Homeland Security Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is an H1B Visa?

Temporary worker in specialty occupation, receives higher education degree, 172,000 in 2015, 18,000 from China, 199,000 from India.

Which department within DHS administers BioWatch?

The DHS Office of Health Affairs.

What is the domestic body of the government?

The FBI.

What is the largest Federal Law Enforcement Training Center in the U.S.?

The Federal Law Enforcement Training Center (FLETCH).

Who is the head of the Intelligence Community?

The National Intelligence Strategy (James R. Clapper, Daniel Coats now, he is the Director of National Intelligence (DIN).

Where is the problem with immigrants?

The Northern Border.

Who examines counterfeit bills?

The Secret Service.

What is Risk Premium?

The amount paid by a (risk averse) individual to avoid risk. They are very common (insurance premiums, higher fees paid by owner to reputable contractors, higher charges by contractor for risky work, lower returns from less risky investments, money paid to ensure flexibility as guard against risk).

Information regarding FBI Directorate of Intelligence?

The mission of the Intelligence Program is to optimally position the FBI to meet current and emerging national security and criminal threats by: Aiming core investigative work proactively against threats to U.S. interests; Building and sustaining enterprise-wide intelligence policies and capabilities; and Providing useful, appropriate, and timely information and analysis to the national security, homeland security, and law enforcement communities. Their primary responsibility for domestic intelligence. Other agencies must go through FBI.

What is Operational Intelligence?

Theater-Level or regional in scope. Focused on integration of intelligence across multiple sources.

What does the Coast Guard do?

They are the only armed forces within DHS. They safeguard nation's maritime interests and environment around the world, including: Ports, waterways, and coastal security, drug interdiction, aids to navigation, search and rescue, living marine resources, Marine Safety, Defense readiness, migrant interdiction, Marine environmental protection, Ice operations, other law enforcement. Special event security, coordination and partnering, etc.

What does border patrol do and their two key entities?

They protect the borders while facilitating legitimate travel and trade. 60,000 employees. They have two key entities- 1. Office of Field Operations (OFO)-responsible for security and trade at points of entry (POEs) 2. Office of Border Patrol (USBP)-responsible for security between POEs.

PPD 21 Reading?

Three Strategic Imperatives 1. Refine and clarify functional relationships across the Federal Government to advance the national unity of effort to strengthen critical infrastructure security and resilience 2.Enable effective information exchange by identifying baseline data and systems requirements for the Federal Government 3. Implement an integration and analysis function to inform planning and operations decisions regarding critical infrastructure.

How Can we Improve our Intel?

Train and implement structure analytic techniques, use diagnostic checks (key assumption check, qualify of information check, indicators or signposts of change, analysis of competing hypotheses) and Engage in contrarian thinking (Devil's advocacy, Team A & Team B, High-Impact/Low-Probability Analysis, "What If?" Analysis) and support imaginative thinking techniques (brainstorming, outside-in thinking, red team analysis, alternative futures analysis).

Vividness?

Vivid, concrete, and personal information has a greater impact than pallid, abstract information that may actually have substantially greater value as evidence. Stats about how illegal immigrants commit less crime, and friend beaten and robbed by illegal immigrant, which sounds more compelling.

How does the Government always attempt to work in a perfect world?

With wholistic approach.

Do you think the Department of Homeland Security has changed?

Yes, a lot.

What is the budget for the Science and Technology Directorate?

$800 million dollars per year.

Cognitive Bias tendencies?

-Absence of evidence (estimate potential impact of missing data and ADJUST CONFIDENCE in judgement). -Oversensity to Consistency "out of sight, out of mind" (highly correlated or redundant information, or drawn from a very small or biased sample. Use of terms like "always" or "never") -Law of Small Numbers (tendency to place too much release on small samples) -Coping with Evidence of Uncertain Accuracy (Misunderstanding, misperception, incomplete story; source bias; distortion in the communication chain, or misunderstanding and misperception by the analyst). -Persistence of Impressions Based on Discredited Evidence (impressions tend to persist even after the evidence that created those impressions has been fully discredited).

What are the Services in the IC?

-Air Force Intelligence -Army Intelligence -Marine Corps Intelligence -Navy Intelligence

What are the Five Strategies of Terrorism?

-Attrition-Trying to stop something through policy change, does not mean you want to overthrow the government. -Provocation-Big, overthrowing government, want complete change -Intimidation-Scare, Big, Spectacular, Frighten -Outbidding-Two or more compelling groups, trying to outweigh the other one, can use other methods in the process of trying to gain control. -Spoiling-Catring to the wishy-washy people (people not 100% with the government), sympathizers, trying to gain membership and support.

Fallacies of False Assumption?

-Begging the Question (Instead of responding to the question or problem, the question is rephrased or the problem is replaced with another). -Hypothesis contrary to fact (A fallacy that occurs when someone states decisively what would have happened had the circumstance been different providing a hyphens that cannot be verified). -Misused analogies (When reasoning from analogy, the analyst assumes that the object or event in the real world is similar to the object or event in the analogy. Analogies are inappropriate as evidence or proof in analytical work. Analogies are most appropriately used for helping to explain or clarify a concept).

What are additional categories to classification?

-Compartmentalized Information (sensitive Compartmented Information (SCI) (digital devices like laptops/computers, USB pen drives, cameras, etc.) in the IC, Special Access Programs (SAP) in the DoD). -Information is further protected, with extra protections around need-to-know -Information is segregated in SCIF areas to limit access.

What does the Science and Technology Directorate do?

-Conducts research, development, demonstration, testing and evaluation relevant to DHS.

What are the Departments in the IC?

-DEA Office of National Security Intelligence -DOE Office of Intelligence and Counterintelligence -DHS Office of Intelligence and Analysis -Coast Guard Intelligence -State Bureau of Intelligence and Research Treasury Office of Intelligence and Analysis

Who are the Program Managers in the IC?

-Director of National Intelligence -Central Intelligence Agency -Defense Intelligence Agency -FBI National Security Branch -National Geospatial Intelligence Agency -National Reconnaissance Office -National Security Agency

CIA Information?

-Founded in 1947 (successor to OSS) -Langley, VA. -Mission-To provide accurate, comprehensive, and timely FORIGN INTELLIGENCE on national security topics and to conduct COUNTERINTELLIGENCE activities, special activities, and other functions related to foreign intelligence and national security, as directed by the President.

National Security Agency information?

-Founded in 1952 -Fort Meade, MD -Largest Component of the Community in terms of money and personnel -Headed by uniformed officer and civilian deputy -2 Major functions-make codes (INFOSEC) and break codes (SIGINT and COMMINT)

Attributes of Good Intelligence?

-Objectivity(does it mirror imaging, cultural bias, and prejudicial judgements) -Relevance -Accuracy -Precision (does it have the required level of detail to satisfy the needs of the end user at his or her operational level) -Completeness -Usability -Availability -Anticipation

Fallacies of Omission?

-Oversimplificaition (An inference that fails to account adequately for all of the complex conditions under consideration). -Inadequate sampling (A fallacy produced by drawing inferences (estimates) from samples that are too few or from samples that are not truly representative). -Mistaken Cause (An unwarranted cause and effect relationship established between events or conditions that coincidentally exist at the same time or precede). -False Dilemma (A fallacy in which only the extreme alternatives are considered).

Sector Specific Agencies in PPD 21?

1) As part of the broader national effort to strengthen the security and resilience of critical infrastructure, coordinate with the Department of Homeland Security (DHS) and other relevant Federal departments and agencies and collaborate with critical infrastructure owners and operators, where appropriate with independent regulatory agencies, and with SLTT entities, as appropriate, to implement this directive 2) Serve as a day-to-day Federal interface for the dynamic prioritization and coordination of sector-specific activities 3) Carry out incident management responsibilities consistent with statutory authority and other appropriate policies, directives, or regulations 4) Provide, support, or facilitate technical assistance and consultations for that sector to identify vulnerabilities and help mitigate incidents, as appropriate and 5) Support the Secretary of Homeland Security's statutorily required reporting requirements by providing on an annual basis sector-specific critical infrastructure information.

Implementation of PPD 21 Directive?

1) Critical Infrastructure Security and Resilience Functional Relationships 2.)Evaluation of the Existing Public-Private Partnership Model. 3.) Identification of Baseline Data and Systems Requirements for the Federal Government to Enable Efficient Information Exchange. 4) Development of a Situational Awareness Capability for Critical Infrastructure. 5) Update to National Infrastructure Protection Plan. 6) National Critical Infrastructure Security and Resilience R&D Plan

Secretary of Homeland Security Responsibilities in PPD 21?

1) Identify and prioritize critical infrastructure, considering physical and cyber threats, vulnerabilities, and consequences, in coordination with SSAs and other Federal departments and agencies 2) Maintain national critical infrastructure centers that shall provide a situational awareness capability that includes integrated, actionable information about emerging trends, imminent threats, and the status of incidents that may impact critical infrastructure 3) In coordination with SSAs and other Federal departments and agencies, provide analysis, expertise, and other technical assistance to critical infrastructure owners and operators and facilitate access to and exchange of information and intelligence necessary to strengthen the security and resilience of critical infrastructure 4) Conduct comprehensive assessments of the vulnerabilities of the Nation's critical infrastructure in coordination with the SSAs and in collaboration with SLTT entities and critical infrastructure owners and operators 5) Coordinate Federal Government responses to significant cyber or physical incidents affecting critical infrastructure consistent with statutory authorities 6) Support the Attorney General and law enforcement agencies with their responsibilities to investigate and prosecute threats to and attacks against critical infrastructure 7) Coordinate with and utilize the expertise of SSAs and other appropriate Federal departments and agencies to map geospatially, image, analyze, and sort critical infrastructure by employing commercial satellite and airborne systems, as well as existing capabilities within other departments and agencies and 8) Report annually on the status of national critical infrastructure efforts as required by statute.

Innovation and Research Development in PPD 21?

1) Promoting R&D to enable the secure and resilient design and construction of critical infrastructure and more secure accompanying cyber technology 2) Enhancing modeling capabilities to determine potential impacts on critical infrastructure of an incident or threat scenario, as well as cascading effects on other sectors 3) Facilitating initiatives to incentivize cybersecurity investments and the adoption of critical infrastructure design features that strengthen all-hazards security and resilience and 4) Prioritizing efforts to support the strategic guidance issued by the Secretary of Homeland Security.

Federal Responsibilities in PPD 21?

1) The Department of State, in coordination with DHS, SSAs, and other Federal departments and agencies, shall engage foreign governments and international organizations to strengthen the security and resilience of critical infrastructure located outside the United States and to facilitate the overall exchange of best practices and lessons learned for promoting the security and resilience of critical infrastructure on which the Nation depends. 2) The Department of Justice (DOJ), including the Federal Bureau of Investigation (FBI), shall lead counterterrorism and counterintelligence investigations and related law enforcement activities across the critical infrastructure sectors. DOJ shall investigate, disrupt, prosecute, and otherwise reduce foreign intelligence, terrorist, and other threats to, and actual or attempted attacks on, or sabotage of, the Nation's critical infrastructure. The FBI also conducts domestic collection, analysis, and dissemination of cyber threat information, and shall be responsible for the operation of the National Cyber Investigative Joint Task Force (NCIJTF). The NCIJTF serves as a multi-agency national focal point for coordinating, integrating, and sharing pertinent information related to cyber threat investigations, with representation from DHS, the Intelligence Community (IC), the Department of Defense (DOD), and other agencies as appropriate. The Attorney General and the Secretary of Homeland Security shall collaborate to carry out their respective critical infrastructure missions. 3) The Department of the Interior, in collaboration with the SSA for the Government Facilities Sector, shall identify, prioritize, and coordinate the security and resilience efforts for national monuments and icons and incorporate measures to reduce risk to these critical assets, while also promoting their use and enjoyment. 4) The Department of Commerce (DOC), in collaboration with DHS and other relevant Federal departments and agencies, shall engage private sector, research, academic, and government organizations to improve security for technology and tools related to cyber-based systems, and promote the development of other efforts related to critical infrastructure to enable the timely availability of industrial products, materials, and services to meet homeland security requirements. 5) The IC, led by the Director of National Intelligence (DNI), shall use applicable authorities and coordination mechanisms to provide, as appropriate, intelligence assessments regarding threats to critical infrastructure and coordinate on intelligence and other sensitive or proprietary information related to critical infrastructure. In addition, information security policies, directives, standards, and guidelines for safeguarding national security systems shall be overseen as directed by the President, applicable law, and in accordance with that direction, carried out under the authority of the heads of agencies that operate or exercise authority over such national security systems. 6) The General Services Administration, in consultation with DOD, DHS, and other departments and agencies as appropriate, shall provide or support government-wide contracts for critical infrastructure systems and ensure that such contracts include audit rights for the security and resilience of critical infrastructure. 7) The Nuclear Regulatory Commission (NRC) is to oversee its licensees' protection of commercial nuclear power reactors and non-power nuclear reactors used for research, testing, and training nuclear materials in medical, industrial, and academic settings, and facilities that fabricate nuclear fuel and the transportation, storage, and disposal of nuclear materials and waste. The NRC is to collaborate, to the extent possible, with DHS, DOJ, the Department of Energy, the Environmental Protection Agency, and other Federal departments and agencies, as appropriate, on strengthening critical infrastructure security and resilience. 8) The Federal Communications Commission, to the extent permitted by law, is to exercise its authority and expertise to partner with DHS and the Department of State, as well as other Federal departments and agencies and SSAs as appropriate, on: (1) identifying and prioritizing communications infrastructure (2) identifying communications sector vulnerabilities and working with industry and other stakeholders to address those vulnerabilities and (3) working with stakeholders, including industry, and engaging foreign governments and international organizations to increase the security and resilience of critical infrastructure within the communications sector and facilitating the development and implementation of best practices promoting the security and resilience of critical communications infrastructure on which the Nation depends. 9) Federal departments and agencies shall provide timely information to the Secretary of Homeland Security and the national critical infrastructure centers necessary to support cross-sector analysis and inform the situational awareness capability for critical infrastructure

What are the four key intelligence challenges and what else does Intelligence and Analysis do?

1. Customer understanding of aviation security 2. Operational effectiveness for Border Security. 3. Integrity of Cybersecurity. 4. Inform operators and decision-makers to Counter Violent Extremism. Intelligence and Analysis collaborates on Nationwide Suspicious Activity Reporting (SAR) initiative with FBI. They also support National Network of Fusion Centers.

What are the four key intelligence challenges?

1. Customer understanding of aviation security. 2. Operational effectiveness for Border Security. 3. Integrity of Cybersecurity. 4. Inform operatiors and devisen-makers to Counter Violent Extremism.

Agencies within Homeland Security?

1. Customs and Border Protection 2. Immigration and Customs Enforcement 3. Citizenship and Immigration Services 4. Coast Guard 5. Federal Emergency Management Ageny 6. Secret Service 7. Transportation Security Administration 8. Intelligence and Analysis 9. Domestic Nuclear Detection Office 10. National Protection and Programs Directorate 11. Policy 12. Health Affairs 13. Science and Technology Directorate 14. Federal Law Enforcement Training Center (FLETC) 15. Privacy Office 16. Civil Rights and Civil Liberties

What are the Four topical Mission objectives according to the National Intelligence Strategy-2014?

1. Cyber Intelligence-provide intelligence on cyber threats 2. Counterterrorism-understand and counter those involved in terrorism and related activities 3. Counterproliferation-Counter the threat and proliferation of weapons of mass destruction 4. Counterintelligence-Thwart efforts of foreign intelligence entities.

What 6 areas does the Science and Technology Directorate cover?

1. First Responders 2. Borders and Maritime Security 3. Cybersecurity 4. Chemical and Biological Defense. 5. Explosives 6. Resilience.

What are the 6 types of Intelligence?

1. Human Intelligence (HUMINT) 2. Signals Intelligence (SIGINT) 3. Imagery Intelligence (IMINT) 4. Military Intelligence and Measurement and Signature Intelligence (MASINT) 5. Open Source Intelligence (OSINT) 6. Geospatial Intelligence (GEOINT)

What are some (4) examples of The National Protection and Programs Directorate's responsibilities?

1. Inspect chemical facilities for security protocols. 2. Issue cybersecurity alerts to private and public sector 3. Plan security efforts with state and local partners for national events (Super Bowl, Inauguration, etc.) 4. Screen visitors at federal buildings for weapons.

Who are the Four Cyber Security Threat Actors?

1. Pranksters 2. Super-Criminals 3. Hacktivists (Terrorists included here) 4. Nation-State Attackers (Terrorists included here)

What are the Five Core Missions of the QSHR?

1. Prevent Terrorism and Enhance Security 2. Secure and Manage our Borders 3. Enforce and Administer our Immigration Laws 4. Safeguard and Secure Cyberspace 5. Strengthen National Preparedness and Resilience

What are the three risk attitudes?

1. Risk Averse-Fear loss and seek sureness 2. Risk Neutral-Are Indifferent to uncertainty 3. Risk lovers-Hope to "win big" and don't mind losing as much

What are the Three Objectives for National Intelligence Strategy?

1. Strategic Intelligence-Addresses issues of enduring national security interest. 2. Anticipatory Intelligence-Addresses new and emerging trends, changing conditions, and under appreciated developments, 3. Current Operations Intelligence-Supports planned and ongoing operations.

What are the three foundations mission objectives for the IC according to the National Intelligence Strategy-2014?

1. Strategic Intelligence-Inform and enrich understanding of enduring national security issues. 2.. Anticipator intelligence-Detect, identify, and warn of emerging issues and discontinuities 3. Current Operations-Support ongoing actions and sensitive intelligence operations.

What are the Six prevailing challenges to Homeland Security according to the QSHR?

1. Terrorist threat 2. Cyber threat 3. Biological Concerns 4. Nuclear Terrorism 5. Trannational criminal organizations 6. Natural Hazards

What are the 4 levels of classification?

1. Unclassified 2. Confidential-Information which would "damage" national security if disclosed 3. Secret-Information which would cause "serious damage" to national security. 4. Top Secret-Information that would cause "exceptionally grave damage" to national security if disclosed.

What is the length of where we monitor the border?

100 miles.

Who funds the Office of Intelligence and Analysis?

100% of the budget is funded by National Intelligence Programs, NOT the DHS.

What is the U.S. Intelligence's total funding?

52.6 billion dollars (leaked by E. Snowden).

What one event led to the recognition of DHS?

9/11.

What is a calamity?

A massive or extreme catastrophic disaster that extends over time and space.

What is a Disaster?

An event in which a community undergoes severe danger and incurs, or is threatened to incur, such losses to persons and/or property that the resources available within the community are severe taxed.

What is a catastrophe?

An event in which a society incurs, or is threatened to incur, such losses to persons and/or property that the entire society is affected and extraordinary resources and skills are required some of which must come from other nations.

What is an Emergency?

An unexpected event which places life and/or property in danger and requires an immediate response through the use of routine community resources and procedures.

What is an accident?

An unexpected or undesirable event, especially one causing injury to a small number of individuals and/or modest damage to physical structures. Example: Automobile wreck, lighting strike at one house.

What is Military Intelligence and Measurement and Signature Intelligence (MASINT)?

Army Field Manual 2.0: -technically derived intelligence that detects, locates, tracks, identifies, and/or describes the specific characteristics of fixed and dynamic target objects and sources. -Includes aspects of IMINT and SIGINT. -Collection systems include radar, spectrogradiotmetic, E-O, acoustic, RF, nuclear detection, and seismic sensors, as well as techniques for gathering Nuclear, Biological, and Chemical (NBC) and other material samples.

What is Strategic Intelligence?

Broadest of scope-focused on economics, large-scale capabilities, and intentions. Tend to be at the National or Regional Level. Greater incorporation of non-state actors in recent years. Also include longer-term trends and developments.

What is Imagery Intelligence (IMINT)?

Capture of data from satellites and aerial photography.

Designated Critical Infrastructure Sectors and Sector-Specific Agencies?

Chemical: Sector-Specific Agency: Department of Homeland Security Commercial Facilities: Sector-Specific Agency: Department of Homeland Security Communications: Sector-Specific Agency: Department of Homeland Security Critical Manufacturing: Sector-Specific Agency: Department of Homeland Security Dams: Sector-Specific Agency: Department of Homeland Security Defense Industrial Base: Sector-Specific Agency: Department of Defense Emergency Services: Sector-Specific Agency: Department of Homeland Security Energy: Sector-Specific Agency: Department of Energy Financial Services: Sector-Specific Agency: Department of the Treasury Food and Agriculture: Co-Sector-Specific Agencies: U.S. Department of Agriculture and Department of Health and Human Services Government Facilities: Co-Sector-Specific Agencies: Department of Homeland Security and General Services Administration Healthcare and Public Health: Sector-Specific Agency: Department of Health and Human Services Information Technology: Sector-Specific Agency: Department of Homeland Security Nuclear Reactors, Materials, and Waste: Sector-Specific Agency: Department of Homeland Security Transportation Systems: Co-Sector-Specific Agencies: Department of Homeland Security and Department of Transportation Water and Wastewater Systems: Sector-Specific Agency: Environmental Protection Agency

What does the Office of Intelligence and Analysis do?

Coordinates all intelligence operations within DHS. Link with Intelligence Community in that it is the only member authorized to deliver intel to state, local, tribal, territorial, and private sector partners. It creates analytic intel products for dissemination throughout DHS. Collaborates on Nationwide Suspicious Activity reporting (SAR) initiative with FBI. Supports National Network of Fusion Centers.

What is Signals Intelligence (SIGINT)?

Derived from electronic signals and systems (communications systems, radars, weapons systems). NSA primary agency responsible (focus only on foreign intelligence).

Accessing validity of intelligence?

Developing Inferences 1. Use all applicable, relevant information 2. Describe and integrate fragmented information 3. Formulate premises 4. Develop alternative hypothesis 5. Use probability values to assess certainty 6. Avoid logical fallacies = CERTANITY PROBABILITY CONFIDENCE

Security Clearances?

Difference IC agencies have their own policies for granting clearances. Investigations include NACLC, SSBI, and Polygraphs. Top secret clearances can take 6 months to over a year.

What is the answer to 40?

E.

What is the answer to number 39?

E.

What is a J Visa?

EXCHANGE Visa used for business & medial training in U.S., research scholars, professors, and exchange visitors get it.

What does Immigration and Customs Enforcement do and their two key divisions?

Enforces federal laws regarding border control, customs, trade, and immigration. Two main divisions: 1. Enforcement and Removal Operations (ERO)-Identification, apprehension, and removal of criminal aliens in the United Statuses well as those apprehended by CBP officers and agents patrolling our nation's borders. 2. Homeland Security Invstigations (HSI)-Investigates all types of cross-border criminal activity, including: Financial crimes, theft, cybercrime, human rights violations, human smuggling and trafficking, immigration, document and benefit fraud, narcotics and weapons smuggling, gang activity, international art and antiquity theft.

What is a Natural Hazard?

Events associated with normal geophysical and biological processes that cause death, injury or loss of home, property or income. (Intensity of hazard may be influenced by human modifications of the landscape (e.g. deforestation and urbanization influence flood frequency and magnitudes) or climate (e.g. heat waves in urban areas). Includes Atmospheric (Meteorolical-cyclones, thunderstorms, blizzards, heatwaves, etc.), Geological (Earth-earthquakes, volcanoes, tsunami, landslides, subsidence, mudflows, sinkholes), Hydrological (Water), Extraterrestrial (meteorites, asteroids, space weather), and Biological hazards (diseases, epidemics, pandemics, overpopulation, and famine).

What is the National Protection and Programs Directorate?

Focus is on Physical and Cyber Critical Infrastructure Protection. It is Guided by HSPD-7 and the National Infrastructure Protection Plan (NIPP). It uses a risk management framework for continuous protection and planning. It coordinates information sharing, public-private partnerships, and strategic planning for critical infrastructure protection. Oversees Biometric program (US-VISIT) for DHS. Employs Federal Protective Service to serve federal facilities.

What is Geospatial Intelligence (GEOINT)?

Geographically-linked intelligence about human activity. May include IMNT, MASINT, and SIGINT, but not always. Limited to Earth-bound assessments (no Space or Atmospheric analysis).

When something happens, how does the Federal Government usually prepare for terrorism?

In a Reactionary way.

Information Processing?

Information->Usefulness Accuracy Correctness->Evaluation->Collation (exclusion of not needed information, arrangement of information in a form which enables real-time analysis, system for rapid retrieval of information)->Intelligence.

What is Classified Information?

Intelligence and sensitive information protected by classification. Individuals are restricted from accessing classified information. Permission is granted only if the individual has proper clearance and the individual has a need to know.

What is Open Source Intelligence (OSINT)?

Intelligence collected from publicly-available sources (News articles, Public Facebook pages, Public tweets, Blog posts, Yelp). Often uses advanced computational data collection and analysis programs to draw intelligence conclusions. Empowered both government and citizen.

What is Intelligence?

Intelligence is the process by which specific types of information important to national security are REQUESTED, COLLECTED, ANALYZED, AND PROVIDED to policymakers; the PRODUCTS of that process; the SAFEGUARDING of these processes and this information by counterintelligence activities; and the carrying out of OPERATIONS as requested by lawful authorities"-Mark Lowenthal, Intelligence: From Secrets to Policy.

Definition of Terrorism?

Involves violent acts to coerce a civilian population, influence policy or coerce the government.

What is intelligence the result of and what can it be?

It is the result of analyzing information, it can be public (open source) or classified.

Post 9/11 Development as far as intelligence?

Law Enforcement and government officials may: Conduct searches of homes and office without prior notice, use roving wiretaps to listen in on phone conversations, and monitor computers and e-mail message, including eavesdropping on attorney/client conversations. The use of military tribunals for prosecution of terrorists. The establishment of a national identification card system.

Are we kicking illegal immigrants out more or less now?

Less.

What are the two things we have?

Life and Property.

What is an Anthropogenic Intentional Hazards?

Mass shootings, civil disobedience, terrorism , and weapons of mass destruction.

Cognitive biases in intelligence?

Mental errors caused by simplified information processing strategies. Include emotional or cultural things, district from ones own self interest. Have to do something about this.

What barriers are their to Information Sharing?

Policies and practices inhibit routine information exchange, increasing sophistication of criminal activity, inadequate safeguards to promote trust and protect privacy, lack of coordination of information sharing initiatives across law enforcement and homeland security communities, and inadequate technology and tools.

What type of material does the Global Nuclear Detection Architecture deal with (2 types)?

Radiological and Nuclear (NR) material.

What is an SCIF?

Sensitive Compartmentalized Information Facility (Electronic devices).

What is a Crises?

Short period of extreme danger, acute emergency.

What is Tactical Intelligence?

Smallest Scope, Immediate info. on selected targets-who to target, which door to open, etc. Very specific to locality, sub-component of a group, or specific assist of criminal organization.

What is an F Visa?

Student Visa.

What is an Anthropogenic Non-Intentional Hazard?

Technological-Acts of people, technological systems that fail because of complexities and human fallibility (accidents), hazardous materials, environmental, industrial, mining, nuclear, transportation, structural.


संबंधित स्टडी सेट्स

Neat pathognomonics and cool stuff

View Set

Business Innovation Final Set #2

View Set

Chapter 01 - A Preview of Cell Biology

View Set

Physical Science (PSY151) Chapter 5: Les Thomas

View Set

Econ Unit 6 Fiscal Policy: Government Taxation and Spending

View Set