CRIM 310 - Intro IC Midterm

Ace your homework & exams now with Quizwiz!

The Art of War- 5th Century BC

"Enlightened rulers and good generals who are able to obtain intelligent agents as spies are certain for great achievements." • Codes & Secret Writing • Infiltration • Surveillance • Development of Assets • Use of Double Agents • Operational Security • Geographic Intel • Weather • Covert Ops • PsyOps & Deception • Interrogation Techniques • Courier Systems • New Technologies (e.g., chariots, weapons)

Tradecraft

"Old-School" Tradecraft: Used to avoid CI from foreign intelligence services and to enable clandestine operations; The methods developed by intelligence operatives to conduct their operations. • Brush pass - Where an item is passed discreetly between a case officer and an agent. • Cover stop - Undercover and under surveillance, cover stops are an operative's apparently innocent reasons for going out in order to conduct a brush pass or dead drop • Dead drop - A secret location where intelligence is hidden for another agent to pick up. • Signal or Advancement - a chalk mark or other demarcation left to indicate that a dead drop, brush pass or meeting is "a go." • Honeytrap - The fine art (perfected by First World War spy Mata Hari) of ensnaring an enemy via sex, using their powers of seduction to extract information and lure them into a state of vulnerability • Dangle - A person sent by the intelligence agency of his or her own country who approaches an intelligence agency in the hope of being recruited as a spy so as to allow a double agent operation for the purpose of intelligence collection or disinformation

Double Agents

- An officer of an intelligence organization pretending to serve one government while actually serving another (or sometimes both at the same time). - insider threat - can occur due to dangle

George Washington

- Formed the Secret Committee - Committee of Secret Correspondence & Culper Spy Ring - 1776 Congress passed the First Espionage Act (spying in or around army was punishable by death)

Camp X

- The 1st training center was called Camp X - located in Ontario, Canada - The British Special Operations Executive (SOE) trained the American OSS, G2 Military, and FBI Other COI/OSS training centers were in VA, MD, and CA

Ghost Army

- United States Army tactical deception unit during World War II officially known as the 23rd Headquarters Special Troops. - The 1,100-man unit was given a unique mission within the U.S Army: to impersonate other U.S. Army units to deceive the enemy by creating illusions in theater in 1944-1945 - "Operation Camouflage" was created to protect the production of airplanes occurring at the Lockheed Martin facility directly after the bombing of Pearl Harbor in 1941 Broken into three specialties or units [slide 23-8, W2]: 1) Visual deception conducted by the 603rd Camouflage Engineers OCONUS 2) Sonic deception conducted by the 3132 Signal Service Company Special OCONUS 3) Radio deception conducted by the Signal Company CONUS and OCONUS A part of PsyOps

Social Construction of Reality (SCR) theory of knowledge in sociology

- a theory of knowledge in sociology and communication theory that examines the development of jointly constructed understandings of the world that form the basis for shared assumptions about reality - Knowledge and people's perceptions and beliefs of what reality is become embedded in the institutional fabric of society. Reality is, therefore, said to be socially constructed. Driven by: - culture and interaction - who your "society is" (external locus of control) - your interpretation/needs (internal locus of control) - institutionalization of roles, rules, norms

Nathan Hale

- agreed to go behind lines in Battle of Long Island for Americans - was quickly captured and hung, he was undertrained and stands as martyr to the revolution "I only regret that I have but one life to lose for my country."

Thaddeus Lowe

- balloon reconnaissance (recon), would spy on confederate from the sky

Counterintelligence (CI)

- concerned with either catching those trying to gather intelligence as double agents (insider threat) or using techniques to detect or disrupt foreign intelligence from detecting the intelligence operations of the IC. • Designed to prevent unwanted spying against the US IC • It is the job of US counterintelligence to identify, assess, neutralize and exploit the intelligence activities of foreign powers, terrorist groups, and other entities that seek to harm us

Intelligence Reform and Terrorism Prevention Act

- creation of the position of Director of National Intelligence (DNI)

USA PATRIOT Act

- don't spy on US citizens - creation of DHS

Allan Pinkerton

- established first detective agency in the U.S. - The Pinkertons supposedly stopped an assassination attempt against Lincoln and thus guarded Lincoln on his inaugural trip from Springfield to D.C. - Pinkertons worked as spies/agents for Union Major General B. McClellan and ran his military intelligence service

The clearance process

- examining your life history: USG examines your loyalty to the United States, strength of character, trustworthiness, honesty, reliability, discretion and soundness of judgment - alliances: USG makes sure you're clear of conflicting alliances; are not a potential risk for coercion; and are willing and able to abide by regulations governing the use, handling and protection of sensitive information - citizenship: must be a citizen of the United States when you apply to work for the IC. Being a dual citizen of the U.S. and another country will not automatically disqualify you as long as the USG can determine you do not pose a security risk. - drug use: Recent and/or frequent use of illegal drugs, including marijuana even in states whose laws permit its recreational or medical use, could raise a security concern, and may be disqualifying. It is important to know that the IC is a drug-free workplace.

Actionable intelligence

- intelligence must be useful for some larger purpose - generally, one that serves the national interest - can empower a consumer toward some level of understanding or action

PsyOps

- intended to mock Hitler and the Nazis, Hitler dancing the jig - Psychological Operations (MISO) convey selected information (selective truths) to targeted foreign audiences to influence their emotions, motives, objective reasoning, and ultimately behavior

Background Investigation (BI)

- preformed by agency on job applicants - complexity based on level of clearence to be obtained - determined by the agency - can include polygraph

Harriet Tubman

- served as an armed scout and spy, helped lead a covert operation in South Carolina to free 700 slaves - made sure former slaves shared any info on activities they had observed, even convincing some to return to the south and conduct espionage and surveillance Black Dispatches: info provided by her and her peers

Civil War

- spy rings (George Washington) - balloon recon (Thaddeus Lowe) - submarines - Harriet Tubman (Black Dispatches) - Allan Pinkerton creates a commercial intel/detective agency Post Civil War (1882) -Creation of the Office of Naval Intelligence; 1885 -Army, Military Information Division

False Flag

- used in offensive counterintelligence, catching spies - in law enforcement it refers to introducing an undercover agent (UCA) posing as a rep of a foreign gov to the subject - UCA will try to covince subject to continue spying for them

Biases

1. Bounded rationality -"the intel is good enough" 2. Experience -"I have seen this before..." 3. Mirror Imaging -"Everyone thinks like we do..." 4. Denial -"that just couldn't happen..." 5. Vividness Criterion -personal experience biasing information 6. Groupthink -consensus is determined under pressure or other factors

BLUF

Bottom Line Up Front - writing must be clear, concise and accurate. Important info (like conclusion) is rendered first

Executive Order 12333

By law, the CIA is specifically prohibited from collecting foreign intelligence concerning the domestic activities of US citizens. Its mission is to collect information related to foreign intelligence and foreign counterintelligence It also limits what the NSA can do

Creating a false identity

COVER: The background information (e.g., documentation, digital data) that supports a cover identity LEGEND: An operator's claimed background or biography; usually supported by documents (cover), digital bonafide and memorized details - Bonafides: determination that a person is who s/he says s/he is by vetting POCKET LITTER: Items in a spy's pocket (receipts, coins, theater tickets, etc.) that authenticity to his or her cover identity. - Remember our phones, iPads, laptops, and social media - all of the information found on you must correspond to your cover What if you get caught? - UNFRIENDLY: could be put to death, tortured for info... - FRIENDLY: PNG'd - Persona non grata. Basically "you're not welcome" tsk tsk go home. Usually not severe and you might even be allowed back in someday. This is for friendly countries

HUMINT focuses on counterintelligence

Case Officer or Operative: an intelligence officer who recruits non-US citizen agents (clandestinely spotting, assessing, developing) and manages their activities. Asset: the informant or "spy" that is handled by a case officer. Cover: The purported occupation, identity or purpose of an operative; it must be consistent with the operative's background and presence in the target area Covert Operations: A "covert" operation differs from a "clandestine" operation in that the former seeks to hide the identity of the operation's sponsor, while the latter seeks to hide the operation itself. Counterintelligence: The business of thwarting the efforts of foreign intelligence agencies; includes but is not limited to spy-catching Double Agent: an officer or operative who pretends to act as a spy for one country or organization while in fact acting on behalf of an enemy

3 general types of classification

Confidential: shall be applied to info, the unauthorized disclosure of which reasonably could be expected to cause DAMAGE to the national security that the original classification authority is able to identify or describe Secret: shall be applied to info, the unauthorized disclosure of which reasonably could be expected to cause SERIOUS DAMAGE to the national security that the original classification authority is able to identify or describe Top Secret: shall be applied to info, the unauthorized disclosure of which reasonably could be expected to cause EXCEPTIONALLY GRAVE DAMAGE to the national security that the original classification authority is able to identify or describe

Define and know the differences between Covert Action, Covert Operations and Clandestine Operations

Covert Operation - intended to conceal the identity of or allow plausible denial by the originator of the activity. • Requires a finding by POTUS, written notification to Congress (HPSCI) • Only the POTUS can direct the CIA/Military to undertake a covert action • These actions usually are recommended by the National Security Council (NSC) • Covert actions are considered when the NSC judges that US foreign policy objectives may not be fully realized by normal diplomatic means and when military action is deemed to be too extreme an option • Once approved and tasked, the intelligence oversight committees of the Congress must be notified - HPSCI and SSCI Clandestine Operation - intended to conceal the entire activity or action • No one should know you or anyone were there, totally invisible (passing information, tailing someone, ect)

Using Cover in Covert Ops & Clandestine Ops

Covert Operation - is an operation that is planned and executed to conceal the identity of or permit plausible deniability by the sponsor (operator of the op). • "Something may have happened here, but no one is quite sure who is responsible." Clandestine Operation - is an operation conducted by gov't departments or agencies in such a way to assure complete secrecy or concealment. • "Nothing ever happened here...no one was here...no one saw anything." Military Deception Op - is an operation that includes both denial and deception. • Denial hides the real characteristics of what is occurring • Deception shows the fake characteristics of what is occurring (think Ghost Army) Plausible Deniability: op can't be traced back to US gov

Related to Intel Collection & the Barriers to Analysis: The Adversary's Impact

Deception - planned techniques or operations used by one country (or group) which attempt to mislead another country (or group). PsyOps (psychological operations) - planned operations to convey selected information and indicators to audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of organizations, groups, and individuals. Sometimes referred to as propaganda ops. Counter Operations (or counter espionage ops) - secret action taken by a country to prevent another country from discovering its military, industrial, or political secrets.

CIA Directorates

Directorate of Intelligence - consists of analysts and other personnel who produce reports using many different sources of info National Clandestine Service (formerly Direc. of Ops) - Case Officers and other individuals who gather intel (HUMINT) in a clandestine manner Directorate of Support - provides logistical support for ops and is resonsible for security, communications, and IT Directorate of Science and Technology - responsible for developing technologies to enhance the agency's mission Directorate of Digital Innovation (DDI) - the Agency's newest Directorate focused on accelerating innovation by exploiting cutting-edge digital devices, using cyber tradecraft, and defending IT infrastructures

Counter Intel vocab

Exfiltration Operation -A clandestine rescue operation designed to bring a defector, refugee, or an operative and his or her family out of harm's way Escort - The operations officer assigned to lead a defector along an escape route. Mole - An officer or asset of one organization sent to penetrate a specific intelligence agency by gaining employment. Walk-in - A defector who declares his or her intentions by walking into an official installation (such as an Embassy) and asking for political asylum or volunteering to work in-place

Difference between FBI and CIA

FBI - Primarily law enforcement - Federal crimes - Agents (collect info from informant) CIA - Primarily intelligence - Can't arrest anyone at home or overseas - Pass along info - Foreign affairs - Officers (collect info from agents/assets)

INTs

HUMINT - human intel (FBI, CIA, military intel officers, DIA) SIGNINT - signals intel • COMINT - communication intel • ELINT - electronic intel (designed NRO, utilized NSA) GEOINT - geo-spatial intel • IMINT - imagery intel (designed/operated NRO, analyzed NGA) OSINT - open source intel • SOCMINT - social media intel* (used by all IC organizations including commercial) CYINT - cyber intel • TECHINT - technical intelligence (used by all IC organizations) FININT - financial intel • FINCEN - Treasury: Financial Crimes Enforcement Network (DOT, CIA, FBI but all IC can use to find double agents) MASINT - measurements intel or mass intel or multiple intel • FISINT - foreign instrumentation signals intel* • NUCINT - nuclear intelligence* (DIA, FBI has massive lab) - INTs are not mutually exclusive (they can be used together) - Some are still not well defined...with new technologies arriving (CYINT, OSINT) - Overlap - by definition and by Agency -Typically, one agency will take the "lead" in one or more of the INTs, but collection and execution are defined by the overall mission (strategic) and the current operations (tactical)

17 IC Organizations

Independent Agencies: • ODNI - Office of the Director of National Intelligence • CIA - Central Intelligence Agency • DOD (Department of Defense) Elements: • NSA - National Security Agency [military] • DIA - Defense Intelligence Agency • NGA - National Geospatial-Intelligence Agency [military] • NRO - National Reconnaissance Office • Dept. of the Army - US Army Intel • Dept. of the Navy - US Navy Intel • Marine Corps. - Marine Corps Intel • Dept. of the Air Force - US Air Force Intel • Department of Energy's (DOE) Office of Intelligence and Counter-Intelligence • Department of Homeland Security's Office (DHS) of Intelligence and Analysis • US Coast Guard Intelligence • Department of Justice's (DOJ) Federal Bureau of Investigation (FBI) •Drug Enforcement Agency's (DEA) Office of National Security Intelligence • Department of State's (DOS) Bureau of Intelligence and Research • Department of the Treasury's (DOT) Office of Intelligence and Analysis.

Define intelligence

Merriam Webster: The obtaining or dispensing of information, particularly secret information; also, the persons engaged in obtaining information; secret service Dictionary of US Military Terms: The product resulting from the collection, evaluation, analysis, integration, and interpretation of all available information which concerns one or more aspects of foreign nations or of areas of operation and which is immediately or potentially significant to planning CIA: Intelligence is the official, secret collection and processing of information on foreign countries to aid in formulating and implementing foreign policy, and the conduct of covert activities abroad to facilitate the implementation of foreign policy

Creation of NSA

Project Ultra showed importance of SIGINT and Armed Forces Security Agency (AFSA) wasn't up to the task so NSA was created with the singular mission was SIGINT and (after the Cold War) IMINT

Right to Know vs. Need to Know

RIGHT: refers to the level of clearence a person has been granted NEED: Means the person must have access to that info in order to be able to preform their duties you must have right to know in order to obtain need to know, but your level of clearence doesn't automatically mean you have need to know

Operation "Neptune's Spear"

Rendition: aka "bag and tag", know where people are and take them in for trial, interview or interrogation (also interpreted as termination) HTV: High Value Target Blacksite: location at which an unacknowledged black operation or black project is conducted. It can refer to the facilities that are controlled by the CIA and used by the U.S. government in its War on Terror to detain alleged unlawful enemy combatants. Ex) Guantanamo Human Intelligence [HUMINT] (case officers, operations officers, operatives): - Assets, Informants and Agents: (these are the spies and info providers) - Developmentals - Walk-ins: A defector who declares his or her intentions by walking into an official installation (such as an Embassy) and asking for political asylum or volunteering to work in-place JTTF: Joint Terrorism Task Force DEVGRU: US Naval Special Warfare Developmental Group (Navy SEALs) SSCI: Senate Select Committee on Intelligence HPSCI: House Permanent Select Committee on Intelligence POTUS: President of the United States Hotwash: debrief after an operation discussing how it went

What's a SCIF?

Sensitive Compartmented Information Facility an enclosed area within a building (or an entire building or complex) that is used to process Sensitive Compartmented Information (SCI) types of classified information Restrictions: - No Cell Phones - No personal computers, tablets - No Wifi devices, USB keys, external storage drives - No FitBits or similar devices - No cameras, recording devices, or other electronics

Types of station

TDY = temporary duty PCS = permanent station

Tactical vs. strategic vs. operational intel

Tactical: designed for near-term use, usually by on-the-ground personnel Operational: somewhere between tactical and strategic typically used at a battalion or expeditionary force level, often utilized by the military Strategic: longer-term issues that have large implications and potential consequences, usually consumed by senior leaders and policymakers

The IR

The IC - the 17 orgs Other Gov and Military Orgs - FAA - DOI Law Enforcement - state - county - local Commercial Sector - Fortune 50 - defense industry Other gov organizations in IR: • Federal Aviation Administration (FAA) (1958 -Federal Aviation Act) • US Marshal's Service (USMS) (1789 -Judiciary Act) • United States Secret Service (USSS) (1865 -to combat counterfeiting) • Department of the Interior (DOI) (1849 -to protect natural resources) • Bureau of Alcohol, Tobacco, and Firearms (ATF) (1972 -out of DOT)

Acronyms

The IR (Intelligence Realm) is made up of "Alphabet Soup" which is a metaphor for an abundance of abbreviations or acronyms Can refer to specific groups, processes, operations, tradecraft or related activities

Changes in CIA

The creation of Coordinator of Information (COI) ==> 1941 led to the Office of Strategic Services (OSS) ==> National Security Act of 1947 appointed Director of Central Intelligence (DCI) and establishes CIA, DoD, and National Security Council (NSC) At the same time (1941), the FBI created the Special Intelligence Service (SIS) National Security Act of 1947 also establishes law for CIA (1) it was not given law enforcement and (2) it was mandated to operate primarily outside of US

"Five Eyes"

UK, Australia, New Zealand, US, Canada - share intel, but not wiretap leaders

Disguises

Why/when could you use a disguise - to protect an assest - to avoid detection from people who might know you outside of your job What is the difference between a light disguise and an advanced disguise? LIGHT: - wig, facial hair, glasses -more short term and to protect you from afar ADVANCED: - mask, prosthetics - used up close and personal for extended period of time, person you're talking to would have no idea - always addative, age someone up - nearly impossible to turn man into a woman, but opposite is possible - not just about looks, also how you act/walk/present yourself

Intelligence is...

a concept, product, and process Intelligence is the result of a logical intellectual process, often referred to as the intelligence cycle, which produces new actionable knowledge designed to: - Corroborate the validity of information and data - Understand its importance and linkages with other data - Develop a plan for action (that is a hypothesis or an operation) - Use the plan to accomplish a desired goal What is it really? - Dynamic process - Collection, evaluation, analysis, integration, interpretation of available information - Information, sources, and methods are guided by requirements - Mission driven; goal oriented•Actionable•Relevant

Intelligence management

consists of several phases: 1) organizing and processing data 2) storing it 3) dissemination

Intelligence Led Policing (ILP)

emphasizes that intelligence should drive all facets of policing from patrolling to investigations

GIGO

garbage in, garbage out

Level of clearances

least to most secure: 1. Secret 2. Top Secret 3. Top Secret/Sensitive Compartmented Information (TS/SCI)

Decision advantage

where the decision maker knows more than the competitor or adversary

Ancient Espionage

• Chinese General Sun Tzu, The Art of War- 5th Century BC • In Ancient Egypt -secret writing, double agents • In Roman, reign of Julius Caesar - assets & CI • In Asia/Middle East, Muslim conquests in the 7th century-military tactics and psyops • In China, from the 5th century and the beginning of the Tang Dynasty in 618 • In India, the ancient period ends with the decline of the Gupta Empire (6th century) and the beginning of the Muslim conquests there from the 8th century. • In Japan, warfare in the 12-13th century - ninjas, covert ops • Middle Ages and Catholic Church (late 13th-early 14 Century) - French Bishop Bernard Gui was best known for the collection, interrogation, and identification of adversaries

Requirements

• Priority Intelligence Requirements (PIRs) (strategic, tactical and operational) • Intelligence Requirements (IRs) • Internal Information Requirements (IIRs) • Priority National Intelligence Objectives (PNIOs) PNIO's establish general guidelines for both collection and research. They are comprehensive, authoritative, and community-wide in their application. But because of their extreme generality, the PNIO's provide no practical guidance in settling issues of specific collection priorities Requirements are created by decision makers (intelligence consumers): - POTUS, Secretary Positions (i.e., Defense), Directors (DHS, CIA, NSA, DIA, etc...), Groups (National Security Council [NSC]), HPSCI, SSCI Requirements are established by (see image): 1) Defining the issue 2) Asks only one questionrequired to support a single decision 3) Selecting the appropriate collection system(s) (or INTs) for the requirement(s) and the IC organization that should lead or head the collection 4) Making sure there is a feedback loop so that requirements can be adjusted. ODNI: organization that sets mission objectives - cyber intelligence, counterterrorism, counterintelligence and counter proliferation - see orange image in notes

Challenges to cover - technology, cameras, social media

• The biggest disruptive force is technological. • Traditional spycraft has always relied on deception based on identity • Spotting, developing, recruiting, running, and servicing intelligence sources involves concealing what you are doing • If you fail, your adversary may find out what you're up to, endangering your source and totally undermining your efforts • Once an adversary learns that an intelligence operation is underway, he or she can use it to discover more clues or feed you false or tainted information-This means your cover is "blown." Ex) Counterintelligence officers start with the internet. Has their target appeared in any photo anywhere? If so, was the context of that photo compatible with the target's cover story? Then they use CCTV, gathered from home cameras, public cameras, and from systems run by allies/businesses. Tech and camera: •Drones •Commercial Satellites •Cryptocurrency •Encryption apps and comms •Phones & Devices (e.g., FitBits, e-readers, earbuds, Alexa) •Facial Recognition (via software & public cameras) Social Media: • Facebook • Instagram • Twitter • LinkedIn • Pinterest • YouTube


Related study sets

Strategic Management Chapter 10 QUESTIONS

View Set

Chapter 7, Section 1: Governing A New Nation

View Set

Statistics Ch. 1 - Data collection

View Set

HW5-Chapter5-Chem106 - Balancing Different Types of Chemical Equations

View Set

Vállalatgazdaságtan ellenőrző kérdések

View Set

Chapter 3: Security Architecture and Engineering (Domain 3)

View Set