Intelligence and Homeland Security Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Current Intelligence

Addresses day to day events

Strategic Warning

Advance notice on issues that would pose a threat to national security.

Scientific and Technical Intelligence

An examination of the technical development, characteristics, performance, and capabilities of foreign technologies, including weapon systems and subsystems

Priorities process

An expression of areas of interest and their relative importance to one another

Finished intelligence is accomplished by the end of which step in the intelligence cycle?

Analysis

The __________ phase of the intelligence cycle includes integrating, evaluating and analyzing all available data, and distilling it into final intelligence products

Analysis

What term refers to analysts becoming more concerned about sharing information and about checking all available data that they cannot bring themselves to act on the information, or set others into action out of fear that something may have been missed?

Analytical paralysis

Under the National Priorities Framework, intelligence requirements are reviewed __________ by the president and the NSC.

Annually

According to Lowenthal, the ratio between collection versus processing and exploitation depends on __________ and _________.

Available resources and Policy Makers

Intelligence products that tally up the number of forces, equipment and manpower in foreign militaries is referred as __________.

Bean Counting

The Department of State __________ provides the Secretary of State with timely, objective analysis of global developments as well as real-time insights from all-source intelligence.

Bureau of Intelligence and Research

Before 9/11 the __________ briefed the president and senior officials.

CIA

The primary mission of the __________ is to collect, evaluate, and disseminate foreign intelligence to assist the president and senior US government policymakers in making decisions relating to the national security.

CIA

Which National Intelligence Agency is the primary collector of HUMINT?

CIA

Which intelligence agency was created by the National Security Act of 1947?

CIA

Access to Classified Information, as stated in EO _____, is a person may have access to classified information.

13526

Executive Order __________ created a program to allow for both sharing and safeguarding information with nonfederal entities.

13549

The U.S. Intelligence Community is a coalition of __________ agencies and organizations.

17

Intelligence Community Directive _____ establishes sources and reference citation requirements for analytic products.

206

Jonathan Pollard

A naval intelligence employee that passed sensitive U.S. intelligence to Israel in the 1980's

Who serves as the military advisor to the NSC?

Chairman of the JCS

In December 2015, the cyber breach of the Office of Personnel Management came from __________.

China

CIA

Collect (including through clandestine means), analyze, produce, and disseminate foreign intelligence and counterintelligence

Department of Treasury

Collect (overtly or through publicly available sources) foreign financial information and, in consultation with the Department of State, foreign economic information

Department of State

Collect (overtly or through publicly available sources) information relevant to United States foreign policy and national security concerns

According to Lowenthal, __________ produces information and not intelligence.

Collection

The Intelligence Community Inspector General (IG) is confirmed by the Senate, and is responsible to the DNI and __________ .

Congress

Director of the FBI

Coordinate the clandestine collection of foreign intelligence collected through human sources or through human-enabled means and counterintelligence activities inside the United States

Director of the CIA

Coordinate the clandestine collection of foreign intelligence collected through human sources or through human-enabled means and counterintelligence activities outside the United States

What activity by United States government is intended to prevent the proliferation of nuclear, chemical and biological capabilities to other nations?

Counter Proliferation

__________ are actions taken directly against terrorist networks and indirectly to influence and render global and regional environments inhospitable to terrorist networks.

Counter terrorism

What activities are concerned with identifying and countering the threat to security posed by hostile intelligence organizations or by individuals engaged in espionage or sabotage or subversion or terrorism?

Counterintelligence

__________ encompasses actions taken to detect and counteract foreign intelligence activity that adversely affects U.S. national security interest.

Counterintelligence

__________ is defined as information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons, or their agents, or international terrorist organizations or activities.

Counterintelligence

The __________ is responsible for the collection, analysis, and dissemination of drug-related intelligence.

DEA

The __________ is the only element of the U.S. Intelligence Community statutorily charged with delivering intelligence to state, local, tribal, territorial and private sector partners, and developing intelligence from those partners for the Department and the IC.

DHS Office of Intelligence and Analysis

Responsibility for MASINT is shared by the __________ and __________.

DIA and NGA

According to Lowenthal, National Intelligence Estimates (NIE) are signed by the __________ and presented to the President and other senior officials.

DNI

The 2010 Intelligence Authorization Act gives the _____ authority to conduct an "accountability review" of an intelligence community element.

DNI

Who is the current Director of National Intelligence (DNI)?

Dan Coats

Director of the National Geospatial-Intelligence Agency

Designated the Functional Manager for Geospatial Intelligence (GEOINT)

Director of the NSA

Designated the Functional Manager for Signals Intelligence (SIGINT)

The Under Secretary for I&A for the Department of Homeland Security serves as DHS' chief intelligence officer and is responsible to both the Secretary of Homeland Security and the __________.

Director of National Intelligence

__________ is referred as a bureaucratic mechanism by which analysts can challenge the views of their superiors without risk to their careers.

Dissent Channels

Executive Order 13691

Encourage the private sector to share cyber threat information

Executive Order 12333 defines counterintelligence as "information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect" against __________ and other activities carried out by foreign states or non-sate actors.

Espionage

What intelligence activity is directed towards the acquisition of information through clandestine operations?

Espionage

__________ is defined as intelligence activity directed toward the acquisition of intelligence through clandestine methods.

Espionage

Presidential Policy Directive 20

Establishes principles and processes for the use of cyber operations

United States intelligence activities are governed by __________.

Executive Order 12333

The Pakistan western border region with Afghanistan is referred as __________ .

FATA

JCAT is co-staffed by DHS and _____ representatives and incorporates police officers, fire fighters, and emergency managers from across the U.S.

FBI

The Joint Terrorism Task Forces (JTTFs) are led by the __________ .

FBI

The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) is a collaborative effort among SLTT and federal agencies, led by the U.S. Department of Homeland Security (DHS) and the __________.

FBI

Which agency is primarily responsible for investigating domestic terrorist attacks?

FBI

Domestic telephones can be tapped, but only after intelligence agents have obtained a warrant from what special federal court?

FISA

A __________ is one in which there has been a breakdown of the legitimacy of the government to maintain a level of control over its own territory.

Failed State

An employee being accorded the privilege of a security clearance automatically gains access to all intelligence information available.

False

Libya has the largest ballistic missile force in the Middle East.

False

Most leaks of intelligence and other national security information come from congress.

False

Most of the Directors of Central Intelligence (DCIs) were professional intelligence officers and had wartime intelligence experience before taking that position.

False

Since World War II, most U.S. presidents have had significant exposure to national intelligence before taking office.

False

Terrorist groups typically operate from large, easily identifiable infrastructures and rely on extensive communications networks.

False

The National Security Council staff reports directly to the Director of Homeland Security

False

The illicit drug threat in the United States is declining, as indicated by less US drug deaths, foreign drug production, and drug seizures.

False

What intelligence source provides Imagery and geospatial data produced through an integration of imagery, imagery intelligence, and geographic information

GEOINT

What is the term that accused spies would threaten to reveal classified information in open court as a means of avoiding prosecution?

Graymail

What term is referred to when authorizers may approve a program but find that it is not given sufficient funds, or any funds from appropriators?

Hollow budget authority

What committees are the primary authorizers of the intelligence budget? (Choose all that apply)

House Permanent Select Committee Senate Select Committee

The Director of the Central Intelligence Agency is designated as the Functional Manager for __________.

Human Intelligence

What Intelligence source provide representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media

IMINT

Which act called for the NCTC to be established?

Intelligence Reform and Terrorism Prevention Act of 2004

Since the inception of the National Security Act of 1947, the __________ radically changed the top management structure of the intelligence community.

Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA)

All-source Intelligence refers to __________.

Intelligence based on as many collection sources as possible to compensate for the shortcomings of each and to profit from their combined strength.

The __________ director serves as principal adviser to the secretary of defense and to the chairman of the Joint Chiefs of Staff on matters of military intelligence, and also chairs the Military Intelligence Board.

Inter

What nation continues to be the foremost state sponsor of terrorism to include the Lebanese Hizballah group?

Iran

__________ members are state, local, tribal, and territorial first responders and public safety professionals from around the country, working side-by-side with federal intelligence analysts from the National Counterterrorism Center (NCTC), Department of Homeland Security (DHS), and the Federal Bureau of Investigation (FBI) to research, produce, and disseminate counterterrorism intelligence

JCAT

__________ refers to the use of judgements or assumptions made in one analysis as the factual basis for judgements.

Layering

__________ assumes that other leaders, states and groups share motivations or goals similar to those most familiar with analysts.

Mirror Imaging

An intelligence activity to keep track of activities in foreign countries is referred as __________.

Monitoring

The __________ is the head of U.S. Counterintelligence and is responsible for developing counterintelligence plans and policies.

NCSC

The __________ mission is to lead and support the counterintelligence and security activities of the US Government, the US Intelligence Community, and US private sector entities who are at risk of intelligence collection, penetration or attack by foreign and other adversaries?

NCSC

The _________ is the nation's primary source of geospatial intelligence for the Department of Defense and the U.S. Intelligence Community in support of U.S. national security and defense, as well as disaster relief.

NGA

The primary mission of the __________ is to develop a Government-wide insider threat program for deterring, detecting, and mitigating insider threats, including the safeguarding of classified information from exploitation, compromise, or other unauthorized disclosure, taking into account risk levels, as well as the distinct needs, missions, and systems of individual agencies.

NITTF

The __________ is the U.S. Government agency in charge of designing, building, launching, and maintaining America's intelligence satellites.

NRO

Which DoD agency builds and maintains the IC's satellite fleet?

NRO

Which agency is the primary collector of Signal's Intelligence and provides much of the cryptological expertise for DoD and the other agencies in the IC?

NSA

According to Lowenthal, the current priority system is based on the __________.

National Intelligence Priorities Framework

The __________ allow policymakers and the IC to identify countries or non-state actors of interest or activities that are of interest and then to give them relative levels of importance.

National Intelligence Priorities Framework

The __________ provides the IC with the mission direction of the Director of National Intelligence (DNI) for the next four to five years.

National Intelligence Strategy

The __________ export of ballistic missiles and associated materials to several countries, including Iran and Syria.

North Korea's

NCTC is aligned under the __________ .

ODNI

Which agency was created by the Intelligence Reform and Terrorism Prevention Act of 2004?

ODNI

What intelligence source is derived from publicly available information appearing in print or electronic form including radio, television, newspapers, and internet.

OSINT

Which administration ruled that inspectors general need permission for access to wiretaps, grand jury information, and other data.

Obama

The U.S. Department of Energy __________ is a member of the U.S. Intelligence Community.

Office of Intelligence and Counterintelligence

What phase of the Intelligence cycle is the process of determining what issues need to be addressed and what information must be gathered to provide the proper answers?

Planning

Who sets the requirements within the Intelligence Cycle?

Policy Makers

__________ regarding Alternative Analysis refers to analysts that can fasten on one line of analysis, especially for issues that are examined and reexamined over the years, and not open to other possible hypothesis or alternatives.

Premature Closure

The Information Security Oversight Office reports annually to the __________ on security classification system.

President

The __________ meets irregularly and is made of the NSC members (less the president) and is presided over by the national security advisor.

Principals Committee

The __________ phase of the Intelligence Cycle provides synthesizing of raw information into a useable state

Processing

The __________ phase of the intelligence cycle requires substantial intelligence resources devoted to the synthesis of data into a form that intelligence analysts can use

Processing

According to Lowenthal, Information must undergo __________ before it can be regarded as intelligence and given to analysts.

Processing and Exploitation

According to Lowenthal, key steps in converting technically collected information into intelligence is the resulted from the __________ phase of the intelligence cycle.

Processing and Exploitation

Trend Analysis

Referred to as second-phase reporting, provides information on an event or series of events.

Current Intelligence

Reports and analysis on issues that may not extend more than a week or two in the future is most often seen and requested by policy makers.

"Jaded" Analysts can be characterized by:

Representing intellectual dishonesty

According to Lowenthal, Intelligence collection derives directly from __________.

Requirements

According to Lowenthal, identifying __________ defines policy issues or areas to which intelligence is expected to make a contribution and their priorities.

Requirements

NRO

Responsible for research and development, acquisition, launch, deployment, and operation of overhead systems and related data processing facilities to collect intelligence and information to support national and

Edward Snowden

Revealed that the United States collected intelligence against various European Allies

The Syrian regime is primarily backed by; (Choose all that apply)

Russia and Iran

Aldrich Ames

Russia used to spy against the United States

What Intelligence source is the interception of signals between people, machines, or combination of both

SIGINT

Chinese espionage puts special emphasis on __________ targets.

Science and Technology

Who is responsible for designating a group as an FTO?

Secretary of State

The NCTC Director is appointed by the President and confirmed by the __________ .

Senate

Tallinn Manual on International Law Applicable to Cyber Warfare

Sets forth definitions of various legal issues regarding cyberspace

According to Lowenthal, who was the founder of the intelligence community in regards of the estimative process?

Sherman Kent

The Director of the National Security Agency is designated as the Functional Manager for __________.

Signals Intelligence

The National Security Agency/Central Security Service (NSA/CSS) leads the U.S. Government in cryptology that encompasses:

Signals Intelligence (SIGINT) and Information Assurance (IA) products and services Computer Network Operations (CNO)

__________ are agents that are sent to another nation to assume normal lives who then become active agents at some time later.

Sleeper agents

Regional tension will persist as China completes construction at its expanded outposts in the __________ .

South China Sea

What country remained the primary focus of activities within the IC during the Cold War?

Soviet Union

George Blake

Spied because of ideological devotion to the Soviet Union

The principal interest of the _________ is maintaining diplomatic relations as a means of furthering U.S. policy interests.

State Department

Estimative intelligence helps policymakers to think more __________ about long-term threats

Strategically

Asad's foreign supporters - Russia, Iran, and Lebanese Hizballah - want to keep an allied regime in power and maintain their influence in __________ .

Syria

Asad's foreign supporters—Russia, Iran, and Lebanese Hizballah—want to keep an allied regime in power and maintain their influence in __________ .

Syria

The _____ regime was assessed to have used the nerve agent sarin in an attack against the opposition in Khan Shaykhun on 4 April 2017 in what is probably the largest chemical weapons attack since August 2013.

Syrian

The Federal Bureau of Investigation is associated with the __________

The DOJ (Department of Justice)

Wheat vs. Chaff Problem

The analyst's daily tasks of sifting through incoming intelligence to their portfolio remains a challenge.

The DEA's office of National Security Intelligence was formally made part of the intelligence community specifically because of __________ .

The link between drugs and terrorism

MASINT

To collect against acquisition of various types of WMD

OSINT

To collect and dissect the many public statements made by terrorist leaders and factions and, tracking various social media sites.

The large and interconnected international arms market provides opportunities to collect weapons-related intelligence at __________ or when weapons are deployed to other countries with lax security.

Trade Shows

According to the 2017 Worldwide Threat Assessment, al-Qa'ida and its affiliates remain a significant CT threat overseas as they remain focused on exploiting local and regional conflicts.

True

Adversaries will continue to use cyber operations to undermine US military and commercial advantage by hacking into US defense industry and commercial enterprises in pursuit of scientific, technical, and business information.

True

Foreign Intelligence is information related to capabilities, intentions, and activities of foreign powers, organizations, or persons, but not including counterintelligence, except for information on international terrorist activities.

True

In democracies, oversight tends to be a responsibility shared by the executive and legislative powers.

True

Intelligence officers are not allowed to make policy recommendations based on their intelligence analysis.

True

Intentions are the plans and goals of the adversary, and pose a difficult collection problem.

True

Normal state-based activities and transnational issues are not truly separable.

True

The Chinese People's Liberation Army (PLA) continues to modernize its nuclear missile force by adding more survivable road-mobile systems and enhancing its silo-based systems.

True

The DCIA controls most of the all-source analysts within the IC, and day-to-day responsibilities for espionage and covert actions.

True

The Middle East and North Africa were rated as one of the worst regions associated with atrocities and instability.

True

To date, no nation has been talked out of developing nuclear weapons by diplomacy alone.

True

Formal Requirements

Using the intelligence process, policy makers should provide intelligence requirements and communicate them to intelligence managers.

Warning Intelligence

Warning intelligence "sounds an alarm" for policymakers.

Open Source Intelligence collection sources such as Social Media are subject to __________.

accessibility, credibility, and deception

The DNI presents The Worldwide Threat Assessment of the US Intelligence Community to Congress _____ .

annually

Warning intelligence includes the identification or forecasting of events such as a __________ .

coup

The executive branch has tended to focus its oversight on issues related to espionage and __________ .

covert action

The FBI, in its counterintelligence role, has put a greater emphasis on Chinese __________ espionage.

economic

Research Intelligence includes research studies that support both current and __________ intelligence.

estimative

The essence of congressional oversight is the ability to gain access to information, usually held by the __________ .

executive branch

For both practical and political reasons, narcotics has become, in part, a __________ problem.

foreign policy

Most senior policy makers tend to think in blocks of time no longer than _____ years because of the tenure of a single administration.

four

Estimates are not predictions of the future but are considered __________ as to the like course of events regarding an issue of importance to our nation

judgements

The term __________ is to assume that present conditions will largely prevail near term.

linear analysis

Warning analysis involves the exploration of alternative futures and __________ / __________scenarios.

low probability / high impact

I&W is primarily a __________ intelligence function with emphasis on surprise attack.

military

Sarin is a __________ agent.

nerve

Transnational Organized Crime (TOC) will pose a continuing threat to the United States and its allies through close relationships with foreign states and __________ .

non-state actors

Covert action decreases political costs because of __________ .

plausible deniability

The National Security Council (NSC) consists of the

president and vice president secretaries of state and defense secretary of energy

As a matter of organization, most intelligence services divide at least their analytical offices into __________ or issue-oriented offices.

regional and subject matter

The U.S. rebalance of the Pacific by the Obama administration focused on __________ .

regional stability

Military activities of nation states tend to __________.

self reveal


संबंधित स्टडी सेट्स

Internal Control: Communications and Reports

View Set

Physiological Psychology (Ch. 8)

View Set

Finals - Humanities - Egyptian Pyramids Article

View Set

Selenium Interview Questions and Answers

View Set

EMT: Chapter 15 [respiratory emergency]

View Set

Final Exam Mega Guide (all guides mixed)

View Set