Intelligence and Homeland Security Final Study
Libya has the largest ballistic missile force in the Middle East
False
Most leaks of intelligence and other national security information come from congress.
False
Most of the Directors of Central Intelligence (DCIs) were professional intelligence officers and had wartime intelligence experience before taking that position.
False
Since World War II, most U.S. presidents have had significant exposure to national intelligence before taking office.
False
What term is referred to when authorizers may approve a program but find that it is not given sufficient funds, or any funds from appropriators?
Hollow budget authority
ISE facilitates the sharing of terrorism information including
Homeland Security information, Weapons of mass destruction, and Law Enforcement information
What committees are the primary authorizers of the intelligence budget?
House Permanent Select Committee Senate Select Committee
GEOINT SIGINT HUMINT MASINT
Images, Static, and Video May encounter communications silence, use of secure lines, spoofing of phony traffic Requires more time to acquire and validate Requires a great deal of Processing and Exploitation
Groupthink
Individuals avoid raising controversial issues or alternative solutions, and there is loss of individual creativity, uniqueness and independent thinking
The Intelligence Cycle is the Process by Which
Information is aquires, converted into finished intelligence, and intelligence is made available to policymakers
Low Confidence
Information is scant, questionable or fragmented, leading to difficulties in making "solid analytical inferences"; or is based on sources that may be problematic
The __________ radically changed the top management structure of the intelligence community after the National Security Act of 1947
Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA)
All-Source Intelligence refers to
Intelligence based on as many collection sources as possible to compensate for the shortcomings of each and to profit from their combined strength.
The Intelligence Oversight Act requires that;
Intelligence committees be kept fully and currently informed of all intelligence activities carried out by or on behalf of the United States, including any significant anticipated activity. & Notification is not a necessary precondition for beginning an activity & Timely reports on any illegal activity or significant intelligence failure
All-Source Analysis
Intelligence information derived from several or all of the intelligence disciplines, including SIGINT, HUMINT, MASINT, OSINT, and GEOINT.
ISR stands for
Intelligence, Surveillance, and Reconnaissance
What nation continues to be the foremost state sponsor of terrorism to include the Lebanese Hizballah group?
Iran
the former Soviet Union was a uniquely difficult target for intelligence collection and analysis because
It was a very large nation to hide capabilities. Large areas of the Soviet Union were subject to adverse weather disrupting overhead collection. The Soviet Union was a closed and heavily policed society.
Estimates are not predictions of the future but are considered __________ as to the like course of events regarding an issue of importance to our nation
Judgements
High Confidence
Judgements based on high quality information, or the nature of the issue makes a solid judgement possible.
__________ regarding Alternative Analysis refers to analysts that can fasten on one line of analysis, especially for issues that are examined and reexamined over the years, and not open to other possible hypothesis or alternatives.
Premature Closure
The __________ meets irregularly and is made of the NSC members (less the president) and is presided over by the national security advisor.
Principals Committee
"Jaded" Analysts"
Proceeds from false assumption that each incident is much like others.
Which phase of the Intelligence Cycle provides synthesizing of raw information into a useable state?
Processing
Which phase of the intelligence cycle requires substantial intelligence resources devoted to the synthesis of data into a form that intelligence analysts can use?
Processing
Information must undergo what before in can be regarded as intelligence and given to analysts?
Processing and Exploitation
key steps in converting technically collected information into intelligence is the resulted from the __________ phase of the intelligence cycle.
Processing and Exploitation
The U.S. rebalance of the Pacific by the Obama administration focused on
Regional Stability
As a matter of organization, most intelligence services divide at least their analytical offices into __________ or issue-oriented offices.
Regional and Subject matter
Estimative Language
Remote, unlikely, even chance, probably, almost certain
Current Intelligence
Reports and analysis on issues that may not extend more than a week or two in the future is most often seen and requested by policy makers.
"Jaded" Analysts can be characterized by: Representing intellectual dishonesty
Representing intellectual dishonesty
According to Lowenthal, identifying __________ defines policy issues or areas to which intelligence is expected to make a contribution and their priorities.
Requirements
According to Lowenthal, who was the founder of the intelligence community in regards of the estimative process?
Sherman Kent
Who is responsible for research and development, acquisition, launch, deployment, and operation of overhead systems and related data processing facilities to collect intelligence and information to support national and departmental missions and other United States Government needs
The NRO
This term is to include the Islamic State of Iraq and ash-Sham (ISIS)—will also continue to use the Internet to organize, recruit, spread propaganda, raise funds, collect intelligence, inspire action by followers, and coordinate operations.
Terrorists
Which director serves as principal adviser to the secretary of defense and to the chairman of the Joint Chiefs of Staff on matters of military intelligence, and also chairs the Military Intelligence Board?
The Defense Intelligence Agency (DIA)
Who Collects (overtly or through publicly available sources) information relevant to United States foreign policy and national security concerns?
The Department of State (DOS)
Who Collects (overtly or through publicly available sources) foreign financial information and, in consultation with the Department of State, foreign economic information?
The Department of the Treasury
Who serves as the head of the IC and acts as the principal advisor to the President?
The Director of National Intelligence
Who Collects, analyses, produces, coordinates, and provides defense related intelligence for the Secretary of Defense?
The Director of the DIA
Who is designated as the Functional Manager for SIGINT?
The Director of the NSA
Who is the Functional Manager for GEOINT?
The Director of the National Geospacial-Intelligence Agency
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) is a collaborative effort among SLTT and federal agencies, led by the U.S. Department of Homeland Security (DHS) and the _______
The FBI
Which federal level partner has the primary coordinating role for the law enforcement domain?
The FBI
Analytical Standards
The Intelligence Reform and Terrorism Prevention Act (IRTPA) includes a number of standards for Intelligence Analysis, as well as the DNI.
Connecting billions of new devices to the Internet, but it also broadens the attack potential of cyber actors against networks and information.
The Internet of Things
Which agency is the nation's primary source of geospatial intelligence for the Dept. of Defense?
The National Geospatial-Intelligence Agency (NGA)
What provides the Intelligence Community with the mission direction of the DNI?
The National Intelligence Strategy
Intelligence officers are not allowed to make policy recommendations based on their intelligence analysis.
True
Formal Requirements
Using the intelligence process, policy makers should provide intelligence requirements and communicate them to intelligence managers
Use of language
Words in the analysis field have distinct and separate meanings that convey intelligence
Strategic Warning
Advance notice on issues that would pose a threat to national security.
Priorities process
An expression of areas of interest and their relative importance to one another
Finished intelligence is accomplished by the end of which step in the Intelligence Cycle?
Analysis
Analysts' Mindset
Analysts as a group exhibit a set of behaviors that can affect their work.
Advancing computational capabilities that benefit the economy, yet those advances also enable new military capabilities for our adversaries.
Artificial Intelligence
Before 9/11 the __________ briefed the president and senior officials.
CIA
Confidential Secret Top Secret Controlled Unclassified Information
"could be expected to cause damage to the national security." "could be expected to cause serious damage to the national security." "could be expected to cause exceptionally grave damage to the national security" Sensitive but not classified
The Intelligence Community is made up of ____ agencies and organizations?
17
Intelligence Community Directive _____ establishes sources and reference citation requirements for analytic products.
206
How many (at least) Urban Area Fusion Centers are there in the United States?
78
Who serves as the Military advisor to the NSC?
Chariman of the JCS
What produces information and not intelligence.
Collection
The Intelligence Community Inspector General (IG) is confirmed by the Senate, and is responsible to the DNI and ________
Congress
Director of the FBI
Coordinate the clandestine collection of foreign intelligence collected through human sources or through human-enabled means and counterintelligence activities INSIDE the United States
Director of the CIA
Coordinate the clandestine collection of foreign intelligence collected through human sources or through human-enabled means and counterintelligence activities OUTSIDE the United States
Which phase of the intelligence cycle distributes intelligence products to policy makers that requested? them
Dissemination
Most senior policy makers tend to think in blocks of time no longer than _____ years because of the tenure of a single administration
Four
What intelligence source provides Imagery and geospatial data produced through an integration of imagery, imagery intelligence, and geographic information
GEOINT
Which Intelligence source provides representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media?
IMINT
The ability of multiple agencies to communicate using technology is called
Interoperability
In 2013, a hacker from this country conducted an intrusion into the industrial control system of a US dam, and in 2014, actors conducted a data deletion attack against the network of a US-based casino
Iran
The current priority system is based on
National Intelligence Priorities Framework
Which administration ruled that inspectors general need permission for access to wiretaps, grand jury information, and other data.
Obama
The U.S. Department of Energy __________ is a member of the U.S. Intelligence Community
Office of Intelligence and Counterintelligence
The National Security Council consists of
President, Vice President, Secratary of State, Secretary of Defense, Secretary of Energy
Intelligence Collection derives directly from
Requirements
Regional tension will persist as China completes construction at its expanded outposts in the
South China Sea
Fusion Centers are owned and operated by
State and Local Authorities
Estimative intelligence helps policymakers to think more __________ about long-term threats
Strategically
Asad's foreign supporters - Russia, Iran, and Lebanese Hizballah - want to keep an allied regime in power and maintain their influence in
Syria
Who collects, analyzes, produces, and disseminates foreign intelligence and counterintelligence?
The CIA
Who is the Functional Manager for HUMINT?
The Director of the CIA
The principal interest of the _________ is maintaining diplomatic relations as a means of furthering U.S. policy interests
The State Department
Data vs. Knowledge
The ability to amass and manipulate large amounts of data on computers offers possibilities for analysis and forecasting.
Analyst Fungibility
The need for analysts who have more than one areas of expertise and can be shifted to higher priority during times of need.
Attributes that contribute to a failed state include
The state is no longer deemed legitimate by its own people, Social factors or crises that lead to displacement of the population, Largely independent security apparatus and suspensions of basic rights
Competitive vs. Collaborative Analysis
There is a need to bring together analysts of agencies or disciplines to work on major ongoing issues.
The large and interconnected international arms market provides opportunities to collect weapons-related intelligence at __________ or when weapons are deployed to other countries with lax security.
Trade Shows
In democracies, oversight tends to be a responsibility shared by the executive and legislative powers
True
Intentions are the plans and goals of the adversary, and pose a difficult collection problem
True
Normal state-based activities and transnational issues are not truly separable.
True
The Chinese People's Liberation Army (PLA) continues to modernize its nuclear missile force by adding more survivable road-mobile systems and enhancing its silo-based systems.
True
The DCIA controls most of the all-source analysts within the IC, and day-to-day responsibilities for espionage and covert actions.
True
Some of the most challenges associated with information sharing include:
disclosures of classified information, analysis and dissemination, and technical requirements efforts to safeguard information selected
Research Intelligence includes research studies that support both current and __________ intelligence.
estimative
Leaks come from a variety of reasons such as
show off special knowledge settle scores promote or stop a policy
Open Source Intelligence collection sources such as Social Media are subject to
Accesibilty, Deception, and Creditbility
Current Intelligence Trend Analysis Warning Intelligence Scientific and Technical Intelligence
Addresses day-to-day events Referred to as second-phase reporting, provides information on an event "Sounds and Alarm" An examination of the technical development, characteristics, performance, and capabilities of foreign technologies, including weapon systems and subsystems
Metaphors for Thinking about Analysis
Affects how one views the analytical process and expectations of outcomes.
Alternative Analysis
Aid judgment on important issues requiring careful weighing of alternative explanations or conclusions.
The ISE Privacy Guidelines apply to:
All Terrorism related information about U.S. Citizens and lawful permanent residents
Which phase of the intelligence cycle includes integrating, evaluating and analyzing all available data, and distilling it into final intelligence products?
Analysis
On the Ground Knowledge
Analysts have varying degrees of direct knowledge about the nations they write, and want to be perceived as experienced.
The DNI presents The Worldwide Threat Assessment of the US Intelligence Community to Congress
Annually
Under the National Priorities Framework, intelligence requirements are reviewed __________ by the president and the NSC.
Annually
The ratio between collection versus processing and exploitation depends on
Available Resources and Policy Makers
Moderate Confidence
Available information is susceptible to multiple interpretations; or there may be alternative views; or the information is "credible or plausible" but not sufficiently corroborated.
Intelligence products that tally up the number of forces, equipment and manpower in foreign militaries is referred as
Bean Counting
The Department of State __________ provides the Secretary of State with timely, objective analysis of global developments as well as real-time insights from all-source intelligence.
Bureau of Intelligence and Research
The Senate Intelligence Committee has exclusive jurisdiction over
CIA
Which Intelligence Agency was created by the National Security Act of 1947?
CIA
Which National Intelligence Agency is the primary collector of HUMINT?
CIA
The composition of SIGINT includes
COMINT, ELINT, FISINT
Warning intelligence includes the identification or forecasting of events such as a __________
Coup
The executive branch has tended to focus its oversight on issues related to espionage and
Covert Action
The production of analysis should stand out on its own merits by adding value to include:Timeliness of intelligence products Ability of the community to tailor products to specific policy maker's needs Objectivity of the analysis All the above
- Timeliness of intelligence products - Ability of the community to tailor products to specific policy maker's needs - Objectivity of the analysis (All the above)
National Security Interests in the 2015 Fund for Peace 1. Afghanistan 2. Pakistan and North Korea 3. Nigeria 4. Haiti
1. U.S. and allied troops are engaged there 2. Have nuclear weapons 3. have significant oil deposits 4. local concern for the U.S.
Access to Classified Information, as stated in EO _____, is a person may have access to classified information
13526
The __________ is responsible for the collection, analysis, and dissemination of drug-related intelligence.
DEA
The __________ is the only element of the U.S. Intelligence Community statutorily charged with delivering intelligence to state, local, tribal, territorial and private sector partners, and developing intelligence from those partners for the Department and the IC.
DHS Office of Intelligence and Analysis
Who has shared responsibility for MASINT?
DIA and NGA
The 2010 Intelligence Authorization Act gives the _____ authority to conduct an "accountability review" of an intelligence community element.
DNI
The current Director of National Intelligence
Dan Coats
Politicized Intelligence
Deliberately distorting analysis or judgments to favor a preferred line of thinking that occurs if products are forced to conform to policymakers' views.
The FBI is associated with
Department of Justice
Director of NSA
Designated the Functional Manager for Signals Intelligence (SIGINT)
Director of the National Geospatial-Intelligence Agency
Designated the Functional manager for GEOINT
The Under Secretary for I&A for the Department of Homeland Security serves as DHS' chief intelligence officer and is responsible to both the Secretary of Homeland Security and the
Director of National Intelligence
National Intelligence Estimates (NIE) are signed by the __________ and presented to the President and other senior officials.
Director of National Intelligence (DNI)
__________ is referred as a bureaucratic mechanism by which analysts can challenge the views of their superiors without risk to their careers.
Dissent Channels
The essence of congressional oversight is the ability to gain access to information, usually held by the __________
Executive Branch
United States intelligence activities are governed by
Executive Order 12333
Which agency is primarily responsible for investigating domestic terrorist attacks?
FBI
A __________ is one in which there has been a breakdown of the legitimacy of the government to maintain a level of control over its own territory.
Failed State
The National Security Council staff reports directly to the Director of Homeland Security
False
Has the potential to cure diseases and modify human performance, which presents new ethical and security issues.
Genome Editing
Indications and Warning (I&W)
Giving policy makers advance warning of significant events (usually military)
GEOINT SIGINT HUMINT OSINT
Graphic and Compelling Military Targets tend to communicate in regular paters Relatively Inexpensive More Readily Available
What is the most common sensitive but unclassified (SBU) system used for information sharing and analytic collaboration among fusion centers?
HSIN-Intel
Competitive Analysis
Having different agencies with different points of view on the same issue
__________ refers to the use of judgements or assumptions made in one analysis as the factual basis for judgements.
Layering
is to assume that present conditions will largely prevail near term
Linear Analysis
Warning analysis involves the exploration of alternative futures and __________ / __________scenarios.
Low probability/High Impact
I&W is primarily a __________ intelligence function with emphasis on surprise attack.
Military
What assumes that other leaders, states and groups share motivations or goals similar to those most familiar with analysts?
Mirror Imaging
Red Cells
Models the behavior of an individual or group by trying to replicate how an adversary would think about an issue.
An intelligence activity to keep track of activities in foreign countries is referred as
Monitoring
Analyst Training
Most useful in giving incoming analysts of what is expected of them, how the larger community works, and its ethos and rules.
Which DoD agency builds and maintains the IC's satellite fleet?
NRO
Which U.S. Government agency is in charge of designing, building, launching, and maintaining America's intelligence satellites?
NRO
The __________ attempt to project existing military, political and economic trends into the future and likely implications of these trends
National Intelligence Estimates
The __________ allow policymakers and the IC to identify countries or non-state actors of interest or activities that are of interest and then to give them relative levels of importance.
National Intelligence Priorities Framework
This country's exports of ballistic missiles and associated materials to several countries, including Iran and Syria
North Korea
Which country Previously conducted cyber-attacks against US commercial entities— specifically, Sony Pictures Entertainment in 2014—and remains capable of launching disruptive or destructive cyber attacks to support its political objectives.
North Korea
What intelligence source is derived from publicly available information appearing in print or electronic form including radio, television, newspapers, and internet.
OSINT
Policy makers can be a source of politicization in a variety of ways such as
Overtly, Covertly, Inadvertenly
The consequences to cyber threats include:
Physucal Consequenses, economic and security, psychological
What phase of the Intelligence cycle is the process of determining what issues need to be addressed and what information must be gathered to provide the proper answers?
Planning
Covert action decreases political costs because of ____
Plausible Deniability
Who sets the requirements within the Intelligence Cycle?
Policymakers
Which country had Possible efforts to influence the 2016 US election, and assessed that only their senior-most officials could have authorized the 2016 US election-focused data thefts and disclosures, based on the scope and sensitivity of the targets
Russia
What Intelligence source is the interception of signals between people, machines, or combination of both
SIGINT
The National Security Agency/Central Security Service (NSA/CSS) leads the U.S. Government in cryptology that encompasses:
SIGINT and Information Assurance, and Computer Network Operations
Who is responsible for designating a group as an FTO?
Secretary of State
Military activities of nation states tend to __________.
Self Reveal
Remain core to the economy and the military, yet new national security risks might arise from next-generation chips because of technology plateaus and investments by other states.
Semiconductors
Wheat vs. Chaff
The analyst's daily tasks of sifting through incoming intelligence to their portfolio remains a challenge.
Estimates
The authoritative assessment of the Director of National Intelligence (DNI) on intelligence related to a particular national security issue.
The Intelligence Reform and Terrorism Prevention Act resulted in:
The creation of the NCTC, the establishmant of the ISE, and the creation of the DNI
Opportunity Analysis
The identification by analysts of unanticipated windows of opportunity to advance U.S. policies—become a key component of intelligence products contributing to policy.
Adversaries will continue to use cyber operations to undermine US military and commercial advantage by hacking into US defense industry and commercial enterprises in pursuit of scientific, technical, and business information.
True