Intel terms 2

5.0(1)
studied byStudied by 44 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/63

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

64 Terms

1
New cards
National Intelligence Priorities Framework (NIPF)
Established post 9/11 (2003) setting national intelligence priorities, translating them into action, and evaluating Intelligence Community (IC) responsiveness to them.
2
New cards
Request for information
When someone higher up or out of that organization's chain of command requests information or intelligence. This is used when additional intelligence is needed in order to be actionable or other strategic reasons.
3
New cards
Requirements management
Process that gets stuff done, usually 6 phases and each IC branch has their own to fit their exact needs. It's like an engine that is running in the background to make sure everything gets done smoothly.
4
New cards
Wheat vs chaff
Analogy of separating the irrelevant information from the relevant information. There will be a lot of irrelevant info to go through before you get to the relevant.
5
New cards
Top secret
Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
6
New cards
Collection swarm ball
tendency of all collectors to collect on an important issue to enhance their standing whether or not they bring anything useful to the table. The solution to this is to give each INT a specific job.
7
New cards
geosynchronous orbit
22,000 feet in the air, the orbit of a satellite that revolves around Earth at the same rate that Earth rotates. US uses one over both oceans
8
New cards
The stovepipes problem
Raw intelligence presented directly to policymakers. bypassing established procedures for review by professional intelligence analysts for validity (a process known as vetting), an important concern since the information may have been presented by a dishonest source with ulterior motives
9
New cards
Defense attaches (DATT)
Overt intelligence collection that all countries conduct at their embassies overseas. They work for the ambassadors, however are assigned to their duty stations through DIA.
10
New cards
Grenville Dodge
Former Union general during the civil war, worked as an intelligence officer for Ulysses S. Grant.
11
New cards
Foreign Broadcast Information Service (FBIS)
Provided translations of both print and broadcast media (television and radio) in communist countries during the Cold War.
12
New cards
PNG-ed
When the official cover of an officer is blown they will be declared this and leave the country. They will not be arrested due to diplomatic status.
13
New cards
NOC
Nonofficial cover, avoids any overt connection
14
New cards
between the officer and his or her government but can make it more difficult to keep in contact. Holds a job to explain their presence. Do not have diplomatic cover.
15
New cards
Sleeper
Are inserted intothe target country but spend time- sometimes years--integrating themselves and do not become active immediately. They maintain regularlives. This allows them tobecome much morecomfortablein and familiar with the target country and also keeps them awayfrom the target's coun- terintelligence activities.
16
New cards
LAVINT
lavatory intelligence, such as heard in restrooms
17
New cards
Circular reporting
The OSINT phenomenon called echo or circular reporting isthe effect of a single media story being picked up and repeated by other mediasources until thestory takes on amuch larger life of its own, appearing more important than it actually is. In other words, there isrepeated reporting on the reporting.
18
New cards
ELINT
Electronic Intelligence, collection of non communications electronic signals, such as radar and other emitters. Primarily used at tactical and operational level of warfare. Includes radio jamming and detecting air defense or artillery radar sites.
19
New cards
Operation Ivy Bells, year?
1972, the CIA tapped into undersea cables in the sea of Okhotsk intercepting soviet messages. Vital to 79' SALT II negotiations.
20
New cards
Electronic Order of Battle
The EOB encompasses the identification, location, and analysis of enemy electronic systems, such as communication networks, radar installations, and electronic warfare assets.
21
New cards
Geospatial Intelligence (GEOINT)
intelligence information derived from maps, imagery, charts, and/or satellite data
22
New cards
Francis Gary Powers
American pilot shot down in his U-2 spy plane, captured and convicted of spying
23
New cards
CORONA
First imagery satellite, code named CORONA. Used film to take photos then dropped a box with parachute which was then collected by an Air Force plain and sent to the NPIC.
24
New cards
MASINT (Measurement and Signature Intelligence)
develops intelligence using quantitative and qualitative analysis of data; data is derived from specific technical sensors for the purpose of identifying any distinctive features associated with the target. Includes radar, radio, geophysical, nuclear radiation, material sampling, electro-optical
25
New cards
Counterintelligence operations
Proactive activities designed to identify, exploit, neutralise, or deter foreign intelligence collection and terrorist activities directed against the United States. For example, protecting secrets, assets, technology, as well as analyzing the capabilities, intentions, and activities of foreign intelligence services.
26
New cards
Insider threats
Citizens inside the US working for different IC organizations
27
New cards
Dmitri Polyakov
High ranking GRU agent that was working for the CIA during the Cold War. One of the greatest spies of all time.
28
New cards
MICE, words?
Acronym used for identifying motives for treason. Money, ideology, compromise, ego.
29
New cards
Threat assessment
Capability and Intent is looked at when doing this
30
New cards
SCIFs
Sensitive Compartmented Information Facilities, rooms or facilities which hold classified information
31
New cards
NCIX
National Counterintelligence Executive, under ODNI, works with security evaluation, specially security center, and national insider threat task force
32
New cards
Military deception
Techniques used to disguise actual unit location or create a false narrative of weapon capabilities
33
New cards
Neutralization
Refers to the ability to render an adversary's intelligence collection operations as useless or to actually defeat adversaries efforts by frustrating their activities. (Physically disabling collection operations) EX: shooting drone or capturing spy
34
New cards
Richard Meinertzhagen
British intelligence officer who decepted the germans by "losing" a fake briefcase which held war plans that said the British's attack on Beersheba was faint and the real attack was Gaza, however the opposite was actually true. The briefcase held personal items of the officer who lost it to make it look more real.
35
New cards
Alexis von Roenne
36
New cards

Plausible deniability

The ability to deny any involvement or knowledge of actions committed by ones governments, usually to do with Covert Action.

37
New cards

Radio free Europe

CIA run radio that broadcasted behind the Iron Curtain during the Cold War. Radio ran American news and anti-communist propaganda. Funded by congress, CIA control taken in ‘72

38
New cards

PBSSUCCESS

First CIA run coup in Guatemala to overthrow Jacobo Arbenz who showed communist support. Was done by propaganda news being broadcasted from Miami which ultimately helped US-backed paramilitary groups. Arbenz stepped down.

39
New cards

Executive Order 12333

Signed by Reagan in ‘81 that put a general ban on assassination

40
New cards

Title 50

Outlines covert action and clandestine operation rules

41
New cards

Black tom

US arms factory in NY that supplied Britain with many weapons, blown up by the Germans in WW1 (1916) while the US was still neutral.

42
New cards

Heinrich albert

One of the German spies that helped sabotage black tom

43
New cards

Aldrich Ames

Infamous CIA officer turned spy who betrayed the United States by selling classified information to the Soviet Union/Russia during the 1980s and 1990s. His actions resulted in the compromise of numerous CIA assets and the deaths of multiple agents.

44
New cards

Ana montes

Former senior intelligence analyst for the U.S. Defense Intelligence Agency (DIA) who was convicted of espionage in 2002. passed classified information to the Cuban government for 16 years.

45
New cards

What is the most common kind of insider threats

Unintentional

46
New cards

SIGINT lead agency

NSA

47
New cards

MASINT lead agency

DIA

48
New cards

GEOINT lead agency

NGA

49
New cards

Remote sensing

Obtaining information about objects or areas from a distance

50
New cards

What scale measures GEOINT image resolution, what numbers

NIIRS, 0-9

51
New cards

Lead HUMINT & OSINT agency

CIA

52
New cards

Surveillance vs. Reconnaissance

Surveillance - Observing target area or group usually extended time. Reconnaissance - Acquire info about target, short term and possibly 1 time thing

53
New cards

Why is OSINT easier to share

No methods or sources to protect

54
New cards

Morality

System of values with requirements for the individual to follow to be a good person

55
New cards

Securitization

The attempt to refocus a subject from its normal, nonmilitary context to the realm of security

56
New cards

Deontology

Philosophical system in which the moral principles that constitute it must be obeyed as a duty without exception.

57
New cards

Utilitarianism

Moral evaluation of conduct should be based on which decisions produce the greatest amount of happiness for the most people.

58
New cards

Daniel Ellsberg

Pentagon intelligence analyst who leaked thousands of pages about the Vietnam war to the press. His acts created the Whistleblower Protection Act of 1989 and laid out the framework for protections against US IC whistleblowers.

59
New cards

Enhanced interrogation techniques

Contracted program created by psychologists where CIA and Military interrogators employed techniques specifically in the 1984 Convention Against Torture. Treaty sponsored by the US

60
New cards

Ticking time bomb scenario

Utilitarians believe this is the only morally correct scenario for torture. Must be used to save lives, target must know the info, interrogator must think they will talk, must contain specific threat.

61
New cards

Anwar al Awlaki

First US Citizen killed by a drone strike in Yemen. Prominent Islamic extremist and preacher, associated with Al-Qaeda. Known for his influential online presence and involvement in several terrorist attacks Killed in a U.S. drone strike in 2011.

62
New cards

Iran-Contra scandal

Reagan gave contras $ to fight in south america after selling Iran arms. Was illegal due to no presidential findings

63
New cards
64
New cards