....

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

ECHELON

-Allegations of United States economic espionage arose in the late 1990's concerning this government program -It searches through collected sigint using keywords win computers. ("Five Eyes")

The Intelligence Process

1) Identification Requirements 2) Collection 3) Processing and Exploitation 4) Analysis and Production 5) Dissemination 6) Consumption 7) Feedback

Tom Kean

9EC Chairman

Assessments

Analytical reports. The same as estimates, but this is what they're called in Australia and Britain

Chronology 1972

Anti-ballistic missile treaty (ABM treaty) and (Strategic Arms and Limitations Talks) SALT I Accord

CSIS

Canada's Security Intelligence Service

Cryptographers

Code Breaking (the message isn't hidden)

Encrypt

Coding of communications

Tim Roemer

D-Indiana, led effort to pass amendment creating 9EC

National Security Agency (NSA)/Central Security Service (NSA/CSS)

Founded in 1952, the NSA is a DOD agency which primarily gathers signals intelligence (SIGINT) - intercepting and processing foreign communications, cryptology, and information assurance (preventing foreign hackers from getting secret information). Unlike the DIA and CIA, the NSA does not unilaterally conduct human-source intelligence gathering. It's current director is Mike Rogers. It is the IC's executive agent for all SIGINT activities. main cryptology organization in USA. Tasked w/ collection and dissemination of SIGINT, protection of USA tech/cyber systems. Budget determined by DOD

Duncan Hunter

HASC Chair, very pro-military; opposed DNI idea b/c he thought it would decrease capability of military (esp. to get intel)

CURVEBALL

Iraq defector who fabricated stories about Iraq WMDs that the CIA received from German Intelligence in 2003, big evidence supporting invasion of Iraq. German source that "falsely claimed that Saddam has mobile bio-weapons labs"

Gang of 4

Only briefing the leaders of the congressional intelligence communities

Asset validation

SAD, Tommy Has Tattled (Spot, Assess, Develop/Recruit, Test, Handle, Terminate)

Technical intelligence

SIGINT, MASINT, imagery. GOOD: Information on "hard targets," precise, safe. BAD: costly, limits of tech., ethical risks of wiretapping, context, deception. (TECHINT) - Derived from the exploitation of foreign materiel and scientific information.

Homeland Security Council (HSC)

The ___ ___ ___ coordinates homeland security related activities among IC members and promotes the effective development and implementation of homeland security policies.

Current Intelligence

"pays the rent for the IC", always predominates over other types (especially during war), Reports and analysis on issues that may not extend more than a week or two into the future. During a crisis or war, current intelligence increases, as many of the decisions made during these periods are tactical in nature - even among senior policymakers - thus demanding current intelligence.

Non official Cover NOC

Avoids any overt connection between the officer and their government but can make it more difficult to keep in contact - they need a full-time job that explains their presence. When a humint officer holds another non-governmental job to hide their humint job

Analytical Confidence Levels

Based on the scope and quality of information supporting an analysts' judgements. The confidence an analyst has in their judgments. The issue of the confidence that an analyst has in their judgements-HIGH: high quality information, solid judgement possible-MEDIUM: credible information, multiple possible interpretations-LOW: scant or questionable information leading to difficulties in creating analysis

BfV

Bundesamt für Verfassungsschutz (Federal Office for the Protection of the Constitution) (Germany)

Keyword Search

Collected data are fed into computers that look for specific words or phrases and the words are used as indicators of the likely value of an intercept

Information Operations

Conflict in cyberspace

Damage Assessment

Determining what intelligence has been compromised. Once a spy has been caught, looking to see what has been compromised or stolen. This determines what intelligence has been compromised (when a spy has been exposed)

FISA

Foreign Intelligence Surveillance Act

Collection Swarm Ball

The tendency of all collectors of collection agencies to collect on an issue that is deemed to be important, whether or not they bring anything useful to the table or can offer an appropriate type of collection. Tendency of all collectors to collect on an important issue to enhance their standing for budget allocations. Usually involves a high priority issue. Think little kids playing soccer, both teams converge on the ball in masse regardless of their assigned positions

Indication and Warning

The use of traffic analysis to provide indication of image imminent danger and the ability to warn consumers and plan ahead

Intelligence failure

When IC fails to predict or predicts wrongly a significant event. Ex: Pearl Harbor, 9/11, Iraq WMD

Source

When a target accepts a pitch

Collection Synergy

When on means of collection provides tips to guide collection via other means

Failed States

no longer deemed legitimate by its people, faltering economy, fictionalization of population, displacement of population, or suspension of basic rights. There has been a breakdown of legitimacy of the government and the ability go the government to maintain a level of control over its own territory

Collection

produces information not intelligence

Chronology 2001

-9/11 attack-Patriot Act created; allows greater latitude regarding domestic intelligence gathering

intelligence cycle

1. Planning and Direction 2. Collection 3. Processing 4. Analysis and Production 5. Dissemination

David Kay

2003; CIA appointed investigator of looking into WMD presence in Iraq; conceded "We were wrong"

CMC

Central Military Commission (China)

COI

Coordinator of Information

DRM

Directoire du Renseignement Militaire (Directorate of Military Intelligence) (France)

FSB

Federal'naya Sluzba Besnopasnoti (Federal Security Service) (Russia)

FAPSI

Feralnoe Agenstvo Pravitelstvennoi Svyazi I Informatsii (Federal Agency for Government Communications and Infromation) (Russia)

Stovepipes Problem

Raw intel presented without proper context, data often not easily shared outside of the agency using it.

Ted Stevens

Senator from Alaska; Appropriations chair; felt that 9EC proposals & DNI bill implied impotency of Congressional oversight of US IC

Chronology 1957

Soviet Union led race to space (Sputnik Satellite)

Foreign Economic Espionage

The collection of foreign economic intelligence

Industrial Espionage

The collection of industrial economic intelligence

Director of Central Intelligence

The head of the CIA from 1946 to 2005, acting as the principal intelligence advisor to the President of the US and the NSC, as well as the coordinator of intelligence activities among and between the various U.S. intelligence agencies (collectively known as the Intelligence Community from 1981 onwards). The office existed from January 1946 to April 21, 2005, and was replaced on that day by the Director of National Intelligence (DNI) as head of the Intelligence Community and the Director of the Central Intelligence Agency (D/CIA) as head of the CIA.

Official Cover

Those who hold another government job, usually posted at the embassy. Makes it easier for the agent to maintain contact with their superiors but raises the risk of being suspected. When a humint officer holds another government job to hide their humint job

Official cover

using diplomats leads to a potential conflict. There is tension between State Dept. ambassadors and CIA chiefs of station (COS). COS officially represents DNI (but see CIA as home). DCIA controls HUMINT. CIA-DNI rivalry = less willingness to share with State. There is not always full disclosure to the Ambassador

Responsibility to Provide

(2007) DNI Mike McConnell signaled a change in intelligence standard-officers and agencies now would be evaluated by the degree to which they actively seek to share intelligence. Officers and agencies assessed by the degree to which they actively seek to share intelligence, as opposed to the need to know standard. Officers nd agencies who now would be evaluated by the degree to which they actively seek to share intelligence

Decision Advantage

(2008) SNI Mike McConnell states that the IC's mission was to provide policymakers with "decision advantage": providing policymakers with Intel that will give them an advantage over adversaries, allowing them to act with more confidence and likelihood of success. Providing policymakers with intelligence that will give them an advantage over adversaries. seeks to provide policymakers with intelligence that will give them an advantage over adversaries, allowing them to act with greater confidence and a greater likelihood of success

Chronology 1940-1941

-Coordinator of Office (COI)-Office of Strategic Services (OSS)-Pearl Harbor

Noise Versus Signals

-Roberta Wohlstetter: Pearl Harbor Warning and Decision-the fact that we collect so much information means that the signals one wishes to receive and to know are often embedded in a lot of surrounding noise

Politicized Intelligence

-this occurs when an analysts has a strong preference for a specific policy outcomes.Altering intelligence in order to support a certain policy outcome. If an intelligence officer has a strong preference for a specific policy outcome, their intelligence analysis may display a similar bias

Philip Zelikow

9EC Executive Director, historian at UVA

Dangles

A humint source that presents himself voluntarily but is, collecting for his government. HUMINT:A suspicion we have of walk ins, why have they comes? are they a means of entrapment? Can be used to ID hostile intel. personnel or gaining insights into the intel. requirements and methods of a hostile service

Polygraph

A lie detector test that uses you heart rate o determine if you are telling the truth

Covert Action

An activity or activities of the United States government to influence political, economic, or military conditions abroad, where it is intended that the role of the United States government will not be apparent of acknowledge publicly. an activity to influence political, economic, or military conditions abroad, where it is intended that the role of the US not be apparent or publicly acknowledged. The type of secret, plausibly deniable operation performed by the CIA. It was given freedom to do this under the National Security Act. "influence."

Appropriated but not Authorized

Appropriators vote money for programs or activities that haven't been authorized. Giving money to a budget program that has not been authorized.

Authorization

Approving specific programs and activities. Consists of approving specific programs and activities and suggesting dollar amounts for programs

Mirror Imaging

Assuming other states or people will act just the way a particular country or person does. Assumes a certain level of shared rationality. Assuming that other leaders, states, and groups share motivations or goals similar to those most familiar to the analyst. Assuming others will act like you would act.-can undermine analysis-these judgements stem from societal norms, rules, etiquette, experience-i.e. Japan starting a war with the US in 1941--made no sense to us

Need to know

Being admitted to different compartments based on what information it is important that you know.Only giving employs intelligence they need to get a job done; no more, no less

BND

Bundesnachrichtendienst (Germany)

INR

Bureau of Intelligence and Research (Department of State)Secretary of State (relationship) - - Relationship impacts ability to get things done/very variable

Chatter

Coms and movements of known or suspected terrorists

FISC

Foreign Intelligence Surveillance Court

Strategic intelligence

Information that is foreign, secret, actionable, and timely. Not as detailed and military-oriented as tactical intelligence.Serves to (1) Explain and account for something and (2) Forecast and estimate about likely events (not predict)

PC

Principles Committee (NSC)

Shin Bet

Sherut ha-Bitachon ha-Klai (General Security Service) (Israel)

SVR

Sluzhba Vneshnei Razvedki (External Intelligence Service) (Russia)

National Intelligence Priorities Framework

The broadest evaluation activity in the intelligence community that gauges how well intelligence means are linked to intelligence ends

Compartmented System

an internal means of thwarting espionage attacks-employees don't get access to all intel: clearances are done on a "need to know" basis

Agent Acquisition Cycle

(1)Identifying Targets- that have access to desired information: Identify a potential asset. Targeting and spotting (2) Asset Validation System- to access susceptibility to recruitment: Gain their confidence, assess weaknesses and susceptibility to be recruited (asset validation system). Assessing (done via the Asset Validation System)-(3) Recruiting Via Pitch- offering relationship: Recruitment make the pitch (a source may accept a pitch for a variety of reasons)(4) Handling: managing the asset (5) Termination: ending relationship with the asset. source is no longer needed

Foreign Intelligence and Surveillance Act (FISA)

(1978) Part of Congresses push back to address the abuse of the Nixon Administration, this act prohibited domestic wiretapping without a warrant.

Chronology 1989-1991

-Failure to force soviet collapse (intelligence failure; minimize d soviet threat)

CDA

Congressionally Directed Action

President's Intelligence Advisory Board

High level of oversight, can investigate intelligence issues or initiate competitive analysis.

Espionage

Human Intelligence- use of human spies. the practice of spying or of using spies, typically by governments to obtain political and military information.

Collection Disciplines

Means of collecting intelligence

Cryptologic Language Analyst

Personnel assigned to this specialty operate and manage communications equipment.

Intentions

Plans and goals of an adversary

QFR

Question for the Record

Intelligence Community (IC)

The ___ ___ is a coalition of agencies and organizations within the executive branch that work both independently and collaboratively to gather the intelligence necessary to conduct foreign relations and national security activites.

Echo or Circular Reporting

The effect of a single media story being picked up and repeated by other media sources until the story is perceived as more important than it actually is. OSINT: the effect of a single media story being picked up and repeated by other media sources until the story appears more important than it actually is

Four Reasons For Intelligence Emphasis

-To avoid strategic surprise -To provide policy makers with long-term expertise -To support the policy process with objectivity and avoid politicized intelligence -To maintain secrecy of information, needs, and methods

Imagery

A likeness or representation of any natural or manmade feature, related object or activity, and the positional data acquired at the time the likeness or representation was acquired.

Executive Orders

A presidential policy directive that implements or interprets a federal statute, a constitutional provision, or a treaty. Can be a source of intelligence action

National Security Letters

An investigative technique that has been used in espionage cases and counterterrorism. A type of administrative subpoena. Administrative subpoena that requires the recipient to turn over records and data pertaining to individuals, with a gag order as well.-an administrative subpoena. The require recipients to turn over records pertaining to people, but they can't tell anyone it exists-not subject to judicial review, the use of them has skyrocketed this past decade

Group Think

Avoid coerced consensus; when the value of consensus overrides the value of critical thinking (Based on non-logical thinking, no reason). a psychological phenomenon in which the desire for harmony or conformity in the group results in an irrational or dysfunctional decision-making outcome.-Group members try to minimize conflict and reach a consensus decision without critical evaluation of alternative viewpoints, by actively suppressing dissenting viewpoints, and by isolating themselves from outside influences. Occurs within a group of people, in which the desire for harmony or conformity in the group results in an irrational or dysfunctional decision-making outcome.

MI5

Security Service (Britain)

Sub-Source

The sources that serve the primary source

Supplemental Appropriations

make available to agencies funds over and above the amount originally planned. Conrgess has been using these more for the IC in recent years.Making funds available for agency use that exceed the amount originally planned.These appropriations make available agencies funds of and above the amount originally planned

Foreign Liaison

Allied or friendly services → these offer greater familiarity with its own region and its government may maintain a different pattern of relations with other states

Appropriation

Allocating specific dollar amounts to authorized programs. Consists of allocating specific dollar amounts to authorized programs

Compartmented

An employee having access to a certain clearance does not automatically get all of the information in that clearance level.The United State intelligence system is segmented and access to each compartment is based on need to know

Chief of station

An intelligence officer assigned to head an overseas intelligence unit, normally based out of an embassy.

Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA)

Called for the most sweeping overhaul of the nation's intelligence-gathering apparatus; created Director of National Intelligence; put together 15 agencies under control of director; created National Counterterrorism Center. established the Office of the Director of National Intelligence (ODNI) to better unify and manage the efforts of the IC.

Chronology 1962

Cuban Missile Crisis-Intelligence Failure: didn't foresee missiles being posted-Intelligence Success: Sae missiles before completely installed

Feedback

From policy consumers to intelligence producers regarding the degree to which intelligence producers are used

Counterintelligence (CI)

Information gathered and activities conducted to protect against espionage and other activities carried out by foreign states or non-state actors. similar to, and often confused with HUMINT, as CI uses many of the same techniques for the information collection. -both analytical and operational should pervade all aspects of intelligence-collection, defensive, offensive- designed to support one's own effort and thwart the efforts of your adversaries

Priority Creep

Issues can and do move up and down in a priority system but a priority creep can occur when issues customarily do not receive significant attention until after they have begun moving up to the higher priority levels, at which point they must compete with the issues already in that bracket. When issues move up/down a priority system

NCTC

National Counterterrorism Center

Analysis and Production Analyst

Personnel assigned to this specialty perform detailed analysis on target network communications for additional exploitation.

Gang of 8

The leaders of congressional intelligence communities and the highest ranking members of the intelligence committees

Department of the Treasury (DOT)

analyzes foreign intelligence related to economic policy and participates with Department of State in the overt collection of general foreign economic information.

Cryptologic Service Groups (CSG)

work under the direct authority of DIRNSA and their primary function is to facilitate timely SIGINT support to unified commands, joint task force commanders, or other operational commanders.

Patriot Act

A controversial law overwhelmingly passed by Congress in October 2001, after the terrorist attacks of September 11 on the World Trade Center and the Pentagon. It greatly expanded the power of federal law enforcement authorities to move against suspected terrorists. Gave CIA more powers and more money.

Sleeper Agents

Agents sent to another nation to assume normal lives and then become active at some later time.

Double Agent

Agents who apparently continue their activities, then provide information on their erstwhile employer and knowingly pass back erroneous information. An employee of a secret intelligence service, whose primary purpose is to spy on a different target organization, but who, in fact, is a member of the target organization. Counterterrorism officers may not just try to catch spies, but try to turn them into double agents

Federal Bureau of Investigation (FBI)

Serves as an intelligence and law enforcement agency which is responsible for understanding national security threats. The FBI's Directorate of Intelligence (DI) is responsible for information sharing policy and intelligence analysis for national security. The current Intelligence Branch Executive Assistant Director is Eric Velez-Villar. As an intelligence and law enforcement agency, is responsible for understanding threats to our national security and penetrating national and transitional networks that have a desire and capability to harm the US.

Steve Cambone

Under SecDef for Intel; like his boss (Rumsfeld), not a big fan of making a DNI

Counterespionage

countering penetration of your own service

Lifestyle Polygraph

A category of polygraph exam that focuses on personal behavior

Clientism

A flaw that occurs when a analyst becomes so immersed in their subject (usually after working on an issue for too long), that they loose their ability to view issues with their necessary criticality. A flaw that occurs when analysts become so immersed in their subjects that they lose their ability to view issues with criticality-they can spend time apologizing for their subjects instead of analyzing them. When analysts become so immersed in their subjects that they lose the ability to view issues with the necessary criticality. "Going native"

Bigot List

A lot of people with access to certain categories of intelligence but these are often rather lengthy rather than exclusive. Lists of people with access to certain categories of intelligence. When leaks occur, there are too many people who have access to the information to be able to pin down the leaker. Agencies keep bigot lists of people with access to certain categories of intelligence (but these are usually too lengthy to be helpful)

Denial

A targeted nation can use knowledge about the collection capabilities of an opponent to avoid collection (known as denial). When a targeted nation uses knowledge of collection capabilities to avoid collection

Supplementals

A way to take care of agreed on needs without making long term budget commitments

President's Foreign Intelligence Advisory Board (PFIAB)

Does high level objective oversight by responsibility to problems or initiating activities to investigate issues; became PIAB in 2004. carries out higher level and more objective oversight than the NSC office of intelligence. Has recently just become the PIAB and has appointed officials

DoT's Office of Intelligence and Analysis (OIA)

Established in 2004 by the Intelligence Authorization Act, the Treasury Department's OIA is a component of the Office of Terrorism and Financial Intelligence. Its purpose is to collect, analyze, and disseminate foreign intelligence and foreign counterintelligence information. They safeguard the financial system against illicit use and combat rogue nations, terrorist facilitators, WMD proliferators, money launderers, drug kingpins, and other national security threats.

Andrew Card

GW's Chief of Staff; controlled what/who went to POTUS (in re: "DNI/IC/9EC debate") and relevant discussions in White House

GRU

Glavnoye Razvedyvatelnoye Upravlenie (Main Intelligence Administration) (Russia)

GCHQ

Government Communications Headquarters (Britain)

Mossad

Ha-Mossad Le-Modin Ule Tafkidim Meyuhadim (Institute for Intelligence and Special Tasks) (Israel)

Five Eyes

Intelligence shared among the United States, Britain, Australia, Canada, and New Zealand

Traffic Analysis

Monitoring the changes in communications. Changes in these patterns (increases or decreases) may be indicative of a larger change in activity. SIGINT: monitoring changes in communications, which has more to do with volume than content

Dissemination

Moving intelligence from producers to consumers

NIC

National Intelligence Council

Denied Areas

OSINT: the number of closed societies and denied areas has decreased dramatically since the cold war

Intelligence Oversight Act of 1980

Required reporting of covert ops to just SSCI and HPSCI, so as not to jeopardize them. Accountability, supervision. From 1947, hardly existed. Church Committee investigations created SSCI and HPSCI, FISA, Hughes-Ryan Amendment, Oversight Act of 1980 and 1991

Principle Committee of the National Security Committee

The senior policy coordination body (Secretary of State, Secretary of Defense, Director of National Intelligence, Chairmen of the Joint Chiefs, etc.)

No Year Appropriations

money that does not have to be spent at the end of the fiscal year. Every executive agency wants these types of appropriations

LEO, MEO, GEO, HEO, Sun Synchronous

-LEO: Low Earth Orbit 200-1000 miles, allows for detailed view of the earth. -MEO: between leo and geosynchronous orbits (22,000 miles). GEO stay over the same spot all the time Geosynchronous Orbit: 22,000 miles above the earth. It stays over the same part of the earth at all times-Highly elliptical orbit: comes close to the southern hemisphere and far from the northern-Sun Synchronous Orbits follow daylight

Chronology 1947

-National Security Act- conveyed the legal basis for intelligence community; created by secretary defense and national security council; framework and bureaucracy of today is from this-Start of Cold War- countering soviet union and stopping growth of communism

National Technical Means

-Nixon's SALT I treaty (1972) recognized and legitimized the use of national technical means (satellites and other technical collectors) by both parties to collect needed intel. Satellites and other technical collectors (used to verify adherence)

Global Coverage

Acknowledged requirement of the intelligence community to cover any and all issues. Can be a dangerous and misleading term: officers mean their acknowledged requirement to cover any and all issues. Can be misinterpreted as promising more than they can deliver (they can be knowledgeable, but not experts, on everything). Intelligence officers meet their acknowledged requirement to cover any and all issues. The acknowledged requirement to cover any and all issues.

Sleepers

Agents inserted into the target country but spend time, sometimes years, integrating themselves and don't become active immediately. HUMINT: some officers are active as soon as they arrive at their station, sleepers are inserted into the target country but spent time integrating themselves and aren't active immediately.These are HUMINT agents inserted into the target country but spend time (even years) integrating themselves and do not become active immediately

National Security Act of 1947

Consolidated changes to national security regime by creating 1. CIA 2. Joint Chiefs of Staff 3. National Security Council 4. US Air Force.Established the National Security Council and Joint Chiefs of Staff. It also created the CIA and helped lead to the creation of organized foreign/domestic intelligence gathering

George Tenet

DCI ca. 9/11--long aware of and addressing bin Laden & al-Qaeda; received flak (from GW White House too IOT deflect criticism) about misrepresenting WMD reports)

DGSE

Directoire Générale de la Sécurité Extérieure (General Directorate for External Security) (France)

National Intelligence Managers NIM

Ensures a balanced focus on priority intelligence missions by overseeing both collection and analysis on a given issue. Intelligence managers who oversee and facilitate analysis and manage projects. There are fifteen of them. Responsible for intelligence integration

Fusion Centers

Information sharing center, many of which were jointly created from 2003-2007 under the Department of Homeland Security and the Justice Department. They are designed to promote information sharing at the federal level between the CIA, FBI, Justice Dept, U.S. military, and state and local governments.

National Intelligence Estimates (NIEs)

Long-term intelligence product that attempts to estimate (not predict) the likely direction an issue will take in the future. They represent the considered opinion of the entire intelligence community and are presented to the president by the DNI once fully agreed to

Sources and Methods

One of the primary concerns of the entire intel community is protecting your sources and methods of collecting intelligence. the details/existance of collection capabilities. Classification of sources and methods is one of the IC's top priorities

Fleet Cyber Command (FLTCYBERCOM)

The Navy's ___ provides guidance to cryptologic activities tasked by both Navy and NSA/CSS.

Director of National Intelligence (DNI)

appointed by the President with Senate approval, serves as the head of the IC. Overseer and coordinator of the activities of 15 intelligence agencies involved in the production and dissemination of intelligence information in the U.S. government, as well as the president's main intelligence adviser. Current director is James Clapper. overseer and coordinator of the many agencies involved in production and dissemination of intelligence information in the U.S. government, as well as the president's main intelligence adviser. Started in in 2005. mbodiment of the intelligence community; works with the national security council to support and advise the president

Iraq WMD analysis

complete analytic failure: analytic biases and problematic IC assumptions, overconfidence of IC leadership, politicization from White House. cherry-picking of evidence.

Tradecraft

methods and tools used by CIA officers in collection (preventing exposure of them and their assets) and analyzation (denial or deception present? biases?)

Mole

A deeply hidden spy (Angleton convinced of the existence of a Soviet mole)

Central Intelligence Agency

Central Intelligence Agency: An independent intelligence agency responsible to the President through the DNI and accountable to the American people through the intelligence oversight committees of the US Congress. an external intelligence service of the U.S. Government, tasked with gathering, processing and analyzing national security information from around the world, primarily through the use of human intelligence. Established in 1947 by the National Security Act, CIA is responsible for collecting, analyzing, and disseminating foreign intelligence. They report to the DNI. Current Director is John Brennan. created with the signing of the National Security Act of 1947.

Deputies Committee of The National Security Council

Composed of the principle committee; they review issues as a groundwork for the Principle Committee

U.S. Intelligence community

Comprised of 1. executive departments (e.g. State, Defense, Homeland Security), 2. the military (each branch has its own agency), 3. intelligence agencies (DIA, CIA, NRO), and 4. the Director of National Intelligence, who sits on top and manages the budgets

DOD

Department of Defense. the federal department charged with coordinating and supervising all agencies and functions of the government relating directly to national security and the military.

National Security Directive 5412/2 (1955)

Executive order that adds oversight to previous directive allowing CIA to take charge of covert operations, such as special committee of White House, State, and Defense Officials. Restates that ends justify the means, and sets out parameters of covert ops.

All-Source Intelligence

Intelligence based on many collection sources to compensate for short-comings of each and profit from combined strength -the goal of the IC is to create all-source intelligence -Intel. based on as many collection sources as possible to compensate for the shortcomings of each and profit from their combined strength

National Intelligence Program (NIP)

One of two components of the U.S. Intelligence Budget. The NIP includes all programs, projects, and activities of the intelligence community as well as any other intelligence community programs designated jointly by the DNI and the head of the department or agency. Budget of $53.1 billion for 2017.Comprises programs that either transcend the boundary of an agency or a defense in nature. DNI is responsible. The DNI has a great deal of power with respect to NIP responsibilities.

Joint Terrorism Task Force (JTTF)

Partnership between American law enforcement agencies that is charged with taking action against terrorism, which includes the investigation of crimes such as wire fraud and identity theft. The lead agency is the FBI followed closely by the DHS and also is composed of 33 other federal agencies. A series of fusion centers have been formed to provide the desired liaison and integration

Signals Intelligence (SIGINT)

Refers to the interception of communications between two or more parties. Intelligence produced by exploiting foreign communications systems and non-communications emitters. It entails: Communications Intelligence (COMINT); Electronic Intelligence (ELINT): Technical ELINT (TECHELINT), Operational ELINT (OPELINT); Foreign INstrumentations Signals Intelligence (FISINT). intercepted communications, wire taps, telemetry intelligence, signatures from military equipment. intelligence discipline provides unique intelligence information, complements intelligence derived from other sources, and is often used for cueing other sensors to potential targets of interest.

Office of the DNI (ODNI)

The ___ __ ___ ___ is charged with effectively integrating foreign, military, and domestic intelligence in defense of the US and its interests abroad.

Office of Strategic Services (OSS)

The first peacetime, non-departmental US intelligence organization. Created in 1942 by FDR and tasked to collect, analyze, and disseminate strategic intel., as well as "black ops." First director was William "Wild Bill" Donovan. Opposed heavily by J.Edgar Hoover of FBI. Disbanded by Truman in 1945.

Imagery Intelligence (IMINT)

The technical, geographic, and intelligence information derived through the interpretation or analysis of imagery and aollateral materials. Images taken from overhead (satellites, U2)

State's Bureau of Intelligence and Research (INR)

a bureau of the Department of State and a member of the Intelligence Community (IC). The Bureau of Intelligence and Research's (INR) primary mission is to harness intelligence to serve U.S. diplomacy.

Defense Intelligence Agency (DIA)

external intelligence service specializing in defense and military intelligence. A component of the Department of Defense (DoD) and the United States Intelligence Community (IC), DIA informs national civilian and defense policymakers about the military intentions and capabilities of foreign governments and non-state actors.Founded in 1961, the DIA is the DOD's lead intelligence agency specializing in defense and military intelligence with a purpose of informing policymakers about the military intentions and capabilities of foreign governments and non-state actors. It also ensures intelligence assistance, integration, and coordination across uniformed military service intelligence components. It's current director is Vincent Stewart.Located on Polling AFB in Washington DC, it is a DOD combat support agency. mission is it to provide timely and objective military intelligence to warfighter, defense policy makers, and force planners

Global Findings

-an oversight issue related to covert action -materials are allocated to deal with global issues (terrorism, narcotics), giving the IC a lot of leeway. Broad president findings dealing with covert action involving transnational issues.Broad presidential findings, often to do with transnational issues such as terrorism or narcotics.

Estimates

-analytical products. An educated guess based on researched information. intelligence products written on a recurring basis.-two purposes: to see where a major issue will go over the next few years, to present the considered view of the entire IC

Competitive Analysis

-based on the belief that by having analysts in several agencies with difference backgrounds and perspective work on the same issues, parochial views are more likely to be countered or weeded out and proximate reality is more likely to be achieved. Different orientations focusing on the same issue but provides more views and great understanding (only rational and logical thinking). Having different agencies work on important issues to produce the best possible intelligence. -the antidote to groupthink -requires a lot of analysts. there was less competitive analysis after the post cold war budget cuts

Intelligence

-much of what goes on is secret, which can be of concern to citizens of a democratic state. Information that makes the needs of policy makers and has been collected and processed to meet those needs. Intelligence refers to info that meets the states or understood needs of policy makers and has been collected, processed and narrowed to meet those needs -there are many different types that provide info to analysts (political, economic, social, environmental, health, cultural)

Spies

Collection platforms (means of collecting information): there is a limited amount of spies, policy makers must make choices among competing collection requirements (it is a zero sum game)

DPSD

Directoire de la Protection et de la Sécurité de la Défense (Directorate for Defense Protection and Security) (France)

JIC

Joint Intelligence Community (Britain)

Analyst Fungibility

Need for analysts who have more than one or two areas of expertise and therefore can be shifted to higher priority accounts during times of need. not every analyst has the language, regional, or topical skills to move to an area of greater need. a very real limit exists on analyst fungibility, which is a major management concern. The ability of analysts to shift from one area of expertise to another during times of need. When requirements change or when crises breakout, analysts must be shifted to areas of greater need. Relies on three factors: (1) Talents and background of the analysts when they are recruited (2) Their training and education within the intelligence community (3) Management of their careers, which should give them sufficient opportunities to develop this expertise in a few areas

WIRe

Worldwide Intelligence Review

CounterIntelligence Polygraph

A category of polygraph exam that focuses on foreign contacts and handling classified intelligence. Polygraph assessing foreign contacts, handling of classified information, etc. foreign contacts, handling of classified information

Developmental

A potential source that is repeatedly contacted to asses value and consideration for a pitch. HUMINT: a potential source who is being brought along-largely through repeated contacts/conversations to asses his value and susceptibilities-to the point where the developmental can be pitched. Potential source who is being brought along largely through contacts and conversations to assess their value (validation) to the point where the developmental can be pitched

Graymail

A spy threatening to reveal classified information in open court as a means of avoiding prosecution.Occurs when accused spies threaten to reveal classified information in open court as a means of avoiding prosecutions.Prosecuting intelligence officers for spying was a major concern-agencies feared that accused spies would threaten to reveal classified info in an open court as a means of avoiding prosecution. Classified Intelligence Procedures Act (1980) allows judges to review classified material in secret so persecution can proceed without fear of publicly disclosing secret intelligence

National Security Council (NSC)

An office created in 1947 to coordinate the president's foreign and military policy advisers. Its formal members are the president, vice president, secretary of state, and secretary of defense, and it is managed by the president's national security assistant. Composed of the Principals Committee and Deputies Committee. It is the principal forum to consider national security issues that require presidnetial decision. serves as the President's principal arm for coordinating policy among various government agencies. The principal forum used by the President of the United States for consideration of national security and foreign policy matters with senior national security advisors and Cabinet officials and is part of the Executive Office of the President of the United States. Since its inception under Harry S. Truman, the function of the Council has been to advise and assist the president on national security and foreign policies.

Steganography

Concealed writing, a technique which is centuries old. For steganography, the message itself is hidden, so its existence is uncertain at best whereas in cryptology, the existence of the message is known but it may not be in a format that can be read. The message is hidden

Chronology 1975-1976

Created congressional oversight committees due to violations of law and due to intelligence abuses

Long Term Intelligence

Deals with trends and issues that may not be an immediate concern but are important to watch. Associated with strategic intelligence. Current intelligence that goes far into the future. Intelligence regarding issues further in the future

DIS

Defense Intelligence Staff (Britain)

Resolution

Degree of visual clarity. Indicate the size of the smallest identifiable object using satellite imagery. At 25-meter (75 feet) resolution, you can see major landforms and larger man-made objects. However, a 1-meter (39 inch) resolution of the same picture, you can see each building with individual cars. satellite imagery: resolution numbers indicate the smallest identifiable object

DoE's Office of Intelligence and Counterintelligence (OICI)

Department of Energy's OICI focuses on technical intelligence on nuclear weapons and nonproliferation as well as nuclear energy (especially foreign) and energy security - they share this technical analysis with the other members of the intelligence community, especially its assessments of foreign nuclear weapons programs. Current director is Steven Black.

Military Intelligence Program (MIP)

Devoted to intelligence activity conducted by the military departments and agencies in the Department of Defense that support tactical U.S. military operations. Budget of $16.8 billion for 2017.Consists of defense and service intelligence programs. Headed by the secretary of defense. Composed of intelligence programs that support the DoD and its components aren't confined to any one military service

Analytical Stovepipes

Each collector operates in a unique field with a series of unique methodologies. Bureaucratic imperatives and a clear preference for their responsibilities in direct support of their particular policy client, as opposed to interagency progects. Isolation of analysts within their own agency and a resulting non-cooperation between agencies. Several ways to which raw intelligence may be presented without proper context

Crosswalks

Efforts between DoD and DNI to coordinate the national intelligence budget decisions

Measurement and Signature Intelligence (MASINT)

Electromagnetic Data; Radio Frequency Data; Radar Data; Nuclear Radiation Data; Materials Data; Geophysical Data. Scientific and technical intelligence obtained by quantitative and qualitative analysis of data (metric, angle, spatial) derived from specific technical sensors for the purpose of identifying any distinctive features associated with the target, source, emitter, or sender. all electronic intel that's not SIGINT or imagery. Mostly military, like sizmometers, submarine detectors, sniffers. The intelligence discipline is scientific and technical intelligence obtained by quantitative and qualitative analysis of data derived from specific technical sensors for the purpose of identifying any distinctive features associated with the target, source, emitter, or sender. acoustic and seismic sensors to detect motion-they're being used in Afghanistan -- Refers to weapons capabilities and industrial activities. Foreign Instrument Intel (FISINT) and Electronic Intel (ELINT) are both major contributors to this branch of intelligence.-Advantages: Extremely useful for issues such as proliferation, can be done remotely-Disadvantages: Expensive, little understood by most users, requires a great deal of P&E

Human Intelligence (HUMINT)

Espionage (spying). Largely involves sending covert service officers to foreign countries to recruit spies (using humans as source information). A category of intelligence derived from information collected and provided by human sources. walk-ins, diplomatic reports, attache reports, law enforcement information, debriefings, clandestine intelligence reporting, case officers and assets. Debriefings; Source Operations; Interrogation Operations; Document and Media Exploitation. USE: to find intentions of leaders, contingency plans, blueprints, etc. GOOD: provides context, interpretation, comprehensive, flexibility... BAD: risky, denial and deception, time intensive, difficult in hard targets -Advantages: Offers insight into plans/intentions, really inexpensive -Disadvantages: Riskier in terms of lives (political fallout), requires more time to acquire and validate sources, problems of dangles, false feeds, double agents

National Security Directive 10/2 (1948)

Executive order that declares covert operations a responsibility of the CIA in threat of the Cold War. Establishes the Office of Policy Coordination (OPC), a new office of Special Projects.

All-Source Analysts

Have a more macro-orientation (general). -the goal of the IC is to create all-source intelligence -intel. based on as many collection sources as possible to compensate for the shortcomings of each and profit from their combined strength

Walk-ins

Humint source volunteers. HUMINT sources who volunteer but it raises a lot of questions: Why have they volunteered? Do they really have access to valuable intelligence? Are they real volunteers or a means of entrapment (called dangles)? Dangles can be used to identify hostile intelligence personnel or gaining insights into the intelligence requirements or methods of a hostile service

case officer

Intelligence officer who supervises an agent/ foreign asset. Utilizes tradecraft to gather information via HUMINT

KGB

Komitet Gosudarstvennoi Bezopasnosti (Committee of State Security) (Russia)

Earmarks

Legislative provisions directing funds to be spent on specific projects.

NIO

National Intelligence Officer

NIPF

National Intelligence Priorities Framework

NIP

National Intelligence Program

Denial and deception

Possibility in collection: HUMINT-- assets who lie or exaggerate, like CURVEBALL. SIGINT or Imagery-- moving equipment. etc.

Presidential Finding

Presidential approval of a covert action that is required before it is carried out.A document the president must sign a covert operation, based on a president's findings that covert action is necessary to support identifiable foreign policy objectives of the United States, and is important to the national security of the United States

Key Judgements (KJs)

Primary findings of an overall intelligence estimate that can be used as a justification for action or inaction. Key Judgments come with intelligence estimates created for policy makers: the IC's opinion of what is most likely -Example: IC's key judgements about the Iraq WMD crisis were published in an unclassified form, adding fuel to the political fire

Content Analysis

Reading intercepted communications and analyzing what they mean. A main pillar of signals intelligence → often called COMINT to refer to communication intercepts. Tracking these communications also gives a good indication and warning. Reading messages and analyzing what they mean. SIGINT: reading messages and analyzing what they mean

5 eyes

Refers to an intelligence alliance comprising the United States, Britain, Australia, Canada, and New Zealand. This was a secret agreement which was disclosed to the public in the late 1990s and has since expanded after the World Trade Center attacks. Documents leaked by Edward Snowden revealed that "Five Eyes" have been spying on one another's citizens and sharing collected information with each other in order to circumvent restrictive domestic regulations on the surveillance of citizens.

MI6

Secret Intelligence Service (Britain)

Analyst Agility

The ability of analysts to shift from one area of expertise to another during times of need. The need for analysts who have more than one (or two) areas of expertise and therefore can be shifted to higher priority accounts during times of need

Oversight

The ability to control information. The responsibility of the executive and legislative powers to oversee intelligence.

DHS Office of Intelligence and Analysis (OIA)

The intelligence arm of the Department of Homeland Security which focuses primarily on homeland threats. They collect and analyze information and share intelligence with local and federal law enforcement through the use of fusion centers. It's current Under Secretary is Francis Taylor.

Cyber Operational Preparations of The Environment

To cover military activities that intrude into adversary systems in advance of offensive operations

Wheat Versus Chaff

US technical collection is more like a vacuum than a microscope-collectors sweep up a great deal of information, within which may be the info that is sought + In order to produce intelligence, you have to separate the intelligence from the overflow of information received daily (separate the wheat, or the meaningful information, from the chaff, or the collective pile of information) + Noise vs. Signals - How to extract desired intelligence form a huge load of information

Intelligence Disciplines

Well-defined areas of intelligence planning, collection, processing, exploitation, analysis and production, and dissemination using a specific category of technical or human resources.

Capabilities versus Intentions

Whether intentions actually matter as opposed to immediate capabilities. Whether the capabilities of the Soviet Union is important when the United States knows the intentions of the Soviets

Office of Intelligence and Analysis

Within the DHS, the ___ of ___ and ___ is responsible for using information and intelligence from multiple sources to identify and assess current and future threats.

TECHELINT

___ is concerned with the technical aspects of foreign noncommunications emitters such as signal characteristics, modes, functions, associations, capabilities, limitations, vulnerabilities, and technology levels.

Covert vs. Clandestine

______ is when the act is obvious, but not who did it (plausible deniability.) _____ is when you don't even know the act occurred (meetings with assets).

President's Daily Brief (PDB)

a top secret document produced and given each morning to the President of the United States. Producing and presenting the brief is the responsibility of the Director of National Intelligence.Daily intelligence brief delivered to the president, primary function of the DNI

National Intelligence

all intelligence is now defined as national intelligence which has three subsets (foreign, domestic, and homeland security) -Didn't appear in the US until 1940. Foreign, domestic, and homeland security

Budget Appropriations

allocating specific dollar amounts to authorized programs -the defense subcommittees of the house and senate appropriations committee

Risk Versus Take/gain

an issue that arises in SIGINT and COMINT: the need to consider the value of the intelligence that is going to be collected (the take) against the risk of discovery.Need to consider the value of the intelligence that is going to be collected (the take) against the risk of discovery - either in political terms or in the collection technology that may then be revealed to another nation. The need to consider the value of the intelligence collected against the risk of discovery

Budget Authorization

approving specific programs or activities. Authorizing committees also suggest dollar amounts for each activity -House Permanent Select Committee on Intel., Senate Select Committee on Intel

Department of Homeland Security (DHS)

mandate to reduce US vulnerability to terrorism and to detect, prevent, and respond to terrorist attacks. responsible for reducing US vulnerability to terrorism and to detect, prevent, and respond to terrorist attacks

Department of Energy (DOE)

oversees and protects vital national security capabilities ranging from nuclear weapons to energy research and developmental projects.

Deception

the target can use knowledge about the collection capabilities of an opponent to deliberately transmit information to a collector. When one side tries to trick the other into believing something as a fact when in reality it is false. When targeted nations use knowledge of collection capabilities to transmit information to that opponent


संबंधित स्टडी सेट्स

Cognitive Psychology- Ch. 6 Practice Questions

View Set

APUSH Learning Curve: Chapter 16

View Set

Cialdini's Negative-state Relief Model

View Set

Ch 4 Policies and Procedures - Quiz

View Set