relations power

111
Q

What does the constitution do?

A

Authorizes (Articles)
Constraints (Bill of Rights)

112
Q

A policy function and not an intelligence function

A

Covert Action

113
Q

Three Aspects of CA under statutory definition

A
  1. Activity of the U.S. government
  2. Purpose is to influence military or political conditions abroad
  3. Role of USG will not be apparent or acknowledged publicly
114
Q

There is no real plausible deniability within the government for CA

A

TRUE, the president ultimately approves in writing (since 1980)

115
Q

Assassination

A

political killing of government leader; terrorists are targeted, non-political

116
Q

Ladder of CA Activities

A

Information/Propaganda ⤑ Economic ⤑ Political Operations ⤑ Paramilitary ⤑ Assassinations Ban/Targeted Killing

117
Q

CDU elections in Italy, influence in French Election, TPAJAX, STUXNET, Bay of Bigs

A

All historic examples of covert action

118
Q

Battle of Tannenberg, Zimmerman Telegram, Black Chamber, MAGIC, Battle of Midway, ULTRA, VENOMA

A

All historic examples of SIGINT

119
Q

What part of a message is transmitted via signals?

A

cipher text ; scrambled and deciphered from Plaintext using algorithm(KEY)

120
Q

Defensive CI

A

Physical Security, Information Security, Personnel Security, Operational Security, Analysis

121
Q

Offensive CI

A

Collection (on adversary services and their activities), Deception (especially in war), Analysis and Targeting

122
Q

Director of the NSA is “dual hatted,” meaning…

A

he is not only in charge of SIGINT collection, but COMSEC for the USG