Intelligence/Counter Intelligence Support & Resources Flashcards
What did the Intelligence Reform Act and Terrorism Prevention Act (IRTPA) of 2004 do?
Established the Office of the Director of National Intelligence, led by Director of National Intelligence to unify and manage the efforts of the IC
Which agencies have Program Manager levels?
CIA, DIA, FBI, NGIA, NRO, NSA
Which agencies have Departmental level
DEA, DOE, DHS, USCG, Department of State, Treasure Office of Intelligence and Analysisy
Which agencies have Service Levels?
Air Force Intelligence, Army Intelligence, Marine Corps Intelligence, ONI, USSF
What informs the capability shortfalls identification process?
Capstone Threat Assessment (CTA)
What is the VOLT Report?
Validated On-Line Life-cycle Threat (VOLT) Report
What are the five pillars of cybersecurity?
Availability, Integrity, Authentication, Confidentiality, and Non-repudiation
What does the Undersecretary of Defense for Intelligence and Security do?
Develops, coordinates, and oversees DoD CI policy and activities.
Also provides authority, direction, and control over a few other suppport agencies
What does the Director of NSA/Chief of Central Security Service do?
Provide signals intelligence in support of CI activities
What does the Director of National Geospatial-Intelligence Agency do?
Provides geospatial intelligence activity support for CI activities
What does the Director of of the DIA do?
Provides centralized management of DoD CI activities under authority direction and control of the USD(I)
What does the Director of the Defense Threat Reduction Agency (DTRA) do?
Provides CI functional services and analysis, as appropriate, in support of international arms control agreements and regimes regarding weapons of mass destruction.
What do the secretaries of the Military Departments do?
Provides for the conduct, direction, management, coordination, and control of CI activities
What do the Component Heads do?
Integrate CI into the DoD Componenet insider threat program, as well as establish resource CI elements to conduct CI activites
Five pillars of cybersecurity: Preserves authorized restrictions on information access and disclosure
Confidentiality
Five pillars of cybersecurity: provides assurance that the sender of data is provided with proof of delivery and that the recipient is provided with proof of the sender’s identity
Non-repudiation
Five pillars of cybersecurity: verifies the identity of a user, process, or device
Authentication
Five pillars of cybersecurity: guarding against improper info modification or destruction
Integrity