Midterm Flashcards

1
Q

What is Intelligence?

A

It is the product of collecting, processing, integrating, evaluating, analyzing, and interpreting available information concerning foreign nations (hostile or potentially hostile forces/elements).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the steps of intelligence (from perceiving of a need to the delivery of the product)

A
  1. Identify requirements
  2. Collection
  3. Processing and Explanation
  4. Analysis and Production
  5. Dissemination
  6. Consumption
  7. Feedback
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 main activities of intelligence?

A
  1. Collection
  2. Analysis
  3. Covert Action
  4. Counterintelligence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many organizations make up the Intelligence Community (IC)?

A

17

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do the federal organizations/agencies do in the IC (just in general)?

A
  1. Collect and analyze raw intelligence
  2. Produce finished intelligence reports and assessments
  3. Disseminate products to inform policymakers responsible for national security and foreign policy decisions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the types of intelligence (these are the 6 major sources of INT that the IC collects)

A
  1. HUMINT (human)
  2. SIGINT (signals)
  3. IMINT (imagery)
  4. GEOINT (geospatial)
  5. MASINT (measurement and signature)
  6. OSINT (open source)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is HUMINT?

A

Info gleaned from human sources - these sources are known as assets when recruited by trained officers via clandestine means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is SIGINT?

A

Info from communications and electronic intelligence (COMINT, ELINT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is IMINT?

A

representations of objects reproduced electronically or by optical means (film, electronic, media); derived from visual photography, radar, and electro-optics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is GEOINT?

A

Analysis and visual representation of objects and activities on earth’s surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is MASINT?

A

data derived from technical sources (excludes IMINT/SIGINT) that locates, identifies, or describes distinctive characteristics of targes by employment of nuclear, optical, radio, acoustic, seismic, or materials sciences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is OSINT?

A

publicly available information that appears in print or electronic form (radio, television, media, internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 17 components of the IC?

A
  1. ODNI (Office of Director of National Intelligence)
  2. CIA
  3. DIA - Defense Intelligence Agency
  4. NGA - National Geospatial-Intelligence Agency
  5. NRO - National Reconnaissance Office
  6. NSA - National Security Agency
  7. IN - Office of Intelligence and Counterintelligence, Department of Energy
  8. DEA - Office of National Security Intelligence, Drug Enforcement Agency
  9. FBI - National Security Branch, Federal Bureau of Investigation
  10. INR - Bureau of Intelligence and Research (DoS)
  11. OIA - Office of Intelligence and Analysis (DoTreasury)
  12. I&A - Office of Intelligence and Analysis (DoHomeland)
  13. Coast Guard Intelligence and Criminal Investigations Enterprise
  14. Army Military Intelligence
  15. ONI - Office of Naval Intelligence
  16. AFISR - Air Force Intelligence, Surveillance & Reconnaissance
  17. MCIA - Marine Corps Intelligence Activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the NIP and MIP? What do they do and how are they different?

A

NIP: National Intelligence Program
MIP: Military Intelligence Program

NIP - funds all IC programs/projects/activities that support national intel needs and serve interagency customers (DNI responsible for NIP)

MIP - funds intel programs/projects/activities that primarily support military operations or other DoD-specific needs (Secretary of Defense responsible for MIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the NIPF and what does it do?

A

NIPF: National Intelligence Priorities Framework

It is the primary mechanism to establish, manage, and communicate national intelligence priorities (as determined by guidance from the President and NS Advisor) and informs NIP planning, programming, and budgeting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain the differences between Title 10 and Title 50

A

Title 10: Authorizes activities often executed by DoD or Military services
Title 50: Authorizes activities executed by IC elements; covert action notification to Congress codified under Title 50

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Key US Intel Authorities (laws, codes, acts, etc)

A
  1. NSA of 1947
  2. Executive Order 12333
  3. FISA 1978
  4. FISA section 702
  5. IRTPA of 2004
  6. IAA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What was the National Security Act of 1947?

A

Defines the IC’s membership, key intelligence-related terms, the role and responsibilities of the ODNI and IC members, and the oversight role of the congressional intelligence committees (creation of CIA from this)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Executive Order 12333?

A

Defines the respective powers and responsibilities of IC members, prohibits certain activities, and specifies the type of info the IC can collect; techniques that can and cannot be used in collection; and rules for sharing and using collected information. This is the principal authority for foreign intelligence collection conducted abroad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the Foreign Intelligence Surveillance Act of 1978? (FISA)

A

Authorizes certain kinds of electronic and physical FOREIGN intelligence surveillance, both within the US and abroad - provides judicial supervision of FISA matters by the FISC (Foreign Intelligence Surveillance Court) - this occurred in response to the Watergate scandal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is FISA section 702?

A

An amendment that facilitates the acquisition of foreign intelligence information concerning non-US citizens living outside the US; NO WARRANT FOR NON_AMERICANS OUTSIDE US - this is the single most important statute for IC collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the Intelligence Reform and Terrorism Prevention Act of 2004?

A

Establishes the ODNI as the lead for intelligence integration in the wake of the failure to “connect the dots” prior to 9/11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the Intelligence Authorization Act?

A

Annual bill that authorizes activities and appropriations spending for the IC each fiscal year. Each IAA contains a classified annex and a schedule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is covert action?

A

As specifically defined in Section 503 of the National Security Act, a covert action means an activity or activities of the U.S. Government to influence political, economic, or military conditions abroad, where it is intended that the role of the U.S. government will not be apparent or acknowledged publicly. No covert action may be conducted which is intended to influence U.S. political processes, public opinion, policies, or media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Why is Covert Action considered a third option? What is the process to authorize Covert Action?

A

Covert action is often considered as a third option between diplomacy and military action. To authorize a covert action, the President must sign a Finding describing why such an activity is necessary to support identifiable foreign policy objectives of the United States and stating which government agency(ies) will be involved in executing the covert action. The CIA is generally designated as the lead element in executing
covert action, though other government entities may be involved as well.
No Finding may authorize an activity that is prohibited by the U.S. Constitution or the U.S. statute. By law, the President must notify the full congressional intelligence
committee as soon as possible after signing and prior to the initiation of any covert action unless the President determines that extraordinary circumstances make it
ssential to limit notification to the Gang of Eight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are types of Covert Action? List from least involved to most

A
  1. Propaganda
  2. Political Activity
  3. Economic Activity
  4. Sabotage
  5. Coups
  6. Paramilitary Operations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the Gang of Eight?

A

(1) House Speaker & (2) Minority Leader
(3) Senate Majority & (4) Minority Leaders
(5) Chairman and (6) Ranking Member of the HPSCI
(7) Chairman and (8) Vice Chairman of the SSCI

The President must inform the full congressional IC of the Finding’s existence and the transmission to the Gang of Eight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a Security Clearance?

A

It is a determination that an individual is eligible for access to classified national security information. Possession alone does not grant an individual access to classified information; the individual must also have a demonstrated “need to know” for their position and policy area responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the different levels of clearance? Who deems what is classified?

A

Confidential: Access to classified information that if disclosed would “cause damage to the national security”

Secret: Access to classified information that if disclosed would “cause serious damage to the national security”

Top-Secret: Access to classified information that if disclosed would “cause exceptionally grave damage to the national security”

EXECUTIVE BRANCH DECIDES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the Chief of Station?

A

The top intelligence official stationed in a foreign country (often CIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is confirmation bias?

A

Tendency to interpret new evidence as confirmation of one’s existing beliefs or theories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is counterintelligence?

A

Efforts to protect one’s own intelligence operations from penetration and disruption from hostile nations or intelligence services. Counterintelligence is not a separate step in the intelligence process. Counterintelligence should pervade all aspects of
intelligence. Examples include efforts to prevent spying,
intelligence gathering, and sabotage by an enemy or other foreign entity.

33
Q

What is a denied area?

A

An area under enemy or unfriendly control in which friendly forces cannot be expected to operate successfully.

34
Q

What is espionage?

A

The practice of spying or of using spies, typically by governments to obtain political and military information. While most nations treat this activity as illegal, it does not violate international law

35
Q

Who are the five eyes?

A

US, Great Britain, Australia, New Zealand, and Canada

36
Q

What does Going Dark mean?

A

The prevalence and sophistication of encryption and the use of new applications (apps) are degrading the ability to collect information pertinent to national security. More specifically, these technologies are diminishing both law enforcement and the Intelligence Community’s (IC) ability to lawfully intercept data in motion as well as access stored data.

37
Q

What is Groupthink?

A

The practice of thinking or making decisions as a group in a way that discourages creativity or individual responsibility

38
Q

What is the HPSCI?

A

The House of Representatives oversight committee for the US intelligence community

39
Q

What is Mirror Imaging?

A

Assuming that the other states or individuals will act just the way a particular country or person does. Occurs when a person or group is viewed through the lens of the analyst’s own environment and experiences rather than from theirs causing them to ascribe ambitions, goals and drives similar to one’s own, to one’s opposites as well.

40
Q

What is NOC?

A

Non-official Cover; Intel officers assume covert roles in organizations without official ties to the
government for which they work

41
Q

What is Offical Cover?

A

Intel officers assuming a position in an organization with diplomatic ties to the government for which the operative works. This provides the officer with diplomatic
immunity, thus protecting them from being punished as spies

42
Q

What is rendition?

A

The practice of sending a foreign criminal or terrorist suspect covertly to be interrogated in a country with less rigorous regulations for the humane treatment of prisoners.

43
Q

What is the SSCI?

A

The US Senate oversight committee for the intelligence community

44
Q

What is a SCIF?

A

Sensitive Compartmented Information Facility; A secure room/enclosed area within a building that is used for intelligence briefings and the exchange of classified information. The Situation Room in the White House is one of the most famous examples of a SCIF.

45
Q

Explain the entire process of how a covert action comes to be?

A
  1. Senior Policy Maker has the idea (POTUS, Natl. security advisor, Deputy Natl. Security Advisor) - Executive Branch Approval
  2. Ask CIA to essentially think about doing the actoin; CIA says yees or no (but president can still say yes no matter what)
  3. WH Prepares finding and defines:
    - Policy objective
    - Actions authorized
    - Risks associated with the action
    - What happens when the action gets out?
  4. Finding is sent to the deputies/principles committees
    - These committees check for legal issues
  5. Sent back to POTUS, where they sign or change
  6. 48hrs to send the modified Finding to Intel Committees (NOT for approval, but more for power of purse - HPSCI/SSCI)
46
Q

What is the hierarchy of sharing in the US from the POTUS down?

A

POTUS
Gang of 8
Committees
Rest of House

47
Q

What are the 2 levels of risk examined before approving covert action?

A
  1. Risk of exposure
  2. Risk of failure of the operation (human lives, political crises)
48
Q

Explain the Iran-contra affair and how it brought up issues with the covert action process

A

The Iran-contra affair was a Reagan administration issue; essentially, the US secretly sold arms to Iran despite an arms embargo - the money from these sales was used to then fund the Contras (Anti-Sandinista group in Nicaragua)

ISSUES:
- QUESTIONABLE DELEGATIONS OF AUTHORITY - Congress cut funding (opposed to contra support), so NSC staff got donations AND also argueed that restrictions from Congress applied only to DOD and IC, not NSC staff

  • Presidential findings postdated and signed ex post facto
  • Disparate operations merged (Iran money to fund contras)
  • Executive branch failed to properly inform Congress
49
Q

What are the basic steps of foreign source/asset recruitment?

A
  1. Spotting
  2. Assess - find motivations, access, what they do, family
  3. Develop - rapport, trust, sharing
  4. Recruit
  5. Handling - warm turnovers
  6. Terminate - retirement, exfiltration etc
50
Q

What is MICE?

A

Potential motivations for espionage; CIA does not use C

M - Money
I - Ideology (political beliefs)
C - Compromise (blackmail)
E - Ego (recognition, power)

51
Q

Where do most leaks come from?

A

Executive!; The legislative side is usually really great at not leaking (Committees)

52
Q

What is the 4th amendment?

A

Protect people from unreasonable search and seizure (Not just citizens!, NOT places!); came about in 1791 - regarding British troops and revolution; balances the law enforced and the individual

53
Q

What does FISA do and why did it come about?

A

Comes from Watergate (Nixon privacy violations -> domestic spying)
- Must obtain authorization to gather foreign intelligence on foreign powers & agents suspected of espionage - this happening on domestic soil

54
Q

Is spying illegal?

A

Most nations treat it as such, but it is NOT per international law!

55
Q

What is probable cause?

A

Evidence of a crime - more than just a tip or guess/hunch

56
Q

What is a subpoena vs search warrant?

A

Subpoena: court-ordered for testifying, you are protected by the 5th of self-incrimination, no probable cause needed (just reasonable suspicion)

Search Warrant: directions to law enforcement to do something otherwise illegal (trespassing, seizure); needs probable cause

57
Q

Explain US v Olmstead

A

1928
- Federal agents wire-tapped Olmstead’s basement without a warrant to catch him bootlegging. Originally ruled that this did not violate his 4th amendment rights.
Brandeis (a judge) Dissent Important!!!!

58
Q

Brandeis Dissent

A

RIGHT TO PRIVACY & we need calibration - Translation of old principles to meet new challenges and emerging technologies -> The constitutional principles written were to protect privacy, they did not know what technologies the future would hold!

59
Q

Explain Katz v US (1967)

A

1967
- FBI mic’d outside of phone booth that Katz would perform illegal interstate gambling from.
- Courts agreed that Katz thought his conversations were private and that he was entitled to this -> the 4th protects people, not places.
Mic’ing the booth would be assumed as a search if the subject had the expectation that their conversations on the phone were private

60
Q

Briefly explain Carpenter v US

A

2018
- Cellphone tower & location of robbers tracked
- They tracked them for an unreasonably long period and it was a “sweeping mode of surveillance” which was revealing and violating of privacy

61
Q

Signature vs Personality Strikes

A

Signature: General idea & location; pattern of life is known, identity is not

Personality: Specific senior leader targeted (requires a lot of intel; often just know senior leader); known identity and past actions = direct threat level

62
Q

How much of the intel budget is under Secretary of Defense (MIP)?

A

70-75%

63
Q

What are the costs of covert action?

A

Money, but the real issue is that Congress cant provide more people, so often you are taking your most valuable people away from collection and analysis for the CA

64
Q

What type of material does collection bring in?

A

Raw data, which is RARELY ever shared -> instead, the product (intelligence) is 99% of the time what is shared

65
Q

What are downstream activities?

A

They are the steps that follow collection:
- processing, exploitation, analysis (TPEDs - tasking, processing, exploitation, dissemination)

MOST raw collection materials dont make it to downstream - there is just so much

66
Q

What decides the ratio of collection and how much of the material is processed? (P&E)

A

Relative priority of the issues
Available resources to conduct P&E
Ability to process some faster than other (signals for example -> encryption, language spoken etc)

67
Q

What is competitive analysis?

A

Having the same issue addressed by several different analytical groups (costly, but valuable); THE antidote to groupthink - Iraq WMD failure was sorta groupthink, I believe

capabilities for Comp. Analysis lost during 90’s and cold war (budget contractions); analytical triage

68
Q

Explain wheat v chaff and cutting through the massive amounts of raw collected materials>

A

More hay bales =/= more needles;
Technical collection is more like an imprecise vacuum, not a microscope.
OSINT is maybe the worst offender of wheat-chaff issue

69
Q

Data vs Knowledge

A

Data: analysis and manipulation of data alluring, but big data is bloated (still helps - like weapons systems info, economic data, terrorism connections), but no amount of data will tell you what NK will do next

Must have Knowledge workers

70
Q

How do you know if a leak happens? External indicators of problems (Counterintelligence)

A
  • Sudden loss of an asset
  • Military patterns corresponding to satellite tracks
71
Q

Define counterintelligence

A

EO 12333: “information gathered
and activities conducted to identify, deceive, exploit, disrupt or
protect” against espionage and other activities carried out by foreign
states or non-state actors

72
Q

Three types of Counter Intel

A
  1. Collection: gaining info about opponents abilities that may be aimed at one’s own
  2. Defensive: thwarting efforts by hostile intel services to penetrate one’s own
  3. Offensive: manipulate attacks from opponent - double agents, false info
73
Q

What are weaknesses of intelligence?

A
  1. Conventional Wisdom dismissed
  2. Dependent on data (the data says that is impossible! but…it happened)
  3. Mirror Imaging - assumption of actions
  4. Policy makers reject/ignore intelligence materials
74
Q

What is mirror imaging?

A

Assuming that other states/individuals will act just the way a particular country or person does (undermines analysis)

75
Q

What is the third party rule?

A

Dont share intelligence received from foreign liaison with another party without permission

76
Q

Ways of protecting sources and methods?

A
  1. Classification system
  2. Five Eyes and gradation of intelligence sharing (UK > Aus > Canada/NZ)
77
Q

What is the intelligence community?

A

The Intelligence Community consists of 17 federal organizations and agencies that
work both independently and in concert to
1) collect and analyze raw intelligence,
2) produce finished intelligence reports and assessments, and
3) disseminate those
products to inform policymakers responsible for national security and foreign policy decisions

78
Q

What is the ODNI and what does it do? What is within the ODNI?

A

The Office of the Director of National Intelligence (ODNI) - Leads intelligence integration of the 16 other component intelligence elements, with the DNI serving as the statutory principal intelligence advisor to the President and the National Security Council.

oused within ODNI are several national integrative centers: the Cyber Threat Integration Center (CTIIC); the National Counterproliferation Center (NCPC); the National Counterterrorism Center (NCTC); the National Intelligence Council (NIC); and the National Counterintelligence and Security Center (NCSC). As of 2013, ODNI employed more than 1,700 personnel

79
Q

What does CIA collect?
What does DIA collect?
What does NGA collect?
What does NRO collect?
NSA?
DEA?
FBI?
OIA?
I&A?

A

CIA: HUMINT, produces all-source analysis
DIA: military intel (HUMINT, MASINT)
NGA: GEOINT
NRO: SIGINT (natl, reconnaissance office)
NSA: leader of US systems and networks
DEA: Drug Trafficking
FBI: National threats & coordinates with law enforcement
OIA: Office of Intel and Analysis -> financial systems
I&A: Intel and Analysis -> homeland security & domestic stakeholders