IC Final study guide

¡Supera tus tareas y exámenes ahora con Quizwiz!

The "Nuclear Club": Big 5 Nuclear Powers

US Russia Britain France China

Black Swan Events

an unlikely event, but one that would have a significant impact if it occurred. Some examples include: Severe Pandemic (fatal pathogens) Collapse of a major world player (the EU, China, US) Solar Storms (solar/geomagnetic storms that could knock out satellites) Nuclear War

Authorization for the Use of Military Force Against Terrorists (2001)

authorize the use of U.S. Armed Forces against those responsible for the recent attacks launched against the United States against those who helped carry out the September 11, 2001 attacks. The act allowed the U.S. military to use force against al Qaeda in keeping with the Geneva Convention, which allows one uniformed soldier to kill another uniformed soldier.

Executive Order 12333 (1981)

authorized the lawful killing of combatants and terrorists

Espionage Act of 1917

civilians do not have the right to reveal classified information to the public, and military personnel do not have a right to reveal classified information under the Uniform Code of Military Justice

Human Intelligence (HUMINT)

collection of information from human sources.

MASINT - measurements intel or mass intel or multiple intel

concerns weapons capabilities and industrial activities. MASINT can be used to help identify chemical weapons or pinpoint the specific features of unknown weapons systems.

Estimative Intelligence

contains analytical forecasts regarding what might occur in the future, it does not serve the same function as warning analysis. Instead of beginning with a threat, NIEs, the most common form of estimative intelligence, look at a host of current situations to examine the way they might affect national security within a given timeframe.

Criminal intelligence versus crime analysis

criminal intelligence, which uses multiple approaches to gain an understanding of criminal groups and activities, and crime analysis, which uses quantitative and qualitative measures to solve and prevent crimes.

Defense Secrets Act of 1911

criminalized the disclosure of government secrets.

Tactical

designed for near-term use, usually by on-the-ground personnel. An army unit on patrol would be interested in whether the enemy is over the next hill

ELINT

electronic intel

SIGNINT - signals intel

electronic transmissions that can be collected by ships, planes, ground sites, or satellites

PNIO: Priority National Intelligence Objectives

establish general guidelines for both collection and research. They are comprehensive, authoritative, and community-wide in their application. provide no practical guidance in settling issues of specific collection priorities.

dept of energy

expertise for all things nuclear. studies the nuclear capabilities of foreign governments, to include the assessment of foreign nuclear weapons programs and proliferation activities. OCONUS

FININT - financial intel

gathers information about the financial capabilities or motivation of the attackers.

Trading with the Enemy Act of 1917

gives the President of the United States the power to oversee or restrict any and all trade between the United States and its enemies in times of war.

US Customs and Border Protection (CBP)

inspection and enforcement agents who regulate goods coming into the country. guard America's borders and keep out illegal immigrants.

daily intelligence

involves issues immediately affecting U.S. security usually tells a policymaker what has happened within the past 24 hours and discusses ramifications of the recent events.

Criminal Intelligence

timely and accurate intelligence analysis is key to understanding the inner-workings and driving factors of crime phenomena and criminal enterprises.

High Intensity Drug Trafficking Area Program (HIDTA)

ultimately led to the National Criminal Intelligence Sharing Plan (NCISP) contained recommendations for implementing Intelligence-Led Policing in any agency, regardless of its size or jurisdiction. A counternarcotics enforcement program that coordinates activities between federal, state, and local agencies. aimed at dealing with the problem of illicit drugs

Exfiltration Operation

A clandestine rescue operation designed to bring a defector, operative or refugee and their family out of harm's way

Walk-ins

A defector who declares their intentions by walking into an official installation and asking for political asylum or volunteering to work in-place

Regional Information Sharing System Program (RISS)

A nationwide program sponsored by the Justice Department where federal, state, and local law enforcement agencies share intelligence over a secure intranet connection

NOC

A rarer and more dangerous job category in the IC is "nonofficial cover" CIA officers pose as employees of international corporations, as scientists or as members of other professions. The idea is that a NOC will not have all the "tells" of an official cover officer, and will therefore be able to conduct operational activities without receiving the same amount of host-country scrutiny that an official cover officer may receive.

GEOINT - geo-spatial intel

Also known as IMINT (imagery intel) or PHOTOINT (photo intel) the analysis and visual representation of security related activities on the earth. produced through an integration of imagery, imagery intelligence, and geospatial information.

CIA- Central intelligence agency

An independent agency Operate OCONUS responsible for providing national security intelligence to senior U.S. policymakers. HUMINT

Clearance

An individual who has been granted a particular level of clearance may view documents at that level and below, provided he or she has a need to know. Someone with a Secret clearance may view documents at the Secret and Confidential levels. Need to know means that persons must have access to that piece of information to perform their duties. Someone with a Secret clearance is not permitted to view all Secret documents; they can view only those for which they have a need to know to carry out their duties.

case officers

An intel officer who recruit non US citizen agents

dept of the air force

Belong to Department of defense America's leading provider of finished intelligence derived from airborne, space, and cyberspace sensors. It delivers decision advantage in order to enable commanders to achieve kinetic effects on targets anywhere CONUS

marine corps

Belong to Department of defense produces tactical and operational intelligence for battlefield support.

Federal Bureau of Investigation (FBI)

Belong to Dept. of justice HUMINT Law enforcement CONUS responsible for understanding threats to our national security and penetrating networks that have a desire and capability to harm the U.S.

space force

Belongs to department of defense The Secretary of the Air Force has overall responsibility for the USSF, under the guidance and direction of the Secretary of Defense. CONUS

dept of state

Both CONUS and OCONUS provides the Secretary of State with timely, objective analysis of global developments as well as real-time insights

BLUF

Bottom line up front Important information, such as one's conclusion, is rendered first. BLUF Statement should be delivered during the opening (first words) of your briefing so that people quickly become aware of the main issue or concept of your presentation Typically one sentence

Non-LE Support for Criminal Investigations in the IC

CIA NSA DIA NGA ODNI

drug production & distribution

Drug dependence is a chronic, relapsing disorder that exacts an enormous cost on individuals, families, businesses, communities, and the nation. Addicted individuals frequently engage in self-destructive and criminal behavior. Billions of dollars have been spent on the struggle against illicit drugs, with much of the funding going to policing. Humans seem to have a voracious appetite for drugs, ranging from the legal (e.g., alcohol, caffeine) to the illegal (e.g., cocaine). According to the United Nations, in 2003, the global drug trade generated an estimated $321.6 billion in revenue.

Defense intelligence agency (DIA)

HUMINT and MASINT Belong to Department of defense a major producer and manager of foreign military intelligence and provides military intelligence to warfighters, defense policymakers and force planners in support of U.S. military planning and operations and weapon systems acquisition CONUS

Main objectives of criminal intelligence

Help officials -senior law enforcers, policy makers and decision makers -deal more effectively with uncertainty and new challenges Provide timely warning of threats Support operational activities and complex investigations.

Executive Order 11905

In 1976, President Ford issued it, which included a section entitled "Restrictions on Intelligence Activities." prohibited political assassination, stating, "No employee of the United States Government shall engage in, or conspire to engage in, political assassination"

church committee

In November 1975, the Church Committee recommended an end to political assassinations after discovering that the CIA had attempted to end the lives of several leaders including Fidel Castro. In response to these findings, the Church Committee requested that the United States reject the government's use of assassination as a means to further its foreign policy.

Social Network Analysis (SNA)

In which people and their activities are tracked

Joint Terrorism Task Forces (JTTFs)

Joint Intelligence Joint terrorism task force detectives from local agencies obtain security clearances and work cases alongside FBI and other federal personnel.

department of homeland security (DHS)

Law enforcement CONUS responsible for using information and intelligence from multiple sources to identify and assess current and future threats to the U.S

Strategic

Longer term issues that have large implications and potential consequences intended to inform higher level decision makers, and the benefits are realized over the long term. The intention is to provide early warning of threats and to support senior decision-makers.

donovan plan

Maj. General William Donovan (coordinator of information/OSS) created the first permanent intelligence agency led by a central director directly supervised by the President.

Preferred Future (policy)

One area that the DNI has pledged to address is security—how can information be shared with those who need it while keeping it out of the hands of those who would do us harm?

SCIF

Sensitive Compartmented Information Facility a highly secure room called that is located within an already secure building.

Informant

those who supplied information in strictly criminal cases

Credibility, confidence and estimative language

Even products written by so-called experts can be misleading or wrong; analysts should verify beforehand that the sources and the conclusions within the sources they use are legitimate. Thus, analysts make judgments and subsequently indicate whether they possess a high, moderate, or low level of confidence in their conclusions. convey the likelihood that something will happen

Some of the IC members who engage in criminal intelligence work

FBI -Lead Criminal Intelligence DHS - HSI CIA (Crime/Narcotics Center CounterTerrorismCenter) DEA DOE DOT Navy -NCIS

dept of the treasury

FININT responsible for the receipt, analysis, collation, and dissemination of foreign intelligence and foreign counterintelligence information related to the operation and responsibilities of the Department of the Treasury CONUS

National security agency (NSA)

Military agency Belong to the DOD (department of defense) coordinates, directs, and performs highly specialized activities to protect U.S. information systems and to produce foreign signals intelligence information. Primary mission is SIGINT CONUS

National geospatial agency (NGA)

Military agency GEOINT- processing and using the imagery Belong to Department of defense provides timely, relevant, and accurate geospatial intelligence in support of national security objectives. CONUS and OCONUS

Modus operandi (MO) & Signature

Mode of operation or behavior of someone (pattern) Something done in the crime that they don't have to do to commit the crime

What is "Speaking truth to power"

Not letting personal influence sway Not letting what they want to hear sway

Mole

Planted to get picked by a government organization so they can gather government secrets

Who creates the requirements?

Potus (president of the united states) SSCI: senate select committee on intelligence HPSCI: house permanent select committee on intelligence

Celebrities in the IC

Prior to the contemporary use of a NOC, the OSS and early CIA used celebrities in their true names and true professions to conduct clandestine operations. Use of magic, illusion, Hollywood special effects for celebrity spy operations and integrated into HUMINT.

Covert op

an operation that is planned and executed to conceal the identity of or permit plausible deniability by the sponsor (operator of the op) Potus has to give approval

National reconnaissance office (NRO)

SIGINT and GEOINT designs, builds, and operates imagery satellites. Belong to Department of defense CONUS and OCONUS

In-depth Reports

Situational reports and profiles that cover myriad topics intended for use by policymakers. intended for use by working-level policymakers who continue to work for long periods of time on certain projects and need additional and detailed information

One-time vs. reoccurring briefings

Sometimes, they are called to give a one-time briefing to a policymaker. Other times, they give recurring briefings to the same audience members. Analysts' individual situations dictate how they prepare for their briefing. If they give a briefing every day to the same policymaker, they will eventually decrease their level of preparation.

The 4 drivers which will have an impact on the future

Technology Demographics Economics politics/governance

The 3 highlighted future threats

Terrorism Russia/China Encryption

Department of Justice -Criminal Intelligence Coordinating Council (CICC)

The CICC supports state, local, and tribal law enforcement and homeland security agencies in their ability to develop and share criminal intelligence and information nationwide. The CICC is a group under the U.S. Department of Justice's (DOJ) Global Justice Information Sharing Initiative (Global), an advisory body to the U.S. Attorney General. The CICC's efforts include the national fusion center initiative, the Nationwide Suspicious Activity Reporting (SAR) Initiative, and the continued implementation of intelligence-led policing.

Rendition/Extraordinary rendition

The practice itself involves the abduction of individuals, usually clandestinely, and their transfer to countries other than the United States.

Alternative Futures

The Possible: What might occur. The Probable: That which has a high likelihood of occurring. The Preferable: The sort of future we would like to have come about. When officials make policy, they are generally attempting to create the preferred future.

COVER

The background information (e.g., documentation, digital data) that supports a cover identity.

border security & immigration

The length of America's borders makes them virtually impossible to close physically. Securing the border and transportation systems continues to pose an enormous challenge. Land ports-of-entry into America stretch across 7500 miles; furthermore, there are 95,000 miles of shoreline and navigable rivers and an exclusive economic zone of 3.4 million square miles. Although many migrate legally, others exploit weaknesses in border security and enter the United States illegally. Law enforcement and intelligence agencies worry that terrorists and criminals can also exploit the porous border. A large portion of the illicit drugs used in the United States are imported from Mexico; this underscores just how difficult it is to achieve total protection.

Escort

The operations officer assigned to lead a defector along an escape route

Classification system

Top Secret: information in which the unauthorized disclosure of could be expected to cause exceptionally grave damage Secret: information in which the unauthorized disclosure of could be expected to cause serious damage Confidential: information in which the unauthorized disclosure of could be expected to cause damage

FINCEN

Treasury: Financial Crimes Enforcement Network

CYINT - cyber intel

the tracking, analyzing, and countering of digital security threats

OSINT - open source intel

a broad array of information and sources that are generally available, including information obtained from the media, professional and academic records, and public data.

US Coast Guard

a military and a law enforcement agency who belongs to DHS protects America's maritime borders, enforces laws on the high seas, and performs life-saving duties. CONUS

PDB

a publication presented to the President each morning assembled by a small team of senior-level analysts. It includes snippets taken from reports written by analysts from all 17 intelligence agencies. Each morning, the senior officer of the CIA delivers the PDB to the President.

COMINT - communication(s) intel

a type of SIGINT and refers to the interception of communications between two parties

US Citizenship and Immigration Services

adjudicates asylum cases, issues temporary work permits, and grants permanent resident and citizenship status.

Operational Analysis

aims to achieve a specific law enforcement outcome. This might be an arrest, seizure, forfeiture of assets or money gained from criminal activities, or the disruption of a criminal group. Identifying links between suspects, and their involvement in crimes and criminal activity Identifying key investigative or information gaps Providing or preparing profiles of known or suspected criminals.

USA Patriot Act (2001)

amended FISA allow wiretaps on persons rather than places; procure medical/business/travel records; info attained can be shared To improve the abilities of U.S. law enforcement to detect and deter terrorism. allowing law enforcement to use surveillance and wiretapping to investigate terror related crimes

double agent

an agent who pretends to act as a spy for one country or organization while in fact acting on behalf of an enemy.

Asset

an individual, whose identity is secret, who provides information on national security matters (terrorism and counterintelligence). the informant/spy handled by a case officer

Clandestine op

an operation conducted by government departments or agencies in such a way to assure complete secrecy or concealment.

Military deception

an operation that includes both denial and deception. Denial hides the real and deception shows the fake characteristics of an operation.

National Security Act (1947)

legally constructed the United States' first permanent, peacetime intelligence organization, the Central Intelligence Agency (CIA).

Warning intelligence

looks at potential threats against U.S. interests and prioritizes the issues with which the IC is concerned.

The Sedition Act of 1918

made it a crime for American citizens to "print, utter, or publish... any false, scandalous, and malicious writing" about the government

21st Century Challenges

natural threats drug production & distribution border security and immigration organized crime human trafficking cyber security weapons trafficking intellectual property theft CBRN Terrorism fragile states and rogue nations.

Office of the Director of National Security (ODNI)

organization that sets mission objectives cyber intelligence, counterterrorism, counterintelligence and counter proliferation Independent organization

Foreign Intelligence Surveillance Act (FISA) (1978)

prohibits government agencies, such as the Federal Bureau of Investigation (FBI) or National Security Agency (NSA), from wiretapping American citizens and those designated as "US persons" without first satisfying several requirements.

counterintelligence

protecting what we know

Classified Information and Procedures Act (ClPA)

provide certain pretrial, trial, and appellate procedures for criminal cases involving classified information

Command and control

rely on their staff and subordinate commanders to transfer plans into action. Military leaders have sought to gain an advantage over their enemies. Strength of forces, weapons technology, logistics, training, communications, and intelligence pertaining to the intention of the enemy and the ability of the commander combined with the boldness to act all play a role in military operational success

US Immigration and Customs Enforcement (ICE)

responsible for enforcing immigration laws. detect and remove illegal aliens and investigate criminal matters relating to illegal immigration.

drug enforcement agency (DEA)

responsible for enforcing the controlled substance laws and regulations of the United States. CONUS Law enforcement

Purpose of Military Intel

the Office of Naval Intelligence (ONI) provided fleet commanders with intelligence designed to produce victory at sea, while the Army concentrated on battlefields in Europe and the South Pacific The military has introduced the concept of "jointness," where Army, Navy, Air Force, Marine, and Coast Guard personnel work side-by-side to produce intelligence that can be used by all.

Restrictions on Intelligence Activities (war vs. peace time)

the ban does not apply in wartime situations when the military is striking the enemy's command and control or leadership targets

Requirements

the goals of the particular intelligence endeavor PIR: priority Intelligence Requirements strategic, tactical and operational IR: Intelligence Requirements IIR: Internal Information Requirements

dept of the navy

the leading provider of maritime intelligence to Navy and joint/combined warfighting forces, as well as national decision makers and other partners/consumers in the U.S. National Intelligence Community. Belong to Department of defense Operate both CONUS and OCONUS


Conjuntos de estudio relacionados

ACS - Alkanes, Alkenes, Alkynes and their Alicyclic Couterparts

View Set

Procedural Programming midterm review

View Set

applied mathematics - unit 4: probability in the social science

View Set