Final Exam Flashcards
Information that meets the stated or understood needs of policy makers and has been collected, processed and narrowed to meet those needs.
Intelligence
When intel officers present biased findings to support a desired policy outcome
Politicized intelligence
Assuming others will act the same way as you
Mirror imaging
Redefined after 9/11 into three categories: (1) Foreign intelligence (2) Domestic intelligence (3) Homeland security
National Intelligence
Different orientations focusing on the same issue provide more views and greater understanding. This is a guard against irrational decisions because of emotions.
Competitive analysis
When the value of consensus outweighs the value of critical thinking.
Groupthink
A variety of satellites and other technical collectors used to verify adherence to treaties.
National technical means
to ensure that agreements are honored, the ability to ascertain whether terms of the treaty are met
Verification
Keeping track of another nation’s activities, the means for verification.
Monitoring
Deliver for interrogation
Render
Key pieces of information that led to the Iraq war and search for WMDs
Key Judgments
Broad evaluation in the intelligence community to relate means (resources) to outcomes (objectives).
National Intelligence Priorities Framework
Works with the NSC to support and advise the President.
Director of National Intelligence
Senior policy coordinating body of the NSC. Comprised of the Secretaries of State and Defense, chairman of the Joint Chiefs of Staff, DNI, assistant to the President for national security and other cabinet members that attend as necessary.
Principals Committee
Deputies of the PC. Together, the PC and DC support policy decisions based on intelligence and give insight to intelligence officials about the course of policy.
Deputies Committee
Efforts to coordinate and make decisions about programs between the DoD and DNI to reduce spending in the MIP and NIP.
Crosswalks
Appropriations above the amount approved by Congress in the original budget. Function as a means to take care of agreed-on needs without long-term budget commitments. The wars in Iraq and Afghanistan were funded in this manner.
Supplementals
Seven phases of the intelligence process
(1) ID Requirements (2) Collection (3) Processing and Exploitation (4) Analysis and Production (5) Dissemination (6) Consumption (7) Feedback
Collection analysts that deal with information from a single source
Single-source analysts
Collection analysts that deal with information on a macro level
All-source analysts
Priority of issues moving up and down a priority system like the NIPF.
Priority creep
Issues that pop up out of nowhere and intel officers exert pressure to give them high priorities.
Ad hocs
When ad hocs take over the focus of the intelligence community.
Tyranny of the ad hocs.
The steps of P&E that follow collection in the intelligence process.
Downstream activities
Multiple intelligence organizations will stress a different point of view in order to make their product unique.
Footnote wars
The means for collection (INTs)
Collection disciplines
Intelligence (general term for collection), surveillance (sit around and watch) and reconnaissance (a mission to acquire information)
ISR
When one means of collection provides cues to guide collection via other means
Collection synergy
Intel based on many collection sources to compensate for shortcomings of each and profit from combined strength.
All-source/fusion intel
Brings together different types of technical collection. It is more than a single INT, but not all-source/fusion intel.
Multi-INT
How to extract desired intel from a huge load of information. Noise vs. signals, wheat vs. chaff.
Vacuum cleaner analogies
Prioritization of collection requirements occurs because of a limited number of collection platforms (spies).
Competing collection priorities
Tendency of all collectors to collect on an important issue to enhance their standing regarding budget allocations.
Collection swarm ball
The details of collection capabilities and the existence of some capabilities.
Sources and methods
U.S., Britain, Australia, Canada, New Zealand
Five Eyes
200-1,000 miles above the earth; typically imagery satellites that are used for a detailed earth view
Low Earth Orbit (LEO)
Between LEO and GEO
Medium Earth Orbit (MEO)
22,000 miles above the earth, stays above the same spot on earth at all times.
Geosynchronous orbit (GEO)
Moving in harmony with earth’s rotation so that it is always functioning in daylight.
Sun-synchronous orbit
Sits over the northern hemisphere longer than the southern hemisphere.
Highly elliptical orbit (HEO)
HUMINT, the use of spies
Espionage
When a targeted nation uses knowledge of collection capabilities to avoid collection.
Denial
When a targeted nation uses knowledge of collection capabilities to transmit information to that opponent.
Deception
Ability to distinguish between two points in an image, related to satellites
Resolution
Targets to which one does not have ready access. Collapse of the Soviet Union decreased the number of denied targets of OSINT
Denied targets
Delete satellite capability
Anti-satellite weapons (ASAT)
Orbiting pieces of debris in space that can destroy satellites
Debris field
Regarding how many targets make themselves known via imagery.
Self-reveal
Looking at past imagery ti determine when an activity commenced
Negation search
Using computers to do a negation search.
Automatic change extraction
When the U.S. limits commercial satellite functioning for national security reasons.
Shutter control
Long duration/close-in video and capabilities that can be used to derive as much information as possible form the videos.
Full motion video (FMV)
Also called “pattern of life,” based on observed behaviors that are more likely to indicate that an activity of interest is taking place in a given location.`
Activity-based intelligence
Interception of signals between two or more entities. This is a broad category of intelligence.
SIGINT
Reading analyzing messages
Content analysis
Can be achieved through content analysis of intercepted messages.
Indication and warning
Monitoring changes in communications
Traffic analysis
Subunit of SIGINT, the interception of signals between two people through phone calls and email.
COMINT
Coding of communications
Encrypt
Code breakers
Cryptographers
The message is hidden.
Steganography
Collected data are fed into computers that look for specific words or phrases as indicators of the likely value of an intercept.
Key-word search
The need to consider the value of intel to be collected (the take) against the risk of discovery–either in political terms or in the collection technology that may be revealed to another country.
Risk versus take
Sensors disguised to blend with the environment that can be linked to a network.
Unattended grounds sensors
Using humans as sources of information, largely involves sending covert service officers to foreign countries to recruit spies (people with access to information that may be of benefit to U.S. policy makers).
HUMINT
Agent Acquisition Cycle
(1) Targeting (2) Assessing (3) Recruiting (4) Handling (5) Termination