Intelligence and Homeland Security Final
Current Intelligence
Addresses day to day events
Strategic Warning
Advance notice on issues that would pose a threat to national security.
Scientific and Technical Intelligence
An examination of the technical development, characteristics, performance, and capabilities of foreign technologies, including weapon systems and subsystems
Priorities process
An expression of areas of interest and their relative importance to one another
Finished intelligence is accomplished by the end of which step in the intelligence cycle?
Analysis
The __________ phase of the intelligence cycle includes integrating, evaluating and analyzing all available data, and distilling it into final intelligence products
Analysis
What term refers to analysts becoming more concerned about sharing information and about checking all available data that they cannot bring themselves to act on the information, or set others into action out of fear that something may have been missed?
Analytical paralysis
Under the National Priorities Framework, intelligence requirements are reviewed __________ by the president and the NSC.
Annually
According to Lowenthal, the ratio between collection versus processing and exploitation depends on __________ and _________.
Available resources and Policy Makers
Intelligence products that tally up the number of forces, equipment and manpower in foreign militaries is referred as __________.
Bean Counting
The Department of State __________ provides the Secretary of State with timely, objective analysis of global developments as well as real-time insights from all-source intelligence.
Bureau of Intelligence and Research
Before 9/11 the __________ briefed the president and senior officials.
CIA
The primary mission of the __________ is to collect, evaluate, and disseminate foreign intelligence to assist the president and senior US government policymakers in making decisions relating to the national security.
CIA
Which National Intelligence Agency is the primary collector of HUMINT?
CIA
Which intelligence agency was created by the National Security Act of 1947?
CIA
Access to Classified Information, as stated in EO _____, is a person may have access to classified information.
13526
Executive Order __________ created a program to allow for both sharing and safeguarding information with nonfederal entities.
13549
The U.S. Intelligence Community is a coalition of __________ agencies and organizations.
17
Intelligence Community Directive _____ establishes sources and reference citation requirements for analytic products.
206
Jonathan Pollard
A naval intelligence employee that passed sensitive U.S. intelligence to Israel in the 1980's
Who serves as the military advisor to the NSC?
Chairman of the JCS
In December 2015, the cyber breach of the Office of Personnel Management came from __________.
China
CIA
Collect (including through clandestine means), analyze, produce, and disseminate foreign intelligence and counterintelligence
Department of Treasury
Collect (overtly or through publicly available sources) foreign financial information and, in consultation with the Department of State, foreign economic information
Department of State
Collect (overtly or through publicly available sources) information relevant to United States foreign policy and national security concerns
According to Lowenthal, __________ produces information and not intelligence.
Collection
The Intelligence Community Inspector General (IG) is confirmed by the Senate, and is responsible to the DNI and __________ .
Congress
Director of the FBI
Coordinate the clandestine collection of foreign intelligence collected through human sources or through human-enabled means and counterintelligence activities inside the United States
Director of the CIA
Coordinate the clandestine collection of foreign intelligence collected through human sources or through human-enabled means and counterintelligence activities outside the United States
What activity by United States government is intended to prevent the proliferation of nuclear, chemical and biological capabilities to other nations?
Counter Proliferation
__________ are actions taken directly against terrorist networks and indirectly to influence and render global and regional environments inhospitable to terrorist networks.
Counter terrorism
What activities are concerned with identifying and countering the threat to security posed by hostile intelligence organizations or by individuals engaged in espionage or sabotage or subversion or terrorism?
Counterintelligence
__________ encompasses actions taken to detect and counteract foreign intelligence activity that adversely affects U.S. national security interest.
Counterintelligence
__________ is defined as information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons, or their agents, or international terrorist organizations or activities.
Counterintelligence
The __________ is responsible for the collection, analysis, and dissemination of drug-related intelligence.
DEA
The __________ is the only element of the U.S. Intelligence Community statutorily charged with delivering intelligence to state, local, tribal, territorial and private sector partners, and developing intelligence from those partners for the Department and the IC.
DHS Office of Intelligence and Analysis
Responsibility for MASINT is shared by the __________ and __________.
DIA and NGA
According to Lowenthal, National Intelligence Estimates (NIE) are signed by the __________ and presented to the President and other senior officials.
DNI
The 2010 Intelligence Authorization Act gives the _____ authority to conduct an "accountability review" of an intelligence community element.
DNI
Who is the current Director of National Intelligence (DNI)?
Dan Coats
Director of the National Geospatial-Intelligence Agency
Designated the Functional Manager for Geospatial Intelligence (GEOINT)
Director of the NSA
Designated the Functional Manager for Signals Intelligence (SIGINT)
The Under Secretary for I&A for the Department of Homeland Security serves as DHS' chief intelligence officer and is responsible to both the Secretary of Homeland Security and the __________.
Director of National Intelligence
__________ is referred as a bureaucratic mechanism by which analysts can challenge the views of their superiors without risk to their careers.
Dissent Channels
Executive Order 13691
Encourage the private sector to share cyber threat information
Executive Order 12333 defines counterintelligence as "information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect" against __________ and other activities carried out by foreign states or non-sate actors.
Espionage
What intelligence activity is directed towards the acquisition of information through clandestine operations?
Espionage
__________ is defined as intelligence activity directed toward the acquisition of intelligence through clandestine methods.
Espionage
Presidential Policy Directive 20
Establishes principles and processes for the use of cyber operations
United States intelligence activities are governed by __________.
Executive Order 12333
The Pakistan western border region with Afghanistan is referred as __________ .
FATA
JCAT is co-staffed by DHS and _____ representatives and incorporates police officers, fire fighters, and emergency managers from across the U.S.
FBI
The Joint Terrorism Task Forces (JTTFs) are led by the __________ .
FBI
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) is a collaborative effort among SLTT and federal agencies, led by the U.S. Department of Homeland Security (DHS) and the __________.
FBI
Which agency is primarily responsible for investigating domestic terrorist attacks?
FBI
Domestic telephones can be tapped, but only after intelligence agents have obtained a warrant from what special federal court?
FISA
A __________ is one in which there has been a breakdown of the legitimacy of the government to maintain a level of control over its own territory.
Failed State
An employee being accorded the privilege of a security clearance automatically gains access to all intelligence information available.
False
Libya has the largest ballistic missile force in the Middle East.
False
Most leaks of intelligence and other national security information come from congress.
False
Most of the Directors of Central Intelligence (DCIs) were professional intelligence officers and had wartime intelligence experience before taking that position.
False
Since World War II, most U.S. presidents have had significant exposure to national intelligence before taking office.
False
Terrorist groups typically operate from large, easily identifiable infrastructures and rely on extensive communications networks.
False
The National Security Council staff reports directly to the Director of Homeland Security
False
The illicit drug threat in the United States is declining, as indicated by less US drug deaths, foreign drug production, and drug seizures.
False
What intelligence source provides Imagery and geospatial data produced through an integration of imagery, imagery intelligence, and geographic information
GEOINT
What is the term that accused spies would threaten to reveal classified information in open court as a means of avoiding prosecution?
Graymail
What term is referred to when authorizers may approve a program but find that it is not given sufficient funds, or any funds from appropriators?
Hollow budget authority
What committees are the primary authorizers of the intelligence budget? (Choose all that apply)
House Permanent Select Committee Senate Select Committee
The Director of the Central Intelligence Agency is designated as the Functional Manager for __________.
Human Intelligence
What Intelligence source provide representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media
IMINT
Which act called for the NCTC to be established?
Intelligence Reform and Terrorism Prevention Act of 2004
Since the inception of the National Security Act of 1947, the __________ radically changed the top management structure of the intelligence community.
Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA)
All-source Intelligence refers to __________.
Intelligence based on as many collection sources as possible to compensate for the shortcomings of each and to profit from their combined strength.
The __________ director serves as principal adviser to the secretary of defense and to the chairman of the Joint Chiefs of Staff on matters of military intelligence, and also chairs the Military Intelligence Board.
Inter
What nation continues to be the foremost state sponsor of terrorism to include the Lebanese Hizballah group?
Iran
__________ members are state, local, tribal, and territorial first responders and public safety professionals from around the country, working side-by-side with federal intelligence analysts from the National Counterterrorism Center (NCTC), Department of Homeland Security (DHS), and the Federal Bureau of Investigation (FBI) to research, produce, and disseminate counterterrorism intelligence
JCAT
__________ refers to the use of judgements or assumptions made in one analysis as the factual basis for judgements.
Layering
__________ assumes that other leaders, states and groups share motivations or goals similar to those most familiar with analysts.
Mirror Imaging
An intelligence activity to keep track of activities in foreign countries is referred as __________.
Monitoring
The __________ is the head of U.S. Counterintelligence and is responsible for developing counterintelligence plans and policies.
NCSC
The __________ mission is to lead and support the counterintelligence and security activities of the US Government, the US Intelligence Community, and US private sector entities who are at risk of intelligence collection, penetration or attack by foreign and other adversaries?
NCSC
The _________ is the nation's primary source of geospatial intelligence for the Department of Defense and the U.S. Intelligence Community in support of U.S. national security and defense, as well as disaster relief.
NGA
The primary mission of the __________ is to develop a Government-wide insider threat program for deterring, detecting, and mitigating insider threats, including the safeguarding of classified information from exploitation, compromise, or other unauthorized disclosure, taking into account risk levels, as well as the distinct needs, missions, and systems of individual agencies.
NITTF
The __________ is the U.S. Government agency in charge of designing, building, launching, and maintaining America's intelligence satellites.
NRO
Which DoD agency builds and maintains the IC's satellite fleet?
NRO
Which agency is the primary collector of Signal's Intelligence and provides much of the cryptological expertise for DoD and the other agencies in the IC?
NSA
According to Lowenthal, the current priority system is based on the __________.
National Intelligence Priorities Framework
The __________ allow policymakers and the IC to identify countries or non-state actors of interest or activities that are of interest and then to give them relative levels of importance.
National Intelligence Priorities Framework
The __________ provides the IC with the mission direction of the Director of National Intelligence (DNI) for the next four to five years.
National Intelligence Strategy
The __________ export of ballistic missiles and associated materials to several countries, including Iran and Syria.
North Korea's
NCTC is aligned under the __________ .
ODNI
Which agency was created by the Intelligence Reform and Terrorism Prevention Act of 2004?
ODNI
What intelligence source is derived from publicly available information appearing in print or electronic form including radio, television, newspapers, and internet.
OSINT
Which administration ruled that inspectors general need permission for access to wiretaps, grand jury information, and other data.
Obama
The U.S. Department of Energy __________ is a member of the U.S. Intelligence Community.
Office of Intelligence and Counterintelligence
What phase of the Intelligence cycle is the process of determining what issues need to be addressed and what information must be gathered to provide the proper answers?
Planning
Who sets the requirements within the Intelligence Cycle?
Policy Makers
__________ regarding Alternative Analysis refers to analysts that can fasten on one line of analysis, especially for issues that are examined and reexamined over the years, and not open to other possible hypothesis or alternatives.
Premature Closure
The Information Security Oversight Office reports annually to the __________ on security classification system.
President
The __________ meets irregularly and is made of the NSC members (less the president) and is presided over by the national security advisor.
Principals Committee
The __________ phase of the Intelligence Cycle provides synthesizing of raw information into a useable state
Processing
The __________ phase of the intelligence cycle requires substantial intelligence resources devoted to the synthesis of data into a form that intelligence analysts can use
Processing
According to Lowenthal, Information must undergo __________ before it can be regarded as intelligence and given to analysts.
Processing and Exploitation
According to Lowenthal, key steps in converting technically collected information into intelligence is the resulted from the __________ phase of the intelligence cycle.
Processing and Exploitation
Trend Analysis
Referred to as second-phase reporting, provides information on an event or series of events.
Current Intelligence
Reports and analysis on issues that may not extend more than a week or two in the future is most often seen and requested by policy makers.
"Jaded" Analysts can be characterized by:
Representing intellectual dishonesty
According to Lowenthal, Intelligence collection derives directly from __________.
Requirements
According to Lowenthal, identifying __________ defines policy issues or areas to which intelligence is expected to make a contribution and their priorities.
Requirements
NRO
Responsible for research and development, acquisition, launch, deployment, and operation of overhead systems and related data processing facilities to collect intelligence and information to support national and
Edward Snowden
Revealed that the United States collected intelligence against various European Allies
The Syrian regime is primarily backed by; (Choose all that apply)
Russia and Iran
Aldrich Ames
Russia used to spy against the United States
What Intelligence source is the interception of signals between people, machines, or combination of both
SIGINT
Chinese espionage puts special emphasis on __________ targets.
Science and Technology
Who is responsible for designating a group as an FTO?
Secretary of State
The NCTC Director is appointed by the President and confirmed by the __________ .
Senate
Tallinn Manual on International Law Applicable to Cyber Warfare
Sets forth definitions of various legal issues regarding cyberspace
According to Lowenthal, who was the founder of the intelligence community in regards of the estimative process?
Sherman Kent
The Director of the National Security Agency is designated as the Functional Manager for __________.
Signals Intelligence
The National Security Agency/Central Security Service (NSA/CSS) leads the U.S. Government in cryptology that encompasses:
Signals Intelligence (SIGINT) and Information Assurance (IA) products and services Computer Network Operations (CNO)
__________ are agents that are sent to another nation to assume normal lives who then become active agents at some time later.
Sleeper agents
Regional tension will persist as China completes construction at its expanded outposts in the __________ .
South China Sea
What country remained the primary focus of activities within the IC during the Cold War?
Soviet Union
George Blake
Spied because of ideological devotion to the Soviet Union
The principal interest of the _________ is maintaining diplomatic relations as a means of furthering U.S. policy interests.
State Department
Estimative intelligence helps policymakers to think more __________ about long-term threats
Strategically
Asad's foreign supporters - Russia, Iran, and Lebanese Hizballah - want to keep an allied regime in power and maintain their influence in __________ .
Syria
Asad's foreign supporters—Russia, Iran, and Lebanese Hizballah—want to keep an allied regime in power and maintain their influence in __________ .
Syria
The _____ regime was assessed to have used the nerve agent sarin in an attack against the opposition in Khan Shaykhun on 4 April 2017 in what is probably the largest chemical weapons attack since August 2013.
Syrian
The Federal Bureau of Investigation is associated with the __________
The DOJ (Department of Justice)
Wheat vs. Chaff Problem
The analyst's daily tasks of sifting through incoming intelligence to their portfolio remains a challenge.
The DEA's office of National Security Intelligence was formally made part of the intelligence community specifically because of __________ .
The link between drugs and terrorism
MASINT
To collect against acquisition of various types of WMD
OSINT
To collect and dissect the many public statements made by terrorist leaders and factions and, tracking various social media sites.
The large and interconnected international arms market provides opportunities to collect weapons-related intelligence at __________ or when weapons are deployed to other countries with lax security.
Trade Shows
According to the 2017 Worldwide Threat Assessment, al-Qa'ida and its affiliates remain a significant CT threat overseas as they remain focused on exploiting local and regional conflicts.
True
Adversaries will continue to use cyber operations to undermine US military and commercial advantage by hacking into US defense industry and commercial enterprises in pursuit of scientific, technical, and business information.
True
Foreign Intelligence is information related to capabilities, intentions, and activities of foreign powers, organizations, or persons, but not including counterintelligence, except for information on international terrorist activities.
True
In democracies, oversight tends to be a responsibility shared by the executive and legislative powers.
True
Intelligence officers are not allowed to make policy recommendations based on their intelligence analysis.
True
Intentions are the plans and goals of the adversary, and pose a difficult collection problem.
True
Normal state-based activities and transnational issues are not truly separable.
True
The Chinese People's Liberation Army (PLA) continues to modernize its nuclear missile force by adding more survivable road-mobile systems and enhancing its silo-based systems.
True
The DCIA controls most of the all-source analysts within the IC, and day-to-day responsibilities for espionage and covert actions.
True
The Middle East and North Africa were rated as one of the worst regions associated with atrocities and instability.
True
To date, no nation has been talked out of developing nuclear weapons by diplomacy alone.
True
Formal Requirements
Using the intelligence process, policy makers should provide intelligence requirements and communicate them to intelligence managers.
Warning Intelligence
Warning intelligence "sounds an alarm" for policymakers.
Open Source Intelligence collection sources such as Social Media are subject to __________.
accessibility, credibility, and deception
The DNI presents The Worldwide Threat Assessment of the US Intelligence Community to Congress _____ .
annually
Warning intelligence includes the identification or forecasting of events such as a __________ .
coup
The executive branch has tended to focus its oversight on issues related to espionage and __________ .
covert action
The FBI, in its counterintelligence role, has put a greater emphasis on Chinese __________ espionage.
economic
Research Intelligence includes research studies that support both current and __________ intelligence.
estimative
The essence of congressional oversight is the ability to gain access to information, usually held by the __________ .
executive branch
For both practical and political reasons, narcotics has become, in part, a __________ problem.
foreign policy
Most senior policy makers tend to think in blocks of time no longer than _____ years because of the tenure of a single administration.
four
Estimates are not predictions of the future but are considered __________ as to the like course of events regarding an issue of importance to our nation
judgements
The term __________ is to assume that present conditions will largely prevail near term.
linear analysis
Warning analysis involves the exploration of alternative futures and __________ / __________scenarios.
low probability / high impact
I&W is primarily a __________ intelligence function with emphasis on surprise attack.
military
Sarin is a __________ agent.
nerve
Transnational Organized Crime (TOC) will pose a continuing threat to the United States and its allies through close relationships with foreign states and __________ .
non-state actors
Covert action decreases political costs because of __________ .
plausible deniability
The National Security Council (NSC) consists of the
president and vice president secretaries of state and defense secretary of energy
As a matter of organization, most intelligence services divide at least their analytical offices into __________ or issue-oriented offices.
regional and subject matter
The U.S. rebalance of the Pacific by the Obama administration focused on __________ .
regional stability
Military activities of nation states tend to __________.
self reveal