Intelligence Fundamentals

Ace your homework & exams now with Quizwiz!

Access

ability and opportunity to obtain knowledge of classified information

Compromise

the disclosure of classified info to persons not authorized access

Intelligence Community (IC)

Executive branch agencies that collect, process, and disseminate intelligence

Downgrade

determination that classified material/information requires a lower degree of protection than previously provided

1N2xxA- Electronic Signals Intel Exploitation Analyst

exploits ELINT and FISINT signals

1N1xxA- Geospatial Intel Analyst

exploits and analyzes multisensory imagery collects, analyzes, and prepares reporting battle damage assessment

Liberal Approach

faith in humanity/human progress and social harmony humans are basically good emphasizes international institutions, laws and global norms of cooperation, coordination, and non violent modes of conflict resolution

OPELINT

known foreign emitters fielded and employed in military operations

1A8x1- Airborne Cryptologic Language Analyst

operates airborne signals intel systems and mission equipment monitors and records signals intel info translates and reports on assigned communications

Department of Energy (DOE)

overtly collects political, economic, and technical information concerning foreign energy matters and nuclear weapons tests

1N2xxC- Signals Intel Analyst

performs COMINT collection and analysis activities intercepts and exploits morse code, printer and fax signals, and special signals

1N4xxA- Digital Network Analyst

performs cyber threat intel analysis and fusion merges data and info from a variety of intel disciplines for the purpose of analyzing, linking, and disseminating timely and actionable intel performs detailed analysis on target network communications for additional exploitation

1N1xxB- Geospatial Intel Targeteer

performs precise mensuration of imagery for targeting recommends specific weapons systems to disable or destroy adversary targets

Department of Homeland Security (DHS)

prevents terrorist attacks within the US and reduces America's vulnerability to terrorists

Central Intelligence Agency (CIA)

primarily responsible for clandestine foreign intelligence collection through HUMINT and other appropriate means

Communications Security (COMSEC)

procedures taken to deny the enemy information from our communications Sub categories: Cryptosecurity Transmission Security Emissions Security

Operations Security (OPSEC)

protects critical information through prevention Identifies, controls, and protects intelligence indicators Prevents adversaries from gathering and exploiting unclassified clues [Not classified]

National Geospacial Intelligence Agency (NGA)

provides imagery, imagery intelligence, and geospacial intelligence

Operational Intelligence

provides information crucial to planning and executing theatre-wide aerospace operations and aids analysts in defining key nodes, weaknesses, and vulnerabilities

Defense Intelligence Agency (DIA)

provides timely, objective, and relevant all source foreign intelligence to warfighters, defense planners, and national security policy makers worldwide

Federal Bureau of Investigation

responsible for counterintelligence operations conducted in the US

Drug Enforcement Administration (DEA)

responsible for enforcing the controlled substance laws and regulations

Realist Approach

self interest at expense of others state most important actors states strive to attain as many resources as possible states unitary, rational actors relations determine level of power

Director of National Intelligence (DNI)

senior intelligence advisor to President, NSC, and the Homeland Security Council on national security matters

Portion Markings

show highest classification contained within a section of a document

Derivative Classification

the act of incorporating, paraphrasing, or restating information that is already classified into a new document

National Security Agency/Central Security Service (NSA/CSS)

unified cryptologic organization of US produces foreign signals intelligence (SIGINT) info protects US government information systems

National Reconnaissance Office (NRO)

Acquires, designed, builds, launches, and maintains technology and space borne assets for worldwide intel collection

Confidential (C)

information or material whose unauthorized disclosure could cause 'damage' to national security

Planning and Direction (Intel Cycle)

usually starts with a requirement or tasking from higher headquarters Two steps: - establishing requirements (standing, field/ad hoc, request for info, collection req, priority intel req, essential elements intel) - validated requirement

OPSEC 5-step Process

1. Identify Critical Information 2. Analyze the threat 3. Analyze the vulnerabilities 4. Access the Risk 5. Apply countermeasures and monitor their success

Battlefield Coordination Detachment (BCD)

Army element Supports integration of aerospace operations with ground maneuver monitors and intercepts the land battle situation

Five Types of Security Violations

Compromise certain Compromise probably Compromise possible Compromise improbable Practice dangerous to security

Classification Authority

US Government official with the authority to actually assign a classification to a document

Portion

any part of a document/presentation that requires separate classification markings

Department of State (DOS)

overtly collects and produces political, military, and economic information relevant to US foreign policy

Component Liaisons

work for their respective component commanders integrates and coordinates component's participation in aerospace operations

Evaluation and Feedback (Intel Cycle)

Consumers evaluate received ISR products Used to ensure stated requirements are met Provides feedback to planners, collection managers and analysts

Marking Classified

Executive Order 13526- uniform way to classify and protect Intel community Markings System- list of security classifications and control markings generally= banner line, portion markings, classification authority block

Intelligence

Product resulting from the collection, processing, analysis, evaluation, and interpretation of information Information and knowledge about an adversary obtained through observation, investigation, analysis, or understanding

Information Security (INFOSEC)

Protects classified information Two categories: -communications security (COMSEC) -computer security (COMPSEC) [Classified]

Collateral

classified information that is not controlled by the SCI system

Department of Treasury (DOT)

overtly collects foreign financial and monetary information

Strategic Intelligence

required to formulate national strategy, policy, and plans and to provide accurate, timely, and predictive information to decision makers

Measurement and Signature (MASINT)

technically derived intelligence that detects and identifies distinctive characteristics of target objects and sources

1NOxx- Operations Intel Specialist

Analyses and provides all-source intel, situational estimates, mission planning, and aircrew training Develops and constructs target materials in support of combat mission planning/execution Collects, processes, and analyzes friendly C4 emissions to identify weaknesses that could be exploited by adversaries

Dissemination and Integration (Intel Cycle)

D: intelligence information is conveyed to consumers I: updating intelligence databases

National Security Council (NSC)

President's senior advisory board for all national security and defense matters

1A8x2- Airborne ISR Operator

flies as primary aircrew onboard a wide variety of aircraft annotates electromagnetic signals to determine likely emitter source digitally archives key events for follow-on processing

14N- Intel officer

manages analysis of collected intel produces assessments to meet operational requirements provides intel briefs to commanders exchanges intel with other services, agencies, and government

Unclassified (U)

Information whose compromise does not necessarily cause damage to national security, but which could potentially provide an adversary with insight to our plans or missions

Department of Defense (DOD)

Major tenant of the Pentagon (Army, Air Force, Navy, DIA, NSA, and NGA) federal department charged with coordinating and supervising all agencies and functions of the government relating directly to national security and military

Computer Security (COMPUSEC)

Protects information processed and stored on computers User is responsible for all information processed on government owned AIS

Top Secret (TS)

information or material whose unauthorized disclosure could cause 'exceptionally grave damage' to national security

Warden's 5 Ring Model

Centers of Gravity- characteristics, capabilities, or localities from which a military force, nation, or alliance derives its freedom of action, physical strength, or will to fight (inner) Leadership/Command Structure/Central C4- most critical (next) Organic Essentials and Logistics- power, POL, water (next) Infrastructure- LOCs, airfields (next)Population/Personnel- popular support (outer) Fielded Forces- least effective area of air power

Analysis and Production (Intel Cycle)

Information converted to intelligence info evaluated for reliability and accuracy, analyzed for meaning, and integrated with other sources Steps: -integration -evaluation -analysis -interpretation

Naval and Amphibious Liaison Element

Navy integrates naval air, fires, and amphibious operation into the theatre aerospace operations monitors and interprets the maritime battle situation

International Relations Theory

attempts to explain states cooperation or conflict, causation of events, patterns, and motivations of state and nonstate actors using various theoretical approaches -Realism -Liberalism

Tactical Intelligence

includes current assignments, defense and penetration analysis, and is primarily focused on threat warning, mission planning, targeting and combat assessment

Security Violations

Occurs when informations that's classified has been definitely, probably, or possibly disclosed to unauthorized persons

Processing and Exploitation (Intel Cycle)

Raw data transformed into information that can be further exploited by intelligence analysts

Caveats

additional warnings or handling instructions that are appended to the overall security classification

TECHELINT

focuses on studying the technical characteristics of a system in the research and development pre-development phase

Open Source Intel (OPSINT)

intel produced from publicly available information can give and insider's view on a situation susceptible to manipulation by the producer

Geospatial Intel (GEOINT)

intelligence derived from exploitation of imagery and geospatial information -electro-optical imagery -infrared -multispectral -radar -motion

Foreign Instrumentation Signals Intel (FISINT)

intelligence derived from the intercept of electronically transmitted data associated with testing and operational deployment of various systems

Clearance

opportunity afforded to an individual to obtain classified information

Destabilizing Factors

overpopulation environmental dangers/destruction economics resource scarcity war and refuge Motivating factors: nationality ethnic, group, tribe, clan race social class religion

1N4xxB- Analysis and Production

analyzes and exploits network intel info performs detailed analysis of comms nodes, structures, and operating procedures identifies, writes, and disseminated time sensitive intel reports and threat warning information

Special Access Program

any program imposing need to know or access controls beyond those normally required for access to classified information

Sensitive Compartmented Information (SCI)

classified information concerning or derived from intelligence sources, methods, or processes which is required to be handled within formal access control systems established by the Director of National Intelligence (DNI)

1N7xx- Human Intel Specialist

collects and reports intel information from human sources conducts in-depth debriefs or interrogations determines value and validity of documents and open source material

National Intelligence Support Team (NIST)

comprised of various national level intel agencies CIA, DIA, NSA, FAA, etc

Human Intel (HUMINT)

gathered from human sources through direct contact can provide coverage when other sensors are restricted limited by timeliness and source reliability oldest form of intel

Signals Intel (SIGINT)

information derived from collection and processing of foreign communications and non-communications passed by EM means -COMINT -ELINT (OPELINT & TECHELINT) -FISINT

Collection (Intel Cycle)

information is acquired by exploiting intel resources -primary -secondary -overt -discreet -covert -clandestine

Electronic Intel (ELINT)

information obtained for intel purposes from the intercept of foreign EM non-communications transmissions and emanations (ie radar)

COMINT

information obtained for intelligence purpose from intercept of foreign communications by other than the the intended recipient

Secret (S)

information or material whose unauthorized disclosure could cause 'serious damage' to national security

Marine Liaison Officer (MARLO)

integrates Marine air-ground task force (MAGTF) fires, maneuver, and Marine air into the theatre campaign

1N3xx- Cryptologic Linguist Specialist

intercepts, exploits, and analyzes voice communications translates intercepted comms for further analysis by other AFSCs

Joint Chiefs of Staff (JCS)

known as Unified Commands composed of forces from two or more military departments and organized via geographical/functional basis

Additional Liaisons

liaison officers from coalition/allied surface force, information warfare, space ops, judge advocate, weather and logistics

Operation Security (OPSEC) 5 steps

1. Identify critical information 2. Analyze the threat 3. Analyze the vulnerability 4. Access the risk 5. Apply countermeasures and monitor success

Banner Lines

US classification markings placed across the top and bottom of every page in a classified document

Special Operation Liaison Element (SOLE)

coordinates and integrates all SOF activities in the entire battlespace prevention of fratricide is a critical product of the SOLE effort

Need-to-know

determination that an individual requires access to specific classified information in order to perform a lawful government function

Custodian

individual who has possession of, or is otherwise charged with the responsibility for safeguarding or accounting for classified information

DIME Model

Diplomatic: how a nation exerts its influence over other countries by diplomacy Information: how a nation exerts influence over countries by type of information shared Military: how a nation uses its military to influence countries Economic: includes trade ties that a nation has to other countries or the kinds of loans it extends

Differences between Liberal and Realist

Liberal: interdependence among states influence state behavior states will work together collectively to achieve common goals sometimes states are willing to give up power in order to create a greater authority that strives for equality among people/state-- NATO, EU, UN, WTO

US Military Service Cryptologic Components (SCC)

Military service elements assigned by the SECDEF to support NSA/CSS mission Army: Army Intel& Security Command (INSCOM) Navy: US Fleet Cyber Command (FLTCYBERCOM) Marine: Marine Cryptologic Support Battalion (MCSB) AF: 25th Air Force (25AF)

Intelligence Cycle

Planning and Direction Collection Processing and Exploitation Analysis and Production Dissemination and Integration Evaluation and Feedback

Special Intelligence

a security control system within SCI to further protect COMINT

US Coast Guard (USCG)

an armed service within the DHS that provides maritime intelligence in support of port security, seaborne rescue, counter narcotics, and alien migration interdiction

Declassification

determination that classified information no longer requires any degree of protection against unauthorized disclosure

Upgrade

determination that classified information requires a higher degree of protection than previously provided


Related study sets

Simulation Lab 11.1: Module 11 Harden PC with Group Policy Editor

View Set

markets and financial intermediation exam 1

View Set

PostTest, Practice Exam 1 & Practice Exam 2

View Set

Coursera Spanish Vocabulary: Meeting People: Vocab 1

View Set

BIOLOGY FINAL EXAM REVIEW CH.12 QUESTIONS

View Set