Intelligence and Homeland Security Final Study

Ace your homework & exams now with Quizwiz!

Libya has the largest ballistic missile force in the Middle East

False

Most leaks of intelligence and other national security information come from congress.

False

Most of the Directors of Central Intelligence (DCIs) were professional intelligence officers and had wartime intelligence experience before taking that position.

False

Since World War II, most U.S. presidents have had significant exposure to national intelligence before taking office.

False

What term is referred to when authorizers may approve a program but find that it is not given sufficient funds, or any funds from appropriators?

Hollow budget authority

ISE facilitates the sharing of terrorism information including

Homeland Security information, Weapons of mass destruction, and Law Enforcement information

What committees are the primary authorizers of the intelligence budget?

House Permanent Select Committee Senate Select Committee

GEOINT SIGINT HUMINT MASINT

Images, Static, and Video May encounter communications silence, use of secure lines, spoofing of phony traffic Requires more time to acquire and validate Requires a great deal of Processing and Exploitation

Groupthink

Individuals avoid raising controversial issues or alternative solutions, and there is loss of individual creativity, uniqueness and independent thinking

The Intelligence Cycle is the Process by Which

Information is aquires, converted into finished intelligence, and intelligence is made available to policymakers

Low Confidence

Information is scant, questionable or fragmented, leading to difficulties in making "solid analytical inferences"; or is based on sources that may be problematic

The __________ radically changed the top management structure of the intelligence community after the National Security Act of 1947

Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA)

All-Source Intelligence refers to

Intelligence based on as many collection sources as possible to compensate for the shortcomings of each and to profit from their combined strength.

The Intelligence Oversight Act requires that;

Intelligence committees be kept fully and currently informed of all intelligence activities carried out by or on behalf of the United States, including any significant anticipated activity. & Notification is not a necessary precondition for beginning an activity & Timely reports on any illegal activity or significant intelligence failure

All-Source Analysis

Intelligence information derived from several or all of the intelligence disciplines, including SIGINT, HUMINT, MASINT, OSINT, and GEOINT.

ISR stands for

Intelligence, Surveillance, and Reconnaissance

What nation continues to be the foremost state sponsor of terrorism to include the Lebanese Hizballah group?

Iran

the former Soviet Union was a uniquely difficult target for intelligence collection and analysis because

It was a very large nation to hide capabilities. Large areas of the Soviet Union were subject to adverse weather disrupting overhead collection. The Soviet Union was a closed and heavily policed society.

Estimates are not predictions of the future but are considered __________ as to the like course of events regarding an issue of importance to our nation

Judgements

High Confidence

Judgements based on high quality information, or the nature of the issue makes a solid judgement possible.

__________ regarding Alternative Analysis refers to analysts that can fasten on one line of analysis, especially for issues that are examined and reexamined over the years, and not open to other possible hypothesis or alternatives.

Premature Closure

The __________ meets irregularly and is made of the NSC members (less the president) and is presided over by the national security advisor.

Principals Committee

"Jaded" Analysts"

Proceeds from false assumption that each incident is much like others.

Which phase of the Intelligence Cycle provides synthesizing of raw information into a useable state?

Processing

Which phase of the intelligence cycle requires substantial intelligence resources devoted to the synthesis of data into a form that intelligence analysts can use?

Processing

Information must undergo what before in can be regarded as intelligence and given to analysts?

Processing and Exploitation

key steps in converting technically collected information into intelligence is the resulted from the __________ phase of the intelligence cycle.

Processing and Exploitation

The U.S. rebalance of the Pacific by the Obama administration focused on

Regional Stability

As a matter of organization, most intelligence services divide at least their analytical offices into __________ or issue-oriented offices.

Regional and Subject matter

Estimative Language

Remote, unlikely, even chance, probably, almost certain

Current Intelligence

Reports and analysis on issues that may not extend more than a week or two in the future is most often seen and requested by policy makers.

"Jaded" Analysts can be characterized by: Representing intellectual dishonesty

Representing intellectual dishonesty

According to Lowenthal, identifying __________ defines policy issues or areas to which intelligence is expected to make a contribution and their priorities.

Requirements

According to Lowenthal, who was the founder of the intelligence community in regards of the estimative process?

Sherman Kent

Who is responsible for research and development, acquisition, launch, deployment, and operation of overhead systems and related data processing facilities to collect intelligence and information to support national and departmental missions and other United States Government needs

The NRO

This term is to include the Islamic State of Iraq and ash-Sham (ISIS)—will also continue to use the Internet to organize, recruit, spread propaganda, raise funds, collect intelligence, inspire action by followers, and coordinate operations.

Terrorists

Which director serves as principal adviser to the secretary of defense and to the chairman of the Joint Chiefs of Staff on matters of military intelligence, and also chairs the Military Intelligence Board?

The Defense Intelligence Agency (DIA)

Who Collects (overtly or through publicly available sources) information relevant to United States foreign policy and national security concerns?

The Department of State (DOS)

Who Collects (overtly or through publicly available sources) foreign financial information and, in consultation with the Department of State, foreign economic information?

The Department of the Treasury

Who serves as the head of the IC and acts as the principal advisor to the President?

The Director of National Intelligence

Who Collects, analyses, produces, coordinates, and provides defense related intelligence for the Secretary of Defense?

The Director of the DIA

Who is designated as the Functional Manager for SIGINT?

The Director of the NSA

Who is the Functional Manager for GEOINT?

The Director of the National Geospacial-Intelligence Agency

The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) is a collaborative effort among SLTT and federal agencies, led by the U.S. Department of Homeland Security (DHS) and the _______

The FBI

Which federal level partner has the primary coordinating role for the law enforcement domain?

The FBI

Analytical Standards

The Intelligence Reform and Terrorism Prevention Act (IRTPA) includes a number of standards for Intelligence Analysis, as well as the DNI.

Connecting billions of new devices to the Internet, but it also broadens the attack potential of cyber actors against networks and information.

The Internet of Things

Which agency is the nation's primary source of geospatial intelligence for the Dept. of Defense?

The National Geospatial-Intelligence Agency (NGA)

What provides the Intelligence Community with the mission direction of the DNI?

The National Intelligence Strategy

Intelligence officers are not allowed to make policy recommendations based on their intelligence analysis.

True

Formal Requirements

Using the intelligence process, policy makers should provide intelligence requirements and communicate them to intelligence managers

Use of language

Words in the analysis field have distinct and separate meanings that convey intelligence

Strategic Warning

Advance notice on issues that would pose a threat to national security.

Priorities process

An expression of areas of interest and their relative importance to one another

Finished intelligence is accomplished by the end of which step in the Intelligence Cycle?

Analysis

Analysts' Mindset

Analysts as a group exhibit a set of behaviors that can affect their work.

Advancing computational capabilities that benefit the economy, yet those advances also enable new military capabilities for our adversaries.

Artificial Intelligence

Before 9/11 the __________ briefed the president and senior officials.

CIA

Confidential Secret Top Secret Controlled Unclassified Information

"could be expected to cause damage to the national security." "could be expected to cause serious damage to the national security." "could be expected to cause exceptionally grave damage to the national security" Sensitive but not classified

The Intelligence Community is made up of ____ agencies and organizations?

17

Intelligence Community Directive _____ establishes sources and reference citation requirements for analytic products.

206

How many (at least) Urban Area Fusion Centers are there in the United States?

78

Who serves as the Military advisor to the NSC?

Chariman of the JCS

What produces information and not intelligence.

Collection

The Intelligence Community Inspector General (IG) is confirmed by the Senate, and is responsible to the DNI and ________

Congress

Director of the FBI

Coordinate the clandestine collection of foreign intelligence collected through human sources or through human-enabled means and counterintelligence activities INSIDE the United States

Director of the CIA

Coordinate the clandestine collection of foreign intelligence collected through human sources or through human-enabled means and counterintelligence activities OUTSIDE the United States

Which phase of the intelligence cycle distributes intelligence products to policy makers that requested? them

Dissemination

Most senior policy makers tend to think in blocks of time no longer than _____ years because of the tenure of a single administration

Four

What intelligence source provides Imagery and geospatial data produced through an integration of imagery, imagery intelligence, and geographic information

GEOINT

Which Intelligence source provides representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media?

IMINT

The ability of multiple agencies to communicate using technology is called

Interoperability

In 2013, a hacker from this country conducted an intrusion into the industrial control system of a US dam, and in 2014, actors conducted a data deletion attack against the network of a US-based casino

Iran

The current priority system is based on

National Intelligence Priorities Framework

Which administration ruled that inspectors general need permission for access to wiretaps, grand jury information, and other data.

Obama

The U.S. Department of Energy __________ is a member of the U.S. Intelligence Community

Office of Intelligence and Counterintelligence

The National Security Council consists of

President, Vice President, Secratary of State, Secretary of Defense, Secretary of Energy

Intelligence Collection derives directly from

Requirements

Regional tension will persist as China completes construction at its expanded outposts in the

South China Sea

Fusion Centers are owned and operated by

State and Local Authorities

Estimative intelligence helps policymakers to think more __________ about long-term threats

Strategically

Asad's foreign supporters - Russia, Iran, and Lebanese Hizballah - want to keep an allied regime in power and maintain their influence in

Syria

Who collects, analyzes, produces, and disseminates foreign intelligence and counterintelligence?

The CIA

Who is the Functional Manager for HUMINT?

The Director of the CIA

The principal interest of the _________ is maintaining diplomatic relations as a means of furthering U.S. policy interests

The State Department

Data vs. Knowledge

The ability to amass and manipulate large amounts of data on computers offers possibilities for analysis and forecasting.

Analyst Fungibility

The need for analysts who have more than one areas of expertise and can be shifted to higher priority during times of need.

Attributes that contribute to a failed state include

The state is no longer deemed legitimate by its own people, Social factors or crises that lead to displacement of the population, Largely independent security apparatus and suspensions of basic rights

Competitive vs. Collaborative Analysis

There is a need to bring together analysts of agencies or disciplines to work on major ongoing issues.

The large and interconnected international arms market provides opportunities to collect weapons-related intelligence at __________ or when weapons are deployed to other countries with lax security.

Trade Shows

In democracies, oversight tends to be a responsibility shared by the executive and legislative powers

True

Intentions are the plans and goals of the adversary, and pose a difficult collection problem

True

Normal state-based activities and transnational issues are not truly separable.

True

The Chinese People's Liberation Army (PLA) continues to modernize its nuclear missile force by adding more survivable road-mobile systems and enhancing its silo-based systems.

True

The DCIA controls most of the all-source analysts within the IC, and day-to-day responsibilities for espionage and covert actions.

True

Some of the most challenges associated with information sharing include:

disclosures of classified information, analysis and dissemination, and technical requirements efforts to safeguard information selected

Research Intelligence includes research studies that support both current and __________ intelligence.

estimative

Leaks come from a variety of reasons such as

show off special knowledge settle scores promote or stop a policy

Open Source Intelligence collection sources such as Social Media are subject to

Accesibilty, Deception, and Creditbility

Current Intelligence Trend Analysis Warning Intelligence Scientific and Technical Intelligence

Addresses day-to-day events Referred to as second-phase reporting, provides information on an event "Sounds and Alarm" An examination of the technical development, characteristics, performance, and capabilities of foreign technologies, including weapon systems and subsystems

Metaphors for Thinking about Analysis

Affects how one views the analytical process and expectations of outcomes.

Alternative Analysis

Aid judgment on important issues requiring careful weighing of alternative explanations or conclusions.

The ISE Privacy Guidelines apply to:

All Terrorism related information about U.S. Citizens and lawful permanent residents

Which phase of the intelligence cycle includes integrating, evaluating and analyzing all available data, and distilling it into final intelligence products?

Analysis

On the Ground Knowledge

Analysts have varying degrees of direct knowledge about the nations they write, and want to be perceived as experienced.

The DNI presents The Worldwide Threat Assessment of the US Intelligence Community to Congress

Annually

Under the National Priorities Framework, intelligence requirements are reviewed __________ by the president and the NSC.

Annually

The ratio between collection versus processing and exploitation depends on

Available Resources and Policy Makers

Moderate Confidence

Available information is susceptible to multiple interpretations; or there may be alternative views; or the information is "credible or plausible" but not sufficiently corroborated.

Intelligence products that tally up the number of forces, equipment and manpower in foreign militaries is referred as

Bean Counting

The Department of State __________ provides the Secretary of State with timely, objective analysis of global developments as well as real-time insights from all-source intelligence.

Bureau of Intelligence and Research

The Senate Intelligence Committee has exclusive jurisdiction over

CIA

Which Intelligence Agency was created by the National Security Act of 1947?

CIA

Which National Intelligence Agency is the primary collector of HUMINT?

CIA

The composition of SIGINT includes

COMINT, ELINT, FISINT

Warning intelligence includes the identification or forecasting of events such as a __________

Coup

The executive branch has tended to focus its oversight on issues related to espionage and

Covert Action

The production of analysis should stand out on its own merits by adding value to include:Timeliness of intelligence products Ability of the community to tailor products to specific policy maker's needs Objectivity of the analysis All the above

- Timeliness of intelligence products - Ability of the community to tailor products to specific policy maker's needs - Objectivity of the analysis (All the above)

National Security Interests in the 2015 Fund for Peace 1. Afghanistan 2. Pakistan and North Korea 3. Nigeria 4. Haiti

1. U.S. and allied troops are engaged there 2. Have nuclear weapons 3. have significant oil deposits 4. local concern for the U.S.

Access to Classified Information, as stated in EO _____, is a person may have access to classified information

13526

The __________ is responsible for the collection, analysis, and dissemination of drug-related intelligence.

DEA

The __________ is the only element of the U.S. Intelligence Community statutorily charged with delivering intelligence to state, local, tribal, territorial and private sector partners, and developing intelligence from those partners for the Department and the IC.

DHS Office of Intelligence and Analysis

Who has shared responsibility for MASINT?

DIA and NGA

The 2010 Intelligence Authorization Act gives the _____ authority to conduct an "accountability review" of an intelligence community element.

DNI

The current Director of National Intelligence

Dan Coats

Politicized Intelligence

Deliberately distorting analysis or judgments to favor a preferred line of thinking that occurs if products are forced to conform to policymakers' views.

The FBI is associated with

Department of Justice

Director of NSA

Designated the Functional Manager for Signals Intelligence (SIGINT)

Director of the National Geospatial-Intelligence Agency

Designated the Functional manager for GEOINT

The Under Secretary for I&A for the Department of Homeland Security serves as DHS' chief intelligence officer and is responsible to both the Secretary of Homeland Security and the

Director of National Intelligence

National Intelligence Estimates (NIE) are signed by the __________ and presented to the President and other senior officials.

Director of National Intelligence (DNI)

__________ is referred as a bureaucratic mechanism by which analysts can challenge the views of their superiors without risk to their careers.

Dissent Channels

The essence of congressional oversight is the ability to gain access to information, usually held by the __________

Executive Branch

United States intelligence activities are governed by

Executive Order 12333

Which agency is primarily responsible for investigating domestic terrorist attacks?

FBI

A __________ is one in which there has been a breakdown of the legitimacy of the government to maintain a level of control over its own territory.

Failed State

The National Security Council staff reports directly to the Director of Homeland Security

False

Has the potential to cure diseases and modify human performance, which presents new ethical and security issues.

Genome Editing

Indications and Warning (I&W)

Giving policy makers advance warning of significant events (usually military)

GEOINT SIGINT HUMINT OSINT

Graphic and Compelling Military Targets tend to communicate in regular paters Relatively Inexpensive More Readily Available

What is the most common sensitive but unclassified (SBU) system used for information sharing and analytic collaboration among fusion centers?

HSIN-Intel

Competitive Analysis

Having different agencies with different points of view on the same issue

__________ refers to the use of judgements or assumptions made in one analysis as the factual basis for judgements.

Layering

is to assume that present conditions will largely prevail near term

Linear Analysis

Warning analysis involves the exploration of alternative futures and __________ / __________scenarios.

Low probability/High Impact

I&W is primarily a __________ intelligence function with emphasis on surprise attack.

Military

What assumes that other leaders, states and groups share motivations or goals similar to those most familiar with analysts?

Mirror Imaging

Red Cells

Models the behavior of an individual or group by trying to replicate how an adversary would think about an issue.

An intelligence activity to keep track of activities in foreign countries is referred as

Monitoring

Analyst Training

Most useful in giving incoming analysts of what is expected of them, how the larger community works, and its ethos and rules.

Which DoD agency builds and maintains the IC's satellite fleet?

NRO

Which U.S. Government agency is in charge of designing, building, launching, and maintaining America's intelligence satellites?

NRO

The __________ attempt to project existing military, political and economic trends into the future and likely implications of these trends

National Intelligence Estimates

The __________ allow policymakers and the IC to identify countries or non-state actors of interest or activities that are of interest and then to give them relative levels of importance.

National Intelligence Priorities Framework

This country's exports of ballistic missiles and associated materials to several countries, including Iran and Syria

North Korea

Which country Previously conducted cyber-attacks against US commercial entities— specifically, Sony Pictures Entertainment in 2014—and remains capable of launching disruptive or destructive cyber attacks to support its political objectives.

North Korea

What intelligence source is derived from publicly available information appearing in print or electronic form including radio, television, newspapers, and internet.

OSINT

Policy makers can be a source of politicization in a variety of ways such as

Overtly, Covertly, Inadvertenly

The consequences to cyber threats include:

Physucal Consequenses, economic and security, psychological

What phase of the Intelligence cycle is the process of determining what issues need to be addressed and what information must be gathered to provide the proper answers?

Planning

Covert action decreases political costs because of ____

Plausible Deniability

Who sets the requirements within the Intelligence Cycle?

Policymakers

Which country had Possible efforts to influence the 2016 US election, and assessed that only their senior-most officials could have authorized the 2016 US election-focused data thefts and disclosures, based on the scope and sensitivity of the targets

Russia

What Intelligence source is the interception of signals between people, machines, or combination of both

SIGINT

The National Security Agency/Central Security Service (NSA/CSS) leads the U.S. Government in cryptology that encompasses:

SIGINT and Information Assurance, and Computer Network Operations

Who is responsible for designating a group as an FTO?

Secretary of State

Military activities of nation states tend to __________.

Self Reveal

Remain core to the economy and the military, yet new national security risks might arise from next-generation chips because of technology plateaus and investments by other states.

Semiconductors

Wheat vs. Chaff

The analyst's daily tasks of sifting through incoming intelligence to their portfolio remains a challenge.

Estimates

The authoritative assessment of the Director of National Intelligence (DNI) on intelligence related to a particular national security issue.

The Intelligence Reform and Terrorism Prevention Act resulted in:

The creation of the NCTC, the establishmant of the ISE, and the creation of the DNI

Opportunity Analysis

The identification by analysts of unanticipated windows of opportunity to advance U.S. policies—become a key component of intelligence products contributing to policy.

Adversaries will continue to use cyber operations to undermine US military and commercial advantage by hacking into US defense industry and commercial enterprises in pursuit of scientific, technical, and business information.

True


Related study sets

Genetics Exam 5/ Comprehensive Final

View Set

Chapter 4 Health Promotion and Risk Reduction

View Set

McGraw-Hill Connect Homework on Atoms and Bonds

View Set

Carbohydrates -Analytical Methods for measuring Glucose - Cerebrospinal Fluid Glucose, Serum, Urine Glucose, Glycated Hemoglobin,

View Set