Exam 1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Feedback

(doesn't occur as much as it should)giving feedback on consumed intelligence

Purpose of intelligence

- avoid strategic surprise - support policy process -maintain secrecy of info, needs, and methods - provide long term expertise

subsets of foreign intelligence

- foreign -domestic -homeland security

two different drone strikes

1. "high-value targets" 2. "signature strikes"

different classifications

1. Confidential 2. Secret 3. Top Secret

Whistleblower Protection Act

1989 law that protects federal employees from being punished for reporting government/agency misconduct (employees can report shady things in the IC and not be punished)

Groupthink

A situation in which group members seek unanimous agreement despite their individual doubts

Steganography

A technology that makes it possible to embed hidden information in documents, pictures, and music files

Quantum Cryptography

A type of asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys.

Supplementals

A way to take care of agreed on needs without making long term budget commitments (must be approved by congress first)

Budget execution authority

Ability to determine the actual spending of dollars versus the allocation of money to agencies

Joint Terrorism Task Force (JTTF)

An FBI-sponsored group composed of federal, state, and local law enforcement personnel who are brought together to focus on a specific threat.

Covert Action

An activity or activities of the United States Government to influence political, economic or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly

Non-Official Cover

Avoids overt connection between the officer and his/her government

Five Eyes

Group with common heritage that share intel with eachother (U.S., BRITAIN, AUSTRALIA, CANADA, AND NEW ZEALAND)

walk-ins

HUMINT sources that voulunteer info

ISR

INTELLIGENCE, SURVEILLANCE, & RECONNAISSANCE

sources and methods

Identifying information on who is reporting intelligence and how it is being collected. (This is often some of the most sensitive information involved in intelligence operations.)

Politicized Intelligence

If intelligence officers have a strong preference for a specific policy outcome, their intelligence analysis may display a similar bias.

industrial espionage

Industrial spying to obtain secrets about manufacturing methods.

Analysis and Production

Integration and evaluation of finished intelligence products into an actionable format, prepared to be briefed to people in power (done by analysts to produce real intel)

Monitoring

Keeping track of a target behavior that is to be regulated.

Maskirovka

Masking, camouflaging, or deceiving (russians would do this to mask what was going on in the Russian state)

Unifying Intelligence Strategies (UIS)

NIMS annually must add to his or her portolofis to integrate relevant collection and analysis

National Technical Means

NTM- variety of satellites & other technical collectors by both parties to collect needed intel

national intelligence priorities framework (NIPF)

Primary mechanism to establish, disestablish, manage, and communicate national intelligence priorities (provides another means by which to assess performance beyond setting priorities)

Full Motion Video (FMV)

Refers to both the long-duration, close-in video that can be collected by UAV's and to the capabilities designed to derive as much intelligence as possible from this video

Principals Committee

Senior policy coordinating body of NSC structure

Machine Learning

Technique for making a computer produce better results by learning from past experiences. (having computers learn what humans can do)

Reagan Doctrine

The Reagan administration's commitment to ending communism by providing military assistance to anti-communist groups

Collection Disciplines

The means of collecting intelligence (INTs)

Blowback

The propensity for actions undertaken for national security to have the unintended consequence of provoking retaliatory attacks when relations later sour.

Global Coverage

This means that intelligence officers acknowledge their requirements to cover any and all issues or areas.

"third-party rule"

a nation receiving foreign liaison intel will not share with a 3rd party without permission

sun-synchronous orbit

a satellites that are moving with Earth's orbit so they can always be with daylight (better for commercial satellites than for national imagery satellites)

denial

a targeted nation can use knowledge about the collection capabilities of an oppnenent to avoid collection

"geofence"

a virtual barrier to prevent drone fligts within a certain area via GPS, radio frequencies, or other technologies

Foreign Liaison

allied or friendly services

Potemkin village

an impressive facade or show designed to hide an undesirable fact or condition

analytic penetration

an intellectual means of trying to overcome a lack of intelligence sources

premature closure

analysts can fasten on to one line of analysis especially for issues that are examined and reexamined over the years and ten will not be open to other possible hypothesis or alternatives

analytical stovepipes

analysts from multiple agencies working on the same hot topic independently due to lack of communcation between agencies

analyst bias

analysts opinions (they need to over come them and be objective)

third option

another option instead of doing nothing (1st) and sending in military (2nd)

mirror imaging

assumes that other leaders, states, and groups share motivations or goals similar to those most familiar to the analyst

Mirror Imaging

assuming that other states or individuals will act just the way a particular country or person does (undermines analysis)

confidence levels

based on the scope and quality of information supporting our judgements

multi-int

bringing together different types of technical collection, most often imagery and signals

denied areas

closed societies or closed areas

intelligence

collection of information for protection

analytically driven collection

collectors act in response to analytic needs and not more independently or opportunistically (ideal state)

wheat versus chaff

collectors sweep up a great deal of information, within which may be the intelligence being sought

chatter

communications and movements of known or suspected terrorists

Processing and Exploitation

conversion of collected information into forms suitable to the analysis and production of intelligence

cyber operational preparation of the environment (cyber OPE)

covers military activities that intrude into adversary systems in advance of offensive operations

plausible deniability

covert operations should be conducted in such a way, and decisions that launched them concealed so well that the president could deny any knowledge of them

identifying requirments

defining those policy issues or areas to which intelligence is expected to make a contribution as well as decisions about which of these issues take priorities over others

deep fakes

digitally altered audio and video clips that are hard to tell when altered

dissemintation

distributing intelligence

crosswalks

efforts to coordinate programs and to make difficult choices between programs- are major facets of the budget process (between DNI and DOD)

national intelligence managers (NIMS)

ensure a balanced focus on priority intel missions by overseeing both collection and analysis on a given issue (they facilitate analysis but dont conduct it)

Link Analysis

establishing connections between various people to get a sense of their broader social networks

disinformation

false information purposely disseminated, usually by a government, for the purpose of creating a false impression

clientism

flaw that occurs when analysts become so immersed in their subjects that they lose their ability to view issues with the necessary criticality

zero-day vulnerabilities

flaws in hardware or software that can be exploited by by an attacker

FINIT

follows the money

National Intelligence

foreign, domestic, homeland security (all intelligence is national intelligence)

Indications and Warnings

giving policy makers advance warning of significant, usually military, events

footnote wars

goal is to maintain a separate POV regardless of the salience of the issue at stake; opposite of groupthink

Competitive Analysis

having analysts in several agencies with different backgrounds work on the same issue (an antidite to groupthink)

consumption

how policy makers interpret intel (each policy maker is not a blank slate)

sleppers

inserted into a target country to spend time integrating themselves

activity-based intelligence

intel collection based on observed behavoirs

All-Source Intelligence

intelligence based on as many collection sources as possible to compensate for the shortcomings of each and to profit from their combined strength (CIA, State dept etc.)

bean counting

intelligence products that tally up the number of forces, equipment, and manpower in foreign militaries

oppurtunity analysis

intelligence that helps advance my agenda that makes me the actor not the reactor

priority creep

issues moving up and down in a priority system (issues tend not to get attention unless it is raised to the top of the priority sytem major problem)

memo of notification (MON)

letting the house and senate intel committees know what is going on

negation search

looking at past imagery to determine when an activity commenced

Deputies Committee

made up of the deputies of the PC members and has a similar function, working on issues before the PC considers them

"about" collection

messages taken from the internet that may not be going to or from a specific target but contain key selectors

Traffic Analysis

monitoring changes in communications

tyranny of the ad hocs

not every ad hoc merits higher priorities (a system that responds to every ad hoc soon has little control over priorities and quickly breaks down)

single-source analysts

one source, not diverse (analysts must go through a lot of material and find the intel that is really needed)

cryptographer

one who decodes secret messages

plumbing

operational support structure- prearranged meeting places, surveillance agents, letter drops, technical support

debris field

orbiting pieces destroy satellites

supply chain

organizations, people , resources, information and activities required to move products or services from the producer to the consumer

Presidential Finding

president signs order approving covert operation

Agent Acquisition Cycle

process of managing spies

collection

producing intelligence just not finished intelligence (collected intel has to undergo P&E)

ECHELON

program that searches through collection using key words via computer

Medium Earth Orbit (MEO)

range between LEO and GEO

content analysis

reading messages and analyzing what they mean

"self-reveal"

regarding how many targets make themselves known via imagery

self-reveal

regarding how many targets make themselves known via imagery

HEO Highly Elliptical Earth Orbit

satellite follows an elliptical orbit, Used by the military for spying and by scientific organizations for photographing celestial bodies

geosynchronous orbit (GEO)

satellites that stay in the exact same spot over the earth

spies

secret agents who obtain information about an enemy

Decision Advantage

seeks to provide policy makers with intelligence that will give them an advantage over adversaries, allowing them to act with greater confidence and greater likelihood of success

unattended ground sensor (UGSs)

sensors to detect motion

noise versus signals

signals one wishes to receive and to know are often embedded in a great deal of surrounding noise

Policy of Containment

soviet union: if the us did nothing about communism the state would fail

Failed states

states in which the central government has lost authority and resorts to deadly force to retain power

downstream activities

steps that follow collection

worst-case analysis

strategy of decision-making that assumes one will face the worst possible situation imaginable and then makes policy based on that assumption

computer network explotation

taking over the network of a person

denied targets

target areas to which one does not have ready access

Verification

the ability to discover whether treaty obligations were being bet (ABM Treaty and SALT I accord)

dissemination

the act of spreading widely (presidents daily brief, national intelligence estimate etc.)

espionage

the act of spying

Official Cover

the agent holds another government job usually posted at the embassy

foreign economic espionage

the collection of foreign economic intelligence by other nations

Information Operations (IO)

the integrated employment of three operational elements: influence operations (IFO), electronic warfare operations, and network warfare operations.

Resolution

the level of detail provided by imagery

Analyst Fungibility/Analyst Agility

the need for analysts to have more than one or 2 areas of expertise (then can be shifted to higher priority accounts during a time of need)

risk versus take

the need to consider the value of the intelligence that is going to be collected against the risk of discovery

Internet of Things (IoT)

the network of products embedded with connectivity-enabled electronics

intentions

the plans and goals of the adversary

renditions

the seizure of individuals wanted by the US

deception

the target can use the same knowledge to transmit info to a collector this info can be true or false

Enhanced Interrogation Techniques

the techniques used to interrogate terrorists (very controversial)

swarm ball

the tendency of all collectors or collection agencies to collect on an issue that is deemed to be important, whether or not they bring anything useful to the table or can offer an appropriate type of collection

Bioterrorism

the use of biological and chemical weapons in terrorist attacks

Layering

the use of judgments or assumptions made in one analysis as the factual basis for judgments in another analysis without also carrying over the uncertainties that may be involved

Battle Damage Assessment (BDA)

timely and accurate estimate of damage resulting from the application of military force, either lethal or nonlethal, against a predetermined objective

encrypt

to put into code

indication and warning

tracking communication helps us understand what may happen next

"unmasking"

uncovering someone to better understand what happened + get more info

ad hocs

unexpected issues inevitably crop up with little or no warning and priority rises

low eath orbit (leo)

used by imagery satellites to see a more detailed view of the Earth

all-source analysts

using as many sources as possible to compensate for the short comings of each one (what the US intel community wants to be producing)

automatic change extraction

using computers to do a negation search

anti-satellite weapons (ASATs)

weapons that take down satellites

Echo or Circular Reporting

when a story appears more important than it is bc multiple news sources pick it up

Key Judgements

when intel community produces an estimate on the likely course of events & possible indications of success or failure

shutter control

when the US limits commercial satellite functioning for national security reasons


Kaugnay na mga set ng pag-aaral

Western Civilization Chapters 17 and 18

View Set