Final Exam Flashcards

1
Q

Information that meets the stated or understood needs of policy makers and has been collected, processed and narrowed to meet those needs.

A

Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When intel officers present biased findings to support a desired policy outcome

A

Politicized intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Assuming others will act the same way as you

A

Mirror imaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Redefined after 9/11 into three categories: (1) Foreign intelligence (2) Domestic intelligence (3) Homeland security

A

National Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Different orientations focusing on the same issue provide more views and greater understanding. This is a guard against irrational decisions because of emotions.

A

Competitive analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When the value of consensus outweighs the value of critical thinking.

A

Groupthink

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A variety of satellites and other technical collectors used to verify adherence to treaties.

A

National technical means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

to ensure that agreements are honored, the ability to ascertain whether terms of the treaty are met

A

Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Keeping track of another nation’s activities, the means for verification.

A

Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Deliver for interrogation

A

Render

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Key pieces of information that led to the Iraq war and search for WMDs

A

Key Judgments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Broad evaluation in the intelligence community to relate means (resources) to outcomes (objectives).

A

National Intelligence Priorities Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Works with the NSC to support and advise the President.

A

Director of National Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Senior policy coordinating body of the NSC. Comprised of the Secretaries of State and Defense, chairman of the Joint Chiefs of Staff, DNI, assistant to the President for national security and other cabinet members that attend as necessary.

A

Principals Committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Deputies of the PC. Together, the PC and DC support policy decisions based on intelligence and give insight to intelligence officials about the course of policy.

A

Deputies Committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Efforts to coordinate and make decisions about programs between the DoD and DNI to reduce spending in the MIP and NIP.

A

Crosswalks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Appropriations above the amount approved by Congress in the original budget. Function as a means to take care of agreed-on needs without long-term budget commitments. The wars in Iraq and Afghanistan were funded in this manner.

A

Supplementals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Seven phases of the intelligence process

A

(1) ID Requirements (2) Collection (3) Processing and Exploitation (4) Analysis and Production (5) Dissemination (6) Consumption (7) Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Collection analysts that deal with information from a single source

A

Single-source analysts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Collection analysts that deal with information on a macro level

A

All-source analysts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Priority of issues moving up and down a priority system like the NIPF.

A

Priority creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Issues that pop up out of nowhere and intel officers exert pressure to give them high priorities.

A

Ad hocs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When ad hocs take over the focus of the intelligence community.

A

Tyranny of the ad hocs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The steps of P&E that follow collection in the intelligence process.

A

Downstream activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Multiple intelligence organizations will stress a different point of view in order to make their product unique.

A

Footnote wars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The means for collection (INTs)

A

Collection disciplines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Intelligence (general term for collection), surveillance (sit around and watch) and reconnaissance (a mission to acquire information)

A

ISR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When one means of collection provides cues to guide collection via other means

A

Collection synergy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Intel based on many collection sources to compensate for shortcomings of each and profit from combined strength.

A

All-source/fusion intel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Brings together different types of technical collection. It is more than a single INT, but not all-source/fusion intel.

A

Multi-INT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How to extract desired intel from a huge load of information. Noise vs. signals, wheat vs. chaff.

A

Vacuum cleaner analogies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Prioritization of collection requirements occurs because of a limited number of collection platforms (spies).

A

Competing collection priorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Tendency of all collectors to collect on an important issue to enhance their standing regarding budget allocations.

A

Collection swarm ball

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The details of collection capabilities and the existence of some capabilities.

A

Sources and methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

U.S., Britain, Australia, Canada, New Zealand

A

Five Eyes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

200-1,000 miles above the earth; typically imagery satellites that are used for a detailed earth view

A

Low Earth Orbit (LEO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Between LEO and GEO

A

Medium Earth Orbit (MEO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

22,000 miles above the earth, stays above the same spot on earth at all times.

A

Geosynchronous orbit (GEO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Moving in harmony with earth’s rotation so that it is always functioning in daylight.

A

Sun-synchronous orbit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Sits over the northern hemisphere longer than the southern hemisphere.

A

Highly elliptical orbit (HEO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

HUMINT, the use of spies

A

Espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

When a targeted nation uses knowledge of collection capabilities to avoid collection.

A

Denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

When a targeted nation uses knowledge of collection capabilities to transmit information to that opponent.

A

Deception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Ability to distinguish between two points in an image, related to satellites

A

Resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Targets to which one does not have ready access. Collapse of the Soviet Union decreased the number of denied targets of OSINT

A

Denied targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Delete satellite capability

A

Anti-satellite weapons (ASAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Orbiting pieces of debris in space that can destroy satellites

A

Debris field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Regarding how many targets make themselves known via imagery.

A

Self-reveal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Looking at past imagery ti determine when an activity commenced

A

Negation search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Using computers to do a negation search.

A

Automatic change extraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

When the U.S. limits commercial satellite functioning for national security reasons.

A

Shutter control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Long duration/close-in video and capabilities that can be used to derive as much information as possible form the videos.

A

Full motion video (FMV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Also called “pattern of life,” based on observed behaviors that are more likely to indicate that an activity of interest is taking place in a given location.`

A

Activity-based intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Interception of signals between two or more entities. This is a broad category of intelligence.

A

SIGINT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Reading analyzing messages

A

Content analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Can be achieved through content analysis of intercepted messages.

A

Indication and warning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Monitoring changes in communications

A

Traffic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Subunit of SIGINT, the interception of signals between two people through phone calls and email.

A

COMINT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Coding of communications

A

Encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Code breakers

A

Cryptographers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

The message is hidden.

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Collected data are fed into computers that look for specific words or phrases as indicators of the likely value of an intercept.

A

Key-word search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

The need to consider the value of intel to be collected (the take) against the risk of discovery–either in political terms or in the collection technology that may be revealed to another country.

A

Risk versus take

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Sensors disguised to blend with the environment that can be linked to a network.

A

Unattended grounds sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Using humans as sources of information, largely involves sending covert service officers to foreign countries to recruit spies (people with access to information that may be of benefit to U.S. policy makers).

A

HUMINT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Agent Acquisition Cycle

A

(1) Targeting (2) Assessing (3) Recruiting (4) Handling (5) Termination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Used to assess a potential source

A

Asset Validation System

68
Q

Offering a relationship to a potential source

A

Pitch

69
Q

Becomes this after accepting a pitch

A

Source

70
Q

A potential source that is repeatedly contacted to asses value and consideration for a pitch.

A

Developmental

71
Q

The sources that the primary source uses

A

Sub-sources

72
Q

When the HUMINT officer holds another governmental position to hide his/her HUMINT position.

A

Official cover

73
Q

When a HUMINT officer holds another non-governmental job to hide his/her HUMINT position.

A

Non-official cover

74
Q

HUMINT officers that become active after integrating into the society.

A

Sleepers

75
Q

HUMINT sources that volunteer

A

Walk-ins

76
Q

Walk-ins that volunteer as a means of entrapment by providing false information.

A

Dangles

77
Q

Resources of foreign or allied friendly services. HUMINT to HUMINT connections.

A

Foreign liaison relationships

78
Q

Targets to which one does not have ready access

A

Denied areas

79
Q

Single media story being picked up and reported by multiple media sources until the story takes on a much larger life of its own, appearing more important than it really is.

A

Echo/Circular reporting

80
Q

Sharing of information via social networks online. This is a subset of OSINT.

A

Social Media

81
Q

Intel that extends over a long time.

A

Long-term intelligence

82
Q

Deals with events just a few weeks into the future. Increases during a war, shorter intelligence reports.

A

Current intelligence

83
Q

Ease of replacing analysts. Also referred to as analyst agility.

A

Analyst fungibility

84
Q

The acknowledged requirement to be able to cover any and all aspects of intelligence (no bait and switch). This can be misleading because it does not include any notion of the depth of knowledge of the subjects.

A

Global coverage

85
Q

Assuming that others will behave just as the analyst and have the same goals.

A

Mirror imaging

86
Q

A flaw that occurs when analysts become so immersed in their subjects that they are unable to view the issues with the needed criticality.

A

Clientism

87
Q

Error that occurs when judgments or assumptions of one analysis are used as the factual basis for another analysis without carrying over the uncertainties or judgments of the first analysis.

A

Layering

88
Q

Intelligence products that are written on a recurring basis; they establish benchmarks.

A

Estimates

89
Q

Australian and British term for estimates.

A

Assessments

90
Q

Groupthink

A

When the value of consensus overrides the value of critical thinking.

91
Q

Ensure a balanced focus on priority intelligence missions by overseeing both collection and analysis on a givern issue.

A

National Intelligence Managers (NIMs)

92
Q

When analysts serve separate clients and do not interact. The analysts get familiar with a certain client and get familiar with that client

A

Analytical stovepipes

93
Q

Different orientations on the same issue provide greater views and better understanding. Guard against irrational decisions because of emotions.

A

Competitive analysis.

94
Q

Compensates for insufficient sources by applying intense analytic rigor to the available sources.

A

Analytic penetration

95
Q

The degree of confidence the analyst has in his or her judgments.

A

Confidence levels

96
Q

Gives policy makers an advance notice of significant, usually military events. Can be achieved from content analysis of intercepted messages.

A

Indications and Warnings (I&W)

97
Q

Intel analysis that helps the policy maker advance an agenda and be the actor (instead of reactor).

A

Opportunity analysis

98
Q

When analysts embrace one perspective on an issue and are not open to other hypotheses.

A

Premature closure

99
Q

When intel officers present biased findings to support a desired policy outcome.

A

Politicized intelligence

100
Q

Efforts taken to prevent one’s own intel operations from penetration and disruption by hostile nations

A

Counterintelligence

101
Q

Countering penetration of one’s service.

A

Counterespionage

102
Q

Monitors pulse and breathing rate and notes changes in such physical responses as possible indications of falsehood or deception.

A

Polygraph

103
Q

Category of polygraph that focuses on personal behavior

A

Lifestyle poly

104
Q

Focuses on foreign contacts and handling of classified information

A

Counterintelligence poly

105
Q

The U.S. intel system is segmented and access is on a need to know basis.

A

Compartmented

106
Q

Intel agencies are evaluated by the degree to which they actively seek to share intel

A

Responsibility to provide

107
Q

Agents sent to another nation to assume normal lives and later become active agents

A

Sleeper agents

108
Q

Agents for one country that are turned against that country and provide intel on that country.

A

Double agents

109
Q

Deeply hidden spy

A

Mole

110
Q

Reasons why a spy went after certain information

A

Big CI

111
Q

How a spy was able to get access to information and other issues of tradecraft.

A

Little CI

112
Q

Determines what intel has been compromised after a spy is discovered.

A

Damage assessment

113
Q

Occurs when accused spies threaten to reveal classified information in open court to avoid prosecution. The U.S. solved this issue through judicial review.

A

Graymail

114
Q

Lists of people with access to certain categories of intelligence, which can be used to locate leaks.

A

Bigot lists

115
Q

Requires the recipient to turn over records pertaining to other individuals and the recipient can’t reveal the existence of it.

A

National Security Letters (NSLs)

116
Q

An activity of the U.S. government to influence political, economic or military conditions abroad, but without its role being apparent or publicly acknowledged.

A

Covert action

117
Q

A covert option that rests between doing nothing and military intervention

A

Third Option

118
Q

Operational support structure.

A

Plumbing

119
Q

A presidential order that approves a covert action as being necessary to support identifiable foreign policy objectives of the US and needed for national security.

A

Presidential Finding

120
Q

Disseminating information that has been created with a specific political outcome in mind.

A

Propaganda

121
Q

Seizure of individuals wanted by the U.S. and turned over to a third party.

A

Renditions

122
Q

Being able to deny a covert action based on surrounding circumstances.

A

Plausible deniability

123
Q

When a story is planted in a media outlet overseas so it will also be reported to the U.S.

A

Blowback

124
Q

Military-style interventions that are difficult to execute as covert action because of their size.

A

Paramilitary operations.

125
Q

Issues include; budget, quality of analysis, control of operations and propriety of activities.

A

Oversight

126
Q

Does high level objective oversight by responding to problems or initiating activities to investigate issues; became the PIAB in 2004 with the reform of national intelligence. Advises the president.

A

President’s Foreign Intelligence Advisory Board

127
Q

Seeks to provide policy makers with intelligence that will give them an edge over their adversaries.

A

“Decision Advantage”

128
Q

Broad presidential findings that deal with covert action involving transnational issues.

A

Global finding

129
Q

Can be a source of an intelligence action

A

Executive Orders

130
Q

Involves approving specific programs and activities

A

Authorization

131
Q

Allocating specific dollar amounts to authorized programs

A

Appropriation

132
Q

Authorized but not given enough, if any, funding.

A

Hollow budget authority

133
Q

Appropriated but not authorized

A

Appropriated but not authorized

134
Q

Legislative provisions directing funds to be spent on specific projects

A

Earmarks

135
Q

Money that does not have to be spent by the end of the fiscal year.

A

No year appropriations

136
Q

Make available funds over and above the amount originally planned.

A

Supplemental appropriations

137
Q

Leaders of the Congressional intel committees

A

Gang of 4

138
Q

Leaders of the Congressional intel committees and their ranking members

A

Gang of 8

139
Q

Intelligence programs that the Government Accountability Office has access to review for performance evaluation.

A

Special Access Programs (SAPs)

140
Q

The premise that if the USSR were contained within its borders, it would either change or collapse.

A

Containment

141
Q

Russian tradition of obscuring the realities of the Russian state.

A

Maskirovka

142
Q

Fake Russian villages built in the 1700s

A

Potemkin Villages

143
Q

The current forces or those being planned.

A

Capabilities

144
Q

The regularity and precision that govern each nation’s military make them susceptible to intel collection. Forces exercise in regular and predictable patterns.

A

Self-reveal

145
Q

Intel products that merely tally up the number of forces, equipment and manpower in foreign militaries.

A

Bean counting

146
Q

U.S. was well informed of the Soviet capabilities, but not their intentions.

A

Capabilities versus intentions

147
Q

Seeking to gauge the worst level of threat that could be posed by an opponent.

A

Worst-Case Analysis

148
Q

U.S. effort to aid anti-Soviet guerrillas

A

Reagan Doctrine

149
Q

A state in which there has been a breakdown in the legitimacy of the government to maintain a minimal level of control over its own territory

A

Failed states

150
Q

Conflict in cyberspace

A

Information Operations

151
Q

Exploitation of access to a computer to determine capabilities, collect data and/or take control of a network.

A

Computer Network Exploitation (CNE)

152
Q

Shutting a network down and/or disrupting command, control or vital services within the target nation.

A

Computer Network Attack (CNA)

153
Q

Includes military operations that intrude into the cyber responsibilities of intelligence agencies in advance of military attacks.

A

Cyber Operational Preparation of the Environment (Cyber OPE)

154
Q

Forensic function that determines the extent of damage that an attack caused. Determined by GEOINT or SIGNIT on a battlefield, but difficult to determine the results of a cyber attack.

A

Battle Damage Assessment (BDA)

155
Q

Key issue in cyberspace. It is difficult to determine attribution for non-state actors and in the case of CNE. This becomes an intelligence task and a policy question: What level of confidence is needed to determine that an attack came from a specific source?

A

Attribution

156
Q

Not precise intelligence, but patterns of intelligence; communications and movements of known or suspected terrorists.

A

Chatter

157
Q

Establishing connections between people to get a sense of the broader social networks. Used to identify the relationships among terrorists. Can examine phone calls between people along with the content of those calls.

A

Link analysis

158
Q

Series of fusion centers that aim to improve the communication between the federal and local levels of government in order to prevent terrorist attacks.

A

Joint Terrorism Task Forces (JTTFs)

159
Q

One of several categories relating economics to intelligence

A

Foreign Economic Espionage

160
Q

Economic espionage undertaken by businesses.

A

Industrial Espionage

161
Q

Searches through SIGINT using a key words search.

A

ECHELON

162
Q

Using a biological weapon as a tool for terrorism.

A

Bioterror

163
Q

Integration of IMINT, SIGINT and HUMINT to give commanders real-time or near real-time, all-weather, comprehensive, continuous surveillance and information about the battlefield in which they operate. This will reduce the fog of war.

A

Dominant Battlefield Awareness (DBA)

164
Q

Doctrinal evolution and debate about the future of warfare encompassing technology, strategy, tactics and the use of intelligence.

A

Revolution in Military Affairs (RMA)

165
Q

Responsible for intelligence integration, meaning collection and analysis, in their portfolios and are also responsible for crafting Unifying Intelligence Strategies (UIS) for their portfolios.

A

National Intelligence Managers (NIMs)

166
Q

Responsibility of the NIMs

A

Unifying Intelligence Strategies (UIS)