Exam 1
Feedback
(doesn't occur as much as it should)giving feedback on consumed intelligence
Purpose of intelligence
- avoid strategic surprise - support policy process -maintain secrecy of info, needs, and methods - provide long term expertise
subsets of foreign intelligence
- foreign -domestic -homeland security
two different drone strikes
1. "high-value targets" 2. "signature strikes"
different classifications
1. Confidential 2. Secret 3. Top Secret
Whistleblower Protection Act
1989 law that protects federal employees from being punished for reporting government/agency misconduct (employees can report shady things in the IC and not be punished)
Groupthink
A situation in which group members seek unanimous agreement despite their individual doubts
Steganography
A technology that makes it possible to embed hidden information in documents, pictures, and music files
Quantum Cryptography
A type of asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys.
Supplementals
A way to take care of agreed on needs without making long term budget commitments (must be approved by congress first)
Budget execution authority
Ability to determine the actual spending of dollars versus the allocation of money to agencies
Joint Terrorism Task Force (JTTF)
An FBI-sponsored group composed of federal, state, and local law enforcement personnel who are brought together to focus on a specific threat.
Covert Action
An activity or activities of the United States Government to influence political, economic or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly
Non-Official Cover
Avoids overt connection between the officer and his/her government
Five Eyes
Group with common heritage that share intel with eachother (U.S., BRITAIN, AUSTRALIA, CANADA, AND NEW ZEALAND)
walk-ins
HUMINT sources that voulunteer info
ISR
INTELLIGENCE, SURVEILLANCE, & RECONNAISSANCE
sources and methods
Identifying information on who is reporting intelligence and how it is being collected. (This is often some of the most sensitive information involved in intelligence operations.)
Politicized Intelligence
If intelligence officers have a strong preference for a specific policy outcome, their intelligence analysis may display a similar bias.
industrial espionage
Industrial spying to obtain secrets about manufacturing methods.
Analysis and Production
Integration and evaluation of finished intelligence products into an actionable format, prepared to be briefed to people in power (done by analysts to produce real intel)
Monitoring
Keeping track of a target behavior that is to be regulated.
Maskirovka
Masking, camouflaging, or deceiving (russians would do this to mask what was going on in the Russian state)
Unifying Intelligence Strategies (UIS)
NIMS annually must add to his or her portolofis to integrate relevant collection and analysis
National Technical Means
NTM- variety of satellites & other technical collectors by both parties to collect needed intel
national intelligence priorities framework (NIPF)
Primary mechanism to establish, disestablish, manage, and communicate national intelligence priorities (provides another means by which to assess performance beyond setting priorities)
Full Motion Video (FMV)
Refers to both the long-duration, close-in video that can be collected by UAV's and to the capabilities designed to derive as much intelligence as possible from this video
Principals Committee
Senior policy coordinating body of NSC structure
Machine Learning
Technique for making a computer produce better results by learning from past experiences. (having computers learn what humans can do)
Reagan Doctrine
The Reagan administration's commitment to ending communism by providing military assistance to anti-communist groups
Collection Disciplines
The means of collecting intelligence (INTs)
Blowback
The propensity for actions undertaken for national security to have the unintended consequence of provoking retaliatory attacks when relations later sour.
Global Coverage
This means that intelligence officers acknowledge their requirements to cover any and all issues or areas.
"third-party rule"
a nation receiving foreign liaison intel will not share with a 3rd party without permission
sun-synchronous orbit
a satellites that are moving with Earth's orbit so they can always be with daylight (better for commercial satellites than for national imagery satellites)
denial
a targeted nation can use knowledge about the collection capabilities of an oppnenent to avoid collection
"geofence"
a virtual barrier to prevent drone fligts within a certain area via GPS, radio frequencies, or other technologies
Foreign Liaison
allied or friendly services
Potemkin village
an impressive facade or show designed to hide an undesirable fact or condition
analytic penetration
an intellectual means of trying to overcome a lack of intelligence sources
premature closure
analysts can fasten on to one line of analysis especially for issues that are examined and reexamined over the years and ten will not be open to other possible hypothesis or alternatives
analytical stovepipes
analysts from multiple agencies working on the same hot topic independently due to lack of communcation between agencies
analyst bias
analysts opinions (they need to over come them and be objective)
third option
another option instead of doing nothing (1st) and sending in military (2nd)
mirror imaging
assumes that other leaders, states, and groups share motivations or goals similar to those most familiar to the analyst
Mirror Imaging
assuming that other states or individuals will act just the way a particular country or person does (undermines analysis)
confidence levels
based on the scope and quality of information supporting our judgements
multi-int
bringing together different types of technical collection, most often imagery and signals
denied areas
closed societies or closed areas
intelligence
collection of information for protection
analytically driven collection
collectors act in response to analytic needs and not more independently or opportunistically (ideal state)
wheat versus chaff
collectors sweep up a great deal of information, within which may be the intelligence being sought
chatter
communications and movements of known or suspected terrorists
Processing and Exploitation
conversion of collected information into forms suitable to the analysis and production of intelligence
cyber operational preparation of the environment (cyber OPE)
covers military activities that intrude into adversary systems in advance of offensive operations
plausible deniability
covert operations should be conducted in such a way, and decisions that launched them concealed so well that the president could deny any knowledge of them
identifying requirments
defining those policy issues or areas to which intelligence is expected to make a contribution as well as decisions about which of these issues take priorities over others
deep fakes
digitally altered audio and video clips that are hard to tell when altered
dissemintation
distributing intelligence
crosswalks
efforts to coordinate programs and to make difficult choices between programs- are major facets of the budget process (between DNI and DOD)
national intelligence managers (NIMS)
ensure a balanced focus on priority intel missions by overseeing both collection and analysis on a given issue (they facilitate analysis but dont conduct it)
Link Analysis
establishing connections between various people to get a sense of their broader social networks
disinformation
false information purposely disseminated, usually by a government, for the purpose of creating a false impression
clientism
flaw that occurs when analysts become so immersed in their subjects that they lose their ability to view issues with the necessary criticality
zero-day vulnerabilities
flaws in hardware or software that can be exploited by by an attacker
FINIT
follows the money
National Intelligence
foreign, domestic, homeland security (all intelligence is national intelligence)
Indications and Warnings
giving policy makers advance warning of significant, usually military, events
footnote wars
goal is to maintain a separate POV regardless of the salience of the issue at stake; opposite of groupthink
Competitive Analysis
having analysts in several agencies with different backgrounds work on the same issue (an antidite to groupthink)
consumption
how policy makers interpret intel (each policy maker is not a blank slate)
sleppers
inserted into a target country to spend time integrating themselves
activity-based intelligence
intel collection based on observed behavoirs
All-Source Intelligence
intelligence based on as many collection sources as possible to compensate for the shortcomings of each and to profit from their combined strength (CIA, State dept etc.)
bean counting
intelligence products that tally up the number of forces, equipment, and manpower in foreign militaries
oppurtunity analysis
intelligence that helps advance my agenda that makes me the actor not the reactor
priority creep
issues moving up and down in a priority system (issues tend not to get attention unless it is raised to the top of the priority sytem major problem)
memo of notification (MON)
letting the house and senate intel committees know what is going on
negation search
looking at past imagery to determine when an activity commenced
Deputies Committee
made up of the deputies of the PC members and has a similar function, working on issues before the PC considers them
"about" collection
messages taken from the internet that may not be going to or from a specific target but contain key selectors
Traffic Analysis
monitoring changes in communications
tyranny of the ad hocs
not every ad hoc merits higher priorities (a system that responds to every ad hoc soon has little control over priorities and quickly breaks down)
single-source analysts
one source, not diverse (analysts must go through a lot of material and find the intel that is really needed)
cryptographer
one who decodes secret messages
plumbing
operational support structure- prearranged meeting places, surveillance agents, letter drops, technical support
debris field
orbiting pieces destroy satellites
supply chain
organizations, people , resources, information and activities required to move products or services from the producer to the consumer
Presidential Finding
president signs order approving covert operation
Agent Acquisition Cycle
process of managing spies
collection
producing intelligence just not finished intelligence (collected intel has to undergo P&E)
ECHELON
program that searches through collection using key words via computer
Medium Earth Orbit (MEO)
range between LEO and GEO
content analysis
reading messages and analyzing what they mean
"self-reveal"
regarding how many targets make themselves known via imagery
self-reveal
regarding how many targets make themselves known via imagery
HEO Highly Elliptical Earth Orbit
satellite follows an elliptical orbit, Used by the military for spying and by scientific organizations for photographing celestial bodies
geosynchronous orbit (GEO)
satellites that stay in the exact same spot over the earth
spies
secret agents who obtain information about an enemy
Decision Advantage
seeks to provide policy makers with intelligence that will give them an advantage over adversaries, allowing them to act with greater confidence and greater likelihood of success
unattended ground sensor (UGSs)
sensors to detect motion
noise versus signals
signals one wishes to receive and to know are often embedded in a great deal of surrounding noise
Policy of Containment
soviet union: if the us did nothing about communism the state would fail
Failed states
states in which the central government has lost authority and resorts to deadly force to retain power
downstream activities
steps that follow collection
worst-case analysis
strategy of decision-making that assumes one will face the worst possible situation imaginable and then makes policy based on that assumption
computer network explotation
taking over the network of a person
denied targets
target areas to which one does not have ready access
Verification
the ability to discover whether treaty obligations were being bet (ABM Treaty and SALT I accord)
dissemination
the act of spreading widely (presidents daily brief, national intelligence estimate etc.)
espionage
the act of spying
Official Cover
the agent holds another government job usually posted at the embassy
foreign economic espionage
the collection of foreign economic intelligence by other nations
Information Operations (IO)
the integrated employment of three operational elements: influence operations (IFO), electronic warfare operations, and network warfare operations.
Resolution
the level of detail provided by imagery
Analyst Fungibility/Analyst Agility
the need for analysts to have more than one or 2 areas of expertise (then can be shifted to higher priority accounts during a time of need)
risk versus take
the need to consider the value of the intelligence that is going to be collected against the risk of discovery
Internet of Things (IoT)
the network of products embedded with connectivity-enabled electronics
intentions
the plans and goals of the adversary
renditions
the seizure of individuals wanted by the US
deception
the target can use the same knowledge to transmit info to a collector this info can be true or false
Enhanced Interrogation Techniques
the techniques used to interrogate terrorists (very controversial)
swarm ball
the tendency of all collectors or collection agencies to collect on an issue that is deemed to be important, whether or not they bring anything useful to the table or can offer an appropriate type of collection
Bioterrorism
the use of biological and chemical weapons in terrorist attacks
Layering
the use of judgments or assumptions made in one analysis as the factual basis for judgments in another analysis without also carrying over the uncertainties that may be involved
Battle Damage Assessment (BDA)
timely and accurate estimate of damage resulting from the application of military force, either lethal or nonlethal, against a predetermined objective
encrypt
to put into code
indication and warning
tracking communication helps us understand what may happen next
"unmasking"
uncovering someone to better understand what happened + get more info
ad hocs
unexpected issues inevitably crop up with little or no warning and priority rises
low eath orbit (leo)
used by imagery satellites to see a more detailed view of the Earth
all-source analysts
using as many sources as possible to compensate for the short comings of each one (what the US intel community wants to be producing)
automatic change extraction
using computers to do a negation search
anti-satellite weapons (ASATs)
weapons that take down satellites
Echo or Circular Reporting
when a story appears more important than it is bc multiple news sources pick it up
Key Judgements
when intel community produces an estimate on the likely course of events & possible indications of success or failure
shutter control
when the US limits commercial satellite functioning for national security reasons