¿?¿?¿?¿?¿?FINAL

¡Supera tus tareas y exámenes ahora con Quizwiz!

National Technical Means

-Nixon's SALT I treaty (1972) recognized and legitimized the use of national technical means (satellites and other technical collectors) by both parties to collect needed intel. Satellites and other technical collectors (used to verify adherence)

Opportunity Analysis

-intelligence should make policy makers the actors, not the reactors. it should also help policy makers advance their agenda **Intelligence analysis that helps the policy maker advance an agenda and be the actor (not the reactor).Intelligence that helps to advance the agenda of policy makers, and makes them the actor rather than reactor.

Reconnaissance

A mission to acquire information on a target

Wiretapping

A passive attack that eavesdrops on communications, only legal with prior consent or warrant

AIDS

Acquired Immune Deficiency Syndrome

ABI

Activity-based intelligence

AGI

Advanced Geospatial Intelligence

Assessments

Analytical reports. The same as estimates, but this is what they're called in Australia and Britain

ASAT

Anti-Satellite

Chronology 1972

Anti-ballistic missile treaty (ABM treaty) and (Strategic Arms and Limitations Talks) SALT I Accord

Appropriated but not Authorized

Appropriators vote money for programs or activities that haven't been authorized. Giving money to a budget program that has not been authorized.

Authorization

Approving specific programs and activities. Consists of approving specific programs and activities and suggesting dollar amounts for programs

ASIO

Australian Secret Intelligence Organization

ASIS

Australian Secret Intelligence Service

Activity Based Intelligence (ABD)/ Pattern of Life

Based on observed behaviors that are more likely to indicate that an activity of interest is taking place in a general location

Confidence Levels

Based on the scope and quality of information supporting an analysts' judgements. The confidence an analyst has in their judgments. The issue of the confidence that an analyst has in their judgements -HIGH: high quality information, solid judgement possible -MEDIUM: credible information, multiple possible interpretations -LOW: scant or questionable information leading to difficulties in creating analysis

BW

Biological Weapons

CIARDS

CIA Retirement and Disability System

CSIS

Canada's Security Intelligence Service

CISEN

Center for Investigation and National Security (Mexico)

Cryptographers

Code Breaking (the message isn't hidden)

Encrypt

Coding of communications

INTs

Collection disciplines (HUMINT, IMINT, MASINT, OSINT, SIGINT)

Information Operations

Conflict in cyberspace

DOE

Department of Energy

DHS

Department of Homeland Security

Crosswalks

Efforts between DoD and DNI to coordinate the national intelligence budget decisions

FARC

Fuerzas Armadas de Columbia (Columbia)

GDP

Gross Domestic Product

GNP

Gross National Product

HSI

Hyperspectral imagery

IR

Infrared Imagery

IRGC

Iranian Revolutionary Guard Corps

ISG

Iraq Survey Group

CURVEBALL

Iraq defector who fabricated stories about Iraq WMDs that the CIA received from German Intelligence in 2003, big evidence supporting invasion of Iraq

IRA

Irish Republican Army

Priority Creep

Issues can and do move up and down in a priority system but a priority creep can occur when issues customarily do not receive significant attention until after they have begun moving up to the higher priority levels, at which point they must compete with the issues already in that bracket. When issues move up/down a priority system

OSC

Open Source Center

Processing and Exploitation

Process that produces intelligence from information

P&E

Processing and Exploitation

PHIA

Professional Head of Intelligence Analysis (Britain)

Technical intelligence

SIGINT, MASINT, imagery. GOOD: Information on "hard targets," precise, safe. BAD: costly, limits of tech., ethical risks of wiretapping, context, deception. (TECHINT) - Derived from the exploitation of foreign materiel and scientific information.

2001

The Coast Guard became a member of the IC in ___.

480 ISRW

The ___ ___, with headquarters at Langley Air Force Base, VA, is the Air Force leader in globally networked ISR operations.

Paramilitary Operations

The equipping and training of large armed groups for an assault on one's enemies.The largest, most violent, most dangerous covert actions involving the equipping and training of large armed groups for a direct assault on one's enemies

Francis Gary Powers

Who was the U-2 spy pilot that caused a crisis when he was captured by the Soviets after being shot down over Soviet territory?

WIRe

Worldwide Intelligence Review

Risk Versus Take

an issue that arises in SIGINT and COMINT: the need to consider the value of the intelligence that is going to be collected (the take) against the risk of discovery.Need to consider the value of the intelligence that is going to be collected (the take) against the risk of discovery - either in political terms or in the collection technology that may then be revealed to another nation

Department of the Treasury (DOT)

analyzes foreign intelligence related to economic policy and participates with Department of State in the overt collection of general foreign economic information.

Deception

the target can use knowledge about the collection capabilities of an opponent to deliberately transmit information to a collector. When one side tries to trick the other into believing something as a fact when in reality it is false. When targeted nations use knowledge of collection capabilities to transmit information to that opponent

Potemkin Villages

villages built that were facades to impress Catherine the Great.Villages that presaged maskirovka

Current Intelligence

"pays the rent for the IC", always predominates over other types (especially during war), Reports and analysis on issues that may not extend more than a week or two into the future. During a crisis or war, current intelligence increases, as many of the decisions made during these periods are tactical in nature - even among senior policymakers - thus demanding current intelligence.

Steps of the Intelligence Process

(1) Identifying Requirements (2) Collection (3) Processing and Exploitation (4) Analysis and Production (5) Dissemination and Consumption

Agent Acquisition Cycle

(1)Identifying Targets- that have access to desired information: Identify a potential asset. Targeting and spotting (2) Asset Validation System- to access susceptibility to recruitment: Gain their confidence, assess weaknesses and susceptibility to be recruited (asset validation system). Assessing (done via the Asset Validation System)-(3) Recruiting Via Pitch- offering relationship: Recruitment make the pitch (a source may accept a pitch for a variety of reasons)(4) Handling: managing the asset (5) Termination: ending relationship with the asset. source is no longer needed

Chronology 2001

-9/11 attack-Patriot Act created; allows greater latitude regarding domestic intelligence gathering

Chronology 1989-1991

-Failure to force soviet collapse (intelligence failure; minimize d soviet threat)

The intelligence cycle

1. Planning and Direction 2. Collection 3. Processing 4. Analysis and Production 5. Dissemination

Reagan Doctrine

A United Sates effort to aid anti-soviet guerrillas

Surveillance

A systematic observation of a target over time

Supplementals

A way to take care of agreed on needs without making long term budget commitments

The Year of Intelligence (1975)

Began with Hersh's article. Hughes-Ryan Amendment, Church Committee, congressional oversight,

BfV

Bundesamt für Verfassungsschutz (Federal Office for the Protection of the Constitution) (Germany)

CIG

Central Intelligence Group

CMC

Central Military Commission (China)

CEO

Chief Executive Officer

COO

Chief Operating Officer

COS

Chief of Station

Keyword Search

Collected data are fed into computers that look for specific words or phrases and the words are used as indicators of the likely value of an intercept

COCOM

Combatant Command

CRS

Congressional Research Service

DCRI

Direction Centrale du Renseignment Intérieur (France)

DGSE

Directoire Générale de la Sécurité Extérieure (General Directorate for External Security) (France)

EO Data

Emitted or reflected energy across the visible/IR portion of the electromagnetic spectrum.

National Security Directive 5412/2 (1955)

Executive order that adds oversight to previous directive allowing CIA to take charge of covert operations, such as special committee of White House, State, and Defense Officials. Restates that ends justify the means, and sets out parameters of covert ops.

FISA

Foreign Intelligence Surveillance Act

FMV

Full Motion Video

House Intelligence Committee

Has exclusive jurisdiction over the entire National Intelligence Program (NIP) and shares jurisdiction over the Military Intelligence Program (MIP) with Armed Services Committee. The current chairman is Devin Nunes (R-CA)

HEO

Highly Elliptical Orbit

IG

Inspector General

IC

Intelligence Community

MON

Memo of Notification

NFIP

National Foreign Intelligence Program

NGA

National Geospatial-Intelligence Agency

NIMA

National Imagery and Mapping Agency

NOC

Nonofficial Cover

NATO

North Atlantic Treaty Organization

Gang of 4

Only briefing the leaders of the congressional intelligence communities

Geospatial Intelligence Targeteer

Personnell assigned to this specialty make recommendations on the appropriate form required to disable an adversary's targeting system.

SAC

Special Agent in Charge; Strategic Air Command

SAS

Special Air Service (Britain)

SBS

Special Boat Service (Britain)

SNIE

Special National Intelligence Estimate

SOCOM

Special Operations Command

SPA

Special Political Action

SALT

Strategic Arms Limitation Talks

START

Strategic Arms Reduction Treaty

SDI

Strategic Defense Initiative

STRATCOM

Strategic Forces Command

SMO

Support to Military Operations

Intelligence Activity (MCIA)

The Marine Corps' ___ is the Marine Corps' SCC.

Combat Support

The NGA is a DOD ___ ____ Agency and fields support teams worldwide.

Fleet Cyber Command (FLTCYBERCOM)

The Navy's ___ provides guidance to cryptologic activities tasked by both Navy and NSA/CSS.

Risk vs. Task

The need to consider the value of the intelligence collected against the risk of discovery

Layering

The use of judgements or assumptions in one's analysis as the factual basis for judgements in another analysis without also carrying over the uncertainties that may be involved. Use of judgments or assumptions made in one analysis as the factual basis for judgments in another analysis without also covering over the uncertainties that may be involved.

Indication and Warning

The use of traffic analysis to provide indication of image imminent danger and the ability to warn consumers and plan ahead

32

Title ___ outlines the role of the US National Guard.

UIS

Unifying Intelligence Strategies

VolP

Voice-over-internet Protocol

Source

When a target accepts a pitch

Collection Synergy

When on means of collection provides tips to guide collection via other means

The CIA "Family Jewels"

exposed by Seymour Hersh in New York Times in 1974, reported that the CIA and FBI had spied on Americans for years and gotten involved in "dirty tricks." Shocked the public.

Failed States

no longer deemed legitimate by its people, faltering economy, fictionalization of population, displacement of population, or suspension of basic rights. There has been a breakdown of legitimacy of the government and the ability go the government to maintain a level of control over its own territory

Collection

produces information not intelligence

Air Force Targeting Center (AFTC)

subordinate to Air Combat Command and resides on Joint Base Langley-Eustis, VA. produces and delivers timely, tailored targeting and geospatial intelligence and conducts precise Point Positioning and CDE

Monitoring

-monitoring, or keeping track of soviet activities, had been underway since the inception of the IC -Looking at someone's activities, but not making judgements based on them. Means for verification

Hughes-Ryan Amendment (1974)

1974. Required the president to report (issue a "finding") all covert operations of the CIA to one or more Congressional committees within a set time limit.

Lifestyle Polygraph

A category of polygraph exam that focuses on personal behavior

Bean Counting

A somewhat pejorative term that refers to intelligence products that tally up the number of forces, equipment, and man-power in the foreign militaries.Tracking military inventories

Aman

Agaf ha-Modi'in (Israel Military Intelligence)

ARC

Analytic Resources Catalog

ADDNI

Assistant Deputy Director of National Intelligence

Mirror Imaging

Assuming other states or people will act just the way a particular country or person does. Assumes a certain level of shared rationality. Assuming that other leaders, states, and groups share motivations or goals similar to those most familiar to the analyst. Assuming others will act like you would act. -can undermine analysis -these judgements stem from societal norms, rules, etiquette, experience -i.e. Japan starting a war with the US in 1941--made no sense to us

Non official Cover

Avoids any overt connection between the officer and their government but can make it more difficult to keep in contact - they need a full-time job that explains their presence. When a humint officer holds another non-governmental job to hide their humint job

BND

Bundesnachrichtendienst (Germany)

CDA

Congressionally Directed Action

COI

Coordinator of Information

Chronology 1962

Cuban Missile Crisis -Intelligence Failure: didn't foresee missiles being posted -Intelligence Success: Sae missiles before completely installed

DCS

Defense Clandestine Service

DMZ

Demilitarized Zone

DRM

Directoire du Renseignement Militaire (Directorate of Military Intelligence) (France)

FSB

Federal'naya Sluzba Besnopasnoti (Federal Security Service) (Russia)

FAPSI

Feralnoe Agenstvo Pravitelstvennoi Svyazi I Informatsii (Federal Agency for Government Communications and Infromation) (Russia)

U.S. Army's Intelligence and Security Command (INSCOM)

Founded in 1977, INSCOM focuses on signals intelligence (SIGINT) and provides commanders on the ground with information they may need on the battlefield - intercepted radio communications, maps, ground imagery, and information on force structure and numbers. It's Deputy Chief of Staff is Lt. Gen. Mary Legere.

Feedback

From policy consumers to intelligence producers regarding the degree to which intelligence producers are used

HSINT

Homeland Security Intelligence

Electronic Intelligence (ELINT)

Intelligence derived from the interception and analysis of noncommunications emitters (e.g., radar).

case officer

Intelligence officer who supervises an agent/ foreign asset. Utilizes tradecraft to gather information via HUMINT

NSAG; NSAT; NSAH; NSAC

List the four primary cryptologic centers.

Full-Motion Video

Long duration/ close-in videos

MSI

Multispectral Imagery

MAD

Mutual Assured Destruction

ORCON

Originator Controlled

OCO

Overseas Contingency Operations

Analysis and Production Analyst

Personnel assigned to this specialty perform detailed analysis on target network communications for additional exploitation.

PHOTINT

Photo Intelligence

Intentions

Plans and goals of an adversary

PDB

President's Daily Brief

PC

Principles Committee (NSC)

Stovepipes Problem

Raw intel presented without proper context, data often not easily shared outside of the agency using it.

Movement and Signatures Intelligence (MASINT)

Refers to weapons capabilities and industrial activities. Foreign Instrument Intel (FISINT) and Electronic Intel (ELINT) are both major contributors to this branch of intelligence. -Advantages: Extremely useful for issues such as proliferation, can be done remotely -Disadvantages: Expensive, little understood by most users, requires a great deal of P&E

DCGS (Distributed Common Ground System)

Regionally focused, globally linked, the AF ___ is the cornerstone of successful Air Force, joint, and coalition ISR operations

SIOP

Select Intelligence Oversight Panel

SGAC

Senate Governmental Affairs Committee

SSCI

Senate Select Committee on Intelligence

SCIFs

Sensitive Compartmented Information Facilities

Unattended Ground Sensors (UAG)

Sensors disguised to blend with their surroundings and can be linked into a network

Chronology 1957

Soviet Union led race to space (Sputnik Satellite)

SBSS

Space-based Surveillance Satellite

Analysis and Production

Subject matter experts (SMEs) turn the intelligence into reports that respond to the needs of policy makers.

SAM

Surface-to-air Missile

TIARA

Tactical Intelligence and Related Activities

TacSat

Tactical Satellite

TUAVs

Tactical Unmanned Aerial Vehicles

Anti-Satellite (ASAT)

Target areas to which one does not have ready access -collection satellites are national assets and thus targets -the US and the USSR tested ASATs and there were efforts to negotiate anti-ASAT treaties

TPEDs

Tasking, Processing, Exploitation, and Dissemination

16; 8; 8

The IC consists of __ agencies with __ members from the DOD and __ non-DOD members.

Industrial Espionage

The collection of industrial economic intelligence

Computer Network Attacks

There may be reopens to bring down the network, to disrupt command, and control vital services within the target nation

18

Title ___ outlines crimes and criminal procedures, and the roles of law enforcement within the United States.

Intelligence derived from the interception and analysis of non-communications.

What is ELINT?

Provide the ability to understand the secret communications of our foreign adversaries while protecting our own communications.

What is the NSA's mission?

Support SIGINT activities and operations by monitoring and collecting non-communications electronic signal transmissions using passive receiving equipment.

What is the responsibliity of the 1N2X1A career field?

Tradecraft

methods and tools used by CIA officers in collection (preventing exposure of them and their assets) and analyzation (denial or deception present? biases?)

Responsibility to Provide

(2007) DNI Mike McConnell signaled a change in intelligence standard-officers and agencies now would be evaluated by the degree to which they actively seek to share intelligence

DNI-CIA (relationship)

- Rival for access to the president - CIA has control over all source/HUMINT/Intel operations/ for liason -However, a tension exists between the two for control over HUMINT and covert action

DNI-Secretary of State (relationship)

-Both heads coordinate proposed intelligence operations with foreign policy goals -Sometimes, DNI will use the State Department as official cover for clandestine officers

Chronology 1940-1941

-Coordinator of Office (COI) -Office of Strategic Services (OSS) -Pearl Harbor

DNI-Congress (relationship)

-DNI is overseen by Congress which makes budget and funding decisions -Congress helps shape the public perception of intelligence and supports secrecy -Senate Intel Committee has exclusive authority to confirm nominations for the DNI and CIA Director -House Intel Committee has exclusive jurisdiction over the entire National Intelligence Program (NIP)

DNI-DOD (relationship)

-Secretary of Defense controls most of the intelligence community more than DNI because he oversees the NSA, DIA, NGA, and all service intelligence agencies (he can also stymie DNI goals if the relationship is poor)

Seven Phases of The Intelligence Process

1) Identification Requirements 2) Collection 3) Processing and Exploitation 4) Analysis and Production 5) Dissemination 6) Consumption 7) Feedback

Polygraph

A lie detector test that uses you heart rate o determine if you are telling the truth

Imagery

A likeness or representation of any natural or manmade feature, related object or activity, and the positional data acquired at the time the likeness or representation was acquired.

Executive Orders

A presidential policy directive that implements or interprets a federal statute, a constitutional provision, or a treaty. Can be a source of intelligence action

Global Coverage

Acknowledged requirement of the intelligence community to cover any and all issues. Can be a dangerous and misleading term: officers mean their acknowledged requirement to cover any and all issues. Can be misinterpreted as promising more than they can deliver (they can be knowledgeable, but not experts, on everything). Intelligence officers meet their acknowledged requirement to cover any and all issues. The acknowledged requirement to cover any and all issues.

Analysts

All intelligence professionals are considered to be ___.

ACH

Alternative Competing Hypothesis

Single-Source Analysts

Are collection analysts who wade through material from a specific venue (specialty)

AOR

Area of Responsibility

Scientific and Technical Intelligence (S&TI)

At the strategic level, the exploitation and interpretation of foreign weapon systems, materiel, and technologies is referred to as ___ ___ ___ ___.

Multiple Intelligence

Brings together different types of technical collection. not all-source, but multi source -bringing together different types of technical collection (usually imagery and signals), which are powerful when fused

INR

Bureau of Intelligence and Research (Department of State)Secretary of State (relationship) - - Relationship impacts ability to get things done/very variable

CNA

Computer Network Attack

CNE

Computer Network Exploitation

Chatter

Coms and movements of known or suspected terrorists

DS&T

Directorate of Science and Technology (CIA)

Link Analysis

Establishing connections between various people to get a sense of their broader social networks

Politicization

Examples: McCarthyism, Bush Administration pressure on George Tenet. When agendas get in the way of the mission of the agency

Attribution

For large scale nation-state attack, this would be relatively easy as the cyber attack would not likely come in isolation from a deterioration in relation or other actions

FBIS

Foreign Broadcast Information Service

FCIP

Foreign Counterintelligence Program (DOD)

FISC

Foreign Intelligence Surveillance Court

FIA

Future Imagery Architecture

HSIP

Homeland Security Intelligence Program

IRTPA

Intelligence Reform and Terrorism Prevention Act

JIO

Joint Intelligence Organisation (Britain)

JMIP

Joint Military Intelligence Program

JTAC

Joint Terrorism Analysis Center (Britain)

JTTF

Joint Terrorism Task Force

Collection Disciplines

Means of collecting intelligence

NTRO

National Technical Research Organization (India)

Tyranny of the Ad Hocs

Occurs when the intelligence community can't function as desired because of overburdening of ac hocs.When issues like ad hocs arise, some policy makers and intelligence officers exert pressure to give the new issue a priority high enough to compete with other high-priority issues

OMB

Office of Management and Budget

ONA

Office of National Assessments (Australia)

OSS

Office of Strategic Services

ODNI

Office of the Director of National Intelligence

OSD

Office of the Secretary of Defense

Responsibility to provide

Officers and agencies assessed by the degree to which they actively seek to share intelligence, as opposed to the need to know standard. Officers nd agencies who now would be evaluated by the degree to which they actively seek to share intelligence

PIAB

President's Intelligence Advisory Board

PIOB

President's Intelligence Oversight Board

QFR

Question for the Record

RG

Renseignements Généraux (France)

Shin Bet

Sherut ha-Bitachon ha-Klai (General Security Service) (Israel)

Highly Elliptical Orbit

Sits over the northern hemisphere; roughly 16 hrs a day over the northern hemisphere

SVR

Sluzhba Vneshnei Razvedki (External Intelligence Service) (Russia)

TELINT

Telemetry Intelligence

TOR

Terms of Reference

National Intelligence Priorities Framework

The broadest evaluation activity in the intelligence community that gauges how well intelligence means are linked to intelligence ends

Echo or Circular Reporting

The effect of a single media story being picked up and repeated by other media sources until the story is perceived as more important than it actually is. OSINT: the effect of a single media story being picked up and repeated by other media sources until the story appears more important than it actually is

Sub-Source

The sources that serve the primary source

50

Title ___ outlines the role of war and national defense.

Promoting understanding of threats through intelligence analysis; collecting information and intelligence pertinent to homeland security; sharing information necessary for action; and managing intelligence for the homeland security enterprise

What are the four strategic areas the Office of Intelligence and Analysis focuses on?

Signatures

___ are typically the products of multiple measurements collected over time and under varying circumstances.

OPELINT

___ is concerned with operationally relevant information such as the location, movement, employment, tactics, and activity of foreign noncommunications emitters and their associated weapon systems.

Analytic Penetration

an intellectual means for trying to overcome a dearth of intelligence sources. Thinking longer and harder about an issue. If an analysis is required and the sources are insufficient, there has to be a rigor applied to the analysis that attempts to make up for these missing sources

Compartmented System

an internal means of thwarting espionage attacks-employees don't get access to all intel: clearances are done on a "need to know" basis

National Air and Space Intelligence Center (NASIC)

with headquarters at Wright-Patterson Air Force Base, Ohio, is the primary DOD producer of foreign aerospace intelligence. The Air Force's main production

Foreign Intelligence and Surveillance Act

(1978) Part of Congresses push back to address the abuse of the Nixon Administration, this act prohibited domestic wiretapping without a warrant.

Decision Advantage

(2008) SNI Mike McConnell states that the IC's mission was to provide policymakers with "decision advantage": providing policymakers with Intel that will give them an advantage over adversaries, allowing them to act with more confidence and likelihood of success. Providing policymakers with intelligence that will give them an advantage over adversaries. seeks to provide policymakers with intelligence that will give them an advantage over adversaries, allowing them to act with greater confidence and a greater likelihood of success

CIA-FBI (relationship)

- Can be a very tense relationship at times - The war on terrorism has led to an expansion of legal attaches abroad meaning that the FBI is more capable of conducting overseas activity without informing the CIA - FBI currently wants to take over the recruitment of foreigners as agents because they think it is relevant to domestic intelligence gathering while the CIA disagrees

DNI-NCTC (relationship)

-NCTC Director has almost autonomous status -Therefore, a potential rivalry arises

Four Reasons For Intelligence Emphasis

-To avoid strategic surprise -To provide policy makers with long-term expertise -To support the policy process with objectivity and avoid politicized intelligence -To maintain secrecy of information, needs, and methods

Politicized Intelligence

-this occurs when an analysts has a strong preference for a specific policy outcomes.Altering intelligence in order to support a certain policy outcome. If an intelligence officer has a strong preference for a specific policy outcome, their intelligence analysis may display a similar bias

Church Committee

A precursor to the U.S. Senate Select Committee on Intelligence, the committee investigated intelligence gathering for illegality by the Central Intelligence Agency (CIA) and Federal Bureau of Investigation (FBI) after certain activities had been revealed by the Watergate affair. Led to further Congressional oversight such as SSCI, HPSCI, and FISA.

Sleepers

Agents inserted into the target country but spend time, sometimes years, integrating themselves and don't become active immediately. HUMINT: some officers are active as soon as they arrive at their station, sleepers are inserted into the target country but spent time integrating themselves and aren't active immediately.These are HUMINT agents inserted into the target country but spend time (even years) integrating themselves and do not become active immediately

Captured Documents and Media

All media capable of storing fixed information to include computer storage material.

Appropriation

Allocating specific dollar amounts to authorized programs. Consists of allocating specific dollar amounts to authorized programs

Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA)

Called for the most sweeping overhaul of the nation's intelligence-gathering apparatus; created Director of National Intelligence; put together 15 agencies under control of director; created National Counterterrorism Center. established the Office of the Director of National Intelligence (ODNI) to better unify and manage the efforts of the IC.

CCP

Consolidated Cryptographic Program

Capabilities

Current forces, or those being planned.

DCIA

Director of the Central Intelligence Agency

ExCom

Executive Committee

HPSCI

House Permanent Select Committee on Intelligence

4

How many Titles within the US Code should ISR professionals have a basic understanding?

Espionage

Human Intelligence- use of human spies. the practice of spying or of using spies, typically by governments to obtain political and military information.

HUMINT

Human Intelligence. intelligence discipline uses people to gain information

I&W

Indications and Warning

Five Eyes

Intelligence shared among the United States, Britain, Australia, Canada, and New Zealand

JCS

Joint Chiefs of Staff

Iran-Contra Affair

NSC and CIA secretly took covert action forbidden by Congress; sold weapons to Iran to get funding for weapons for Contras in Nicaragua. Unclear if/what Pres. Reagan knew. 1985-1987

NAB

National Assessment Bureau (New Zealand)

Nuclear Radiation Data

Nuclear radiation and physical phenomena associated with nuclear weapons, processes, materials, devices, or facilities.

Denied Areas

OSINT: the number of closed societies and denied areas has decreased dramatically since the cold war

Airborne Intelligence, Surveillance, and Reconnaissance (ISR) Operator

Personnel assigned to this specialty fly as primary aircrew onboard a wide variety of aircraft to operate, evaluate, and manage airborne ISR information and related ground processing systems.

Cryptologic Language Analyst

Personnel assigned to this specialty operate and manage communications equipment.

PCO

Privy Council Office (Canada)

INSCOM

Provides critical, multidiscipline intelligence, counterintelligence, and information warfare support to Army commanders at all echelons.

Doolittle Committee

Requested by Pres. Eisenhower; conveyed the national fear that the United States faced the prospect of annihilation at the hands of the Soviet Union: "It is now clear that we are facing an implacable enemy whose avowed objective is world domination by whatever means and at whatever cost," Doolittle wrote. "There are no rules in such a game... If the United States is to survive, long standing concepts of 'fair play' must be reconsidered."[1] Doolittle's forceful policy and language reflected the fear that motivated American citizens and policymakers in the wake of Soviet communism.

Intelligence Oversight Act of 1980

Required reporting of covert ops to just SSCI and HPSCI, so as not to jeopardize them. Accountability, supervision. From 1947, hardly existed. Church Committee investigations created SSCI and HPSCI, FISA, Hughes-Ryan Amendment, Oversight Act of 1980 and 1991

RAW

Research and Analysis Wing (India)

SRA

Systems and Research Analyses

August 16, 2000

The 70th ISRW, with headquarters at Fort George G. Meade, MD, was activated on ___ ___, ___.

2006

The DEA's Office of National Security Intelligence became a member of the IC in ___.

Gang of 8

The leaders of congressional intelligence communities and the highest ranking members of the intelligence committees

Damage Assessments

This determines what intelligence has been compromised (when a spy has been exposed)

Joint Publication (JP) 2-0, Joint Intelligence

This document defines intelligence sources as the means or systems that can be used to observe and record information relating to the condition, situation, or activities of a targeted location, organization, or individual.

Cyber Operational Preparations of The Environment

To cover military activities that intrude into adversary systems in advance of offensive operations

Counterespionage

countering penetration of your own service

Senate Intel Comm- Senate Armed Services Comm (relationship)

- Can be tense with the Armed Services Committee jealously guarding its oversight of all aspects of defense intelligence - If the Senate Intel Committee makes real or perceived efforts to step beyond its turf, Armed Services usually responds with punitive actions like delaying the annual intel budget authorization bill - Both committees resist the Senate Governmental Affairs Committee

CIA-DOD (relationship)

- Since military and intelligence roles in the war on terrorism are very blurred, this can lead to a rocky relationship at times - DOD desires to gain control over any and all intelligence related to CIA missions - Since the CIA is resistant to sharing intelligence, there is a HUMINT rivalry with DOD expanding its Strategic Support Branch of the DIA to increase their own HUMINT and minimize their reliance on CIA HUMINT

State Department-CIA

- This is generally an edgy relationship Official cover using diplomats leads to a potential conflict - There is tension between State Dept. ambassadors and CIA chiefs of station (COS) - COS officially represents DNI (but see CIA as home) - DCIA controls HUMINT - CIA-DNI rivalry = less willingness to share with State - There is not always full disclosure to the Ambassador

ECHELON

-Allegations of United States economic espionage arose in the late 1990's concerning this government program -It searches through collected sigint using keywords win computers. ("Five Eyes") Refers to an intelligence alliance comprising the United States, Britain, Australia, Canada, and New Zealand. This was a secret agreement which was disclosed to the public in the late 1990s and has since expanded after the World Trade Center attacks. Documents leaked by Edward Snowden revealed that "Five Eyes" have been spying on one another's citizens and sharing collected information with each other in order to circumvent restrictive domestic regulations on the surveillance of citizens.

Developmental

A potential source that is repeatedly contacted to asses value and consideration for a pitch. HUMINT: a potential source who is being brought along-largely through repeated contacts/conversations to asses his value and susceptibilities-to the point where the developmental can be pitched. Potential source who is being brought along largely through contacts and conversations to assess their value (validation) to the point where the developmental can be pitched

Double Agent

Agents who apparently continue their activities, then provide information on their erstwhile employer and knowingly pass back erroneous information. An employee of a secret intelligence service, whose primary purpose is to spy on a different target organization, but who, in fact, is a member of the target organization. Counterterrorism officers may not just try to catch spies, but try to turn them into double agents

Foreign Liaison

Allied or friendly services → these offer greater familiarity with its own region and its government may maintain a different pattern of relations with other states

Revolutions in Military Affairs (RMA)

An ongoing broad doctrinal evolution and debate about the likely nature of future warfare, encompassing technology, strategy, tactics, and the use of intelligence

ABM

Antiballistic Missile

DARP

Defense Airborne Reconnaissance Program

DI

Directorate of Intelligence

DO

Directorate of Operations (CIA)

DoT's Office of Intelligence and Analysis (OIA)

Established in 2004 by the Intelligence Authorization Act, the Treasury Department's OIA is a component of the Office of Terrorism and Financial Intelligence. Its purpose is to collect, analyze, and disseminate foreign intelligence and foreign counterintelligence information. They safeguard the financial system against illicit use and combat rogue nations, terrorist facilitators, WMD proliferators, money launderers, drug kingpins, and other national security threats.

I&A

Intelligence and Analysis

JIC

Joint Intelligence Community (Britain)

NSA

National Security Agency

NSC

National Security Council

NSL

National Security Letters

PFIAB

President's Foreign Intelligence Advisory Board

PIPs

Presidential Intelligence Priorities

Competing Collection Priorities

Prioritization of collection requirements occurs cause of limited numbers of collective platforms

Asset validation

SAD, Tommy Has Tattled (Spot, Assess, Develop/Recruit, Test, Handle, Terminate)

SIS

Secret Intelligence Service (Britain)

MI5

Security Service (Britain)

SARS

Severe Acute Respiratory Syndrome

SWIFT

Society for Worldwide Interbank Financial Telecommunication

Consumer; Producer

The DOD is both a ___ and ___ of intelligence. Consumption By consumer analysis

Debriefing

The process of questioning cooperating human sources to satisfy intelligence requirements, consistent with applicable law. Orbiting pieces of destroyed satellites

Title 10

This Title of the USC outlines the role of the armed forces. provides the legal basis for the roles, missions, and organizations of each of the services as well as the DOD

Iraq WMD analysis

complete analytic failure: analytic biases and problematic IC assumptions, overconfidence of IC leadership, politicization from White House. cherry-picking of evidence.

Cryptologic Service Groups (CSG)

work under the direct authority of DIRNSA and their primary function is to facilitate timely SIGINT support to unified commands, joint task force commanders, or other operational commanders.

LEO, MEO, GEO, HEO, Sun Synchronous

-LEO: Low Earth Orbit 200-1000 miles, allows for detailed view of the earth. -MEO: between leo and geosynchronous orbits (22,000 miles). GEO stay over the same spot all the time - Geosynchronous Orbit: 22,000 miles above the earth. It stays over the same part of the earth at all times -Highly elliptical orbit: comes close to the southern hemisphere and far from the northern -Sun Synchronous Orbits follow daylight

Swarm Ball

-a major problem in managing collection -the tendency of collectors to collect on an issue that is deemed important, whether or not they bring anything useful to the table

Global Findings

-an oversight issue related to covert action -materials are allocated to deal with global issues (terrorism, narcotics), giving the IC a lot of leeway. Broad president findings dealing with covert action involving transnational issues.Broad presidential findings, often to do with transnational issues such as terrorism or narcotics.

Bigot List

A lot of people with access to certain categories of intelligence but these are often rather lengthy rather than exclusive. Lists of people with access to certain categories of intelligence. When leaks occur, there are too many people who have access to the information to be able to pin down the leaker. Agencies keep bigot lists of people with access to certain categories of intelligence (but these are usually too lengthy to be helpful)

Unifying Intelligence Strategies

A responsibility of national intelligence managers to integrate the intelligence that is collected and analyzed by various intelligence agencies. Formulated by the National Intelligence Managers as ways to integrate collection and analysis.

Covert Action

An activity or activities of the United States government to influence political, economic, or military conditions abroad, where it is intended that the role of the United States government will not be apparent of acknowledge publicly. an activity to influence political, economic, or military conditions abroad, where it is intended that the role of the US not be apparent or publicly acknowledged. The type of secret, plausibly deniable operation performed by the CIA. It was given freedom to do this under the National Security Act. "influence."

Compartmented

An employee having access to a certain clearance does not automatically get all of the information in that clearance level.The United State intelligence system is segmented and access to each compartment is based on need to know

Chief of station

An intelligence officer assigned to head an overseas intelligence unit, normally based out of an embassy.

36

Chapter ___ of Title 50, Foreign Intelligence Surveillance, contains laws governing physical searches and electronic surveillance to ensure we aren't breaking any laws while conducting these activities.

CSRS

Counter Surveillance Reconnaissance System

DISTP

Defense Intelligence Special Technologies Program

President's Foreign Intelligence Advisory Board (PFIAB)

Does high level objective oversight by responsibility to problems or initiating activities to investigate issues; became PIAB in 2004. carries out higher level and more objective oversight than the NSC office of intelligence. Has recently just become the PIAB and has appointed officials

EOD

Entry on Duty

Drones: Full Motion Video, Activity Based Intel, Pattern of Life

FMV: long direction and close in video that can bring a lot of valuable intel ABI/Pattern of Life: intel. collection based on observed behaviors that are more likely to indicate that an activity of interest is taking place at that location (looking for activity other than the norm

Footnote Wars

Multiple intelligence organizations focusing on one issue, and will stress a separate point of view to make their report unique. The U.S. system of competitive analysis (which means the same issue is analyzed by different analytical groups) can result in two different outcomes, one of which is footnote wars - the only goal is to maintain a separate point of view regardless of the salience of the issue at stake

NCS

National Clandestine Service

NCIX

National Counterintelligence Executive

NCPC

National Counterproliferation Center

NCTC

National Counterterrorism Center

NIA

National Intelligence Agency (South Africa)

CNI

National Intelligence Center (Mexico)

NIC

National Intelligence Council

Airborne Crytologic Language Analyst

Personnel assigned to this specialty operate, evaluate, and manage airborne signals intelligence information systems and operations activities.

Communication Signals Intelligence Analyst

Personnel assigned to this specialty perform communication signals intelligence analysis to include acquiring signals through optimum antenna manipulation and receiver tuning.

Radar Data

Radar energy reflected (reradiated) from a target or objective.

Radio Frequency Data

Radio frequency/electromagnetic pulse emissions associated with nuclear testing, or other high energy events for the purpose of determining power levels, operating characteristics, and signatures of advance technology weapons, power and propulsion systems.

Targeting Reachback Capabilities

The AFTC provides ___ ___ ___ to air and space operations centers (AOC) to include geospatial intelligence, target analysis, and precision engagement intelligence.

Intelligence, Surveillance, and Reconnaissance Agency (AFISRA)

The Air Force's ___ assists with the coordination of Air Force cryptologic activities, NSA/CSS, and Air Force or theater commanders on SIGINT matters.

Day-to-Day

The DNI has overall responsibility for intelligence support to the President and the ___ ___ ___ management of the IC.

United States Code (USC)

The codification by subject matter of the general and permanent laws of the United States.

Foreign Economic Espionage

The collection of foreign economic intelligence

Processing

The core element of our mission is the ___ of intelligence.

Air Force Intelligence Analysis Agency (AFIAA)

This agency provides the AF/A2 intelligence, special security services, and imagery products.

UCR

Unanimous Consent Request

INSCOM, FLTCYBERCOM, AFISRA, MCIA, CGCG

What are the NSA/CSS's give Service Cryptologic Components (SCS)s?

Title 10; Title 18; Title 32; Title 50

What are the four Titles of the USC in which ISR professionals should have a basic understanding?

Gort Gordon, GA (NSAG); Lackland AFB, TX (NSAT); Kenia, HI (NSAH); and Denver, CO

What are the four primary cryptologic centers of the NSA/CSS?

Communications Intelligence (COMINT); Electronic Signals Intelligence (ELINT); Foreign Instrumentation Signals Intelligence (FISINT)

What are the three subcategories of SIGINT?

Operational ELINT; Technical ELINT

What are the two subcategories of ELINT?

Intelligence failure

When IC fails to predict or predicts wrongly a significant event. Ex: Pearl Harbor, 9/11, Iraq WMD

Title 50

Which Title contains numerous laws that cover intelligence activities?

TECHELINT

___ is concerned with the technical aspects of foreign noncommunications emitters such as signal characteristics, modes, functions, associations, capabilities, limitations, vulnerabilities, and technology levels.

Coast Guard Cryptologic Group (CGCG)

___ is the Coast Guard's SCC.

Competitive Analysis

-based on the belief that by having analysts in several agencies with difference backgrounds and perspective work on the same issues, parochial views are more likely to be countered or weeded out and proximate reality is more likely to be achieved. Different orientations focusing on the same issue but provides more views and great understanding (only rational and logical thinking). Having different agencies work on important issues to produce the best possible intelligence. -the antidote to groupthink -requires a lot of analysts. there was less competitive analysis after the post cold war budget cuts

Patriot Act

A controversial law overwhelmingly passed by Congress in October 2001, after the terrorist attacks of September 11 on the World Trade Center and the Pentagon. It greatly expanded the power of federal law enforcement authorities to move against suspected terrorists. Gave CIA more powers and more money.

Mole

A deeply hidden spy (Angleton convinced of the existence of a Soviet mole)

Sleeper Agents

Agents sent to another nation to assume normal lives and then become active at some later time.

Executive; Executive; Legislative

Although the IC is led by the ___ branch, it is subject to oversight from both the ___ and ___ branches.

AIPAC

American Israel Public Affairs Committee

House Armed Services Committee

Appropriate subcommittees serve as authorizers versus appropriators. Shares jurisdiction of the Military Intelligence Program (MIP) with the House Intel Committee. The current chairman is Mac Thornberry (R-TX)

Group Think

Avoid coerced consensus; when the value of consensus overrides the value of critical thinking (Based on non-logical thinking, no reason). a psychological phenomenon in which the desire for harmony or conformity in the group results in an irrational or dysfunctional decision-making outcome. -Group members try to minimize conflict and reach a consensus decision without critical evaluation of alternative viewpoints, by actively suppressing dissenting viewpoints, and by isolating themselves from outside influences. Occurs within a group of people, in which the desire for harmony or conformity in the group results in an irrational or dysfunctional decision-making outcome.

CW

Chemical Weapons

COIN

Counterinsurgency

CI

Counterintelligence

CIC

Counterintelligence Center

DC

Deputies Committee (NSC)

Battle Damage Assessment (BDA)

Determining the degree to which an attack has been successful

DCI

Director of Central Intelligence

Office of Naval Intelligence (ONI)

Founded in 1882, ONI focuses on signals intelligence (SIGINT) and collects and records naval information that could be useful in war and peace → ONI gives maritime commanders information they need on foreign forces. It's current director is Vice Admiral Ted Branch. located at the National Maritime Intelligence Center(NMIC) in Suitland, MD, is the lead DOD production center for global maritime intelligence.

GDIP

General Defense Intelligence Program

IT

Information Technology

Geospatial Intelligence (GEOINT)

Information about any object-natural or manmade - that can be observed and has national security implications. Imagery Intelligence (IMINT); Geospatial Information -Advantages: Graphic and compelling (when presented to policymakers) easily understood, little to no interpretation required to determine how it was acquired, targets are 'self-reveal,' or make themselves available -Disadvantages: Graphic can be too compelling, leading to hasty or ill-informed decisions or the exclusion of other evidence, only a snapshot-not telling the entire story, expensive to maintain

ISC

Intelligence and Security Committee (Britain)

Airborne ISR Operator

Personnel assigned to which intelligence speicalty fly as primary aircrew onboard a wide variety of aircraft to operate, evaluate and manage airborne ISR information and related ground processing systems?

Geophysical Data

Phenomena transmitted through the Earth (ground, water, and atmosphere) and man-made structures including emitted or reflected sounds, pressure waves, vibrations, and magnetic field or ionosphere disturbances.

PFLP

Popular Front for the Liberation of Palestine

RMA

Revolution in Military Affairs

UAVs

Unmanned Aerial Vehicles

Chronology 1947

-National Security Act- conveyed the legal basis for intelligence community; created by secretary defense and national security council; framework and bureaucracy of today is from this -Start of Cold War- countering soviet union and stopping growth of communism

Maskirovka

A Russian tradition of obscuring the physical realities of the Russian state. Masking, camouflaging, or deceiving

Hollow Budget Authority

A budget program being approved but not given sufficient funds by its appropriators. Authorizers may approve a program but find that it is not given any funds, or the appropriate amount, by appropriators

Dangles

A humint source that presents himself voluntarily but is, collecting for his government. HUMINT:A suspicion we have of walk ins, why have they comes? are they a means of entrapment? Can be used to ID hostile intel. personnel or gaining insights into the intel. requirements and methods of a hostile service

Graymail

A spy threatening to reveal classified information in open court as a means of avoiding prosecution.Occurs when accused spies threaten to reveal classified information in open court as a means of avoiding prosecutions.Prosecuting intelligence officers for spying was a major concern-agencies feared that accused spies would threaten to reveal classified info in an open court as a means of avoiding prosecution. Classified Intelligence Procedures Act (1980) allows judges to review classified material in secret so persecution can proceed without fear of publicly disclosing secret intelligence

Denial

A targeted nation can use knowledge about the collection capabilities of an opponent to avoid collection (known as denial). When a targeted nation uses knowledge of collection capabilities to avoid collection

William "Wild Bill" Donovan

American Decorated General, millionaire Wall Street lawyer, but best known for his position of Coordinator of Information when United States intel was still fragmented under Roosevelt. Became the head of the OSS and argued for a peacetime centralized intelligence agency, eventually the CIA. Ambitious, public service-oriented, reckless, Republican.

Need to know

Being admitted to different compartments based on what information it is important that you know.Only giving employs intelligence they need to get a job done; no more, no less

Central Intelligence Agency

Central Intelligence Agency: An independent intelligence agency responsible to the President through the DNI and accountable to the American people through the intelligence oversight committees of the US Congress. an external intelligence service of the U.S. Government, tasked with gathering, processing and analyzing national security information from around the world, primarily through the use of human intelligence. Established in 1947 by the National Security Act, CIA is responsible for collecting, analyzing, and disseminating foreign intelligence. They report to the DNI. Current Director is John Brennan. created with the signing of the National Security Act of 1947.

15

Chapter ___ of Title 50, National Security, contains laws on matters of intelligence access, protection of national security information, and coordination of intelligence activities.

CBW

Chemical and Biological Weapons

Steganography

Concealed writing, a technique which is centuries old. For steganography, the message itself is hidden, so its existence is uncertain at best whereas in cryptology, the existence of the message is known but it may not be in a format that can be read. The message is hidden

Allen Dulles

Director of CIA, appointed by Eisenhower. He was a veteran of wartime OSS cloak-and-dagger operations. He was also the brother of John Foster Dulles. Known for staying strong against McCarthyism and being a fan of covert action. Forced to resign after Bay of Pigs fiasco.

DBA

Dominant Battlefield Awareness

Coast Guard Intelligence (CGI)

Founded in 1915, CGI now falls under the Dept. of Homeland Security, providing information on maritime and port security, search and rescue, and counter-narcotics. Current Assistant Commander is Rear Admiral Steven Andersen. strives to create decision advantage to advance US interests by providing timely, actionable, and relevant intelligence to shape Coast Guard operations, planning, and decision-making, and to support national and homeland security intelligence requirements.

Materials Data

Gas, liquid, or solid samples, collected both by automatic equipment, such as air samplers, and directly by humans.

Worst-case Analysis

Gauging the worst level of threat that a country may face. - When intelligence analysts gauge the worst level of threat, in order to determine what our forces are likely to face

Subtitle A

General Military Law; Subtitle B - Army; Subtitle C - Navy and Marine Corps; Subtitle D - Air Force; Subtitle E - Reserve Components - Name the five subtitles of Title 10.

GEOINT

Geospatial Intelligence. A unique intelligence discipline that integrates imagery, imagery intelligence (IMINT), and geospatial information.

GRU

Glavnoye Razvedyvatelnoye Upravlenie (Main Intelligence Administration) (Russia)

GAO

Government Accountability Office

GCHQ

Government Communications Headquarters (Britain)

Mossad

Ha-Mossad Le-Modin Ule Tafkidim Meyuhadim (Institute for Intelligence and Special Tasks) (Israel)

All-Source Analysts

Have a more macro-orientation (general)

Sun-Synchronous Orbit

Moving in harmony with earth's rotation so always functioning in daylight

Dissemination

Moving intelligence from producers to consumers

NIE

National Intelligence Estimate

Computer Network Exploitation

Once one has achieved access to a target's computer, one can use that access, determine capabilities, collecting available data, and possible control of all or part of the network for one's own end

OSINT

Open-Source Intelligence. Information that is openly available (newspapers, reports, websites, Internet, media). Made intelligence by the way it is amalgamated, processed. Intention.

Strategic Debriefer

Personnel assigned to this special duty collect and report intelligence information obtained from human sources in response to requirements.

Digital Network Intelligence Analyst

Personnel assigned to this specialty employ techniques to collect, identify, and exploit appropriate communications to ensure accurate targeting.

Geospatial Intelligence Analyst

Personnel assigned to this specialty exploit and analyze multisensor imagery in conjunction with all-source intelligence information.

Operations Intelligence

Personnel assigned to this specialty prepare, maintain, and present intelligence displays, reports and briefings.

US Air Force Intelligence, Surveillance, and Reconnaissance Agency (AFISRA)

The field operating agency that reports to A2 and is located on Security Hill, Lackland AFB, Texas.

Downstream Activities

The specific steps of process and exploitation that follow collection

Interrogation

The systematic effort to procure information to answer specific collection requirements by direct and indirect questioning techniques of a person who is in the custody of the forces conducting the questioning.

Imagery Intelligence (IMINT)

The technical, geographic, and intelligence information derived through the interpretation or analysis of imagery and aollateral materials. Images taken from overhead (satellites, U2)

Official Cover

Those who hold another government job, usually posted at the embassy. Makes it easier for the agent to maintain contact with their superiors but raises the risk of being suspected. When a humint officer holds another government job to hide their humint job

UNSCOM

Unites Nations Special Commission

Title 32

Which Title outlines the role of the US National Guard?

Budget Authorization

approving specific programs or activities. Authorizing committees also suggest dollar amounts for each activity -House Permanent Select Committee on Intel., Senate Select Committee on Intel

Third option

between doing nothing in a situation, in which, vital interests may be threatened and sending in military force , which raises the chance of difficult political action.The reasoning behind covert action, as policy makers need another option beside doing nothing and sending in military force.

CounterIntelligence Polygraph

A category of polygraph exam that focuses on foreign contacts and handling classified intelligence. Polygraph assessing foreign contacts, handling of classified information, etc

U-2

American reconnaissance aircraft shot down over the Soviet Union in May 1960. President Eisenhower refused to acknowledge that this was a spy flight; this incident increased Cold War tensions

National Security Letters

An investigative technique that has been used in espionage cases and counterterrorism. A type of administrative subpoena. Administrative subpoena that requires the recipient to turn over records and data pertaining to individuals, with a gag order as well. -an administrative subpoena. The require recipients to turn over records pertaining to people, but they can't tell anyone it exists -not subject to judicial review, the use of them has skyrocketed this past decade

National Security Act of 1947

Consolidated changes to national security regime by creating 1. CIA 2. Joint Chiefs of Staff 3. National Security Council 4. US Air Force.Established the National Security Council and Joint Chiefs of Staff. It also created the CIA and helped lead to the creation of organized foreign/domestic intelligence gathering

CNC

Counternarcotics Center

CT

Counterrorism

CTC

Counterterrorism Center

Long Term Intelligence

Deals with trends and issues that may not be an immediate concern but are important to watch. Associated with strategic intelligence. Current intelligence that goes far into the future. Intelligence regarding issues further in the future

DCP

Defense Cryptologic Program

DGIAP

Defense General Intelligence Applications Program

DIA

Defense Intelligence Agency

Anti-Satellite Weapons

Delete satellite capabilities

DEA

Drug Enforcement Agency

National Intelligence Managers

Ensures a balanced focus on priority intelligence missions by overseeing both collection and analysis on a given issue. Intelligence managers who oversee and facilitate analysis and manage projects. There are fifteen of them. Responsible for intelligence integration

Air Force Intelligence, Surveillance, and Reconnaissance (Air Force ISR)

Founded in 1948, AF ISR focuses signals intelligence (SIGINT) and on getting information to troops on the ground and most recently, the ISR has collected that intelligence from aerial drones. It also collects intelligence on foreign nations and hostile forces, both in and out of combat zones - conduct electronic and photographic surveillance, and provide weather and mapping data to troops in the field. It's current Deputy Chief of Staff is Lt. Gen. Robert Otto.

Denied Targets

IMINT: target areas to which one does not have ready access -ex. During the cold war, 80% of the information about the USSR was secret and 20% was open

Counterintelligence (CI)

Information gathered and activities conducted to protect against espionage and other activities carried out by foreign states or non-state actors. similar to, and often confused with HUMINT, as CI uses many of the same techniques for the information collection. -both analytical and operational should pervade all aspects of intelligence -collection, defensive, offensive - designed to support one's own effort and thwart the efforts of your adversaries

Fusion Centers

Information sharing center, many of which were jointly created from 2003-2007 under the Department of Homeland Security and the Justice Department. They are designed to promote information sharing at the federal level between the CIA, FBI, Justice Dept, U.S. military, and state and local governments.

Propaganda

Information, especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view. The old political technique of disseminating information that has been created with a specific political outcome in mind

MOIS

Ministry of Intelligence and Security (Iran)

Dulles-Jackson-Correa report

One of the most influential evaluations of the functioning of the United States Intelligence Community, and in particular, the Central Intelligence Agency (CIA). The report focused primarily on the coordination and organization of the CIA and offered suggestions that refined the US intelligence effort in the early stages of the Cold War. Focus on lack of coordination between agencies, poor efficiency and leadership from DCI, and need to merge covert and clandestine ops.

Sources and Methods

One of the primary concerns of the entire intel community is protecting your sources and methods of collecting intelligence.the details/existance of collection capabilities. Classification of sources and methods is one of the IC's top priorities

National Intelligence Program (NIP)

One of two components of the U.S. Intelligence Budget. The NIP includes all programs, projects, and activities of the intelligence community as well as any other intelligence community programs designated jointly by the DNI and the head of the department or agency. Budget of $53.1 billion for 2017.Comprises programs that either transcend the boundary of an agency or a defense in nature. DNI is responsible. The DNI has a great deal of power with respect to NIP responsibilities.

8D000, Strategic Debriefer

Personnel assigned to the special duty identifier of ___ collect and report intelligence information obtained from human sources in response to requirements.

Scientific Applications Specialist

Personnel assigned to this reporting identifier apply leading edge physical sciences to perform data collection, analysis, observation, study, experimentation, acquisition, maintenance, research and development, fielding of prototype and operational active and passive sensors and systems.

Interpreter/Translator

Personnel assigned to this reporting identifier perform duties as foreign language interpreters or translators.

Electronic Signals Intelligence Exploitation Analyst

Personnel assigned to this specialty support SIGINT activities and operations by monitoring and collecting noncommunications electronic signal transmissions using passive receiving equipment.

70 ISRW

The Air Force's only cryptologic wing that trains and equips cryptologic information operations specialists to carry out AFISRA's and NSA's multi service operations.

President; National Security Council (NSC); Homeland Security Council (HSC)

The US Iintelligence effort provides the ___, ___, and ___ with timely, accurate, and insightful infomration about the activities, capabilities, plans, and intentions of foreign powers, organizations, and persons, and their agents.

Plausible Deniability

The ability for persons to deny knowledge of and responsibility for any damnable actions committed by others because of a lack of evidence that can confirm their participation, even if they were personally involved in or at least willfully ignorant of the actions.When a foreign government in whose territory a rendition occurred was aware of the operation and looks the other way to deny any involvement

Oversight

The ability to control information. The responsibility of the executive and legislative powers to oversee intelligence.

Capabilities versus Intentions

Whether intentions actually matter as opposed to immediate capabilities. Whether the capabilities of the Soviet Union is important when the United States knows the intentions of the Soviets

counterintelligence polygraph

foreign contacts, handling of classified information

Negation Search

imagery is a static piece of intel, revealing something about where and when it was taken but nothing about what happened before or why it happened. negation searches look at past imagery to determine when an activity commenced (automatic change extraction: comparing images). Looking at past imagery to determine when an activity commenced.A look at previous satellite imagery to determine when an activity commenced

CESG

Communications Electronics Security Group (Britain)

CMA

Community Management Account

U.S. Intelligence community

Comprised of 1. executive departments (e.g. State, Defense, Homeland Security), 2. the military (each branch has its own agency), 3. intelligence agencies (DIA, CIA, NRO), and 4. the Director of National Intelligence, who sits on top and manages the budgets

DOD

Department of Defense. the federal department charged with coordinating and supervising all agencies and functions of the government relating directly to national security and the military.

DoE's Office of Intelligence and Counterintelligence (OICI)

Department of Energy's OICI focuses on technical intelligence on nuclear weapons and nonproliferation as well as nuclear energy (especially foreign) and energy security - they share this technical analysis with the other members of the intelligence community, especially its assessments of foreign nuclear weapons programs. Current director is Steven Black.

EO

Electro-optical; Executive Order

National Security Agency (NSA)/Central Security Service (NSA/CSS)

Founded in 1952, the NSA is a DOD agency which primarily gathers signals intelligence (SIGINT) - intercepting and processing foreign communications, cryptology, and information assurance (preventing foreign hackers from getting secret information). Unlike the DIA and CIA, the NSA does not unilaterally conduct human-source intelligence gathering. It's current director is Mike Rogers. It is the IC's executive agent for all SIGINT activities. main cryptology organization in USA. Tasked w/ collection and dissemination of SIGINT, protection of USA tech/cyber systems. Budget determined by DOD

President's Intelligence Advisory Board

High level of oversight, can investigate intelligence issues or initiate competitive analysis.

Containment

If the soviet union was contained within its borders it would have either changed or collapsed due to commit shortcomings. The action of keeping something harmful under control or within limits.

INF

Intermediate Nuclear Forces

Joint Terrorism Task Force (JTTF)

Partnership between American law enforcement agencies that is charged with taking action against terrorism, which includes the investigation of crimes such as wire fraud and identity theft. The lead agency is the FBI followed closely by the DHS and also is composed of 33 other federal agencies. A series of fusion centers have been formed to provide the desired liaison and integration

Intelligence Officer

Performs and manages intelligence functions and activities to support the United States and allied forces.

Signals Intelligence (SIGINT)

Refers to the interception of communications between two or more parties. Intelligence produced by exploiting foreign communications systems and non-communications emitters. It entails: Communications Intelligence (COMINT); Electronic Intelligence (ELINT): Technical ELINT (TECHELINT), Operational ELINT (OPELINT); Foreign INstrumentations Signals Intelligence (FISINT). intercepted communications, wire taps, telemetry intelligence, signatures from military equipment. intelligence discipline provides unique intelligence information, complements intelligence derived from other sources, and is often used for cueing other sensors to potential targets of interest. -Advantages: Offers insight into plans, intentions, voluminous material, military targets tend to communicate in regular patterns -Disadvantages: Signals may be encrypted or encoded

Intelligence and Security Command (INSCOM)

The Army's ___ assists with the coordination between Army tactical units and NSA/CSS concerning SIGINT matters for Army resources and assets.

Primary Mission

The IC's ___ ___ is to collect and convey the essential information the President and members of the policymaking, law enforcement, and military communities require to execute their appointed duties.

Office of the DNI (ODNI)

The ___ __ ___ ___ is charged with effectively integrating foreign, military, and domestic intelligence in defense of the US and its interests abroad.

Chairman of the Joint Chiefs of Staff (CJCS)

The ___ ___ ___ ___ is the military advisor to the NSC.

Homeland Security Council (HSC)

The ___ ___ ___ coordinates homeland security related activities among IC members and promotes the effective development and implementation of homeland security policies.

Intelligence Community (IC)

The ___ ___ is a coalition of agencies and organizations within the executive branch that work both independently and collaboratively to gather the intelligence necessary to conduct foreign relations and national security activites.

Office of Strategic Services (OSS)

The first peacetime, non-departmental US intelligence organization. Created in 1942 by FDR and tasked to collect, analyze, and disseminate strategic intel., as well as "black ops." First director was William "Wild Bill" Donovan. Opposed heavily by J.Edgar Hoover of FBI. Disbanded by Truman in 1945.

The Deputy Chief of Staff for Intelligence, Surveillance, and Reconnaissance (A2)

The focal point for the functional management of all Air Force ISR capabilities; Reports to internal and external consumers (Congress, ODNI, Joint Staff).

Operational Commanders; Program Managers; Decision Makers

The function of CI is to provide direct support to ___ ___, ___ ___, and ___ ___.

Wheat Versus Chaff

US technical collection is more like a vacuum than a microscope-collectors sweep up a great deal of information, within which may be the info that is sought + In order to produce intelligence, you have to separate the intelligence from the overflow of information received daily (separate the wheat, or the meaningful information, from the chaff, or the collective pile of information) + Noise vs. Signals - How to extract desired intelligence form a huge load of information

Ad Hocs

Unexpected issues that appear with little warning. When unexpected issues inevitably crop up with little or no warning - not every ad hoc merits higher priorities however

Tactical, investigative, and strategic

What are the DEA's three categories of drug intelligence?

State's Bureau of Intelligence and Research (INR)

a bureau of the Department of State and a member of the Intelligence Community (IC). The Bureau of Intelligence and Research's (INR) primary mission is to harness intelligence to serve U.S. diplomacy.

AFISRA (Air Force Intelligence, Surveillance, and Reconnaissance Agency)

agency that organizes, trains, equips, and presents assigned forces and capabilities to conduct ISR utilizing assets ranging from worldwide ground sites to manned and unmanned airborne platforms

FISINT

involves the technical analysis of data intercepted from foreign equipment and control systems such as telemetry, electronic interrogators, tracking/fusing/arming/firing command systems, and video data links. Foreign Instrumentation intelligence

Noise Versus Signals

-Roberta Wohlstetter: Pearl Harbor Warning and Decision -the fact that we collect so much information means that the signals one wishes to receive and to know are often embedded in a lot of surrounding noise

Estimates

-analytical products. An educated guess based on researched information. intelligence products written on a recurring basis. -two purposes: to see where a major issue will go over the next few years, to present the considered view of the entire IC

Intelligence

-much of what goes on is secret, which can be of concern to citizens of a democratic state. Information that makes the needs of policy makers and has been collected and processed to meet those needs -Intelligence refers to info that meets the states or understood needs of policy makers and has been collected, processed and narrowed to meet those needs -there are many different types that provide info to analysts (political, economic, social, environmental, health, cultural)

CSEC

Communications Security Establishment Canada

DST

Directoire de Surveillance Territoire (Directorate of Territorial Surveillance) (France)

DPSD

Directoire de la Protection et de la Sécurité de la Défense (Directorate for Defense Protection and Security) (France)

Shutter Control

During periods when national security or international obligations may be compromised, the U.S. government can prevent a commercial satellite from imaging a given area. United States limits commercial satellite functioning for national security reasons

Langley, VA

Headquartered in ___, ___, the CIA serves as a source of analysis on topics of concern and works closely with the other organizations in the IC to ensure the intelligence consumer receives the best intelligence possible.

Geospatial Information

Identifies the geographic location and characteristics of natural or constructed features and boundaries on the Earth.

ISR

Intelligence, Surveillance, and Reconnaissance

ISD(ISI)

Inter-Services Intelligence Directorate (Pakistan)

IAEA

International Agency for Atomic Energy

National Intelligence Estimates (NIEs)

Long-term intelligence product that attempts to estimate (not predict) the likely direction an issue will take in the future. They represent the considered opinion of the entire intelligence community and are presented to the president by the DNI once fully agreed to

Traffic Analysis

Monitoring the changes in communications. Changes in these patterns (increases or decreases) may be indicative of a larger change in activity. SIGINT: monitoring changes in communications, which has more to do with volume than content

Renditions

The seizure of individuals wanted by the US.

Automatic Change Exchange

Using computer to do a negation search

Clientism

A flaw that occurs when a analyst becomes so immersed in their subject (usually after working on an issue for too long), that they loose their ability to view issues with their necessary criticality. A flaw that occurs when analysts become so immersed in their subjects that they lose their ability to view issues with criticality-they can spend time apologizing for their subjects instead of analyzing them. When analysts become so immersed in their subjects that they lose the ability to view issues with the necessary criticality. "Going native"

National Security Council (NSC)

An office created in 1947 to coordinate the president's foreign and military policy advisers. Its formal members are the president, vice president, secretary of state, and secretary of defense, and it is managed by the president's national security assistant. Composed of the Principals Committee and Deputies Committee. It is the principal forum to consider national security issues that require presidnetial decision. serves as the President's principal arm for coordinating policy among various government agencies. The principal forum used by the President of the United States for consideration of national security and foreign policy matters with senior national security advisors and Cabinet officials and is part of the Executive Office of the President of the United States. Since its inception under Harry S. Truman, the function of the Council has been to advise and assist the president on national security and foreign policies.

Spies

Collection platforms (means of collecting information): there is a limited amount of spies, policy makers must make choices among competing collection requirements (it is a zero sum game)

Deputies Committee of The National Security Council

Composed of the principle committee; they review issues as a groundwork for the Principle Committee

Chronology 1975-1976

Created congressional oversight committees due to violations of law and due to intelligence abuses

DICP

Defense Intelligence Counterdrug Program

DIS

Defense Intelligence Staff (Britain)

DITP

Defense Intelligence Tactical Program

DSRP

Defense Space Reconnaissance Program

Requirements

Defining policy issues which the intelligence community is expected to focus on

Resolution

Degree of visual clarity. Indicate the size of the smallest identifiable object using satellite imagery. At 25-meter (75 feet) resolution, you can see major landforms and larger man-made objects. However, a 1-meter (39 inch) resolution of the same picture, you can see each building with individual cars. satellite imagery: resolution numbers indicate the smallest identifiable object

Render

Delivery of suspected terrorists to a 3rd world country that can incarcerate and interrogate with fewer limitations -CIA captured suspected terrorists overseas and rendered them to a third country for incarceration and interrogation -this has become controversial as some questioned the basis on which people were rendered and the conditions to which they were subjected in these third nations

D&D

Denial and Deception

Damage Assessment

Determining what intelligence has been compromised. Once a spy has been caught, looking to see what has been compromised or stolen

Military Intelligence Program (MIP)

Devoted to intelligence activity conducted by the military departments and agencies in the Department of Defense that support tactical U.S. military operations. Budget of $16.8 billion for 2017.Consists of defense and service intelligence programs. Headed by the secretary of defense. Composed of intelligence programs that support the DoD and its components aren't confined to any one military service

Analytical Stovepipes

Each collector operates in a unique field with a series of unique methodologies. Bureaucratic imperatives and a clear preference for their responsibilities in direct support of their particular policy client, as opposed to interagency progects. Isolation of analysts within their own agency and a resulting non-cooperation between agencies. Several ways to which raw intelligence may be presented without proper context

Measurement and Signature Intelligence (MASINT)

Electromagnetic Data; Radio Frequency Data; Radar Data; Nuclear Radiation Data; Materials Data; Geophysical Data. Scientific and technical intelligence obtained by quantitative and qualitative analysis of data (metric, angle, spatial) derived from specific technical sensors for the purpose of identifying any distinctive features associated with the target, source, emitter, or sender. all electronic intel that's not SIGINT or imagery. Mostly military, like sizmometers, submarine detectors, sniffers. The intelligence discipline is scientific and technical intelligence obtained by quantitative and qualitative analysis of data derived from specific technical sensors for the purpose of identifying any distinctive features associated with the target, source, emitter, or sender

Human Intelligence (HUMINT)

Espionage (spying). Largely involves sending covert service officers to foreign countries to recruit spies (using humans as source information). A category of intelligence derived from information collected and provided by human sources. walk-ins, diplomatic reports, attache reports, law enforcement information, debriefings, clandestine intelligence reporting, case officers and assets. Debriefings; Source Operations; Interrogation Operations; Document and Media Exploitation. USE: to find intentions of leaders, contingency plans, blueprints, etc. GOOD: provides context, interpretation, comprehensive, flexibility... BAD: risky, denial and deception, time intensive, difficult in hard targets -Advantages: Offers insight into plans/intentions, really inexpensive -Disadvantages: Riskier in terms of lives (political fallout), requires more time to acquire and validate sources, problems of dangles, false feeds, double agents

National Security Directive 10/2 (1948)

Executive order that declares covert operations a responsibility of the CIA in threat of the Cold War. Establishes the Office of Policy Coordination (OPC), a new office of Special Projects.

DEA's Office of National Security Intelligence (ONSI)

Founded in 1973, the DEA's ONSI focuses on gathering intelligence for anti-drug operations while also providing intelligence to other law enforcement agencies

National Reconnaissance Office (NRO)

Founded secretly in 1961, the NRO is a DOD agency which designs, builds, and operates US government reconnaissance satellites providing signal intelligence (SIGINT) to the NSA, imagery intelligence (IMINT) to the NGA, and measurement and signature intelligence (MASINT) to the DIA. It is considered one of the "big five" intelligence agencies (along with the CIA, NSA, DIA, and NGA). It's current director is Betty Sapp. It designs, builds, and operates the nation's reconnaissance satellites. Builds, operates, maintains satellites. Classified until 1978.

Senate Intelligence Committee

Has exclusive authority to confirm nominations for the DNI, its principal deputy, and the director of the CIA. Have tense relationship with the Armed Services Committee. The current chairman is Richard Burr (R-NC)

Senate Armed Services Committee

Has exclusive jurisdiction over all aspects of defense intelligence. The appropriate subcommittees serve as authorizers versus appropriators. Has always jealously guarded its oversight of all aspects of defense intelligence. Has exclusive jurisdiction over all aspects of defense intelligence. The current chairman is John McCain (R-AZ)

National Geospatial-Intelligence Agency (NGA)

Headquartered in Springfield, VA, the ___ operates major facilities in the St. Lois, MO and Washington, DC areas. Rooted in the 1972 formation of the Defense Mapping Agency and renamed the NGA in 2003. It's primary goal is to collect, analyze, and distribute geospatial intelligence (GEOINT) by gathering data from reconnaissance satellites provided by the NRO. For example, using advanced satellite imagery, the NGA was responsible for watching Bin Laden's Pakistani compound when it was discovered. It's current director is Robert Cardillo. Collecting, analyzing imagery, creating reports

Walk-ins

Humint source volunteers. HUMINT sources who volunteer but it raises a lot of questions: Why have they volunteered? Do they really have access to valuable intelligence? Are they real volunteers or a means of entrapment (called dangles)? Dangles can be used to identify hostile intelligence personnel or gaining insights into the intelligence requirements or methods of a hostile service

Self Reveal

IMINT: many targets of imagery systems make themselves available. Regarding how many targets make themselves known via imagery.Revealing how a military force is intended to be used in combat through demonstration or exercise. -ex. military exercises are conducted in regular cycles in predictable locations.

Bureau of Intelligence and Research (INR)

INR serves as the intelligence bureau of the State Department tasked with providing all-source intelligence support to U.S. diplomats and analyzing information. It is the principal lisason with the DNI. It's current director is Assistant Secretary of State for Intelligence and Research Daniel Smith. As the intelligence arm of the Department of State, the ___ of ___ and ___ has the primary mission of harnessing intelligence to serve US diplomacy.

Big CI & Little CI

If a spy is caught, you look at two things: -Big CI: motives of the country sponsoring him, what was he going for? Determining the reasons a spy went after certain informationWhen an organization has a spy within it and can figure out if the spying is part of a comprehensive tasking from other nations -Little CI: issues of tradecraft, what did he steal, how did he get in? How penetration occurred, how long it was going on, etc. The specific details that collectively compromise the Big CI

Strategic intelligence

Information that is foreign, secret, actionable, and timely. Not as detailed and military-oriented as tactical intelligence.Serves to (1) Explain and account for something and (2) Forecast and estimate about likely events (not predict)

Communications Intelligence (COMINT)

Intelligence and technical information derived from collecting and processing intercepted foreign communications passed by radio, wire, or other electromagnetic means. A subunit of sigint- the inception of communications between two parties

All-Source Intelligence

Intelligence based on many collection sources to compensate for short-comings of each and profit from combined strength -the goal of the IC is to create all-source intelligence -Intel. based on as many collection sources as possible to compensate for the shortcomings of each and profit from their combined strength

Tactical Intelligence

Intelligence specifically used for tactical reasons (special ops missions, strikes, etc.)

JICC

Joint Intelligence Community Council

JIOC

Joint Intelligence Operations Center

KGB

Komitet Gosudarstvennoi Bezopasnosti (Committee of State Security) (Russia)

Earmarks

Legislative provisions directing funds to be spent on specific projects.

Marine Corps Intelligence Activity (MCIA)

Marine Corps provides their own agency to collect and analyze information for troops on the ground. Includes map making, radio intercepts, human intelligence, and counterintelligence. Current director is Brid. Gen. Michael Groen. produces tactical and operational intelligence for battlefield support.

NIM

National Intelligence Manager

NIO

National Intelligence Officer

NIPF

National Intelligence Priorities Framework

NIP

National Intelligence Program

NRO

National Reconnaissance Office

NRP

National Reconnaissance Program

NTM

National Technical Means

Analyst Fungibility

Need for analysts who have more than one or two areas of expertise and therefore can be shifted to higher priority accounts during times of need. not every analyst has the language, regional, or topical skills to move to an area of greater need. a very real limit exists on analyst fungibility, which is a major management concern. The ability of analysts to shift from one area of expertise to another during times of need. When requirements change or when crises breakout, analysts must be shifted to areas of greater needRelies on three factors: (1) Talents and background of the analysts when they are recruited (2) Their training and education within the intelligence community (3) Management of their careers, which should give them sufficient opportunities to develop this expertise in a few areas

Plumbing

Operational support structure of covert action.The operational support structure, which also includes prearranged getting places, surveillance agents, letter drops, and technical support

Denial and deception

Possibility in collection: HUMINT-- assets who lie or exaggerate, like CURVEBALL. SIGINT or Imagery-- moving equipment. etc.

Presidential Finding

Presidential approval of a covert action that is required before it is carried out.A document the president must sign a covert operation, based on a president's findings that covert action is necessary to support identifiable foreign policy objectives of the United States, and is important to the national security of the United States

Key Judgements (KJs)

Primary findings of an overall intelligence estimate that can be used as a justification for action or inaction. Key Judgments come with intelligence estimates created for policy makers: the IC's opinion of what is most likely -Example: IC's key judgements about the Iraq WMD crisis were published in an unclassified form, adding fuel to the political fire

Content Analysis

Reading intercepted communications and analyzing what they mean. A main pillar of signals intelligence → often called COMINT to refer to communication intercepts. Tracking these communications also gives a good indication and warning. Reading messages and analyzing what they mean. SIGINT: reading messages and analyzing what they mean

S&T

Science and Technology

MI6

Secret Intelligence Service (Britain)

Special Access Programs (SAP)

Security protocols that provide highly classified information with safeguards and access restrictions that exceed those for regular classified information.Are typically open to general accounting office (GAO) audits and performance reviews (most intelligence programs haven't been subjected to GAO reviews

Federal Bureau of Investigation (FBI)

Serves as an intelligence and law enforcement agency which is responsible for understanding national security threats. The FBI's Directorate of Intelligence (DI) is responsible for information sharing policy and intelligence analysis for national security. The current Intelligence Branch Executive Assistant Director is Eric Velez-Villar. As an intelligence and law enforcement agency, is responsible for understanding threats to our national security and penetrating national and transitional networks that have a desire and capability to harm the US.

Drug Enforcement Administration (DEA)

The ___ is responsible for enforcing the controlled substance laws and regulations of the US.

Air Force Technical Applications Center (AFTAC)

The ___ provides national authorities quality technical measurements to monitor nuclear treaty compliance and develops advanced proliferation monitoring technologies to preserve our nation's security.

Analyst Agility

The ability of analysts to shift from one area of expertise to another during times of need. The need for analysts who have more than one (or two) areas of expertise and therefore can be shifted to higher priority accounts during times of need

Director of Central Intelligence

The head of the CIA from 1946 to 2005, acting as the principal intelligence advisor to the President of the US and the NSC, as well as the coordinator of intelligence activities among and between the various U.S. intelligence agencies (collectively known as the Intelligence Community from 1981 onwards). The office existed from January 1946 to April 21, 2005, and was replaced on that day by the Director of National Intelligence (DNI) as head of the Intelligence Community and the Director of the Central Intelligence Agency (D/CIA) as head of the CIA.

DHS Office of Intelligence and Analysis (OIA)

The intelligence arm of the Department of Homeland Security which focuses primarily on homeland threats. They collect and analyze information and share intelligence with local and federal law enforcement through the use of fusion centers. It's current Under Secretary is Francis Taylor.

Blowback

The risk probability of a story being planted into overseas media outlets that could also be reported in the United States. Unintended consequences of a covert operation that are suffered by the aggressor.

Principle Committee of the National Security Committee

The senior policy coordination body (Secretary of State, Secretary of Defense, Director of National Intelligence, Chairmen of the Joint Chiefs, etc.)

Collection Swarm Ball

The tendency of all collectors of collection agencies to collect on an issue that is deemed to be important, whether or not they bring anything useful to the table or can offer an appropriate type of collection. Tendency of all collectors to collect on an important issue to enhance their standing for budget allocations. Usually involves a high priority issue. Think little kids playing soccer, both teams converge on the ball en masse regardless of their assigned positions

10; 50

Title ___ is used to colloquially refer to DOD and military operations, while Title ___ refers to intelligence agencies, intelligence activities, and covert action.

Dominated Battlefield Awareness

To give commanders real-time, or near-time, all-weather, comprehensive, continuous surveillance and information about the battle-space in which they operate

USDI

Undersecretary of Defense for Intelligence-Congress (relationship) = Established in 2003, the USDI acts as the principal civilian adviser and deputy to the Secretary and Deputy Secretary of Defense on matters relating to military intelligence and also reports to the DNI - Serves a managerial function with oversight over the DIA, NGA, NRO, NSA, and all military intelligence service components. Current USDI is Marcel Lettre. The USDI is one of the main two conduits through which defense intelligence issues reach Congress (the other is the DIA itself) - Given the principle of civilian control of the military, the USDI is more powerful and important than the DIA because oversees DIA, NRO, NSA, and NGA - Deals with House and Senate Armed Services Committees - USDI staff functions as a guardian of the authority of the Secretary of Defense over defense intelligence, watching for any possible encroachments, such as from the DNI. Current director is Vincent Stewart. - Verification -SALT I's legitimation of national technical means created the issue of verification: the ability to ascertain whether treaty obligations were being met. judgments based on monitoring. Ensures that treaty agreements are honOroed

WMD

Weapons of Mass Destruction

Intelligence Disciplines

Well-defined areas of intelligence planning, collection, processing, exploitation, analysis and production, and dissemination using a specific category of technical or human resources.

AFIAA (Air Force Intelligence Analysis Agency)

What agency analyzes foreign air and air defense tactics and training, and was activated as a Field Operating Agency of the United States Air Force, on 1 FEB 2001?

Title 10 & Title 50

Which two Titles in combination regulate the activities and funding of the US Intelligence Community?

Deputy Chief of Staff for ISR (A2)

Who is the focal point for the functional management of all Air Force intelligence, surveillance, and reconnaissance capabilities?

The Joint Chiefs of Staff (JCS)

Who is the primary military advisory council to the President of the US and SecDef?

Office of Intelligence and Analysis

Within the DHS, the ___ of ___ and ___ is responsible for using information and intelligence from multiple sources to identify and assess current and future threats.

Covert vs. Clandestine

______ is when the act is obvious, but not who did it (plausible deniability.) _____ is when you don't even know the act occurred (meetings with assets).

Service Cryptologic Components (SCC)

___s are the US military's service SIGINT activities that are subordinate to DIRNSA/CHCSS.

President's Daily Brief (PDB)

a top secret document produced and given each morning to the President of the United States. Producing and presenting the brief is the responsibility of the Director of National Intelligence.Daily intelligence brief delivered to the president, primary function of the DNI

National Intelligence

all intelligence is now defined as national intelligence which has three subsets (foreign, domestic, and homeland security) -Didn't appear in the US until 1940. Foreign, domestic, and homeland security

Budget Appropriations

allocating specific dollar amounts to authorized programs -the defense subcommittees of the house and senate appropriations committee

Premature Closure

analysts can fasten to one line of analysis, especially for issues that are reexamined over the years, and then not be open to other possible hypotheses or alternatives.When an analyst fastens on to one line of analysis, especially for issues that are examined and reexamined over the years, and then will not be open to other possible hypotheses or alternatives.When analysts embrace one perspective on an issue and are not open to other hypothesis

Director of National Intelligence (DNI)

appointed by the President with Senate approval, serves as the head of the IC. Overseer and coordinator of the activities of 15 intelligence agencies involved in the production and dissemination of intelligence information in the U.S. government, as well as the president's main intelligence adviser. Current director is James Clapper. overseer and coordinator of the many agencies involved in production and dissemination of intelligence information in the U.S. government, as well as the president's main intelligence adviser. Started in in 2005. mbodiment of the intelligence community; works with the national security council to support and advise the president

Open-Source Intelligence (OSINT)

based on publicly available information as well as other unclassified information that has limited public distribution or access. Information from readily available sources (Academia; Interagency; Internet; Newspapers/Periodicals; Media Broadcast, public data, social media) -Advantages: Accessibility, needs less processing and exploitation than the technical INTs, but still require some P&E -Disadvantages: The volume of information (it represents the worst 'wheat and chaff' problem)

Defense Intelligence Agency (DIA)

external intelligence service specializing in defense and military intelligence. A component of the Department of Defense (DoD) and the United States Intelligence Community (IC), DIA informs national civilian and defense policymakers about the military intentions and capabilities of foreign governments and non-state actors.Founded in 1961, the DIA is the DOD's lead intelligence agency specializing in defense and military intelligence with a purpose of informing policymakers about the military intentions and capabilities of foreign governments and non-state actors. It also ensures intelligence assistance, integration, and coordination across uniformed military service intelligence components. It's current director is Vincent Stewart.Located on Polling AFB in Washington DC, it is a DOD combat support agency. mission is it to provide timely and objective military intelligence to warfighter, defense policy makers, and force planners

Supplemental Appropriations

make available to agencies funds over and above the amount originally planned. Conrgess has been using these more for the IC in recent years.Making funds available for agency use that exceed the amount originally planned.These appropriations make available agencies funds of and above the amount originally planned

Department of Homeland Security (DHS)

mandate to reduce US vulnerability to terrorism and to detect, prevent, and respond to terrorist attacks. responsible for reducing US vulnerability to terrorism and to detect, prevent, and respond to terrorist attacks

No Year Appropriations

money that does not have to be spent at the end of the fiscal year. Every executive agency wants these types of appropriations

Department of Energy (DOE)

oversees and protects vital national security capabilities ranging from nuclear weapons to energy research and developmental projects.


Conjuntos de estudio relacionados

Prep U: Chapter 15: Postpartum Adaptations

View Set

Chapter 11 Review Perfect Competition

View Set

Warranty Basics for Technicians and Profile Administrators (RWSW112)

View Set