IC Final study guide
The "Nuclear Club": Big 5 Nuclear Powers
US Russia Britain France China
Black Swan Events
an unlikely event, but one that would have a significant impact if it occurred. Some examples include: Severe Pandemic (fatal pathogens) Collapse of a major world player (the EU, China, US) Solar Storms (solar/geomagnetic storms that could knock out satellites) Nuclear War
Authorization for the Use of Military Force Against Terrorists (2001)
authorize the use of U.S. Armed Forces against those responsible for the recent attacks launched against the United States against those who helped carry out the September 11, 2001 attacks. The act allowed the U.S. military to use force against al Qaeda in keeping with the Geneva Convention, which allows one uniformed soldier to kill another uniformed soldier.
Executive Order 12333 (1981)
authorized the lawful killing of combatants and terrorists
Espionage Act of 1917
civilians do not have the right to reveal classified information to the public, and military personnel do not have a right to reveal classified information under the Uniform Code of Military Justice
Human Intelligence (HUMINT)
collection of information from human sources.
MASINT - measurements intel or mass intel or multiple intel
concerns weapons capabilities and industrial activities. MASINT can be used to help identify chemical weapons or pinpoint the specific features of unknown weapons systems.
Estimative Intelligence
contains analytical forecasts regarding what might occur in the future, it does not serve the same function as warning analysis. Instead of beginning with a threat, NIEs, the most common form of estimative intelligence, look at a host of current situations to examine the way they might affect national security within a given timeframe.
Criminal intelligence versus crime analysis
criminal intelligence, which uses multiple approaches to gain an understanding of criminal groups and activities, and crime analysis, which uses quantitative and qualitative measures to solve and prevent crimes.
Defense Secrets Act of 1911
criminalized the disclosure of government secrets.
Tactical
designed for near-term use, usually by on-the-ground personnel. An army unit on patrol would be interested in whether the enemy is over the next hill
ELINT
electronic intel
SIGNINT - signals intel
electronic transmissions that can be collected by ships, planes, ground sites, or satellites
PNIO: Priority National Intelligence Objectives
establish general guidelines for both collection and research. They are comprehensive, authoritative, and community-wide in their application. provide no practical guidance in settling issues of specific collection priorities.
dept of energy
expertise for all things nuclear. studies the nuclear capabilities of foreign governments, to include the assessment of foreign nuclear weapons programs and proliferation activities. OCONUS
FININT - financial intel
gathers information about the financial capabilities or motivation of the attackers.
Trading with the Enemy Act of 1917
gives the President of the United States the power to oversee or restrict any and all trade between the United States and its enemies in times of war.
US Customs and Border Protection (CBP)
inspection and enforcement agents who regulate goods coming into the country. guard America's borders and keep out illegal immigrants.
daily intelligence
involves issues immediately affecting U.S. security usually tells a policymaker what has happened within the past 24 hours and discusses ramifications of the recent events.
Criminal Intelligence
timely and accurate intelligence analysis is key to understanding the inner-workings and driving factors of crime phenomena and criminal enterprises.
High Intensity Drug Trafficking Area Program (HIDTA)
ultimately led to the National Criminal Intelligence Sharing Plan (NCISP) contained recommendations for implementing Intelligence-Led Policing in any agency, regardless of its size or jurisdiction. A counternarcotics enforcement program that coordinates activities between federal, state, and local agencies. aimed at dealing with the problem of illicit drugs
Exfiltration Operation
A clandestine rescue operation designed to bring a defector, operative or refugee and their family out of harm's way
Walk-ins
A defector who declares their intentions by walking into an official installation and asking for political asylum or volunteering to work in-place
Regional Information Sharing System Program (RISS)
A nationwide program sponsored by the Justice Department where federal, state, and local law enforcement agencies share intelligence over a secure intranet connection
NOC
A rarer and more dangerous job category in the IC is "nonofficial cover" CIA officers pose as employees of international corporations, as scientists or as members of other professions. The idea is that a NOC will not have all the "tells" of an official cover officer, and will therefore be able to conduct operational activities without receiving the same amount of host-country scrutiny that an official cover officer may receive.
GEOINT - geo-spatial intel
Also known as IMINT (imagery intel) or PHOTOINT (photo intel) the analysis and visual representation of security related activities on the earth. produced through an integration of imagery, imagery intelligence, and geospatial information.
CIA- Central intelligence agency
An independent agency Operate OCONUS responsible for providing national security intelligence to senior U.S. policymakers. HUMINT
Clearance
An individual who has been granted a particular level of clearance may view documents at that level and below, provided he or she has a need to know. Someone with a Secret clearance may view documents at the Secret and Confidential levels. Need to know means that persons must have access to that piece of information to perform their duties. Someone with a Secret clearance is not permitted to view all Secret documents; they can view only those for which they have a need to know to carry out their duties.
case officers
An intel officer who recruit non US citizen agents
dept of the air force
Belong to Department of defense America's leading provider of finished intelligence derived from airborne, space, and cyberspace sensors. It delivers decision advantage in order to enable commanders to achieve kinetic effects on targets anywhere CONUS
marine corps
Belong to Department of defense produces tactical and operational intelligence for battlefield support.
Federal Bureau of Investigation (FBI)
Belong to Dept. of justice HUMINT Law enforcement CONUS responsible for understanding threats to our national security and penetrating networks that have a desire and capability to harm the U.S.
space force
Belongs to department of defense The Secretary of the Air Force has overall responsibility for the USSF, under the guidance and direction of the Secretary of Defense. CONUS
dept of state
Both CONUS and OCONUS provides the Secretary of State with timely, objective analysis of global developments as well as real-time insights
BLUF
Bottom line up front Important information, such as one's conclusion, is rendered first. BLUF Statement should be delivered during the opening (first words) of your briefing so that people quickly become aware of the main issue or concept of your presentation Typically one sentence
Non-LE Support for Criminal Investigations in the IC
CIA NSA DIA NGA ODNI
drug production & distribution
Drug dependence is a chronic, relapsing disorder that exacts an enormous cost on individuals, families, businesses, communities, and the nation. Addicted individuals frequently engage in self-destructive and criminal behavior. Billions of dollars have been spent on the struggle against illicit drugs, with much of the funding going to policing. Humans seem to have a voracious appetite for drugs, ranging from the legal (e.g., alcohol, caffeine) to the illegal (e.g., cocaine). According to the United Nations, in 2003, the global drug trade generated an estimated $321.6 billion in revenue.
Defense intelligence agency (DIA)
HUMINT and MASINT Belong to Department of defense a major producer and manager of foreign military intelligence and provides military intelligence to warfighters, defense policymakers and force planners in support of U.S. military planning and operations and weapon systems acquisition CONUS
Main objectives of criminal intelligence
Help officials -senior law enforcers, policy makers and decision makers -deal more effectively with uncertainty and new challenges Provide timely warning of threats Support operational activities and complex investigations.
Executive Order 11905
In 1976, President Ford issued it, which included a section entitled "Restrictions on Intelligence Activities." prohibited political assassination, stating, "No employee of the United States Government shall engage in, or conspire to engage in, political assassination"
church committee
In November 1975, the Church Committee recommended an end to political assassinations after discovering that the CIA had attempted to end the lives of several leaders including Fidel Castro. In response to these findings, the Church Committee requested that the United States reject the government's use of assassination as a means to further its foreign policy.
Social Network Analysis (SNA)
In which people and their activities are tracked
Joint Terrorism Task Forces (JTTFs)
Joint Intelligence Joint terrorism task force detectives from local agencies obtain security clearances and work cases alongside FBI and other federal personnel.
department of homeland security (DHS)
Law enforcement CONUS responsible for using information and intelligence from multiple sources to identify and assess current and future threats to the U.S
Strategic
Longer term issues that have large implications and potential consequences intended to inform higher level decision makers, and the benefits are realized over the long term. The intention is to provide early warning of threats and to support senior decision-makers.
donovan plan
Maj. General William Donovan (coordinator of information/OSS) created the first permanent intelligence agency led by a central director directly supervised by the President.
Preferred Future (policy)
One area that the DNI has pledged to address is security—how can information be shared with those who need it while keeping it out of the hands of those who would do us harm?
SCIF
Sensitive Compartmented Information Facility a highly secure room called that is located within an already secure building.
Informant
those who supplied information in strictly criminal cases
Credibility, confidence and estimative language
Even products written by so-called experts can be misleading or wrong; analysts should verify beforehand that the sources and the conclusions within the sources they use are legitimate. Thus, analysts make judgments and subsequently indicate whether they possess a high, moderate, or low level of confidence in their conclusions. convey the likelihood that something will happen
Some of the IC members who engage in criminal intelligence work
FBI -Lead Criminal Intelligence DHS - HSI CIA (Crime/Narcotics Center CounterTerrorismCenter) DEA DOE DOT Navy -NCIS
dept of the treasury
FININT responsible for the receipt, analysis, collation, and dissemination of foreign intelligence and foreign counterintelligence information related to the operation and responsibilities of the Department of the Treasury CONUS
National security agency (NSA)
Military agency Belong to the DOD (department of defense) coordinates, directs, and performs highly specialized activities to protect U.S. information systems and to produce foreign signals intelligence information. Primary mission is SIGINT CONUS
National geospatial agency (NGA)
Military agency GEOINT- processing and using the imagery Belong to Department of defense provides timely, relevant, and accurate geospatial intelligence in support of national security objectives. CONUS and OCONUS
Modus operandi (MO) & Signature
Mode of operation or behavior of someone (pattern) Something done in the crime that they don't have to do to commit the crime
What is "Speaking truth to power"
Not letting personal influence sway Not letting what they want to hear sway
Mole
Planted to get picked by a government organization so they can gather government secrets
Who creates the requirements?
Potus (president of the united states) SSCI: senate select committee on intelligence HPSCI: house permanent select committee on intelligence
Celebrities in the IC
Prior to the contemporary use of a NOC, the OSS and early CIA used celebrities in their true names and true professions to conduct clandestine operations. Use of magic, illusion, Hollywood special effects for celebrity spy operations and integrated into HUMINT.
Covert op
an operation that is planned and executed to conceal the identity of or permit plausible deniability by the sponsor (operator of the op) Potus has to give approval
National reconnaissance office (NRO)
SIGINT and GEOINT designs, builds, and operates imagery satellites. Belong to Department of defense CONUS and OCONUS
In-depth Reports
Situational reports and profiles that cover myriad topics intended for use by policymakers. intended for use by working-level policymakers who continue to work for long periods of time on certain projects and need additional and detailed information
One-time vs. reoccurring briefings
Sometimes, they are called to give a one-time briefing to a policymaker. Other times, they give recurring briefings to the same audience members. Analysts' individual situations dictate how they prepare for their briefing. If they give a briefing every day to the same policymaker, they will eventually decrease their level of preparation.
The 4 drivers which will have an impact on the future
Technology Demographics Economics politics/governance
The 3 highlighted future threats
Terrorism Russia/China Encryption
Department of Justice -Criminal Intelligence Coordinating Council (CICC)
The CICC supports state, local, and tribal law enforcement and homeland security agencies in their ability to develop and share criminal intelligence and information nationwide. The CICC is a group under the U.S. Department of Justice's (DOJ) Global Justice Information Sharing Initiative (Global), an advisory body to the U.S. Attorney General. The CICC's efforts include the national fusion center initiative, the Nationwide Suspicious Activity Reporting (SAR) Initiative, and the continued implementation of intelligence-led policing.
Rendition/Extraordinary rendition
The practice itself involves the abduction of individuals, usually clandestinely, and their transfer to countries other than the United States.
Alternative Futures
The Possible: What might occur. The Probable: That which has a high likelihood of occurring. The Preferable: The sort of future we would like to have come about. When officials make policy, they are generally attempting to create the preferred future.
COVER
The background information (e.g., documentation, digital data) that supports a cover identity.
border security & immigration
The length of America's borders makes them virtually impossible to close physically. Securing the border and transportation systems continues to pose an enormous challenge. Land ports-of-entry into America stretch across 7500 miles; furthermore, there are 95,000 miles of shoreline and navigable rivers and an exclusive economic zone of 3.4 million square miles. Although many migrate legally, others exploit weaknesses in border security and enter the United States illegally. Law enforcement and intelligence agencies worry that terrorists and criminals can also exploit the porous border. A large portion of the illicit drugs used in the United States are imported from Mexico; this underscores just how difficult it is to achieve total protection.
Escort
The operations officer assigned to lead a defector along an escape route
Classification system
Top Secret: information in which the unauthorized disclosure of could be expected to cause exceptionally grave damage Secret: information in which the unauthorized disclosure of could be expected to cause serious damage Confidential: information in which the unauthorized disclosure of could be expected to cause damage
FINCEN
Treasury: Financial Crimes Enforcement Network
CYINT - cyber intel
the tracking, analyzing, and countering of digital security threats
OSINT - open source intel
a broad array of information and sources that are generally available, including information obtained from the media, professional and academic records, and public data.
US Coast Guard
a military and a law enforcement agency who belongs to DHS protects America's maritime borders, enforces laws on the high seas, and performs life-saving duties. CONUS
PDB
a publication presented to the President each morning assembled by a small team of senior-level analysts. It includes snippets taken from reports written by analysts from all 17 intelligence agencies. Each morning, the senior officer of the CIA delivers the PDB to the President.
COMINT - communication(s) intel
a type of SIGINT and refers to the interception of communications between two parties
US Citizenship and Immigration Services
adjudicates asylum cases, issues temporary work permits, and grants permanent resident and citizenship status.
Operational Analysis
aims to achieve a specific law enforcement outcome. This might be an arrest, seizure, forfeiture of assets or money gained from criminal activities, or the disruption of a criminal group. Identifying links between suspects, and their involvement in crimes and criminal activity Identifying key investigative or information gaps Providing or preparing profiles of known or suspected criminals.
USA Patriot Act (2001)
amended FISA allow wiretaps on persons rather than places; procure medical/business/travel records; info attained can be shared To improve the abilities of U.S. law enforcement to detect and deter terrorism. allowing law enforcement to use surveillance and wiretapping to investigate terror related crimes
double agent
an agent who pretends to act as a spy for one country or organization while in fact acting on behalf of an enemy.
Asset
an individual, whose identity is secret, who provides information on national security matters (terrorism and counterintelligence). the informant/spy handled by a case officer
Clandestine op
an operation conducted by government departments or agencies in such a way to assure complete secrecy or concealment.
Military deception
an operation that includes both denial and deception. Denial hides the real and deception shows the fake characteristics of an operation.
National Security Act (1947)
legally constructed the United States' first permanent, peacetime intelligence organization, the Central Intelligence Agency (CIA).
Warning intelligence
looks at potential threats against U.S. interests and prioritizes the issues with which the IC is concerned.
The Sedition Act of 1918
made it a crime for American citizens to "print, utter, or publish... any false, scandalous, and malicious writing" about the government
21st Century Challenges
natural threats drug production & distribution border security and immigration organized crime human trafficking cyber security weapons trafficking intellectual property theft CBRN Terrorism fragile states and rogue nations.
Office of the Director of National Security (ODNI)
organization that sets mission objectives cyber intelligence, counterterrorism, counterintelligence and counter proliferation Independent organization
Foreign Intelligence Surveillance Act (FISA) (1978)
prohibits government agencies, such as the Federal Bureau of Investigation (FBI) or National Security Agency (NSA), from wiretapping American citizens and those designated as "US persons" without first satisfying several requirements.
counterintelligence
protecting what we know
Classified Information and Procedures Act (ClPA)
provide certain pretrial, trial, and appellate procedures for criminal cases involving classified information
Command and control
rely on their staff and subordinate commanders to transfer plans into action. Military leaders have sought to gain an advantage over their enemies. Strength of forces, weapons technology, logistics, training, communications, and intelligence pertaining to the intention of the enemy and the ability of the commander combined with the boldness to act all play a role in military operational success
US Immigration and Customs Enforcement (ICE)
responsible for enforcing immigration laws. detect and remove illegal aliens and investigate criminal matters relating to illegal immigration.
drug enforcement agency (DEA)
responsible for enforcing the controlled substance laws and regulations of the United States. CONUS Law enforcement
Purpose of Military Intel
the Office of Naval Intelligence (ONI) provided fleet commanders with intelligence designed to produce victory at sea, while the Army concentrated on battlefields in Europe and the South Pacific The military has introduced the concept of "jointness," where Army, Navy, Air Force, Marine, and Coast Guard personnel work side-by-side to produce intelligence that can be used by all.
Restrictions on Intelligence Activities (war vs. peace time)
the ban does not apply in wartime situations when the military is striking the enemy's command and control or leadership targets
Requirements
the goals of the particular intelligence endeavor PIR: priority Intelligence Requirements strategic, tactical and operational IR: Intelligence Requirements IIR: Internal Information Requirements
dept of the navy
the leading provider of maritime intelligence to Navy and joint/combined warfighting forces, as well as national decision makers and other partners/consumers in the U.S. National Intelligence Community. Belong to Department of defense Operate both CONUS and OCONUS