INTEL 201 Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following are not one part of the method for conducting a key assumptions check.

Accept

What statement best describes the IC prior to 9/11?

Agencies worked, often in isolation, to provide intelligence to their particular constituency.

Overseas, the CIA and the military actively attempt to recruit spies employed by foreign intelligence services. these spies are referred to as ________.

Agents

__________ was a CIA operation that overthrew the democratically elected Prime Minister of Iran, Mohammed Mosaddeq.

Ajax

The National counterintelligence Center was created to share and evaluate information regarding foreign intelligence threats after the arrest of _________ for spying.

Aldrich Ames

Decision makers want intelligence to answer three basic questions. Which of the following is one of those questions?

All of the above

Intelligence can be defined as:

All of the above

What key skill makes a successful analytical writer and/or briefer?

All of the above

Which best describes the characteristics of analytic writing?

All of the above

Which of the following are criteria needed to establish cause and effect

All the above

____________ is when you combine data obtained from human sources with such things as electronic overhears, surveillances, imagery from above and the like. This results in a fuller more accurate picture.

All-source intelligence

Which two airline companies aircraft were hijacked on 9-11.

American Airlines and United

_____________ is the application of individual and collective cognitive methods to weigh data and test hypotheses within a secret socio-cultural context

Analysis

Which of the following structured analytic techniques does the intelligence community use?

Analysis of Competing Hypotheses, Key Assumptions Check, Scenarios

An individual who provides information in national security matters is known as an _____________.

Asset

After 9-11 Congress authorized the President to use the U.S. Armed Forces against those responsible for the recent attacks launched against the United States and against those who helped carry out the September 11, 2001 attacks.

Authorization for the use of Military Force Against Terrorists.

Heuer used the example below to describe this bias: "Consider two people who are smokers. One had a father who died of lung cancer, whereas the other does not know anyone who ever had lung cancer. The one whose father died of lung cancer will normally perceive a greater probability of adverse health consequences associated with smoking, even though one more case of lung cancer is statistically insignificant when weighing such risk. How about two CIA officers, one of whom knew (convicted CIA spy) Aldrich Ames and the other who did not personally know anyone who had ever turned out to be a traitor? Which one is likely to perceive the greatest risk of insider betrayal?"

Availability bias

Which of the following is not one of the four things Gudmund Thompson believes a good analyst should exhibit.

Be brief

What does BLUF stand for?

Bottom Line Up Front

The mission of the ___________ is to develop intelligence to serve U.S. diplomacy.

Bureau of Intelligence And Research

The National Security Act of 1947 created this organization which was "to perform such other functions and duties related to intelligence affecting the national security as the the National Security Council may from time to time direct.

CIA

America's first spy sattellite was known as the __________ program.

CORONA

Which of the following statements is true about 28 CFR 23?

*** SPECIFIC The code applies only to criminal intelligence that is compiled into electronic databases, often in conjunction with cases regarding loan sharking, drug trafficking, trafficking in stolen property, gambling, extortion, smuggling, bribery, and corruption of public officials

The U.S. Intelligence Community consists of ___ agencies.

17

What year was dubbed "the Year of the Spy" due to all of the penetrations of the intelligence community that were uncovered.

1985

In general counterintelligence can be divided into how many types of operations?

2

How many steps are there in the military intelligence cycle?

8

The first American killed in combat during the U.S. invasion of Afghanistan in 2001 was _________.

A CIA Case Officer

An organization that looks closely at itself to ensure that sensitive information is not compromised conducts:

A defensive operation

Which government committee(s) concluded that intelligence agencies had overstepped their legal boundaries by disregarding Americans' Constitutional rights?

Church Committee

An operation sponsored or conducted by governmental departments or agencies in such a way as to assure secrecy or concealment is the definition of a:

Clandestine operation

__________ is information that is considered sensitive to the point that its distribution is limited to certain people who meet specific requirements and who need the information to perform their duties.

Classified information

Which of the following is NOT an activity of offensive counterintelligence?

Classifying information

A substitution of text for particular words or phrases is a ________.

Code

Which of the following is NOT a barrier to information sharing?

Collaboration

____________ information is the heart of the intelligence process.

Collecting

Which of the following is not a mission of the CIA.

Collecting domestic information that reveals the plans, intentions, and capabilities of citizens and provides the basis for decision and action.

Of the following, which is NOT a key area of analytical tradecraft?

Collection

The "INTS" are part of which step in the intelligence cycle?

Collection

The act of gathering information and data is _________________

Collection

the document used to plan the gathering of intelligence is called ____________.

Collection Plan

_________ includes the making and executing of decisions.

Command and Control

SIGINT generally falls into two categories. Which of the following is one of those categories.

Communications between people, Electronic emissions (Both A and B)

What distinguishes good intelligence writing?

Concise Logical Create clear judgments and conclusions (All of the above)

________ shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause damage to the national security that the original classification authority is able to identify or describe.

Confidential

Which of the following is not one of the three categories of individuals whose identities the FBI agreed to protect?

Confidential Criminal

An individual who provides information in criminal matters is a _______________?

Confidential Informant

The philosophy of _______ was a strategy for dealing with the Soviets by containing their expansion rather than trying to work with them or confront them in battle.

Containment

___________ are designed to purposely inject dissent into any analytical situation.

Contrarian Methods

These were NOT created by the National Security Act?

Coordinator of Information, Department of War, DIA

________ is when their is a predictable relationship between two things.

Correlation

Decision advantage is achieved by meeting two goals; knowing as much as possible about a situation while denying that same knowledge to the enemy. Which of the following do intelligence agencies engage in to meet the goal of denying the same knowledge to the enemy.

Counterintelligence

Information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations or foreign persons, or international terrorist activities is the definition of:

Counterintelligence

_______________ is the protection of information and intelligence.

Counterintelligence

In an Analysis of Competing Hypotheses, facts are assessed by:

Credibility and impact

_______________ is that mode of thinking--about any subject, content, or problem--in which the thinker improves the quality of his or her thinking by skillfully analyzing, assessing, and reconstructing it. It is self-directed, self-disciplined, self-monitored, and self-corrective thinking.

Critical thinking

One of the NSA's major missions is ___________.

Cryptanalysis

The President's Daily Brief is an excellent example of what?

Current intelligence

What is the difference between current and warning intelligence? Choose the correct answer.

Current intelligence involves issues immediately affecting U.S. security while warning intelligence looks at the potential threats against U.S. interests.

This agency is a member of the intelligence community because of narco-terrorism.

DEA

This agency was created in 1961 and is responsible for providing current all-source intelligence to the Department of Defense.

DIA

What key intelligence figure serves as the principal adviser to the President and his staff on intelligence matters relating to national security?

DNI

This type of intelligence involves issues immediately affecting U.S. security; it is similar to news reports but also contains classified information.

Daily intelligence

What was the purpose of the Black Chamber?

Decrypting the message traffic of foreign governments.

Instituting security measures, conducting extensive background checks and reinvestigations, and looking for spies within the agency are all examples of ________________,

Defensive operations

Of the following, which was NOT created by the National Security Act of 1947?

Department of War

The Office of Terrorism and Financial Intelligence is located in the _________.

Department of the Treasury

Questioning every conclusion or fact and proposing alternative hypotheses is a characteristic of:

Devil's Advocacy

Of the following, which steps are included in the military intelligence cycle but NOT the traditional intelligence cycle?

Direction and Prioritisation

Prior to the creation of the Director of National Intelligence who served as the nominal head of the intelligence community?

Director of Central Intelligence

The ___________ consists of analysts and other personnel who produce reports using many different sources of information.

Directorate of Intelligence

Military deception operations apply four basic deception techniques. Which of the following is NOT one of those techniques?

Disinformation

A critical and sometimes overlooked step in Intelligence Management is ____________

Dissemination

Delivery of intelligence to decision-makers is part of which step in the intelligence cycle?

Dissemination

During __________, intelligence is delivered to decision-makers for them to use in whatever way they deem appropriate.

Dissemination

Which of the following is not one of the functions an analyst performs on a daily basis?

Draft Policy statements

The textbook states that all of the following are means of gaining plausible deniability except _____________?

Eliminate everyone who knows about the operation

__________ was the name of the German Cipher Machine during World War Two

Enigma

Which of the following is NOT a responsibility of a military intelligence officer?

Establish intelligence priorities identifying those pieces of information that are the most critical to the decision- making process

This type of intelligence is considered judgments as to the likely course of events regarding an issue of importance to the nation. Sometimes, more than one outcome may be estimated.

Estimative intelligence

What do analysts and briefers use to alert policymakers to the level of confidence they have in their judgments, based on the available information?

Estimative language

James Bond is the the world's worst spy because:

Everyone knows who he is He causes a scene everywhere he goes He never files a report ( All of the above)

The ____________ has the power to make decisions related to the country's security.

Executive Branch

The practice involving the abduction of individuals, usually clandestinely, and their transfer to countries other than the United States.

Extraordinary rendition

Investigating espionage and discovering foreign spies is primarily the duty of the ___________.

FBI

The ________ operates more than 100 Joint Terrorism Task Forces in the United States.

FBI

This federal agency almost lost its intelligence mission after 9-11because critics said intelligence and law enforcement should not be mixed together in one agency.

FBI

Which agency administers domestic intelligence and terrorism wiretaps?

FBI

One of the most egregious writing sins an analysts can commit is what?

Failing to write in BLUF

Which of the following are not biases that affect intelligence analysis?

Fallacy of Big Results/Small Cause

What bias occurs when analysts assume the subjects they are studying pursue coherent, rational, goal-maximizing policies?

Fallacy of Centralized Direction

All agencies that undertake intelligence collection, whether through human or technical means, must constantly ensure that what they collect is genuine. This requires continuous evaluation of their sources as well as the information gathered from them. Historically intelligence agencies have performed this crucial function very well.

False

America first weaponized drones in October 2000.

False

Analysts write for busy policymakers and provide them with complex products on complex subjects that are comprehensive and sometimes very difficult to read.

False

Effective collection depends upon single sourcing.

False

In 1919 the head of the general intelligence division of the Bureau of Investigation was Mitchell Palmer.

False

In a military context, CI includes both active and repressive measures intended to deny the enemy to think they have valuable information.

False

Intelligence did not play a key role in the Cuban Missile Crisis.

False

Most CIA Case Officers spend the bulk of their time engaged in covert operations.

False

Much of intelligence writing is an individual effort.

False

Spying is illegal under international law.

False

T/F An intelligence requirement is always generated by the consumer.

False

T/F Collection is a one time process. Once complete this phase is finished.

False

T/F Developing a reasonable human intelligence (HUMINT) capability is easy--good sources of information spring up over night in a crisis.

False

T/F Hypothesis is basically a vague statement or conclusion that can be falsified or disproven.

False

T/F In the Team A/Team B method two competing goups debate each other before a body of academia who rules on which team is correct.

False

T/F Intelligence has not played a critical role in mankind since the earliest humans began to think and process information.

False

T/F OSINT stands for Open Signal Intelligence and is a narrow form of intelligence dealing with television signals.

False

T/F Only Federal Agencies are allowed to collect and use intelligence.

False

T/F Only Federal Agencies in the Intelligence Community are involved in the collection of intelligence.

False

T/F Polygraphs are machines which detect lies.

False

T/F The Intelligence Cycle is linear. It begins with a request for information and ends with dissemination and evaluation.

False

T/F The President of the Untied States is required to "ensure that the congressional intelligence committees are kept full and currently informed of the intelligence activities of the United States." The President must inform these committees of all covert actions before they occur.

False

T/F The definition of intelligence that everyone uses is the one created by the Federal Bureau of Investigation.

False

T/F Unmanned Aerial Vehicles have been used to locate, watch, and occasionally kill terrorists in Europe.

False

The DNI has budgetary control over all Intelligence Community agencies.

False

The Intelligence Cycle is a realistic representation of how intelligence is collected and analyzed.

False

The Secretary of Homeland Security is now the head of the intelligence community.

False

The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act was passed in 1995 after the Oklahoma City bombing.

False

The first Director of National Intelligence was William Colby.

False

The first system of spy satellites was known as the Verona Program.

False

The human brain is wired to consider problems rationally and come up with the best solution to the problem.

False

The process where a military officer resigned their commission and went to work for the CIA was known as cow dipping.

False

Those who produce intelligence should formulate policy because they have the best information available.

False

Until recently collaboration among analysts has been a high priority in the Intelligence Community.

False

The Church committee findings prompted the passage of the ____________ in 1978.

Foreign Intelligence Surveillance Act

Which mandate prohibits government agencies, such as the FBI or NSA, from wiretapping U.S. citizens without a warrant?

Foreign Intelligence Surveillance Act

__________ was the spy plane pilot shot down by a missile over the Soviet Union. This forced the Eisenhower Administration to admit it had been sending spy planes over the Soviet Union.

Francis Gary Powers

At ____________ police officers can work side by side with CIA and FBI personnel and individuals from the private sector.

Fusion Centers

What agencies serve as primary focal points within the state and local environment for the receipt, analysis, gathering, and sharing of threat-related information among federal, state, local, tribal, and territorial partners?

Fusion centers

The exploitation and analysis of imagery and geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on earth is _____________.

GEOINT

The first person to put intelligence to great use in the United States was _______

George Washington

______________ recruited and ran a number of agents, set up spy rings, devised secret methods of reporting, analyzed the raw intelligence gathered by his agents, and mounted an extensive campaign to deceive the British armies.

George Washington

What is a mode of thinking that people engage in when they are deeply involved in a cohesive in group, when the members' strivings for unanimity override their motivation to realistically appraise alternative courses of action.

Groupthink

The oldest form of collection is ____________.

HUMINT

This armed scout and spy led a covert operation in South Carolina that freed 700 slaves.

Harriet Tubman

T/F What are transfers of money that take place based on communications between members of a network based on trust.

Hawala System

Who shut down the Black Chamber in 1929 when they declared "Gentlemen do not read each other's mail."

Henry Stimson

These shortcuts to facilitate rapid decision-making develop over time and are strongly informed by experience.

Heuristics

Which terrorist group conducted suicide bombings against the American Embassy and Marine Barracks in Beirut Lebanon killing 241 American service personnel in 1983.

Hezbollah

_________ indicates that judgments are based on high-quality information, and/or that the nature of the issue makes it possible to render a solid judgment.

High confidence

The main point of an intelligence product should be made _______________.

In the first paragraph of the product.

________ is unprocessed material of every description that can be used to produce intelligence.

Information

IC stands for _____________

Intelligence Community

_____________ emphasizes that intelligence should drive all facets of policing, from patrol to investigations.

Intelligence Led Policing

__________________ is a systematic, continuous process of analyzing the threat and environment in a specific geographic area.

Intelligence Preparation of the Battlefield

Many of the 9-11 Commission recommendations were addressed in the ___________.

Intelligence Reform and Terrorism Prevention Act

To support operational planning, intelligence strives to accomplish two objectives. Which of the following are those objectives?

Intelligence must provide accurate, timely, and relevant knowledge about the enemy and the surrounding environment, Intelligence must protect friendly forces through counterintelligence: (Both A and C.)

Which of the following is NOT a type of intelligence specifically described in the text?

International

What was the purpose of COINTELPRO?

Investigated suspected domestic dissidents and subversives including members of the Communist Party, Students for a Democratic Society, the Black Panther Party and Women Strike for Peace.

Which of the following countries is not part of the 5 Eyes?

Israel

In 1948 the CIA contributed increasing amounts of money and other support to a candidate in the ___________ elections.

Italian

Which of the following is an example of the vividness criterion?

John was a soldier in the War on Terror. He watched as a Muslim insurgent killed his best friend. John believes that all Muslims are terrorists.

FBI managers in the Branch Davidian standoff failed to use this type of structured analytical technique which resulted in the deaths of men, women and children when they chose to die in a fire rather than surrender.

Key Assumptions Check

Indirect measurements of technical data are:

MASINT

Which of the following are deception measures?

Manipulation Distortion Falsification of evidence

Which of the following is not estimative language as defined by the Director of National Intelligence in relation to intelligence information collected by agencies.

Medium Confidence

Self-censorship occurs when:

Members stifle opinions that run counter to what they believe to be the group's ideas

____________ are events along the way that help analysts determine which scenario is likely "coming true"

Milestones

The primary function of _____________ is the collection, analysis, production, and dissemination of intelligence at the tactical, operational, and strategic levels.

Military Intelligence Officer

Of the following examples, which is NOT an example of covert action?

Military air strike

____________ has been a staple of war-fighting since the American Revolution.

Military intelligence

________ or ways of looking at things; they describe what we think we know of the world around us.

Mindsets

The baseball player one termed the "brainiest guy in baseball" who was an OSS agent during World War II was

Moe Berg

_____________ is a military strategy in which each side is deterred from going to war, lest both be destroyed in the process.

Mutually Assured Destruction

Some situations remain unknowable. Agencies cannot discern their true nature. These are referred to in the intelligence community as _______________

Mysteries

____________ is responsible for the collection and analysis of foreign communications and signals intelligence.

NSA

In 1998 al Qa'ida attacked embassies in two different African countries on the same day. These embassies were located in the cites of ________ and ___________.

Nairobi and Dar es Salaam

The Defense Intelligence Agency's Directorate of Analysis has established "Select Intellectual Standards" that is expects its analysts to follow. Which of the following is not one of those standards?

Narrow focus

Cartography has been a staple of navigation since its earliest days. Maps can be drawn more accurately and intelligence obtained more holistically through aerial observation. What Agency is responsible for this type of Intelligence gathering.

National Geospatial-Intelligence Agency

These documents are perfects examples of strategic pieces, as they tank an international issue that affects U.S. national security and assess, long term, how the issue will continue to affect the United States in the coming months and years.

National Intelligence Estimates

________ designs, builds, launches and operates satellites to gather imagery for intelligence.

National Reconnaissance Office

________________ are administrative subpoenas or "secret demand letter" that tallow the government to demand customer information from communications providers, financial institutions, and credit agencies.

National Security Letters

______________ means that persons must have access to that particular piece of information to perform their duties.

Need to know

________ stations detectives in foreign countries, such as France and Israel, where they serve in a liaison capacity.

New York PD

On which of the following countries does the U.S. most likely not spy?

New Zealand

The biggest mission of this office is to ensure that timely intelligence is disseminated to federal, state, local and tribal law enforcement organizations and the private sector:

OIA

Which of the following are one of the six principles summarized in Military Deception?

Objective Security Timeliness (All of the above)

Investigating suspected foreign spies and, once detected, trying to convince them to spay against their country of origin is an example of _______________.

Offensive Operations

Prior to 9/11 the most devastating terrorist attack in the United States occurred on April 19, 1995. This attack occurred where?

Oklahoma City, OK

_____________ was the name of the World War II military deception designed to make the Germans think that allied forcers were poised to invade Norway and Pas de Calais when, in fat, Normandy was their target.

Operation Fortitude

__________ was the code name for a ring of Nazi saboteurs who plotted to destroy American factories and economic targets.

Operation Pastorius

___________ is similar to tactical intelligence, but it is primarily used by combatant commanders, subordinate joint force commanders, and their component commanders to shape operations and identify evolving situations before they escalate.

Operational intelligence.

By the end of the 1950"s, covert action had evolved to the extent that its purposes could be group into three broad categories. Which of the following is not one of these categories.

Operations to divert funds from legitimate businesses to secret funding accounts.

_______________ represents the managment of the Intellgience Cycle.

Planning and Direction

____________ means that an action cannot be traced back to its source with any degree of certainty.

Plausible deniability

Which statement best describes the relationship between politics and analysis?

Politics have no place in analysis

____________ measures changes in a person's blood pressure, pulse, respiration, and galvanic skin response.

Polygraph

The UAV that was armed with Hellfire missiles by the CIA and used to kill high value terrorists is known as the __________.

Predator

Of the following, which is NOT a type of written analytical product used by the IC?

Predictive

___________ created the position of Coordinator of Information (COI) whose mission was to better integrate intelligence among agencies and to encourage information sharing.

President Franklin Roosevelt

The textbook describes the United States intelligence Community as a series of concentric circles. The inner circles consists of the DNI and the 16 federal agencies that report to him. The middle circle represent Federal , State, and Local Agencies with a intelligence component. What does the outside ring represent?

Private Agencies

In 2010 of the estimated 854,000 people possessing government top secret clearances, 265,000 were _______.

Private Contractors

Which of the following is where one would not find open source material.

Private sources

Deliberately spreading disinformation can confuse an adversary and prevent them form learning what is truly going on. This is an example of?

Proactive operation

The step of the intelligence cycle that converts raw information into useful intelligence is:

Processing

What is the main mission of intelligence?

Production of knowledge

Which of the following is not one of the four primary functions of the CIA as defined by the National Security Act of 1947

Provide overall direction for and coordination of counterintelligence inside the United States.

Which of the following is NOT an example of an intelligence function?

Purging excessive amounts of outdated information and intelligence from files to make room for new actionable intelligence

The U.S. codename for the Japanese code during World War II was ____________?

Purple

Law Enforcement agencies that maintain an intelligence file on someone must have at least __________ that individuals are engaging in or are going to engage in criminal behavior.

Reasonable suspicion

___________ is when individuals show a bias to recall better the information they have learned in the recent past rather than what they learned a long time ago.

Recency effect

According to the Joint Chiefs of Staff this is any specific time-sensitive ad hoc requirement for intelligence information or products to support an ongoing crisis or operation not necessarily related to standing requirements or scheduled intelligence production.

Request for Information

Any specific time-sensitive ad hoc requirement for intelligence information or products to support an ongoing crisis or operation not necessarily related to standing requirements or scheduled intelligence production, is the definition of:

Request for Information

What should an analyst do when they are in a hostile briefing situation?

Respectfully try to convey their point and mention what other factors the policy-maker might consider.

In an effort to improve the quality of intelligence through collaboration the Director of National Intelligence is encouraging ________________.

Responsibility to provide

The book "Psychology of Intelligence" was written by a CIA employee and discussed cognitive biases and their effects on decision-making as it relates to intelligence analysis. Which of the following was the author of this ground breaking text.

Richard Heuer

_____________ refers to the level of clearance a person has been granted.

Right to know

This spy caused the FBI to review its security procedures and ultimately resulted in regular polygraphs for all employees involved in National Security matters.

Robert Hanssen

A covert operation referred to popularly as the Iran-Contras affair almost destroyed the presidency of ____________.

Ronald Reagan

Nicknamed "the Blackbird" this spy plane succeeded the U-2 and was in service from 1966 until 1991.

SR-71

______________ is when analysts envision any number of different possibilities, regardless of how implausible they seem.

Scenario Planning

___________ shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security that the original classification authority is able to identify or describe.

Secret

When a person in a group knows their opinion is in opposition to the group position they keep their thoughts to themselves. This is known as what?

Self-censorship

Which of the following best describes the goal of military intelligence?

Serve the commander's needs/Gain insight into enemy strategies.

The intelligence cycle as presented by the Director of National Intelligence consists of _______ interconnected process.

Six

According to the text, what conditions do covert operations NOT influence?

Social

In 2011, the New York Times reported that the United States ahd stepped up clandestine operations in what African country?

Somalia

Once these become known they cease to be of use.

Sources of information, Methods of collection Both a and b

At nearly 700,000 strong, _____________ are the "eyes and ears" of national security.

State and Local Police

This type of intelligence deals with longer term issues that have large implications and potential consequences.

Strategic

_____________ is used to develop national strategy and policy, monitor the international situation, prepare military plans, determine major weapon systems and force structure requirements and conduct strategic operations.

Strategic intelligence

Who said "It is only the enlightened ruler and the wise general who will use th highest intelligence of the army for purposes of spying and thereby they achieve great results".

Sun Tzu

T/F A clandestine operation differs from a covert operation in that emphasis is placed on concealment of the operation rather than on concealment of the identity of the sponsor.

TRUE (SPECIFIC)

Some intelligence products are designed for near term use. These are called ___________

Tactical

____________ is used by frontline commanders for planning and conducting battles and engagements.

Tactical

______ addresses the threat across the range of military operations and focuses on the adversary's capabilities, intentions, and vulnerabilities; it also helps understand the physical environment.

Tactical intelligence

Speaking truth to power is when an analyst ___________.

Tells the consumer how it really is.

_____________ is being able to show that the cause of something occurred before its effect.

Temporality

After World War I, the United States realized that it needed to enhance its intelligence capabilities. The government had the capability to intercept diplomatic communications but most of them were in code. An organization was established to break these codes. Its official name was the Cipher Bureau but it was generally referred to as __________.

The Black Chamber

The information provided to the Union by African-Americans in the south were known as:

The Black Dispatches

The ____________________ studies the nuclear capabilities of foreign governments, to include the assessment of foreign nuclear weapons programs and proliferation activities.

The DOE Office of Intelligence and Counterintelligence

Which of the following was not created by the Intelligence Reform and Terrorism Prevention Act.

The Defense Intelligence Agency

The Special Intelligence Service (SIS) monitored the large German population in Central and South America. This organization was part of ____________.

The Federal Bureau of Investigation

The ________________ interprets the laws that are created.

The Judicial Branch

____________ has the authority to declare war, oversee the military, conduct hearings, and control the federal budget.

The Legistlative Branch

The first legal basis for a permanent U.S. intelligence agency was ______________.

The National Security Act of 1947

This law created the Central Intelligence Agency

The National Security Act of 1947

The _____________ was a true intelligence service operated by the United States during World War II. This organization was under the Joint Chiefs of Staff and at its height, it boasted 24, 00 employees and a budget exceeding $10 million

The Office of Strategic Services

Multipoint or roving wiretaps to target persons rather than places were authorized by what act?

The PATRIOT Act

The series of raids from 1919 to 1921 that were conducted by the Bureau of investigation and the Immigration and Naturalization Service against suspected anarchists were called___________.

The Palmer Raids

Defense Intelligence Agency products are typically written for whom?

The Secretary of Defense

Which of the following statements best describes the relationship between the history of intelligence in the United States and present-day intelligence?

The U.S. intelligence infrastructure today is a product of its history

Of the following examples, which best describes all-source intelligence?

The capturing and killing of Osama bin Laden

__________ prohibits the government from unfairly or arbitrarily depriving a person of life, liberty, or property.

The due process clause

The first espionage act was passed by congress in 1792.

The first espionage act was passed by congress in 1792.

Curveball was _____________.

The name of the intelligence source used by the U.S. Intelligence Community to justify the invasion of Iraq.

IC agencies often collectively flock to issues that are most visible, such as terrorism, while neglecting others. This phenomenon has been termed ____________.

The swarm ball

Covert operations lie somewhere between diplomacy and military action. They are often referred to as ____________.

The third option

Critical thinking means:

Thinking outside the box Thinking by skillfully analyzing, assessing, and reconstructing Both A and C

Why did Congress create the Classified Information Procedures Act?

To prohibit defendants from demanding that the government release classified information in open court

_____________ shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security that the original classification authority is able to identify or describe.

Top Secret

A "revolving door" currently exists between the public and private intelligence sectors.

True

A deception effort during World War II called Operation Quicksilver convinced the Germans that the Allies would land at the Pas-de-Calais and not at Normandy.

True

A foreign spy who has diplomatic immunity cannot be arrested. Instead they are declared persona non grata and are forced to leave the country.

True

A major criticism of the 9-11 Commission, and a great impetus for change was that, despite the collapse of the Soviet Union, the IC remained organized to wage the Cold War.

True

A secret is information that is knowable but hidden.

True

After World War II, J. Edgar Hoover attempted to ring the responsibility for international intelligence to the FBI as one of its missions.

True

Although it is an oversimplification the job of an analysis can be compared to someone putting together a jigsaw puzzle with no picture to refer to, missing pieces, and pieces added from another puzzle.

True

An important concept to grasp when attempting to understand the legal structure of the IC is checks and balances.

True

An obvious example of politicized intelligence is when an analyst tells the boss what he wants to hear. Correct!

True

Analysts must be aware of the level of expertise of their consumer--if the reader knows a lot about a subject, an analyst can forgo background information and detail.

True

Analysts must prove the value of their product to their audience by making the product relevant to the audience's needs.

True

Analysts need to realize that, like scientists, their goal is to disprove, not rove, hypotheses. The one that remains standing at the end of the process is the one that should be judged most likely.

True

Battlefield success can, in a large measure, be a matter of the decision advantage conveyed through superior intelligence.

True

By some estimates the military controls up to 80% of the Intelligence Community's budget.

True

Collectors must corroborate source information to ensure it is accurate.

True

Covet actions, in the truest sense, should complement and supplement parallel over measures, such as diplomacy, trade sanctions, or military activities, and should not be used recklessly.

True

Denial and deception operations are designed to deny information to an enemy or to provide the enemy with false information.

True

Documents that had plans for the bombing of the World Trade Center were recovered in 1990 but were not translated until after the first World Trade Center bombing in 1993.

True

In 1976 President Gerald Ford issued an executive order prohibiting assassinations.

True

In the 1990's the FBI found itself squaring off against a variety of domestic threats to include environmental extremists, antiabortionists, militia groups, and white supremacists.

True

In the IC it is common to appoint someone as a devil's advocate whose job it is to questions every conclusion or fact and to propose alternative hypotheses.

True

Intelligence within a democracy presents a paradox.

True

Just because a country is a friend does not mean that they do not spy on you.

True

Military Deception emphasizes that to effectively use the art of deception, the deceiver must know and understand the mind of the target of the deception.

True

Offensive operations are those that look outside the organization to detect enemy espionage activities as well as the attempts made to mitigate the damage done by those efforts.

True

One of the IC's biggest problems is to refuse to consider other hypotheses other than one's own favorite one.

True

One of the biggest hurdles facing the creation of an independent intelligence agency was the military's unwillingness to relinquish control.

True

One of the problems that the Intelligence Community had in the years after the collapse of the Soviet Union is that it was organized to spy on the Soviet Union. When that country collapsed it was not prepared to spy on other types of organizations.

True

Persons seeking a security clearance must fill out a lengthy document about themselves. This is a Form SF-86.

True

Planning and direction are both the beginning and ending points of the intelligence cycle.

True

Policymakers and IC professionals share a producer-consumer relationship.

True

Satisfying is arriving at the first acceptable, rather than the optimal decision.

True

Surveyors, such as a young George Washington, could be considered the first practitioners of GEOINT in North America.

True

T/F A crucial step in the intelligence cycle process is that the formulation of the question to be examined

True

T/F An operation that cannot be traced back to the United States is considered to have plausible deniability. Correct!

True

T/F Analysis is both a process and a product.

True

T/F At its core, the analytical process consists of looking at information, sometimes voluminous amounts of information from myriad sources and coming to conclusions that will assist policymakers in performing their jobs.

True

T/F CIA Case Officers spend the bulk of their careers engaged almost solely in information collection, usually from human sources.

True

T/F Evaluation is a constant process.

True

T/F FININT stands for Financial Intelligence

True

T/F In high-impact/low-probability analysis, the analysts are trying to develop milestones or indicators that would be identifiable that terrorists are attempting one of these catastrophic but improbable events.

True

T/F In terms of resources and risk, collection, is the most expensive part of the intelligence cycle.

True

T/F Intelligence does not just occur: rather, it is drawn from information and is generally the result of a process in which the information is organized, reviewed, vetted, and validated.

True

T/F Lead time is a factor in deciding which collection technique to use. Lead time involved the length of time necessary from inception until a likely payoff is realized.

True

T/F Listening in on domestic calls using SIGINT is not allowed without a judge's approval

True

T/F MASINT deals with technical measurements and the signatures left by physical substances such as radiation.

True

T/F Systems that are isolated from one another are called stovepipes.

True

T/F The United States is developing lighter than air blimps that fly at 65,000 feet to collect intelligence.

True

T/F The central premise of the "Psychology of Intelligence" was that analysts need to understand "hows" and"why" of evaluating evidence and reaching conclusions.

True

T/F The dissemination process can make or break the entire intelligence cycle.

True

The 9-11 Commission was convened to determine what had gone wrong, in particular, they sought to determine why a well-funded, sophisticated intelligence infrastructure had failed to predict and prevent the 9-11 attacks.

True

The Central Intelligence Agency is the only independent member of Intelligence Community.

True

The FBI defines international terrorism as that which occurs primarily outside the territorial jurisdiction of the Untied States or is caused by groups that were formed and operate primarily outside of U.S. borders.

True

The Foreign Intelligence Surveillance Court consists of 11 federal district court judges appointed by the Chief Justice of the Supreme Court.

True

The Intelligence Community was caught completely off guard by the 9-11 attacks.

True

The National Counterterrorism Center is an example of IC members collaborating together.

True

The President's Daily Brief is not intended to alert the President to impending terrorist attacks or to assist him or her in declaring war or ordering an attack.

True

The State Department's role in counterintelligence overseas is to ensure that U.S. embassies are physically secure and free from infiltration.

True

The United States has been involved in covert operations since the American Revolution.

True

The collapse of the Soviet Union in the late 1980's and 1990"s changed the world threat environment from a bipolar one to multi polar world with many different threats.

True

The first permanent intelligence service in the United States was the Office of Naval Intelligence.

True

The intelligence community places a great deal of emphasis on writing and briefing.

True

The provision of the National Security Act relating to intelligence that continues to be the center of controversy is "Perform other functions and duties related to intelligence affecting the national security as the President or the Director of National Intelligence may direct.

True

The sheer volume of intelligence collected has made the processing step increasingly important.

True

President Eisenhower commissioned the construction of a special plane designed specifically for spying. This plane was dubbed the ________.

U-2

In 2000 a U.S. Navy ship was attacked by al Qa'ida suicide bombers in a boat. The name of this ship was __________.

U.S.S. Cole

The name of the U.S. Navy ship outfitted to collect electronic signals that was seized in international waters by the North Koreans in 1968 is _____________.

U.S.S. Pueblo

The mujahedeen fought a war against the Soviet Union in Afghanistan from 1979-1989. Who supplied the mujahedeen with arms and ammunition?

United States

This Agency has had a formal intelligence arm since 1915.

United States Coast Guard

UAV stands for ________.

Unmanned Aerial Vehicle

What is information in terms of intelligence collection?

Unprocessed material of every description that can be used to produce intelligence, Raw Data, Perishable (All of the above)

According to the text, what do some consider as the seventh step in the intelligence cycle?

Utilization

Suppose analysts travel to a particular foreign country and have some unique and wonderful experiences. Upon their return to the Untied States, they are tasked by their employer, the Defense Intelligence Agency (DIA) to write a report on the likelihood of that country invading one of its neighbors. Despite solid evidence that this could be a real possibility, the analysts are unconsciously affected by the great time they had there and the lovely people they met; their subsequent report downplays the likelihood of invasion. This is and example of what?

Vividness criterion

According to James S. Major there are three general forms that intelligence products have. Which of the following is not one of those forms.

Warning

Of the following, which is NOT a type of military intelligence?

Warning

This type of intelligence looks at the potential threats against U.S. interests and prioritizes the issues with which the IC is concerned.

Warning intelligence

The first Coordinator of Information was _____.

William "Wild Bill" Donovan

________ coined the term "Iron Curtain" in reference to the countries that were under the control of the Soviet Union during the Cold War.

Winston Churchill

Of the following, which is NOT allowed by FISA?

Wiretapping U.S. citizens for any purpose so long as the agency has a reasonable suspicion to do so

A terrorist bombing attack occurred in the United Sates on February 26, 1993 which killed six people and injured 1040. Where did this occur?

World Trade Center, New York

Under the First Amendment, may journalists reveal classified information?

Yes, as long as the information doesn't subject the U.S. or its citizens to direct, immediate, and irreparable danger

For the military commander, ____________ helps to remove uncertainty and assists in lifting the __________; it may literally mean the difference between victory and defeat.

accurate intelligence of the enemy's intent; Fog of war

This type of intelligence creates an encyclopedic recording of information pertinent to U.S. security.

basic intelligence

In the Analysis and Production phase analysts are critical because they integrate data and place the evaluated information in ______________.

context

The bias which describes the tendency to attribute the behavior of others to their personalities or individual skills while undervaluing situational explanations for those behaviors is called what?

fundamental attribution error

Which of the following is not one of the five categories of finished intelligence.

future intelligence

President Truman did not want the FBI to become the federal government's intelligence organization because _________________.

he didn't want to mix intelligence and law enforcement functions, AND didn't want to see a "secret police" type organization, such as the Nazi Gestapo emerge in the United States.

The three types of confidence levels are?

high, moderate, low

The "everybody thinks like we do" mindset is where analysts view facts and patterns of a situation and assume that people of other countries and cultures will choose the same way they would in the same situation. This mindset is termed what?

mirror imaging

Intelligence agencies do not have unlimited resources and time to gather information on every person or topic so _______ must be established.

priorities

Raw information is usually not in a form that allows for immediate analysis; first, it must be _______________ and in some cases translated or decrypted.

processed

Abducting suspected terrorists and secretly transferring them to countries that may allow them to be tortured is called ___________.

rendition

Organized , explicit methods for analyzing information are called _____________,

structured analytical techniques

The Fourth Amendment of the Constitution guarantees ______________.

the right to be free from search and seizure

The First Amendment of the Constitution guarantees the right ____________

to freedom of speech

The purpose of the Church Committee was to determine ____________.

whether or not intelligence agencies had violated the law.


Ensembles d'études connexes

Hubspot Inbound Marketing part 4

View Set

Anatomy Chapter 11 Autonomic Nervous System

View Set

Conectores de Causa y de Consecuencia

View Set

Fetal abdominal wall and abdomen

View Set

Chapter 3: Collecting Objective Data: the Physical Examination

View Set