Intel terms 2

studied byStudied by 44 people
5.0(1)
Get a hint
Hint

National Intelligence Priorities Framework (NIPF)

1 / 63

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

64 Terms

1

National Intelligence Priorities Framework (NIPF)

Established post 9/11 (2003) setting national intelligence priorities, translating them into action, and evaluating Intelligence Community (IC) responsiveness to them.

New cards
2

Request for information

When someone higher up or out of that organization's chain of command requests information or intelligence. This is used when additional intelligence is needed in order to be actionable or other strategic reasons.

New cards
3

Requirements management

Process that gets stuff done, usually 6 phases and each IC branch has their own to fit their exact needs. It's like an engine that is running in the background to make sure everything gets done smoothly.

New cards
4

Wheat vs chaff

Analogy of separating the irrelevant information from the relevant information. There will be a lot of irrelevant info to go through before you get to the relevant.

New cards
5

Top secret

Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.

New cards
6

Collection swarm ball

tendency of all collectors to collect on an important issue to enhance their standing whether or not they bring anything useful to the table. The solution to this is to give each INT a specific job.

New cards
7

geosynchronous orbit

22,000 feet in the air, the orbit of a satellite that revolves around Earth at the same rate that Earth rotates. US uses one over both oceans

New cards
8

The stovepipes problem

Raw intelligence presented directly to policymakers. bypassing established procedures for review by professional intelligence analysts for validity (a process known as vetting), an important concern since the information may have been presented by a dishonest source with ulterior motives

New cards
9

Defense attaches (DATT)

Overt intelligence collection that all countries conduct at their embassies overseas. They work for the ambassadors, however are assigned to their duty stations through DIA.

New cards
10

Grenville Dodge

Former Union general during the civil war, worked as an intelligence officer for Ulysses S. Grant.

New cards
11

Foreign Broadcast Information Service (FBIS)

Provided translations of both print and broadcast media (television and radio) in communist countries during the Cold War.

New cards
12

PNG-ed

When the official cover of an officer is blown they will be declared this and leave the country. They will not be arrested due to diplomatic status.

New cards
13

NOC

Nonofficial cover, avoids any overt connection

New cards
14

between the officer and his or her government but can make it more difficult to keep in contact. Holds a job to explain their presence. Do not have diplomatic cover.

New cards
15

Sleeper

Are inserted intothe target country but spend time- sometimes years--integrating themselves and do not become active immediately. They maintain regularlives. This allows them tobecome much morecomfortablein and familiar with the target country and also keeps them awayfrom the target's coun- terintelligence activities.

New cards
16

LAVINT

lavatory intelligence, such as heard in restrooms

New cards
17

Circular reporting

The OSINT phenomenon called echo or circular reporting isthe effect of a single media story being picked up and repeated by other mediasources until thestory takes on amuch larger life of its own, appearing more important than it actually is. In other words, there isrepeated reporting on the reporting.

New cards
18

ELINT

Electronic Intelligence, collection of non communications electronic signals, such as radar and other emitters. Primarily used at tactical and operational level of warfare. Includes radio jamming and detecting air defense or artillery radar sites.

New cards
19

Operation Ivy Bells, year?

1972, the CIA tapped into undersea cables in the sea of Okhotsk intercepting soviet messages. Vital to 79' SALT II negotiations.

New cards
20

Electronic Order of Battle

The EOB encompasses the identification, location, and analysis of enemy electronic systems, such as communication networks, radar installations, and electronic warfare assets.

New cards
21

Geospatial Intelligence (GEOINT)

intelligence information derived from maps, imagery, charts, and/or satellite data

New cards
22

Francis Gary Powers

American pilot shot down in his U-2 spy plane, captured and convicted of spying

New cards
23

CORONA

First imagery satellite, code named CORONA. Used film to take photos then dropped a box with parachute which was then collected by an Air Force plain and sent to the NPIC.

New cards
24

MASINT (Measurement and Signature Intelligence)

develops intelligence using quantitative and qualitative analysis of data; data is derived from specific technical sensors for the purpose of identifying any distinctive features associated with the target. Includes radar, radio, geophysical, nuclear radiation, material sampling, electro-optical

New cards
25

Counterintelligence operations

Proactive activities designed to identify, exploit, neutralise, or deter foreign intelligence collection and terrorist activities directed against the United States. For example, protecting secrets, assets, technology, as well as analyzing the capabilities, intentions, and activities of foreign intelligence services.

New cards
26

Insider threats

Citizens inside the US working for different IC organizations

New cards
27

Dmitri Polyakov

High ranking GRU agent that was working for the CIA during the Cold War. One of the greatest spies of all time.

New cards
28

MICE, words?

Acronym used for identifying motives for treason. Money, ideology, compromise, ego.

New cards
29

Threat assessment

Capability and Intent is looked at when doing this

New cards
30

SCIFs

Sensitive Compartmented Information Facilities, rooms or facilities which hold classified information

New cards
31

NCIX

National Counterintelligence Executive, under ODNI, works with security evaluation, specially security center, and national insider threat task force

New cards
32

Military deception

Techniques used to disguise actual unit location or create a false narrative of weapon capabilities

New cards
33

Neutralization

Refers to the ability to render an adversary's intelligence collection operations as useless or to actually defeat adversaries efforts by frustrating their activities. (Physically disabling collection operations) EX: shooting drone or capturing spy

New cards
34

Richard Meinertzhagen

British intelligence officer who decepted the germans by "losing" a fake briefcase which held war plans that said the British's attack on Beersheba was faint and the real attack was Gaza, however the opposite was actually true. The briefcase held personal items of the officer who lost it to make it look more real.

New cards
35

Alexis von Roenne

New cards
36

Plausible deniability

The ability to deny any involvement or knowledge of actions committed by ones governments, usually to do with Covert Action.

New cards
37

Radio free Europe

CIA run radio that broadcasted behind the Iron Curtain during the Cold War. Radio ran American news and anti-communist propaganda. Funded by congress, CIA control taken in ‘72

New cards
38

PBSSUCCESS

First CIA run coup in Guatemala to overthrow Jacobo Arbenz who showed communist support. Was done by propaganda news being broadcasted from Miami which ultimately helped US-backed paramilitary groups. Arbenz stepped down.

New cards
39

Executive Order 12333

Signed by Reagan in ‘81 that put a general ban on assassination

New cards
40

Title 50

Outlines covert action and clandestine operation rules

New cards
41

Black tom

US arms factory in NY that supplied Britain with many weapons, blown up by the Germans in WW1 (1916) while the US was still neutral.

New cards
42

Heinrich albert

One of the German spies that helped sabotage black tom

New cards
43

Aldrich Ames

Infamous CIA officer turned spy who betrayed the United States by selling classified information to the Soviet Union/Russia during the 1980s and 1990s. His actions resulted in the compromise of numerous CIA assets and the deaths of multiple agents.

New cards
44

Ana montes

Former senior intelligence analyst for the U.S. Defense Intelligence Agency (DIA) who was convicted of espionage in 2002. passed classified information to the Cuban government for 16 years.

New cards
45

What is the most common kind of insider threats

Unintentional

New cards
46

SIGINT lead agency

NSA

New cards
47

MASINT lead agency

DIA

New cards
48

GEOINT lead agency

NGA

New cards
49

Remote sensing

Obtaining information about objects or areas from a distance

New cards
50

What scale measures GEOINT image resolution, what numbers

NIIRS, 0-9

New cards
51

Lead HUMINT & OSINT agency

CIA

New cards
52

Surveillance vs. Reconnaissance

Surveillance - Observing target area or group usually extended time. Reconnaissance - Acquire info about target, short term and possibly 1 time thing

New cards
53

Why is OSINT easier to share

No methods or sources to protect

New cards
54

Morality

System of values with requirements for the individual to follow to be a good person

New cards
55

Securitization

The attempt to refocus a subject from its normal, nonmilitary context to the realm of security

New cards
56

Deontology

Philosophical system in which the moral principles that constitute it must be obeyed as a duty without exception.

New cards
57

Utilitarianism

Moral evaluation of conduct should be based on which decisions produce the greatest amount of happiness for the most people.

New cards
58

Daniel Ellsberg

Pentagon intelligence analyst who leaked thousands of pages about the Vietnam war to the press. His acts created the Whistleblower Protection Act of 1989 and laid out the framework for protections against US IC whistleblowers.

New cards
59

Enhanced interrogation techniques

Contracted program created by psychologists where CIA and Military interrogators employed techniques specifically in the 1984 Convention Against Torture. Treaty sponsored by the US

New cards
60

Ticking time bomb scenario

Utilitarians believe this is the only morally correct scenario for torture. Must be used to save lives, target must know the info, interrogator must think they will talk, must contain specific threat.

New cards
61

Anwar al Awlaki

First US Citizen killed by a drone strike in Yemen. Prominent Islamic extremist and preacher, associated with Al-Qaeda. Known for his influential online presence and involvement in several terrorist attacks Killed in a U.S. drone strike in 2011.

New cards
62

Iran-Contra scandal

Reagan gave contras $ to fight in south america after selling Iran arms. Was illegal due to no presidential findings

New cards
63
New cards
64
New cards

Explore top notes

note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 86 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 25 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard66 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard32 terms
studied byStudied by 16 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard25 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard23 terms
studied byStudied by 194 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard60 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard86 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard161 terms
studied byStudied by 21 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard70 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)