¿?¿?¿?¿?¿?FINAL
National Technical Means
-Nixon's SALT I treaty (1972) recognized and legitimized the use of national technical means (satellites and other technical collectors) by both parties to collect needed intel. Satellites and other technical collectors (used to verify adherence)
Opportunity Analysis
-intelligence should make policy makers the actors, not the reactors. it should also help policy makers advance their agenda **Intelligence analysis that helps the policy maker advance an agenda and be the actor (not the reactor).Intelligence that helps to advance the agenda of policy makers, and makes them the actor rather than reactor.
Reconnaissance
A mission to acquire information on a target
Wiretapping
A passive attack that eavesdrops on communications, only legal with prior consent or warrant
AIDS
Acquired Immune Deficiency Syndrome
ABI
Activity-based intelligence
AGI
Advanced Geospatial Intelligence
Assessments
Analytical reports. The same as estimates, but this is what they're called in Australia and Britain
ASAT
Anti-Satellite
Chronology 1972
Anti-ballistic missile treaty (ABM treaty) and (Strategic Arms and Limitations Talks) SALT I Accord
Appropriated but not Authorized
Appropriators vote money for programs or activities that haven't been authorized. Giving money to a budget program that has not been authorized.
Authorization
Approving specific programs and activities. Consists of approving specific programs and activities and suggesting dollar amounts for programs
ASIO
Australian Secret Intelligence Organization
ASIS
Australian Secret Intelligence Service
Activity Based Intelligence (ABD)/ Pattern of Life
Based on observed behaviors that are more likely to indicate that an activity of interest is taking place in a general location
Confidence Levels
Based on the scope and quality of information supporting an analysts' judgements. The confidence an analyst has in their judgments. The issue of the confidence that an analyst has in their judgements -HIGH: high quality information, solid judgement possible -MEDIUM: credible information, multiple possible interpretations -LOW: scant or questionable information leading to difficulties in creating analysis
BW
Biological Weapons
CIARDS
CIA Retirement and Disability System
CSIS
Canada's Security Intelligence Service
CISEN
Center for Investigation and National Security (Mexico)
Cryptographers
Code Breaking (the message isn't hidden)
Encrypt
Coding of communications
INTs
Collection disciplines (HUMINT, IMINT, MASINT, OSINT, SIGINT)
Information Operations
Conflict in cyberspace
DOE
Department of Energy
DHS
Department of Homeland Security
Crosswalks
Efforts between DoD and DNI to coordinate the national intelligence budget decisions
FARC
Fuerzas Armadas de Columbia (Columbia)
GDP
Gross Domestic Product
GNP
Gross National Product
HSI
Hyperspectral imagery
IR
Infrared Imagery
IRGC
Iranian Revolutionary Guard Corps
ISG
Iraq Survey Group
CURVEBALL
Iraq defector who fabricated stories about Iraq WMDs that the CIA received from German Intelligence in 2003, big evidence supporting invasion of Iraq
IRA
Irish Republican Army
Priority Creep
Issues can and do move up and down in a priority system but a priority creep can occur when issues customarily do not receive significant attention until after they have begun moving up to the higher priority levels, at which point they must compete with the issues already in that bracket. When issues move up/down a priority system
OSC
Open Source Center
Processing and Exploitation
Process that produces intelligence from information
P&E
Processing and Exploitation
PHIA
Professional Head of Intelligence Analysis (Britain)
Technical intelligence
SIGINT, MASINT, imagery. GOOD: Information on "hard targets," precise, safe. BAD: costly, limits of tech., ethical risks of wiretapping, context, deception. (TECHINT) - Derived from the exploitation of foreign materiel and scientific information.
2001
The Coast Guard became a member of the IC in ___.
480 ISRW
The ___ ___, with headquarters at Langley Air Force Base, VA, is the Air Force leader in globally networked ISR operations.
Paramilitary Operations
The equipping and training of large armed groups for an assault on one's enemies.The largest, most violent, most dangerous covert actions involving the equipping and training of large armed groups for a direct assault on one's enemies
Francis Gary Powers
Who was the U-2 spy pilot that caused a crisis when he was captured by the Soviets after being shot down over Soviet territory?
WIRe
Worldwide Intelligence Review
Risk Versus Take
an issue that arises in SIGINT and COMINT: the need to consider the value of the intelligence that is going to be collected (the take) against the risk of discovery.Need to consider the value of the intelligence that is going to be collected (the take) against the risk of discovery - either in political terms or in the collection technology that may then be revealed to another nation
Department of the Treasury (DOT)
analyzes foreign intelligence related to economic policy and participates with Department of State in the overt collection of general foreign economic information.
Deception
the target can use knowledge about the collection capabilities of an opponent to deliberately transmit information to a collector. When one side tries to trick the other into believing something as a fact when in reality it is false. When targeted nations use knowledge of collection capabilities to transmit information to that opponent
Potemkin Villages
villages built that were facades to impress Catherine the Great.Villages that presaged maskirovka
Current Intelligence
"pays the rent for the IC", always predominates over other types (especially during war), Reports and analysis on issues that may not extend more than a week or two into the future. During a crisis or war, current intelligence increases, as many of the decisions made during these periods are tactical in nature - even among senior policymakers - thus demanding current intelligence.
Steps of the Intelligence Process
(1) Identifying Requirements (2) Collection (3) Processing and Exploitation (4) Analysis and Production (5) Dissemination and Consumption
Agent Acquisition Cycle
(1)Identifying Targets- that have access to desired information: Identify a potential asset. Targeting and spotting (2) Asset Validation System- to access susceptibility to recruitment: Gain their confidence, assess weaknesses and susceptibility to be recruited (asset validation system). Assessing (done via the Asset Validation System)-(3) Recruiting Via Pitch- offering relationship: Recruitment make the pitch (a source may accept a pitch for a variety of reasons)(4) Handling: managing the asset (5) Termination: ending relationship with the asset. source is no longer needed
Chronology 2001
-9/11 attack-Patriot Act created; allows greater latitude regarding domestic intelligence gathering
Chronology 1989-1991
-Failure to force soviet collapse (intelligence failure; minimize d soviet threat)
The intelligence cycle
1. Planning and Direction 2. Collection 3. Processing 4. Analysis and Production 5. Dissemination
Reagan Doctrine
A United Sates effort to aid anti-soviet guerrillas
Surveillance
A systematic observation of a target over time
Supplementals
A way to take care of agreed on needs without making long term budget commitments
The Year of Intelligence (1975)
Began with Hersh's article. Hughes-Ryan Amendment, Church Committee, congressional oversight,
BfV
Bundesamt für Verfassungsschutz (Federal Office for the Protection of the Constitution) (Germany)
CIG
Central Intelligence Group
CMC
Central Military Commission (China)
CEO
Chief Executive Officer
COO
Chief Operating Officer
COS
Chief of Station
Keyword Search
Collected data are fed into computers that look for specific words or phrases and the words are used as indicators of the likely value of an intercept
COCOM
Combatant Command
CRS
Congressional Research Service
DCRI
Direction Centrale du Renseignment Intérieur (France)
DGSE
Directoire Générale de la Sécurité Extérieure (General Directorate for External Security) (France)
EO Data
Emitted or reflected energy across the visible/IR portion of the electromagnetic spectrum.
National Security Directive 5412/2 (1955)
Executive order that adds oversight to previous directive allowing CIA to take charge of covert operations, such as special committee of White House, State, and Defense Officials. Restates that ends justify the means, and sets out parameters of covert ops.
FISA
Foreign Intelligence Surveillance Act
FMV
Full Motion Video
House Intelligence Committee
Has exclusive jurisdiction over the entire National Intelligence Program (NIP) and shares jurisdiction over the Military Intelligence Program (MIP) with Armed Services Committee. The current chairman is Devin Nunes (R-CA)
HEO
Highly Elliptical Orbit
IG
Inspector General
IC
Intelligence Community
MON
Memo of Notification
NFIP
National Foreign Intelligence Program
NGA
National Geospatial-Intelligence Agency
NIMA
National Imagery and Mapping Agency
NOC
Nonofficial Cover
NATO
North Atlantic Treaty Organization
Gang of 4
Only briefing the leaders of the congressional intelligence communities
Geospatial Intelligence Targeteer
Personnell assigned to this specialty make recommendations on the appropriate form required to disable an adversary's targeting system.
SAC
Special Agent in Charge; Strategic Air Command
SAS
Special Air Service (Britain)
SBS
Special Boat Service (Britain)
SNIE
Special National Intelligence Estimate
SOCOM
Special Operations Command
SPA
Special Political Action
SALT
Strategic Arms Limitation Talks
START
Strategic Arms Reduction Treaty
SDI
Strategic Defense Initiative
STRATCOM
Strategic Forces Command
SMO
Support to Military Operations
Intelligence Activity (MCIA)
The Marine Corps' ___ is the Marine Corps' SCC.
Combat Support
The NGA is a DOD ___ ____ Agency and fields support teams worldwide.
Fleet Cyber Command (FLTCYBERCOM)
The Navy's ___ provides guidance to cryptologic activities tasked by both Navy and NSA/CSS.
Risk vs. Task
The need to consider the value of the intelligence collected against the risk of discovery
Layering
The use of judgements or assumptions in one's analysis as the factual basis for judgements in another analysis without also carrying over the uncertainties that may be involved. Use of judgments or assumptions made in one analysis as the factual basis for judgments in another analysis without also covering over the uncertainties that may be involved.
Indication and Warning
The use of traffic analysis to provide indication of image imminent danger and the ability to warn consumers and plan ahead
32
Title ___ outlines the role of the US National Guard.
UIS
Unifying Intelligence Strategies
VolP
Voice-over-internet Protocol
Source
When a target accepts a pitch
Collection Synergy
When on means of collection provides tips to guide collection via other means
The CIA "Family Jewels"
exposed by Seymour Hersh in New York Times in 1974, reported that the CIA and FBI had spied on Americans for years and gotten involved in "dirty tricks." Shocked the public.
Failed States
no longer deemed legitimate by its people, faltering economy, fictionalization of population, displacement of population, or suspension of basic rights. There has been a breakdown of legitimacy of the government and the ability go the government to maintain a level of control over its own territory
Collection
produces information not intelligence
Air Force Targeting Center (AFTC)
subordinate to Air Combat Command and resides on Joint Base Langley-Eustis, VA. produces and delivers timely, tailored targeting and geospatial intelligence and conducts precise Point Positioning and CDE
Monitoring
-monitoring, or keeping track of soviet activities, had been underway since the inception of the IC -Looking at someone's activities, but not making judgements based on them. Means for verification
Hughes-Ryan Amendment (1974)
1974. Required the president to report (issue a "finding") all covert operations of the CIA to one or more Congressional committees within a set time limit.
Lifestyle Polygraph
A category of polygraph exam that focuses on personal behavior
Bean Counting
A somewhat pejorative term that refers to intelligence products that tally up the number of forces, equipment, and man-power in the foreign militaries.Tracking military inventories
Aman
Agaf ha-Modi'in (Israel Military Intelligence)
ARC
Analytic Resources Catalog
ADDNI
Assistant Deputy Director of National Intelligence
Mirror Imaging
Assuming other states or people will act just the way a particular country or person does. Assumes a certain level of shared rationality. Assuming that other leaders, states, and groups share motivations or goals similar to those most familiar to the analyst. Assuming others will act like you would act. -can undermine analysis -these judgements stem from societal norms, rules, etiquette, experience -i.e. Japan starting a war with the US in 1941--made no sense to us
Non official Cover
Avoids any overt connection between the officer and their government but can make it more difficult to keep in contact - they need a full-time job that explains their presence. When a humint officer holds another non-governmental job to hide their humint job
BND
Bundesnachrichtendienst (Germany)
CDA
Congressionally Directed Action
COI
Coordinator of Information
Chronology 1962
Cuban Missile Crisis -Intelligence Failure: didn't foresee missiles being posted -Intelligence Success: Sae missiles before completely installed
DCS
Defense Clandestine Service
DMZ
Demilitarized Zone
DRM
Directoire du Renseignement Militaire (Directorate of Military Intelligence) (France)
FSB
Federal'naya Sluzba Besnopasnoti (Federal Security Service) (Russia)
FAPSI
Feralnoe Agenstvo Pravitelstvennoi Svyazi I Informatsii (Federal Agency for Government Communications and Infromation) (Russia)
U.S. Army's Intelligence and Security Command (INSCOM)
Founded in 1977, INSCOM focuses on signals intelligence (SIGINT) and provides commanders on the ground with information they may need on the battlefield - intercepted radio communications, maps, ground imagery, and information on force structure and numbers. It's Deputy Chief of Staff is Lt. Gen. Mary Legere.
Feedback
From policy consumers to intelligence producers regarding the degree to which intelligence producers are used
HSINT
Homeland Security Intelligence
Electronic Intelligence (ELINT)
Intelligence derived from the interception and analysis of noncommunications emitters (e.g., radar).
case officer
Intelligence officer who supervises an agent/ foreign asset. Utilizes tradecraft to gather information via HUMINT
NSAG; NSAT; NSAH; NSAC
List the four primary cryptologic centers.
Full-Motion Video
Long duration/ close-in videos
MSI
Multispectral Imagery
MAD
Mutual Assured Destruction
ORCON
Originator Controlled
OCO
Overseas Contingency Operations
Analysis and Production Analyst
Personnel assigned to this specialty perform detailed analysis on target network communications for additional exploitation.
PHOTINT
Photo Intelligence
Intentions
Plans and goals of an adversary
PDB
President's Daily Brief
PC
Principles Committee (NSC)
Stovepipes Problem
Raw intel presented without proper context, data often not easily shared outside of the agency using it.
Movement and Signatures Intelligence (MASINT)
Refers to weapons capabilities and industrial activities. Foreign Instrument Intel (FISINT) and Electronic Intel (ELINT) are both major contributors to this branch of intelligence. -Advantages: Extremely useful for issues such as proliferation, can be done remotely -Disadvantages: Expensive, little understood by most users, requires a great deal of P&E
DCGS (Distributed Common Ground System)
Regionally focused, globally linked, the AF ___ is the cornerstone of successful Air Force, joint, and coalition ISR operations
SIOP
Select Intelligence Oversight Panel
SGAC
Senate Governmental Affairs Committee
SSCI
Senate Select Committee on Intelligence
SCIFs
Sensitive Compartmented Information Facilities
Unattended Ground Sensors (UAG)
Sensors disguised to blend with their surroundings and can be linked into a network
Chronology 1957
Soviet Union led race to space (Sputnik Satellite)
SBSS
Space-based Surveillance Satellite
Analysis and Production
Subject matter experts (SMEs) turn the intelligence into reports that respond to the needs of policy makers.
SAM
Surface-to-air Missile
TIARA
Tactical Intelligence and Related Activities
TacSat
Tactical Satellite
TUAVs
Tactical Unmanned Aerial Vehicles
Anti-Satellite (ASAT)
Target areas to which one does not have ready access -collection satellites are national assets and thus targets -the US and the USSR tested ASATs and there were efforts to negotiate anti-ASAT treaties
TPEDs
Tasking, Processing, Exploitation, and Dissemination
16; 8; 8
The IC consists of __ agencies with __ members from the DOD and __ non-DOD members.
Industrial Espionage
The collection of industrial economic intelligence
Computer Network Attacks
There may be reopens to bring down the network, to disrupt command, and control vital services within the target nation
18
Title ___ outlines crimes and criminal procedures, and the roles of law enforcement within the United States.
Intelligence derived from the interception and analysis of non-communications.
What is ELINT?
Provide the ability to understand the secret communications of our foreign adversaries while protecting our own communications.
What is the NSA's mission?
Support SIGINT activities and operations by monitoring and collecting non-communications electronic signal transmissions using passive receiving equipment.
What is the responsibliity of the 1N2X1A career field?
Tradecraft
methods and tools used by CIA officers in collection (preventing exposure of them and their assets) and analyzation (denial or deception present? biases?)
Responsibility to Provide
(2007) DNI Mike McConnell signaled a change in intelligence standard-officers and agencies now would be evaluated by the degree to which they actively seek to share intelligence
DNI-CIA (relationship)
- Rival for access to the president - CIA has control over all source/HUMINT/Intel operations/ for liason -However, a tension exists between the two for control over HUMINT and covert action
DNI-Secretary of State (relationship)
-Both heads coordinate proposed intelligence operations with foreign policy goals -Sometimes, DNI will use the State Department as official cover for clandestine officers
Chronology 1940-1941
-Coordinator of Office (COI) -Office of Strategic Services (OSS) -Pearl Harbor
DNI-Congress (relationship)
-DNI is overseen by Congress which makes budget and funding decisions -Congress helps shape the public perception of intelligence and supports secrecy -Senate Intel Committee has exclusive authority to confirm nominations for the DNI and CIA Director -House Intel Committee has exclusive jurisdiction over the entire National Intelligence Program (NIP)
DNI-DOD (relationship)
-Secretary of Defense controls most of the intelligence community more than DNI because he oversees the NSA, DIA, NGA, and all service intelligence agencies (he can also stymie DNI goals if the relationship is poor)
Seven Phases of The Intelligence Process
1) Identification Requirements 2) Collection 3) Processing and Exploitation 4) Analysis and Production 5) Dissemination 6) Consumption 7) Feedback
Polygraph
A lie detector test that uses you heart rate o determine if you are telling the truth
Imagery
A likeness or representation of any natural or manmade feature, related object or activity, and the positional data acquired at the time the likeness or representation was acquired.
Executive Orders
A presidential policy directive that implements or interprets a federal statute, a constitutional provision, or a treaty. Can be a source of intelligence action
Global Coverage
Acknowledged requirement of the intelligence community to cover any and all issues. Can be a dangerous and misleading term: officers mean their acknowledged requirement to cover any and all issues. Can be misinterpreted as promising more than they can deliver (they can be knowledgeable, but not experts, on everything). Intelligence officers meet their acknowledged requirement to cover any and all issues. The acknowledged requirement to cover any and all issues.
Analysts
All intelligence professionals are considered to be ___.
ACH
Alternative Competing Hypothesis
Single-Source Analysts
Are collection analysts who wade through material from a specific venue (specialty)
AOR
Area of Responsibility
Scientific and Technical Intelligence (S&TI)
At the strategic level, the exploitation and interpretation of foreign weapon systems, materiel, and technologies is referred to as ___ ___ ___ ___.
Multiple Intelligence
Brings together different types of technical collection. not all-source, but multi source -bringing together different types of technical collection (usually imagery and signals), which are powerful when fused
INR
Bureau of Intelligence and Research (Department of State)Secretary of State (relationship) - - Relationship impacts ability to get things done/very variable
CNA
Computer Network Attack
CNE
Computer Network Exploitation
Chatter
Coms and movements of known or suspected terrorists
DS&T
Directorate of Science and Technology (CIA)
Link Analysis
Establishing connections between various people to get a sense of their broader social networks
Politicization
Examples: McCarthyism, Bush Administration pressure on George Tenet. When agendas get in the way of the mission of the agency
Attribution
For large scale nation-state attack, this would be relatively easy as the cyber attack would not likely come in isolation from a deterioration in relation or other actions
FBIS
Foreign Broadcast Information Service
FCIP
Foreign Counterintelligence Program (DOD)
FISC
Foreign Intelligence Surveillance Court
FIA
Future Imagery Architecture
HSIP
Homeland Security Intelligence Program
IRTPA
Intelligence Reform and Terrorism Prevention Act
JIO
Joint Intelligence Organisation (Britain)
JMIP
Joint Military Intelligence Program
JTAC
Joint Terrorism Analysis Center (Britain)
JTTF
Joint Terrorism Task Force
Collection Disciplines
Means of collecting intelligence
NTRO
National Technical Research Organization (India)
Tyranny of the Ad Hocs
Occurs when the intelligence community can't function as desired because of overburdening of ac hocs.When issues like ad hocs arise, some policy makers and intelligence officers exert pressure to give the new issue a priority high enough to compete with other high-priority issues
OMB
Office of Management and Budget
ONA
Office of National Assessments (Australia)
OSS
Office of Strategic Services
ODNI
Office of the Director of National Intelligence
OSD
Office of the Secretary of Defense
Responsibility to provide
Officers and agencies assessed by the degree to which they actively seek to share intelligence, as opposed to the need to know standard. Officers nd agencies who now would be evaluated by the degree to which they actively seek to share intelligence
PIAB
President's Intelligence Advisory Board
PIOB
President's Intelligence Oversight Board
QFR
Question for the Record
RG
Renseignements Généraux (France)
Shin Bet
Sherut ha-Bitachon ha-Klai (General Security Service) (Israel)
Highly Elliptical Orbit
Sits over the northern hemisphere; roughly 16 hrs a day over the northern hemisphere
SVR
Sluzhba Vneshnei Razvedki (External Intelligence Service) (Russia)
TELINT
Telemetry Intelligence
TOR
Terms of Reference
National Intelligence Priorities Framework
The broadest evaluation activity in the intelligence community that gauges how well intelligence means are linked to intelligence ends
Echo or Circular Reporting
The effect of a single media story being picked up and repeated by other media sources until the story is perceived as more important than it actually is. OSINT: the effect of a single media story being picked up and repeated by other media sources until the story appears more important than it actually is
Sub-Source
The sources that serve the primary source
50
Title ___ outlines the role of war and national defense.
Promoting understanding of threats through intelligence analysis; collecting information and intelligence pertinent to homeland security; sharing information necessary for action; and managing intelligence for the homeland security enterprise
What are the four strategic areas the Office of Intelligence and Analysis focuses on?
Signatures
___ are typically the products of multiple measurements collected over time and under varying circumstances.
OPELINT
___ is concerned with operationally relevant information such as the location, movement, employment, tactics, and activity of foreign noncommunications emitters and their associated weapon systems.
Analytic Penetration
an intellectual means for trying to overcome a dearth of intelligence sources. Thinking longer and harder about an issue. If an analysis is required and the sources are insufficient, there has to be a rigor applied to the analysis that attempts to make up for these missing sources
Compartmented System
an internal means of thwarting espionage attacks-employees don't get access to all intel: clearances are done on a "need to know" basis
National Air and Space Intelligence Center (NASIC)
with headquarters at Wright-Patterson Air Force Base, Ohio, is the primary DOD producer of foreign aerospace intelligence. The Air Force's main production
Foreign Intelligence and Surveillance Act
(1978) Part of Congresses push back to address the abuse of the Nixon Administration, this act prohibited domestic wiretapping without a warrant.
Decision Advantage
(2008) SNI Mike McConnell states that the IC's mission was to provide policymakers with "decision advantage": providing policymakers with Intel that will give them an advantage over adversaries, allowing them to act with more confidence and likelihood of success. Providing policymakers with intelligence that will give them an advantage over adversaries. seeks to provide policymakers with intelligence that will give them an advantage over adversaries, allowing them to act with greater confidence and a greater likelihood of success
CIA-FBI (relationship)
- Can be a very tense relationship at times - The war on terrorism has led to an expansion of legal attaches abroad meaning that the FBI is more capable of conducting overseas activity without informing the CIA - FBI currently wants to take over the recruitment of foreigners as agents because they think it is relevant to domestic intelligence gathering while the CIA disagrees
DNI-NCTC (relationship)
-NCTC Director has almost autonomous status -Therefore, a potential rivalry arises
Four Reasons For Intelligence Emphasis
-To avoid strategic surprise -To provide policy makers with long-term expertise -To support the policy process with objectivity and avoid politicized intelligence -To maintain secrecy of information, needs, and methods
Politicized Intelligence
-this occurs when an analysts has a strong preference for a specific policy outcomes.Altering intelligence in order to support a certain policy outcome. If an intelligence officer has a strong preference for a specific policy outcome, their intelligence analysis may display a similar bias
Church Committee
A precursor to the U.S. Senate Select Committee on Intelligence, the committee investigated intelligence gathering for illegality by the Central Intelligence Agency (CIA) and Federal Bureau of Investigation (FBI) after certain activities had been revealed by the Watergate affair. Led to further Congressional oversight such as SSCI, HPSCI, and FISA.
Sleepers
Agents inserted into the target country but spend time, sometimes years, integrating themselves and don't become active immediately. HUMINT: some officers are active as soon as they arrive at their station, sleepers are inserted into the target country but spent time integrating themselves and aren't active immediately.These are HUMINT agents inserted into the target country but spend time (even years) integrating themselves and do not become active immediately
Captured Documents and Media
All media capable of storing fixed information to include computer storage material.
Appropriation
Allocating specific dollar amounts to authorized programs. Consists of allocating specific dollar amounts to authorized programs
Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA)
Called for the most sweeping overhaul of the nation's intelligence-gathering apparatus; created Director of National Intelligence; put together 15 agencies under control of director; created National Counterterrorism Center. established the Office of the Director of National Intelligence (ODNI) to better unify and manage the efforts of the IC.
CCP
Consolidated Cryptographic Program
Capabilities
Current forces, or those being planned.
DCIA
Director of the Central Intelligence Agency
ExCom
Executive Committee
HPSCI
House Permanent Select Committee on Intelligence
4
How many Titles within the US Code should ISR professionals have a basic understanding?
Espionage
Human Intelligence- use of human spies. the practice of spying or of using spies, typically by governments to obtain political and military information.
HUMINT
Human Intelligence. intelligence discipline uses people to gain information
I&W
Indications and Warning
Five Eyes
Intelligence shared among the United States, Britain, Australia, Canada, and New Zealand
JCS
Joint Chiefs of Staff
Iran-Contra Affair
NSC and CIA secretly took covert action forbidden by Congress; sold weapons to Iran to get funding for weapons for Contras in Nicaragua. Unclear if/what Pres. Reagan knew. 1985-1987
NAB
National Assessment Bureau (New Zealand)
Nuclear Radiation Data
Nuclear radiation and physical phenomena associated with nuclear weapons, processes, materials, devices, or facilities.
Denied Areas
OSINT: the number of closed societies and denied areas has decreased dramatically since the cold war
Airborne Intelligence, Surveillance, and Reconnaissance (ISR) Operator
Personnel assigned to this specialty fly as primary aircrew onboard a wide variety of aircraft to operate, evaluate, and manage airborne ISR information and related ground processing systems.
Cryptologic Language Analyst
Personnel assigned to this specialty operate and manage communications equipment.
PCO
Privy Council Office (Canada)
INSCOM
Provides critical, multidiscipline intelligence, counterintelligence, and information warfare support to Army commanders at all echelons.
Doolittle Committee
Requested by Pres. Eisenhower; conveyed the national fear that the United States faced the prospect of annihilation at the hands of the Soviet Union: "It is now clear that we are facing an implacable enemy whose avowed objective is world domination by whatever means and at whatever cost," Doolittle wrote. "There are no rules in such a game... If the United States is to survive, long standing concepts of 'fair play' must be reconsidered."[1] Doolittle's forceful policy and language reflected the fear that motivated American citizens and policymakers in the wake of Soviet communism.
Intelligence Oversight Act of 1980
Required reporting of covert ops to just SSCI and HPSCI, so as not to jeopardize them. Accountability, supervision. From 1947, hardly existed. Church Committee investigations created SSCI and HPSCI, FISA, Hughes-Ryan Amendment, Oversight Act of 1980 and 1991
RAW
Research and Analysis Wing (India)
SRA
Systems and Research Analyses
August 16, 2000
The 70th ISRW, with headquarters at Fort George G. Meade, MD, was activated on ___ ___, ___.
2006
The DEA's Office of National Security Intelligence became a member of the IC in ___.
Gang of 8
The leaders of congressional intelligence communities and the highest ranking members of the intelligence committees
Damage Assessments
This determines what intelligence has been compromised (when a spy has been exposed)
Joint Publication (JP) 2-0, Joint Intelligence
This document defines intelligence sources as the means or systems that can be used to observe and record information relating to the condition, situation, or activities of a targeted location, organization, or individual.
Cyber Operational Preparations of The Environment
To cover military activities that intrude into adversary systems in advance of offensive operations
Counterespionage
countering penetration of your own service
Senate Intel Comm- Senate Armed Services Comm (relationship)
- Can be tense with the Armed Services Committee jealously guarding its oversight of all aspects of defense intelligence - If the Senate Intel Committee makes real or perceived efforts to step beyond its turf, Armed Services usually responds with punitive actions like delaying the annual intel budget authorization bill - Both committees resist the Senate Governmental Affairs Committee
CIA-DOD (relationship)
- Since military and intelligence roles in the war on terrorism are very blurred, this can lead to a rocky relationship at times - DOD desires to gain control over any and all intelligence related to CIA missions - Since the CIA is resistant to sharing intelligence, there is a HUMINT rivalry with DOD expanding its Strategic Support Branch of the DIA to increase their own HUMINT and minimize their reliance on CIA HUMINT
State Department-CIA
- This is generally an edgy relationship Official cover using diplomats leads to a potential conflict - There is tension between State Dept. ambassadors and CIA chiefs of station (COS) - COS officially represents DNI (but see CIA as home) - DCIA controls HUMINT - CIA-DNI rivalry = less willingness to share with State - There is not always full disclosure to the Ambassador
ECHELON
-Allegations of United States economic espionage arose in the late 1990's concerning this government program -It searches through collected sigint using keywords win computers. ("Five Eyes") Refers to an intelligence alliance comprising the United States, Britain, Australia, Canada, and New Zealand. This was a secret agreement which was disclosed to the public in the late 1990s and has since expanded after the World Trade Center attacks. Documents leaked by Edward Snowden revealed that "Five Eyes" have been spying on one another's citizens and sharing collected information with each other in order to circumvent restrictive domestic regulations on the surveillance of citizens.
Developmental
A potential source that is repeatedly contacted to asses value and consideration for a pitch. HUMINT: a potential source who is being brought along-largely through repeated contacts/conversations to asses his value and susceptibilities-to the point where the developmental can be pitched. Potential source who is being brought along largely through contacts and conversations to assess their value (validation) to the point where the developmental can be pitched
Double Agent
Agents who apparently continue their activities, then provide information on their erstwhile employer and knowingly pass back erroneous information. An employee of a secret intelligence service, whose primary purpose is to spy on a different target organization, but who, in fact, is a member of the target organization. Counterterrorism officers may not just try to catch spies, but try to turn them into double agents
Foreign Liaison
Allied or friendly services → these offer greater familiarity with its own region and its government may maintain a different pattern of relations with other states
Revolutions in Military Affairs (RMA)
An ongoing broad doctrinal evolution and debate about the likely nature of future warfare, encompassing technology, strategy, tactics, and the use of intelligence
ABM
Antiballistic Missile
DARP
Defense Airborne Reconnaissance Program
DI
Directorate of Intelligence
DO
Directorate of Operations (CIA)
DoT's Office of Intelligence and Analysis (OIA)
Established in 2004 by the Intelligence Authorization Act, the Treasury Department's OIA is a component of the Office of Terrorism and Financial Intelligence. Its purpose is to collect, analyze, and disseminate foreign intelligence and foreign counterintelligence information. They safeguard the financial system against illicit use and combat rogue nations, terrorist facilitators, WMD proliferators, money launderers, drug kingpins, and other national security threats.
I&A
Intelligence and Analysis
JIC
Joint Intelligence Community (Britain)
NSA
National Security Agency
NSC
National Security Council
NSL
National Security Letters
PFIAB
President's Foreign Intelligence Advisory Board
PIPs
Presidential Intelligence Priorities
Competing Collection Priorities
Prioritization of collection requirements occurs cause of limited numbers of collective platforms
Asset validation
SAD, Tommy Has Tattled (Spot, Assess, Develop/Recruit, Test, Handle, Terminate)
SIS
Secret Intelligence Service (Britain)
MI5
Security Service (Britain)
SARS
Severe Acute Respiratory Syndrome
SWIFT
Society for Worldwide Interbank Financial Telecommunication
Consumer; Producer
The DOD is both a ___ and ___ of intelligence. Consumption By consumer analysis
Debriefing
The process of questioning cooperating human sources to satisfy intelligence requirements, consistent with applicable law. Orbiting pieces of destroyed satellites
Title 10
This Title of the USC outlines the role of the armed forces. provides the legal basis for the roles, missions, and organizations of each of the services as well as the DOD
Iraq WMD analysis
complete analytic failure: analytic biases and problematic IC assumptions, overconfidence of IC leadership, politicization from White House. cherry-picking of evidence.
Cryptologic Service Groups (CSG)
work under the direct authority of DIRNSA and their primary function is to facilitate timely SIGINT support to unified commands, joint task force commanders, or other operational commanders.
LEO, MEO, GEO, HEO, Sun Synchronous
-LEO: Low Earth Orbit 200-1000 miles, allows for detailed view of the earth. -MEO: between leo and geosynchronous orbits (22,000 miles). GEO stay over the same spot all the time - Geosynchronous Orbit: 22,000 miles above the earth. It stays over the same part of the earth at all times -Highly elliptical orbit: comes close to the southern hemisphere and far from the northern -Sun Synchronous Orbits follow daylight
Swarm Ball
-a major problem in managing collection -the tendency of collectors to collect on an issue that is deemed important, whether or not they bring anything useful to the table
Global Findings
-an oversight issue related to covert action -materials are allocated to deal with global issues (terrorism, narcotics), giving the IC a lot of leeway. Broad president findings dealing with covert action involving transnational issues.Broad presidential findings, often to do with transnational issues such as terrorism or narcotics.
Bigot List
A lot of people with access to certain categories of intelligence but these are often rather lengthy rather than exclusive. Lists of people with access to certain categories of intelligence. When leaks occur, there are too many people who have access to the information to be able to pin down the leaker. Agencies keep bigot lists of people with access to certain categories of intelligence (but these are usually too lengthy to be helpful)
Unifying Intelligence Strategies
A responsibility of national intelligence managers to integrate the intelligence that is collected and analyzed by various intelligence agencies. Formulated by the National Intelligence Managers as ways to integrate collection and analysis.
Covert Action
An activity or activities of the United States government to influence political, economic, or military conditions abroad, where it is intended that the role of the United States government will not be apparent of acknowledge publicly. an activity to influence political, economic, or military conditions abroad, where it is intended that the role of the US not be apparent or publicly acknowledged. The type of secret, plausibly deniable operation performed by the CIA. It was given freedom to do this under the National Security Act. "influence."
Compartmented
An employee having access to a certain clearance does not automatically get all of the information in that clearance level.The United State intelligence system is segmented and access to each compartment is based on need to know
Chief of station
An intelligence officer assigned to head an overseas intelligence unit, normally based out of an embassy.
36
Chapter ___ of Title 50, Foreign Intelligence Surveillance, contains laws governing physical searches and electronic surveillance to ensure we aren't breaking any laws while conducting these activities.
CSRS
Counter Surveillance Reconnaissance System
DISTP
Defense Intelligence Special Technologies Program
President's Foreign Intelligence Advisory Board (PFIAB)
Does high level objective oversight by responsibility to problems or initiating activities to investigate issues; became PIAB in 2004. carries out higher level and more objective oversight than the NSC office of intelligence. Has recently just become the PIAB and has appointed officials
EOD
Entry on Duty
Drones: Full Motion Video, Activity Based Intel, Pattern of Life
FMV: long direction and close in video that can bring a lot of valuable intel ABI/Pattern of Life: intel. collection based on observed behaviors that are more likely to indicate that an activity of interest is taking place at that location (looking for activity other than the norm
Footnote Wars
Multiple intelligence organizations focusing on one issue, and will stress a separate point of view to make their report unique. The U.S. system of competitive analysis (which means the same issue is analyzed by different analytical groups) can result in two different outcomes, one of which is footnote wars - the only goal is to maintain a separate point of view regardless of the salience of the issue at stake
NCS
National Clandestine Service
NCIX
National Counterintelligence Executive
NCPC
National Counterproliferation Center
NCTC
National Counterterrorism Center
NIA
National Intelligence Agency (South Africa)
CNI
National Intelligence Center (Mexico)
NIC
National Intelligence Council
Airborne Crytologic Language Analyst
Personnel assigned to this specialty operate, evaluate, and manage airborne signals intelligence information systems and operations activities.
Communication Signals Intelligence Analyst
Personnel assigned to this specialty perform communication signals intelligence analysis to include acquiring signals through optimum antenna manipulation and receiver tuning.
Radar Data
Radar energy reflected (reradiated) from a target or objective.
Radio Frequency Data
Radio frequency/electromagnetic pulse emissions associated with nuclear testing, or other high energy events for the purpose of determining power levels, operating characteristics, and signatures of advance technology weapons, power and propulsion systems.
Targeting Reachback Capabilities
The AFTC provides ___ ___ ___ to air and space operations centers (AOC) to include geospatial intelligence, target analysis, and precision engagement intelligence.
Intelligence, Surveillance, and Reconnaissance Agency (AFISRA)
The Air Force's ___ assists with the coordination of Air Force cryptologic activities, NSA/CSS, and Air Force or theater commanders on SIGINT matters.
Day-to-Day
The DNI has overall responsibility for intelligence support to the President and the ___ ___ ___ management of the IC.
United States Code (USC)
The codification by subject matter of the general and permanent laws of the United States.
Foreign Economic Espionage
The collection of foreign economic intelligence
Processing
The core element of our mission is the ___ of intelligence.
Air Force Intelligence Analysis Agency (AFIAA)
This agency provides the AF/A2 intelligence, special security services, and imagery products.
UCR
Unanimous Consent Request
INSCOM, FLTCYBERCOM, AFISRA, MCIA, CGCG
What are the NSA/CSS's give Service Cryptologic Components (SCS)s?
Title 10; Title 18; Title 32; Title 50
What are the four Titles of the USC in which ISR professionals should have a basic understanding?
Gort Gordon, GA (NSAG); Lackland AFB, TX (NSAT); Kenia, HI (NSAH); and Denver, CO
What are the four primary cryptologic centers of the NSA/CSS?
Communications Intelligence (COMINT); Electronic Signals Intelligence (ELINT); Foreign Instrumentation Signals Intelligence (FISINT)
What are the three subcategories of SIGINT?
Operational ELINT; Technical ELINT
What are the two subcategories of ELINT?
Intelligence failure
When IC fails to predict or predicts wrongly a significant event. Ex: Pearl Harbor, 9/11, Iraq WMD
Title 50
Which Title contains numerous laws that cover intelligence activities?
TECHELINT
___ is concerned with the technical aspects of foreign noncommunications emitters such as signal characteristics, modes, functions, associations, capabilities, limitations, vulnerabilities, and technology levels.
Coast Guard Cryptologic Group (CGCG)
___ is the Coast Guard's SCC.
Competitive Analysis
-based on the belief that by having analysts in several agencies with difference backgrounds and perspective work on the same issues, parochial views are more likely to be countered or weeded out and proximate reality is more likely to be achieved. Different orientations focusing on the same issue but provides more views and great understanding (only rational and logical thinking). Having different agencies work on important issues to produce the best possible intelligence. -the antidote to groupthink -requires a lot of analysts. there was less competitive analysis after the post cold war budget cuts
Patriot Act
A controversial law overwhelmingly passed by Congress in October 2001, after the terrorist attacks of September 11 on the World Trade Center and the Pentagon. It greatly expanded the power of federal law enforcement authorities to move against suspected terrorists. Gave CIA more powers and more money.
Mole
A deeply hidden spy (Angleton convinced of the existence of a Soviet mole)
Sleeper Agents
Agents sent to another nation to assume normal lives and then become active at some later time.
Executive; Executive; Legislative
Although the IC is led by the ___ branch, it is subject to oversight from both the ___ and ___ branches.
AIPAC
American Israel Public Affairs Committee
House Armed Services Committee
Appropriate subcommittees serve as authorizers versus appropriators. Shares jurisdiction of the Military Intelligence Program (MIP) with the House Intel Committee. The current chairman is Mac Thornberry (R-TX)
Group Think
Avoid coerced consensus; when the value of consensus overrides the value of critical thinking (Based on non-logical thinking, no reason). a psychological phenomenon in which the desire for harmony or conformity in the group results in an irrational or dysfunctional decision-making outcome. -Group members try to minimize conflict and reach a consensus decision without critical evaluation of alternative viewpoints, by actively suppressing dissenting viewpoints, and by isolating themselves from outside influences. Occurs within a group of people, in which the desire for harmony or conformity in the group results in an irrational or dysfunctional decision-making outcome.
CW
Chemical Weapons
COIN
Counterinsurgency
CI
Counterintelligence
CIC
Counterintelligence Center
DC
Deputies Committee (NSC)
Battle Damage Assessment (BDA)
Determining the degree to which an attack has been successful
DCI
Director of Central Intelligence
Office of Naval Intelligence (ONI)
Founded in 1882, ONI focuses on signals intelligence (SIGINT) and collects and records naval information that could be useful in war and peace → ONI gives maritime commanders information they need on foreign forces. It's current director is Vice Admiral Ted Branch. located at the National Maritime Intelligence Center(NMIC) in Suitland, MD, is the lead DOD production center for global maritime intelligence.
GDIP
General Defense Intelligence Program
IT
Information Technology
Geospatial Intelligence (GEOINT)
Information about any object-natural or manmade - that can be observed and has national security implications. Imagery Intelligence (IMINT); Geospatial Information -Advantages: Graphic and compelling (when presented to policymakers) easily understood, little to no interpretation required to determine how it was acquired, targets are 'self-reveal,' or make themselves available -Disadvantages: Graphic can be too compelling, leading to hasty or ill-informed decisions or the exclusion of other evidence, only a snapshot-not telling the entire story, expensive to maintain
ISC
Intelligence and Security Committee (Britain)
Airborne ISR Operator
Personnel assigned to which intelligence speicalty fly as primary aircrew onboard a wide variety of aircraft to operate, evaluate and manage airborne ISR information and related ground processing systems?
Geophysical Data
Phenomena transmitted through the Earth (ground, water, and atmosphere) and man-made structures including emitted or reflected sounds, pressure waves, vibrations, and magnetic field or ionosphere disturbances.
PFLP
Popular Front for the Liberation of Palestine
RMA
Revolution in Military Affairs
UAVs
Unmanned Aerial Vehicles
Chronology 1947
-National Security Act- conveyed the legal basis for intelligence community; created by secretary defense and national security council; framework and bureaucracy of today is from this -Start of Cold War- countering soviet union and stopping growth of communism
Maskirovka
A Russian tradition of obscuring the physical realities of the Russian state. Masking, camouflaging, or deceiving
Hollow Budget Authority
A budget program being approved but not given sufficient funds by its appropriators. Authorizers may approve a program but find that it is not given any funds, or the appropriate amount, by appropriators
Dangles
A humint source that presents himself voluntarily but is, collecting for his government. HUMINT:A suspicion we have of walk ins, why have they comes? are they a means of entrapment? Can be used to ID hostile intel. personnel or gaining insights into the intel. requirements and methods of a hostile service
Graymail
A spy threatening to reveal classified information in open court as a means of avoiding prosecution.Occurs when accused spies threaten to reveal classified information in open court as a means of avoiding prosecutions.Prosecuting intelligence officers for spying was a major concern-agencies feared that accused spies would threaten to reveal classified info in an open court as a means of avoiding prosecution. Classified Intelligence Procedures Act (1980) allows judges to review classified material in secret so persecution can proceed without fear of publicly disclosing secret intelligence
Denial
A targeted nation can use knowledge about the collection capabilities of an opponent to avoid collection (known as denial). When a targeted nation uses knowledge of collection capabilities to avoid collection
William "Wild Bill" Donovan
American Decorated General, millionaire Wall Street lawyer, but best known for his position of Coordinator of Information when United States intel was still fragmented under Roosevelt. Became the head of the OSS and argued for a peacetime centralized intelligence agency, eventually the CIA. Ambitious, public service-oriented, reckless, Republican.
Need to know
Being admitted to different compartments based on what information it is important that you know.Only giving employs intelligence they need to get a job done; no more, no less
Central Intelligence Agency
Central Intelligence Agency: An independent intelligence agency responsible to the President through the DNI and accountable to the American people through the intelligence oversight committees of the US Congress. an external intelligence service of the U.S. Government, tasked with gathering, processing and analyzing national security information from around the world, primarily through the use of human intelligence. Established in 1947 by the National Security Act, CIA is responsible for collecting, analyzing, and disseminating foreign intelligence. They report to the DNI. Current Director is John Brennan. created with the signing of the National Security Act of 1947.
15
Chapter ___ of Title 50, National Security, contains laws on matters of intelligence access, protection of national security information, and coordination of intelligence activities.
CBW
Chemical and Biological Weapons
Steganography
Concealed writing, a technique which is centuries old. For steganography, the message itself is hidden, so its existence is uncertain at best whereas in cryptology, the existence of the message is known but it may not be in a format that can be read. The message is hidden
Allen Dulles
Director of CIA, appointed by Eisenhower. He was a veteran of wartime OSS cloak-and-dagger operations. He was also the brother of John Foster Dulles. Known for staying strong against McCarthyism and being a fan of covert action. Forced to resign after Bay of Pigs fiasco.
DBA
Dominant Battlefield Awareness
Coast Guard Intelligence (CGI)
Founded in 1915, CGI now falls under the Dept. of Homeland Security, providing information on maritime and port security, search and rescue, and counter-narcotics. Current Assistant Commander is Rear Admiral Steven Andersen. strives to create decision advantage to advance US interests by providing timely, actionable, and relevant intelligence to shape Coast Guard operations, planning, and decision-making, and to support national and homeland security intelligence requirements.
Materials Data
Gas, liquid, or solid samples, collected both by automatic equipment, such as air samplers, and directly by humans.
Worst-case Analysis
Gauging the worst level of threat that a country may face. - When intelligence analysts gauge the worst level of threat, in order to determine what our forces are likely to face
Subtitle A
General Military Law; Subtitle B - Army; Subtitle C - Navy and Marine Corps; Subtitle D - Air Force; Subtitle E - Reserve Components - Name the five subtitles of Title 10.
GEOINT
Geospatial Intelligence. A unique intelligence discipline that integrates imagery, imagery intelligence (IMINT), and geospatial information.
GRU
Glavnoye Razvedyvatelnoye Upravlenie (Main Intelligence Administration) (Russia)
GAO
Government Accountability Office
GCHQ
Government Communications Headquarters (Britain)
Mossad
Ha-Mossad Le-Modin Ule Tafkidim Meyuhadim (Institute for Intelligence and Special Tasks) (Israel)
All-Source Analysts
Have a more macro-orientation (general)
Sun-Synchronous Orbit
Moving in harmony with earth's rotation so always functioning in daylight
Dissemination
Moving intelligence from producers to consumers
NIE
National Intelligence Estimate
Computer Network Exploitation
Once one has achieved access to a target's computer, one can use that access, determine capabilities, collecting available data, and possible control of all or part of the network for one's own end
OSINT
Open-Source Intelligence. Information that is openly available (newspapers, reports, websites, Internet, media). Made intelligence by the way it is amalgamated, processed. Intention.
Strategic Debriefer
Personnel assigned to this special duty collect and report intelligence information obtained from human sources in response to requirements.
Digital Network Intelligence Analyst
Personnel assigned to this specialty employ techniques to collect, identify, and exploit appropriate communications to ensure accurate targeting.
Geospatial Intelligence Analyst
Personnel assigned to this specialty exploit and analyze multisensor imagery in conjunction with all-source intelligence information.
Operations Intelligence
Personnel assigned to this specialty prepare, maintain, and present intelligence displays, reports and briefings.
US Air Force Intelligence, Surveillance, and Reconnaissance Agency (AFISRA)
The field operating agency that reports to A2 and is located on Security Hill, Lackland AFB, Texas.
Downstream Activities
The specific steps of process and exploitation that follow collection
Interrogation
The systematic effort to procure information to answer specific collection requirements by direct and indirect questioning techniques of a person who is in the custody of the forces conducting the questioning.
Imagery Intelligence (IMINT)
The technical, geographic, and intelligence information derived through the interpretation or analysis of imagery and aollateral materials. Images taken from overhead (satellites, U2)
Official Cover
Those who hold another government job, usually posted at the embassy. Makes it easier for the agent to maintain contact with their superiors but raises the risk of being suspected. When a humint officer holds another government job to hide their humint job
UNSCOM
Unites Nations Special Commission
Title 32
Which Title outlines the role of the US National Guard?
Budget Authorization
approving specific programs or activities. Authorizing committees also suggest dollar amounts for each activity -House Permanent Select Committee on Intel., Senate Select Committee on Intel
Third option
between doing nothing in a situation, in which, vital interests may be threatened and sending in military force , which raises the chance of difficult political action.The reasoning behind covert action, as policy makers need another option beside doing nothing and sending in military force.
CounterIntelligence Polygraph
A category of polygraph exam that focuses on foreign contacts and handling classified intelligence. Polygraph assessing foreign contacts, handling of classified information, etc
U-2
American reconnaissance aircraft shot down over the Soviet Union in May 1960. President Eisenhower refused to acknowledge that this was a spy flight; this incident increased Cold War tensions
National Security Letters
An investigative technique that has been used in espionage cases and counterterrorism. A type of administrative subpoena. Administrative subpoena that requires the recipient to turn over records and data pertaining to individuals, with a gag order as well. -an administrative subpoena. The require recipients to turn over records pertaining to people, but they can't tell anyone it exists -not subject to judicial review, the use of them has skyrocketed this past decade
National Security Act of 1947
Consolidated changes to national security regime by creating 1. CIA 2. Joint Chiefs of Staff 3. National Security Council 4. US Air Force.Established the National Security Council and Joint Chiefs of Staff. It also created the CIA and helped lead to the creation of organized foreign/domestic intelligence gathering
CNC
Counternarcotics Center
CT
Counterrorism
CTC
Counterterrorism Center
Long Term Intelligence
Deals with trends and issues that may not be an immediate concern but are important to watch. Associated with strategic intelligence. Current intelligence that goes far into the future. Intelligence regarding issues further in the future
DCP
Defense Cryptologic Program
DGIAP
Defense General Intelligence Applications Program
DIA
Defense Intelligence Agency
Anti-Satellite Weapons
Delete satellite capabilities
DEA
Drug Enforcement Agency
National Intelligence Managers
Ensures a balanced focus on priority intelligence missions by overseeing both collection and analysis on a given issue. Intelligence managers who oversee and facilitate analysis and manage projects. There are fifteen of them. Responsible for intelligence integration
Air Force Intelligence, Surveillance, and Reconnaissance (Air Force ISR)
Founded in 1948, AF ISR focuses signals intelligence (SIGINT) and on getting information to troops on the ground and most recently, the ISR has collected that intelligence from aerial drones. It also collects intelligence on foreign nations and hostile forces, both in and out of combat zones - conduct electronic and photographic surveillance, and provide weather and mapping data to troops in the field. It's current Deputy Chief of Staff is Lt. Gen. Robert Otto.
Denied Targets
IMINT: target areas to which one does not have ready access -ex. During the cold war, 80% of the information about the USSR was secret and 20% was open
Counterintelligence (CI)
Information gathered and activities conducted to protect against espionage and other activities carried out by foreign states or non-state actors. similar to, and often confused with HUMINT, as CI uses many of the same techniques for the information collection. -both analytical and operational should pervade all aspects of intelligence -collection, defensive, offensive - designed to support one's own effort and thwart the efforts of your adversaries
Fusion Centers
Information sharing center, many of which were jointly created from 2003-2007 under the Department of Homeland Security and the Justice Department. They are designed to promote information sharing at the federal level between the CIA, FBI, Justice Dept, U.S. military, and state and local governments.
Propaganda
Information, especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view. The old political technique of disseminating information that has been created with a specific political outcome in mind
MOIS
Ministry of Intelligence and Security (Iran)
Dulles-Jackson-Correa report
One of the most influential evaluations of the functioning of the United States Intelligence Community, and in particular, the Central Intelligence Agency (CIA). The report focused primarily on the coordination and organization of the CIA and offered suggestions that refined the US intelligence effort in the early stages of the Cold War. Focus on lack of coordination between agencies, poor efficiency and leadership from DCI, and need to merge covert and clandestine ops.
Sources and Methods
One of the primary concerns of the entire intel community is protecting your sources and methods of collecting intelligence.the details/existance of collection capabilities. Classification of sources and methods is one of the IC's top priorities
National Intelligence Program (NIP)
One of two components of the U.S. Intelligence Budget. The NIP includes all programs, projects, and activities of the intelligence community as well as any other intelligence community programs designated jointly by the DNI and the head of the department or agency. Budget of $53.1 billion for 2017.Comprises programs that either transcend the boundary of an agency or a defense in nature. DNI is responsible. The DNI has a great deal of power with respect to NIP responsibilities.
8D000, Strategic Debriefer
Personnel assigned to the special duty identifier of ___ collect and report intelligence information obtained from human sources in response to requirements.
Scientific Applications Specialist
Personnel assigned to this reporting identifier apply leading edge physical sciences to perform data collection, analysis, observation, study, experimentation, acquisition, maintenance, research and development, fielding of prototype and operational active and passive sensors and systems.
Interpreter/Translator
Personnel assigned to this reporting identifier perform duties as foreign language interpreters or translators.
Electronic Signals Intelligence Exploitation Analyst
Personnel assigned to this specialty support SIGINT activities and operations by monitoring and collecting noncommunications electronic signal transmissions using passive receiving equipment.
70 ISRW
The Air Force's only cryptologic wing that trains and equips cryptologic information operations specialists to carry out AFISRA's and NSA's multi service operations.
President; National Security Council (NSC); Homeland Security Council (HSC)
The US Iintelligence effort provides the ___, ___, and ___ with timely, accurate, and insightful infomration about the activities, capabilities, plans, and intentions of foreign powers, organizations, and persons, and their agents.
Plausible Deniability
The ability for persons to deny knowledge of and responsibility for any damnable actions committed by others because of a lack of evidence that can confirm their participation, even if they were personally involved in or at least willfully ignorant of the actions.When a foreign government in whose territory a rendition occurred was aware of the operation and looks the other way to deny any involvement
Oversight
The ability to control information. The responsibility of the executive and legislative powers to oversee intelligence.
Capabilities versus Intentions
Whether intentions actually matter as opposed to immediate capabilities. Whether the capabilities of the Soviet Union is important when the United States knows the intentions of the Soviets
counterintelligence polygraph
foreign contacts, handling of classified information
Negation Search
imagery is a static piece of intel, revealing something about where and when it was taken but nothing about what happened before or why it happened. negation searches look at past imagery to determine when an activity commenced (automatic change extraction: comparing images). Looking at past imagery to determine when an activity commenced.A look at previous satellite imagery to determine when an activity commenced
CESG
Communications Electronics Security Group (Britain)
CMA
Community Management Account
U.S. Intelligence community
Comprised of 1. executive departments (e.g. State, Defense, Homeland Security), 2. the military (each branch has its own agency), 3. intelligence agencies (DIA, CIA, NRO), and 4. the Director of National Intelligence, who sits on top and manages the budgets
DOD
Department of Defense. the federal department charged with coordinating and supervising all agencies and functions of the government relating directly to national security and the military.
DoE's Office of Intelligence and Counterintelligence (OICI)
Department of Energy's OICI focuses on technical intelligence on nuclear weapons and nonproliferation as well as nuclear energy (especially foreign) and energy security - they share this technical analysis with the other members of the intelligence community, especially its assessments of foreign nuclear weapons programs. Current director is Steven Black.
EO
Electro-optical; Executive Order
National Security Agency (NSA)/Central Security Service (NSA/CSS)
Founded in 1952, the NSA is a DOD agency which primarily gathers signals intelligence (SIGINT) - intercepting and processing foreign communications, cryptology, and information assurance (preventing foreign hackers from getting secret information). Unlike the DIA and CIA, the NSA does not unilaterally conduct human-source intelligence gathering. It's current director is Mike Rogers. It is the IC's executive agent for all SIGINT activities. main cryptology organization in USA. Tasked w/ collection and dissemination of SIGINT, protection of USA tech/cyber systems. Budget determined by DOD
President's Intelligence Advisory Board
High level of oversight, can investigate intelligence issues or initiate competitive analysis.
Containment
If the soviet union was contained within its borders it would have either changed or collapsed due to commit shortcomings. The action of keeping something harmful under control or within limits.
INF
Intermediate Nuclear Forces
Joint Terrorism Task Force (JTTF)
Partnership between American law enforcement agencies that is charged with taking action against terrorism, which includes the investigation of crimes such as wire fraud and identity theft. The lead agency is the FBI followed closely by the DHS and also is composed of 33 other federal agencies. A series of fusion centers have been formed to provide the desired liaison and integration
Intelligence Officer
Performs and manages intelligence functions and activities to support the United States and allied forces.
Signals Intelligence (SIGINT)
Refers to the interception of communications between two or more parties. Intelligence produced by exploiting foreign communications systems and non-communications emitters. It entails: Communications Intelligence (COMINT); Electronic Intelligence (ELINT): Technical ELINT (TECHELINT), Operational ELINT (OPELINT); Foreign INstrumentations Signals Intelligence (FISINT). intercepted communications, wire taps, telemetry intelligence, signatures from military equipment. intelligence discipline provides unique intelligence information, complements intelligence derived from other sources, and is often used for cueing other sensors to potential targets of interest. -Advantages: Offers insight into plans, intentions, voluminous material, military targets tend to communicate in regular patterns -Disadvantages: Signals may be encrypted or encoded
Intelligence and Security Command (INSCOM)
The Army's ___ assists with the coordination between Army tactical units and NSA/CSS concerning SIGINT matters for Army resources and assets.
Primary Mission
The IC's ___ ___ is to collect and convey the essential information the President and members of the policymaking, law enforcement, and military communities require to execute their appointed duties.
Office of the DNI (ODNI)
The ___ __ ___ ___ is charged with effectively integrating foreign, military, and domestic intelligence in defense of the US and its interests abroad.
Chairman of the Joint Chiefs of Staff (CJCS)
The ___ ___ ___ ___ is the military advisor to the NSC.
Homeland Security Council (HSC)
The ___ ___ ___ coordinates homeland security related activities among IC members and promotes the effective development and implementation of homeland security policies.
Intelligence Community (IC)
The ___ ___ is a coalition of agencies and organizations within the executive branch that work both independently and collaboratively to gather the intelligence necessary to conduct foreign relations and national security activites.
Office of Strategic Services (OSS)
The first peacetime, non-departmental US intelligence organization. Created in 1942 by FDR and tasked to collect, analyze, and disseminate strategic intel., as well as "black ops." First director was William "Wild Bill" Donovan. Opposed heavily by J.Edgar Hoover of FBI. Disbanded by Truman in 1945.
The Deputy Chief of Staff for Intelligence, Surveillance, and Reconnaissance (A2)
The focal point for the functional management of all Air Force ISR capabilities; Reports to internal and external consumers (Congress, ODNI, Joint Staff).
Operational Commanders; Program Managers; Decision Makers
The function of CI is to provide direct support to ___ ___, ___ ___, and ___ ___.
Wheat Versus Chaff
US technical collection is more like a vacuum than a microscope-collectors sweep up a great deal of information, within which may be the info that is sought + In order to produce intelligence, you have to separate the intelligence from the overflow of information received daily (separate the wheat, or the meaningful information, from the chaff, or the collective pile of information) + Noise vs. Signals - How to extract desired intelligence form a huge load of information
Ad Hocs
Unexpected issues that appear with little warning. When unexpected issues inevitably crop up with little or no warning - not every ad hoc merits higher priorities however
Tactical, investigative, and strategic
What are the DEA's three categories of drug intelligence?
State's Bureau of Intelligence and Research (INR)
a bureau of the Department of State and a member of the Intelligence Community (IC). The Bureau of Intelligence and Research's (INR) primary mission is to harness intelligence to serve U.S. diplomacy.
AFISRA (Air Force Intelligence, Surveillance, and Reconnaissance Agency)
agency that organizes, trains, equips, and presents assigned forces and capabilities to conduct ISR utilizing assets ranging from worldwide ground sites to manned and unmanned airborne platforms
FISINT
involves the technical analysis of data intercepted from foreign equipment and control systems such as telemetry, electronic interrogators, tracking/fusing/arming/firing command systems, and video data links. Foreign Instrumentation intelligence
Noise Versus Signals
-Roberta Wohlstetter: Pearl Harbor Warning and Decision -the fact that we collect so much information means that the signals one wishes to receive and to know are often embedded in a lot of surrounding noise
Estimates
-analytical products. An educated guess based on researched information. intelligence products written on a recurring basis. -two purposes: to see where a major issue will go over the next few years, to present the considered view of the entire IC
Intelligence
-much of what goes on is secret, which can be of concern to citizens of a democratic state. Information that makes the needs of policy makers and has been collected and processed to meet those needs -Intelligence refers to info that meets the states or understood needs of policy makers and has been collected, processed and narrowed to meet those needs -there are many different types that provide info to analysts (political, economic, social, environmental, health, cultural)
CSEC
Communications Security Establishment Canada
DST
Directoire de Surveillance Territoire (Directorate of Territorial Surveillance) (France)
DPSD
Directoire de la Protection et de la Sécurité de la Défense (Directorate for Defense Protection and Security) (France)
Shutter Control
During periods when national security or international obligations may be compromised, the U.S. government can prevent a commercial satellite from imaging a given area. United States limits commercial satellite functioning for national security reasons
Langley, VA
Headquartered in ___, ___, the CIA serves as a source of analysis on topics of concern and works closely with the other organizations in the IC to ensure the intelligence consumer receives the best intelligence possible.
Geospatial Information
Identifies the geographic location and characteristics of natural or constructed features and boundaries on the Earth.
ISR
Intelligence, Surveillance, and Reconnaissance
ISD(ISI)
Inter-Services Intelligence Directorate (Pakistan)
IAEA
International Agency for Atomic Energy
National Intelligence Estimates (NIEs)
Long-term intelligence product that attempts to estimate (not predict) the likely direction an issue will take in the future. They represent the considered opinion of the entire intelligence community and are presented to the president by the DNI once fully agreed to
Traffic Analysis
Monitoring the changes in communications. Changes in these patterns (increases or decreases) may be indicative of a larger change in activity. SIGINT: monitoring changes in communications, which has more to do with volume than content
Renditions
The seizure of individuals wanted by the US.
Automatic Change Exchange
Using computer to do a negation search
Clientism
A flaw that occurs when a analyst becomes so immersed in their subject (usually after working on an issue for too long), that they loose their ability to view issues with their necessary criticality. A flaw that occurs when analysts become so immersed in their subjects that they lose their ability to view issues with criticality-they can spend time apologizing for their subjects instead of analyzing them. When analysts become so immersed in their subjects that they lose the ability to view issues with the necessary criticality. "Going native"
National Security Council (NSC)
An office created in 1947 to coordinate the president's foreign and military policy advisers. Its formal members are the president, vice president, secretary of state, and secretary of defense, and it is managed by the president's national security assistant. Composed of the Principals Committee and Deputies Committee. It is the principal forum to consider national security issues that require presidnetial decision. serves as the President's principal arm for coordinating policy among various government agencies. The principal forum used by the President of the United States for consideration of national security and foreign policy matters with senior national security advisors and Cabinet officials and is part of the Executive Office of the President of the United States. Since its inception under Harry S. Truman, the function of the Council has been to advise and assist the president on national security and foreign policies.
Spies
Collection platforms (means of collecting information): there is a limited amount of spies, policy makers must make choices among competing collection requirements (it is a zero sum game)
Deputies Committee of The National Security Council
Composed of the principle committee; they review issues as a groundwork for the Principle Committee
Chronology 1975-1976
Created congressional oversight committees due to violations of law and due to intelligence abuses
DICP
Defense Intelligence Counterdrug Program
DIS
Defense Intelligence Staff (Britain)
DITP
Defense Intelligence Tactical Program
DSRP
Defense Space Reconnaissance Program
Requirements
Defining policy issues which the intelligence community is expected to focus on
Resolution
Degree of visual clarity. Indicate the size of the smallest identifiable object using satellite imagery. At 25-meter (75 feet) resolution, you can see major landforms and larger man-made objects. However, a 1-meter (39 inch) resolution of the same picture, you can see each building with individual cars. satellite imagery: resolution numbers indicate the smallest identifiable object
Render
Delivery of suspected terrorists to a 3rd world country that can incarcerate and interrogate with fewer limitations -CIA captured suspected terrorists overseas and rendered them to a third country for incarceration and interrogation -this has become controversial as some questioned the basis on which people were rendered and the conditions to which they were subjected in these third nations
D&D
Denial and Deception
Damage Assessment
Determining what intelligence has been compromised. Once a spy has been caught, looking to see what has been compromised or stolen
Military Intelligence Program (MIP)
Devoted to intelligence activity conducted by the military departments and agencies in the Department of Defense that support tactical U.S. military operations. Budget of $16.8 billion for 2017.Consists of defense and service intelligence programs. Headed by the secretary of defense. Composed of intelligence programs that support the DoD and its components aren't confined to any one military service
Analytical Stovepipes
Each collector operates in a unique field with a series of unique methodologies. Bureaucratic imperatives and a clear preference for their responsibilities in direct support of their particular policy client, as opposed to interagency progects. Isolation of analysts within their own agency and a resulting non-cooperation between agencies. Several ways to which raw intelligence may be presented without proper context
Measurement and Signature Intelligence (MASINT)
Electromagnetic Data; Radio Frequency Data; Radar Data; Nuclear Radiation Data; Materials Data; Geophysical Data. Scientific and technical intelligence obtained by quantitative and qualitative analysis of data (metric, angle, spatial) derived from specific technical sensors for the purpose of identifying any distinctive features associated with the target, source, emitter, or sender. all electronic intel that's not SIGINT or imagery. Mostly military, like sizmometers, submarine detectors, sniffers. The intelligence discipline is scientific and technical intelligence obtained by quantitative and qualitative analysis of data derived from specific technical sensors for the purpose of identifying any distinctive features associated with the target, source, emitter, or sender
Human Intelligence (HUMINT)
Espionage (spying). Largely involves sending covert service officers to foreign countries to recruit spies (using humans as source information). A category of intelligence derived from information collected and provided by human sources. walk-ins, diplomatic reports, attache reports, law enforcement information, debriefings, clandestine intelligence reporting, case officers and assets. Debriefings; Source Operations; Interrogation Operations; Document and Media Exploitation. USE: to find intentions of leaders, contingency plans, blueprints, etc. GOOD: provides context, interpretation, comprehensive, flexibility... BAD: risky, denial and deception, time intensive, difficult in hard targets -Advantages: Offers insight into plans/intentions, really inexpensive -Disadvantages: Riskier in terms of lives (political fallout), requires more time to acquire and validate sources, problems of dangles, false feeds, double agents
National Security Directive 10/2 (1948)
Executive order that declares covert operations a responsibility of the CIA in threat of the Cold War. Establishes the Office of Policy Coordination (OPC), a new office of Special Projects.
DEA's Office of National Security Intelligence (ONSI)
Founded in 1973, the DEA's ONSI focuses on gathering intelligence for anti-drug operations while also providing intelligence to other law enforcement agencies
National Reconnaissance Office (NRO)
Founded secretly in 1961, the NRO is a DOD agency which designs, builds, and operates US government reconnaissance satellites providing signal intelligence (SIGINT) to the NSA, imagery intelligence (IMINT) to the NGA, and measurement and signature intelligence (MASINT) to the DIA. It is considered one of the "big five" intelligence agencies (along with the CIA, NSA, DIA, and NGA). It's current director is Betty Sapp. It designs, builds, and operates the nation's reconnaissance satellites. Builds, operates, maintains satellites. Classified until 1978.
Senate Intelligence Committee
Has exclusive authority to confirm nominations for the DNI, its principal deputy, and the director of the CIA. Have tense relationship with the Armed Services Committee. The current chairman is Richard Burr (R-NC)
Senate Armed Services Committee
Has exclusive jurisdiction over all aspects of defense intelligence. The appropriate subcommittees serve as authorizers versus appropriators. Has always jealously guarded its oversight of all aspects of defense intelligence. Has exclusive jurisdiction over all aspects of defense intelligence. The current chairman is John McCain (R-AZ)
National Geospatial-Intelligence Agency (NGA)
Headquartered in Springfield, VA, the ___ operates major facilities in the St. Lois, MO and Washington, DC areas. Rooted in the 1972 formation of the Defense Mapping Agency and renamed the NGA in 2003. It's primary goal is to collect, analyze, and distribute geospatial intelligence (GEOINT) by gathering data from reconnaissance satellites provided by the NRO. For example, using advanced satellite imagery, the NGA was responsible for watching Bin Laden's Pakistani compound when it was discovered. It's current director is Robert Cardillo. Collecting, analyzing imagery, creating reports
Walk-ins
Humint source volunteers. HUMINT sources who volunteer but it raises a lot of questions: Why have they volunteered? Do they really have access to valuable intelligence? Are they real volunteers or a means of entrapment (called dangles)? Dangles can be used to identify hostile intelligence personnel or gaining insights into the intelligence requirements or methods of a hostile service
Self Reveal
IMINT: many targets of imagery systems make themselves available. Regarding how many targets make themselves known via imagery.Revealing how a military force is intended to be used in combat through demonstration or exercise. -ex. military exercises are conducted in regular cycles in predictable locations.
Bureau of Intelligence and Research (INR)
INR serves as the intelligence bureau of the State Department tasked with providing all-source intelligence support to U.S. diplomats and analyzing information. It is the principal lisason with the DNI. It's current director is Assistant Secretary of State for Intelligence and Research Daniel Smith. As the intelligence arm of the Department of State, the ___ of ___ and ___ has the primary mission of harnessing intelligence to serve US diplomacy.
Big CI & Little CI
If a spy is caught, you look at two things: -Big CI: motives of the country sponsoring him, what was he going for? Determining the reasons a spy went after certain informationWhen an organization has a spy within it and can figure out if the spying is part of a comprehensive tasking from other nations -Little CI: issues of tradecraft, what did he steal, how did he get in? How penetration occurred, how long it was going on, etc. The specific details that collectively compromise the Big CI
Strategic intelligence
Information that is foreign, secret, actionable, and timely. Not as detailed and military-oriented as tactical intelligence.Serves to (1) Explain and account for something and (2) Forecast and estimate about likely events (not predict)
Communications Intelligence (COMINT)
Intelligence and technical information derived from collecting and processing intercepted foreign communications passed by radio, wire, or other electromagnetic means. A subunit of sigint- the inception of communications between two parties
All-Source Intelligence
Intelligence based on many collection sources to compensate for short-comings of each and profit from combined strength -the goal of the IC is to create all-source intelligence -Intel. based on as many collection sources as possible to compensate for the shortcomings of each and profit from their combined strength
Tactical Intelligence
Intelligence specifically used for tactical reasons (special ops missions, strikes, etc.)
JICC
Joint Intelligence Community Council
JIOC
Joint Intelligence Operations Center
KGB
Komitet Gosudarstvennoi Bezopasnosti (Committee of State Security) (Russia)
Earmarks
Legislative provisions directing funds to be spent on specific projects.
Marine Corps Intelligence Activity (MCIA)
Marine Corps provides their own agency to collect and analyze information for troops on the ground. Includes map making, radio intercepts, human intelligence, and counterintelligence. Current director is Brid. Gen. Michael Groen. produces tactical and operational intelligence for battlefield support.
NIM
National Intelligence Manager
NIO
National Intelligence Officer
NIPF
National Intelligence Priorities Framework
NIP
National Intelligence Program
NRO
National Reconnaissance Office
NRP
National Reconnaissance Program
NTM
National Technical Means
Analyst Fungibility
Need for analysts who have more than one or two areas of expertise and therefore can be shifted to higher priority accounts during times of need. not every analyst has the language, regional, or topical skills to move to an area of greater need. a very real limit exists on analyst fungibility, which is a major management concern. The ability of analysts to shift from one area of expertise to another during times of need. When requirements change or when crises breakout, analysts must be shifted to areas of greater needRelies on three factors: (1) Talents and background of the analysts when they are recruited (2) Their training and education within the intelligence community (3) Management of their careers, which should give them sufficient opportunities to develop this expertise in a few areas
Plumbing
Operational support structure of covert action.The operational support structure, which also includes prearranged getting places, surveillance agents, letter drops, and technical support
Denial and deception
Possibility in collection: HUMINT-- assets who lie or exaggerate, like CURVEBALL. SIGINT or Imagery-- moving equipment. etc.
Presidential Finding
Presidential approval of a covert action that is required before it is carried out.A document the president must sign a covert operation, based on a president's findings that covert action is necessary to support identifiable foreign policy objectives of the United States, and is important to the national security of the United States
Key Judgements (KJs)
Primary findings of an overall intelligence estimate that can be used as a justification for action or inaction. Key Judgments come with intelligence estimates created for policy makers: the IC's opinion of what is most likely -Example: IC's key judgements about the Iraq WMD crisis were published in an unclassified form, adding fuel to the political fire
Content Analysis
Reading intercepted communications and analyzing what they mean. A main pillar of signals intelligence → often called COMINT to refer to communication intercepts. Tracking these communications also gives a good indication and warning. Reading messages and analyzing what they mean. SIGINT: reading messages and analyzing what they mean
S&T
Science and Technology
MI6
Secret Intelligence Service (Britain)
Special Access Programs (SAP)
Security protocols that provide highly classified information with safeguards and access restrictions that exceed those for regular classified information.Are typically open to general accounting office (GAO) audits and performance reviews (most intelligence programs haven't been subjected to GAO reviews
Federal Bureau of Investigation (FBI)
Serves as an intelligence and law enforcement agency which is responsible for understanding national security threats. The FBI's Directorate of Intelligence (DI) is responsible for information sharing policy and intelligence analysis for national security. The current Intelligence Branch Executive Assistant Director is Eric Velez-Villar. As an intelligence and law enforcement agency, is responsible for understanding threats to our national security and penetrating national and transitional networks that have a desire and capability to harm the US.
Drug Enforcement Administration (DEA)
The ___ is responsible for enforcing the controlled substance laws and regulations of the US.
Air Force Technical Applications Center (AFTAC)
The ___ provides national authorities quality technical measurements to monitor nuclear treaty compliance and develops advanced proliferation monitoring technologies to preserve our nation's security.
Analyst Agility
The ability of analysts to shift from one area of expertise to another during times of need. The need for analysts who have more than one (or two) areas of expertise and therefore can be shifted to higher priority accounts during times of need
Director of Central Intelligence
The head of the CIA from 1946 to 2005, acting as the principal intelligence advisor to the President of the US and the NSC, as well as the coordinator of intelligence activities among and between the various U.S. intelligence agencies (collectively known as the Intelligence Community from 1981 onwards). The office existed from January 1946 to April 21, 2005, and was replaced on that day by the Director of National Intelligence (DNI) as head of the Intelligence Community and the Director of the Central Intelligence Agency (D/CIA) as head of the CIA.
DHS Office of Intelligence and Analysis (OIA)
The intelligence arm of the Department of Homeland Security which focuses primarily on homeland threats. They collect and analyze information and share intelligence with local and federal law enforcement through the use of fusion centers. It's current Under Secretary is Francis Taylor.
Blowback
The risk probability of a story being planted into overseas media outlets that could also be reported in the United States. Unintended consequences of a covert operation that are suffered by the aggressor.
Principle Committee of the National Security Committee
The senior policy coordination body (Secretary of State, Secretary of Defense, Director of National Intelligence, Chairmen of the Joint Chiefs, etc.)
Collection Swarm Ball
The tendency of all collectors of collection agencies to collect on an issue that is deemed to be important, whether or not they bring anything useful to the table or can offer an appropriate type of collection. Tendency of all collectors to collect on an important issue to enhance their standing for budget allocations. Usually involves a high priority issue. Think little kids playing soccer, both teams converge on the ball en masse regardless of their assigned positions
10; 50
Title ___ is used to colloquially refer to DOD and military operations, while Title ___ refers to intelligence agencies, intelligence activities, and covert action.
Dominated Battlefield Awareness
To give commanders real-time, or near-time, all-weather, comprehensive, continuous surveillance and information about the battle-space in which they operate
USDI
Undersecretary of Defense for Intelligence-Congress (relationship) = Established in 2003, the USDI acts as the principal civilian adviser and deputy to the Secretary and Deputy Secretary of Defense on matters relating to military intelligence and also reports to the DNI - Serves a managerial function with oversight over the DIA, NGA, NRO, NSA, and all military intelligence service components. Current USDI is Marcel Lettre. The USDI is one of the main two conduits through which defense intelligence issues reach Congress (the other is the DIA itself) - Given the principle of civilian control of the military, the USDI is more powerful and important than the DIA because oversees DIA, NRO, NSA, and NGA - Deals with House and Senate Armed Services Committees - USDI staff functions as a guardian of the authority of the Secretary of Defense over defense intelligence, watching for any possible encroachments, such as from the DNI. Current director is Vincent Stewart. - Verification -SALT I's legitimation of national technical means created the issue of verification: the ability to ascertain whether treaty obligations were being met. judgments based on monitoring. Ensures that treaty agreements are honOroed
WMD
Weapons of Mass Destruction
Intelligence Disciplines
Well-defined areas of intelligence planning, collection, processing, exploitation, analysis and production, and dissemination using a specific category of technical or human resources.
AFIAA (Air Force Intelligence Analysis Agency)
What agency analyzes foreign air and air defense tactics and training, and was activated as a Field Operating Agency of the United States Air Force, on 1 FEB 2001?
Title 10 & Title 50
Which two Titles in combination regulate the activities and funding of the US Intelligence Community?
Deputy Chief of Staff for ISR (A2)
Who is the focal point for the functional management of all Air Force intelligence, surveillance, and reconnaissance capabilities?
The Joint Chiefs of Staff (JCS)
Who is the primary military advisory council to the President of the US and SecDef?
Office of Intelligence and Analysis
Within the DHS, the ___ of ___ and ___ is responsible for using information and intelligence from multiple sources to identify and assess current and future threats.
Covert vs. Clandestine
______ is when the act is obvious, but not who did it (plausible deniability.) _____ is when you don't even know the act occurred (meetings with assets).
Service Cryptologic Components (SCC)
___s are the US military's service SIGINT activities that are subordinate to DIRNSA/CHCSS.
President's Daily Brief (PDB)
a top secret document produced and given each morning to the President of the United States. Producing and presenting the brief is the responsibility of the Director of National Intelligence.Daily intelligence brief delivered to the president, primary function of the DNI
National Intelligence
all intelligence is now defined as national intelligence which has three subsets (foreign, domestic, and homeland security) -Didn't appear in the US until 1940. Foreign, domestic, and homeland security
Budget Appropriations
allocating specific dollar amounts to authorized programs -the defense subcommittees of the house and senate appropriations committee
Premature Closure
analysts can fasten to one line of analysis, especially for issues that are reexamined over the years, and then not be open to other possible hypotheses or alternatives.When an analyst fastens on to one line of analysis, especially for issues that are examined and reexamined over the years, and then will not be open to other possible hypotheses or alternatives.When analysts embrace one perspective on an issue and are not open to other hypothesis
Director of National Intelligence (DNI)
appointed by the President with Senate approval, serves as the head of the IC. Overseer and coordinator of the activities of 15 intelligence agencies involved in the production and dissemination of intelligence information in the U.S. government, as well as the president's main intelligence adviser. Current director is James Clapper. overseer and coordinator of the many agencies involved in production and dissemination of intelligence information in the U.S. government, as well as the president's main intelligence adviser. Started in in 2005. mbodiment of the intelligence community; works with the national security council to support and advise the president
Open-Source Intelligence (OSINT)
based on publicly available information as well as other unclassified information that has limited public distribution or access. Information from readily available sources (Academia; Interagency; Internet; Newspapers/Periodicals; Media Broadcast, public data, social media) -Advantages: Accessibility, needs less processing and exploitation than the technical INTs, but still require some P&E -Disadvantages: The volume of information (it represents the worst 'wheat and chaff' problem)
Defense Intelligence Agency (DIA)
external intelligence service specializing in defense and military intelligence. A component of the Department of Defense (DoD) and the United States Intelligence Community (IC), DIA informs national civilian and defense policymakers about the military intentions and capabilities of foreign governments and non-state actors.Founded in 1961, the DIA is the DOD's lead intelligence agency specializing in defense and military intelligence with a purpose of informing policymakers about the military intentions and capabilities of foreign governments and non-state actors. It also ensures intelligence assistance, integration, and coordination across uniformed military service intelligence components. It's current director is Vincent Stewart.Located on Polling AFB in Washington DC, it is a DOD combat support agency. mission is it to provide timely and objective military intelligence to warfighter, defense policy makers, and force planners
Supplemental Appropriations
make available to agencies funds over and above the amount originally planned. Conrgess has been using these more for the IC in recent years.Making funds available for agency use that exceed the amount originally planned.These appropriations make available agencies funds of and above the amount originally planned
Department of Homeland Security (DHS)
mandate to reduce US vulnerability to terrorism and to detect, prevent, and respond to terrorist attacks. responsible for reducing US vulnerability to terrorism and to detect, prevent, and respond to terrorist attacks
No Year Appropriations
money that does not have to be spent at the end of the fiscal year. Every executive agency wants these types of appropriations
Department of Energy (DOE)
oversees and protects vital national security capabilities ranging from nuclear weapons to energy research and developmental projects.