Intelligence Fundamentals
Access
ability and opportunity to obtain knowledge of classified information
Compromise
the disclosure of classified info to persons not authorized access
Intelligence Community (IC)
Executive branch agencies that collect, process, and disseminate intelligence
Downgrade
determination that classified material/information requires a lower degree of protection than previously provided
1N2xxA- Electronic Signals Intel Exploitation Analyst
exploits ELINT and FISINT signals
1N1xxA- Geospatial Intel Analyst
exploits and analyzes multisensory imagery collects, analyzes, and prepares reporting battle damage assessment
Liberal Approach
faith in humanity/human progress and social harmony humans are basically good emphasizes international institutions, laws and global norms of cooperation, coordination, and non violent modes of conflict resolution
OPELINT
known foreign emitters fielded and employed in military operations
1A8x1- Airborne Cryptologic Language Analyst
operates airborne signals intel systems and mission equipment monitors and records signals intel info translates and reports on assigned communications
Department of Energy (DOE)
overtly collects political, economic, and technical information concerning foreign energy matters and nuclear weapons tests
1N2xxC- Signals Intel Analyst
performs COMINT collection and analysis activities intercepts and exploits morse code, printer and fax signals, and special signals
1N4xxA- Digital Network Analyst
performs cyber threat intel analysis and fusion merges data and info from a variety of intel disciplines for the purpose of analyzing, linking, and disseminating timely and actionable intel performs detailed analysis on target network communications for additional exploitation
1N1xxB- Geospatial Intel Targeteer
performs precise mensuration of imagery for targeting recommends specific weapons systems to disable or destroy adversary targets
Department of Homeland Security (DHS)
prevents terrorist attacks within the US and reduces America's vulnerability to terrorists
Central Intelligence Agency (CIA)
primarily responsible for clandestine foreign intelligence collection through HUMINT and other appropriate means
Communications Security (COMSEC)
procedures taken to deny the enemy information from our communications Sub categories: Cryptosecurity Transmission Security Emissions Security
Operations Security (OPSEC)
protects critical information through prevention Identifies, controls, and protects intelligence indicators Prevents adversaries from gathering and exploiting unclassified clues [Not classified]
National Geospacial Intelligence Agency (NGA)
provides imagery, imagery intelligence, and geospacial intelligence
Operational Intelligence
provides information crucial to planning and executing theatre-wide aerospace operations and aids analysts in defining key nodes, weaknesses, and vulnerabilities
Defense Intelligence Agency (DIA)
provides timely, objective, and relevant all source foreign intelligence to warfighters, defense planners, and national security policy makers worldwide
Federal Bureau of Investigation
responsible for counterintelligence operations conducted in the US
Drug Enforcement Administration (DEA)
responsible for enforcing the controlled substance laws and regulations
Realist Approach
self interest at expense of others state most important actors states strive to attain as many resources as possible states unitary, rational actors relations determine level of power
Director of National Intelligence (DNI)
senior intelligence advisor to President, NSC, and the Homeland Security Council on national security matters
Portion Markings
show highest classification contained within a section of a document
Derivative Classification
the act of incorporating, paraphrasing, or restating information that is already classified into a new document
National Security Agency/Central Security Service (NSA/CSS)
unified cryptologic organization of US produces foreign signals intelligence (SIGINT) info protects US government information systems
National Reconnaissance Office (NRO)
Acquires, designed, builds, launches, and maintains technology and space borne assets for worldwide intel collection
Confidential (C)
information or material whose unauthorized disclosure could cause 'damage' to national security
Planning and Direction (Intel Cycle)
usually starts with a requirement or tasking from higher headquarters Two steps: - establishing requirements (standing, field/ad hoc, request for info, collection req, priority intel req, essential elements intel) - validated requirement
OPSEC 5-step Process
1. Identify Critical Information 2. Analyze the threat 3. Analyze the vulnerabilities 4. Access the Risk 5. Apply countermeasures and monitor their success
Battlefield Coordination Detachment (BCD)
Army element Supports integration of aerospace operations with ground maneuver monitors and intercepts the land battle situation
Five Types of Security Violations
Compromise certain Compromise probably Compromise possible Compromise improbable Practice dangerous to security
Classification Authority
US Government official with the authority to actually assign a classification to a document
Portion
any part of a document/presentation that requires separate classification markings
Department of State (DOS)
overtly collects and produces political, military, and economic information relevant to US foreign policy
Component Liaisons
work for their respective component commanders integrates and coordinates component's participation in aerospace operations
Evaluation and Feedback (Intel Cycle)
Consumers evaluate received ISR products Used to ensure stated requirements are met Provides feedback to planners, collection managers and analysts
Marking Classified
Executive Order 13526- uniform way to classify and protect Intel community Markings System- list of security classifications and control markings generally= banner line, portion markings, classification authority block
Intelligence
Product resulting from the collection, processing, analysis, evaluation, and interpretation of information Information and knowledge about an adversary obtained through observation, investigation, analysis, or understanding
Information Security (INFOSEC)
Protects classified information Two categories: -communications security (COMSEC) -computer security (COMPSEC) [Classified]
Collateral
classified information that is not controlled by the SCI system
Department of Treasury (DOT)
overtly collects foreign financial and monetary information
Strategic Intelligence
required to formulate national strategy, policy, and plans and to provide accurate, timely, and predictive information to decision makers
Measurement and Signature (MASINT)
technically derived intelligence that detects and identifies distinctive characteristics of target objects and sources
1NOxx- Operations Intel Specialist
Analyses and provides all-source intel, situational estimates, mission planning, and aircrew training Develops and constructs target materials in support of combat mission planning/execution Collects, processes, and analyzes friendly C4 emissions to identify weaknesses that could be exploited by adversaries
Dissemination and Integration (Intel Cycle)
D: intelligence information is conveyed to consumers I: updating intelligence databases
National Security Council (NSC)
President's senior advisory board for all national security and defense matters
1A8x2- Airborne ISR Operator
flies as primary aircrew onboard a wide variety of aircraft annotates electromagnetic signals to determine likely emitter source digitally archives key events for follow-on processing
14N- Intel officer
manages analysis of collected intel produces assessments to meet operational requirements provides intel briefs to commanders exchanges intel with other services, agencies, and government
Unclassified (U)
Information whose compromise does not necessarily cause damage to national security, but which could potentially provide an adversary with insight to our plans or missions
Department of Defense (DOD)
Major tenant of the Pentagon (Army, Air Force, Navy, DIA, NSA, and NGA) federal department charged with coordinating and supervising all agencies and functions of the government relating directly to national security and military
Computer Security (COMPUSEC)
Protects information processed and stored on computers User is responsible for all information processed on government owned AIS
Top Secret (TS)
information or material whose unauthorized disclosure could cause 'exceptionally grave damage' to national security
Warden's 5 Ring Model
Centers of Gravity- characteristics, capabilities, or localities from which a military force, nation, or alliance derives its freedom of action, physical strength, or will to fight (inner) Leadership/Command Structure/Central C4- most critical (next) Organic Essentials and Logistics- power, POL, water (next) Infrastructure- LOCs, airfields (next)Population/Personnel- popular support (outer) Fielded Forces- least effective area of air power
Analysis and Production (Intel Cycle)
Information converted to intelligence info evaluated for reliability and accuracy, analyzed for meaning, and integrated with other sources Steps: -integration -evaluation -analysis -interpretation
Naval and Amphibious Liaison Element
Navy integrates naval air, fires, and amphibious operation into the theatre aerospace operations monitors and interprets the maritime battle situation
International Relations Theory
attempts to explain states cooperation or conflict, causation of events, patterns, and motivations of state and nonstate actors using various theoretical approaches -Realism -Liberalism
Tactical Intelligence
includes current assignments, defense and penetration analysis, and is primarily focused on threat warning, mission planning, targeting and combat assessment
Security Violations
Occurs when informations that's classified has been definitely, probably, or possibly disclosed to unauthorized persons
Processing and Exploitation (Intel Cycle)
Raw data transformed into information that can be further exploited by intelligence analysts
Caveats
additional warnings or handling instructions that are appended to the overall security classification
TECHELINT
focuses on studying the technical characteristics of a system in the research and development pre-development phase
Open Source Intel (OPSINT)
intel produced from publicly available information can give and insider's view on a situation susceptible to manipulation by the producer
Geospatial Intel (GEOINT)
intelligence derived from exploitation of imagery and geospatial information -electro-optical imagery -infrared -multispectral -radar -motion
Foreign Instrumentation Signals Intel (FISINT)
intelligence derived from the intercept of electronically transmitted data associated with testing and operational deployment of various systems
Clearance
opportunity afforded to an individual to obtain classified information
Destabilizing Factors
overpopulation environmental dangers/destruction economics resource scarcity war and refuge Motivating factors: nationality ethnic, group, tribe, clan race social class religion
1N4xxB- Analysis and Production
analyzes and exploits network intel info performs detailed analysis of comms nodes, structures, and operating procedures identifies, writes, and disseminated time sensitive intel reports and threat warning information
Special Access Program
any program imposing need to know or access controls beyond those normally required for access to classified information
Sensitive Compartmented Information (SCI)
classified information concerning or derived from intelligence sources, methods, or processes which is required to be handled within formal access control systems established by the Director of National Intelligence (DNI)
1N7xx- Human Intel Specialist
collects and reports intel information from human sources conducts in-depth debriefs or interrogations determines value and validity of documents and open source material
National Intelligence Support Team (NIST)
comprised of various national level intel agencies CIA, DIA, NSA, FAA, etc
Human Intel (HUMINT)
gathered from human sources through direct contact can provide coverage when other sensors are restricted limited by timeliness and source reliability oldest form of intel
Signals Intel (SIGINT)
information derived from collection and processing of foreign communications and non-communications passed by EM means -COMINT -ELINT (OPELINT & TECHELINT) -FISINT
Collection (Intel Cycle)
information is acquired by exploiting intel resources -primary -secondary -overt -discreet -covert -clandestine
Electronic Intel (ELINT)
information obtained for intel purposes from the intercept of foreign EM non-communications transmissions and emanations (ie radar)
COMINT
information obtained for intelligence purpose from intercept of foreign communications by other than the the intended recipient
Secret (S)
information or material whose unauthorized disclosure could cause 'serious damage' to national security
Marine Liaison Officer (MARLO)
integrates Marine air-ground task force (MAGTF) fires, maneuver, and Marine air into the theatre campaign
1N3xx- Cryptologic Linguist Specialist
intercepts, exploits, and analyzes voice communications translates intercepted comms for further analysis by other AFSCs
Joint Chiefs of Staff (JCS)
known as Unified Commands composed of forces from two or more military departments and organized via geographical/functional basis
Additional Liaisons
liaison officers from coalition/allied surface force, information warfare, space ops, judge advocate, weather and logistics
Operation Security (OPSEC) 5 steps
1. Identify critical information 2. Analyze the threat 3. Analyze the vulnerability 4. Access the risk 5. Apply countermeasures and monitor success
Banner Lines
US classification markings placed across the top and bottom of every page in a classified document
Special Operation Liaison Element (SOLE)
coordinates and integrates all SOF activities in the entire battlespace prevention of fratricide is a critical product of the SOLE effort
Need-to-know
determination that an individual requires access to specific classified information in order to perform a lawful government function
Custodian
individual who has possession of, or is otherwise charged with the responsibility for safeguarding or accounting for classified information
DIME Model
Diplomatic: how a nation exerts its influence over other countries by diplomacy Information: how a nation exerts influence over countries by type of information shared Military: how a nation uses its military to influence countries Economic: includes trade ties that a nation has to other countries or the kinds of loans it extends
Differences between Liberal and Realist
Liberal: interdependence among states influence state behavior states will work together collectively to achieve common goals sometimes states are willing to give up power in order to create a greater authority that strives for equality among people/state-- NATO, EU, UN, WTO
US Military Service Cryptologic Components (SCC)
Military service elements assigned by the SECDEF to support NSA/CSS mission Army: Army Intel& Security Command (INSCOM) Navy: US Fleet Cyber Command (FLTCYBERCOM) Marine: Marine Cryptologic Support Battalion (MCSB) AF: 25th Air Force (25AF)
Intelligence Cycle
Planning and Direction Collection Processing and Exploitation Analysis and Production Dissemination and Integration Evaluation and Feedback
Special Intelligence
a security control system within SCI to further protect COMINT
US Coast Guard (USCG)
an armed service within the DHS that provides maritime intelligence in support of port security, seaborne rescue, counter narcotics, and alien migration interdiction
Declassification
determination that classified information no longer requires any degree of protection against unauthorized disclosure
Upgrade
determination that classified information requires a higher degree of protection than previously provided