Looks like no one added any tags here yet for you.
National Intelligence Priorities Framework (NIPF)
Established post 9/11 (2003) setting national intelligence priorities, translating them into action, and evaluating Intelligence Community (IC) responsiveness to them.
Request for information
When someone higher up or out of that organization's chain of command requests information or intelligence. This is used when additional intelligence is needed in order to be actionable or other strategic reasons.
Requirements management
Process that gets stuff done, usually 6 phases and each IC branch has their own to fit their exact needs. It's like an engine that is running in the background to make sure everything gets done smoothly.
Wheat vs chaff
Analogy of separating the irrelevant information from the relevant information. There will be a lot of irrelevant info to go through before you get to the relevant.
Top secret
Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
Collection swarm ball
tendency of all collectors to collect on an important issue to enhance their standing whether or not they bring anything useful to the table. The solution to this is to give each INT a specific job.
geosynchronous orbit
22,000 feet in the air, the orbit of a satellite that revolves around Earth at the same rate that Earth rotates. US uses one over both oceans
The stovepipes problem
Raw intelligence presented directly to policymakers. bypassing established procedures for review by professional intelligence analysts for validity (a process known as vetting), an important concern since the information may have been presented by a dishonest source with ulterior motives
Defense attaches (DATT)
Overt intelligence collection that all countries conduct at their embassies overseas. They work for the ambassadors, however are assigned to their duty stations through DIA.
Grenville Dodge
Former Union general during the civil war, worked as an intelligence officer for Ulysses S. Grant.
Foreign Broadcast Information Service (FBIS)
Provided translations of both print and broadcast media (television and radio) in communist countries during the Cold War.
PNG-ed
When the official cover of an officer is blown they will be declared this and leave the country. They will not be arrested due to diplomatic status.
NOC
Nonofficial cover, avoids any overt connection
between the officer and his or her government but can make it more difficult to keep in contact. Holds a job to explain their presence. Do not have diplomatic cover.
Sleeper
Are inserted intothe target country but spend time- sometimes years--integrating themselves and do not become active immediately. They maintain regularlives. This allows them tobecome much morecomfortablein and familiar with the target country and also keeps them awayfrom the target's coun- terintelligence activities.
LAVINT
lavatory intelligence, such as heard in restrooms
Circular reporting
The OSINT phenomenon called echo or circular reporting isthe effect of a single media story being picked up and repeated by other mediasources until thestory takes on amuch larger life of its own, appearing more important than it actually is. In other words, there isrepeated reporting on the reporting.
ELINT
Electronic Intelligence, collection of non communications electronic signals, such as radar and other emitters. Primarily used at tactical and operational level of warfare. Includes radio jamming and detecting air defense or artillery radar sites.
Operation Ivy Bells, year?
1972, the CIA tapped into undersea cables in the sea of Okhotsk intercepting soviet messages. Vital to 79' SALT II negotiations.
Electronic Order of Battle
The EOB encompasses the identification, location, and analysis of enemy electronic systems, such as communication networks, radar installations, and electronic warfare assets.
Geospatial Intelligence (GEOINT)
intelligence information derived from maps, imagery, charts, and/or satellite data
Francis Gary Powers
American pilot shot down in his U-2 spy plane, captured and convicted of spying
CORONA
First imagery satellite, code named CORONA. Used film to take photos then dropped a box with parachute which was then collected by an Air Force plain and sent to the NPIC.
MASINT (Measurement and Signature Intelligence)
develops intelligence using quantitative and qualitative analysis of data; data is derived from specific technical sensors for the purpose of identifying any distinctive features associated with the target. Includes radar, radio, geophysical, nuclear radiation, material sampling, electro-optical
Counterintelligence operations
Proactive activities designed to identify, exploit, neutralise, or deter foreign intelligence collection and terrorist activities directed against the United States. For example, protecting secrets, assets, technology, as well as analyzing the capabilities, intentions, and activities of foreign intelligence services.
Insider threats
Citizens inside the US working for different IC organizations
Dmitri Polyakov
High ranking GRU agent that was working for the CIA during the Cold War. One of the greatest spies of all time.
MICE, words?
Acronym used for identifying motives for treason. Money, ideology, compromise, ego.
Threat assessment
Capability and Intent is looked at when doing this
SCIFs
Sensitive Compartmented Information Facilities, rooms or facilities which hold classified information
NCIX
National Counterintelligence Executive, under ODNI, works with security evaluation, specially security center, and national insider threat task force
Military deception
Techniques used to disguise actual unit location or create a false narrative of weapon capabilities
Neutralization
Refers to the ability to render an adversary's intelligence collection operations as useless or to actually defeat adversaries efforts by frustrating their activities. (Physically disabling collection operations) EX: shooting drone or capturing spy
Richard Meinertzhagen
British intelligence officer who decepted the germans by "losing" a fake briefcase which held war plans that said the British's attack on Beersheba was faint and the real attack was Gaza, however the opposite was actually true. The briefcase held personal items of the officer who lost it to make it look more real.
Alexis von Roenne
Plausible deniability
The ability to deny any involvement or knowledge of actions committed by ones governments, usually to do with Covert Action.
Radio free Europe
CIA run radio that broadcasted behind the Iron Curtain during the Cold War. Radio ran American news and anti-communist propaganda. Funded by congress, CIA control taken in â72
PBSSUCCESS
First CIA run coup in Guatemala to overthrow Jacobo Arbenz who showed communist support. Was done by propaganda news being broadcasted from Miami which ultimately helped US-backed paramilitary groups. Arbenz stepped down.
Executive Order 12333
Signed by Reagan in â81 that put a general ban on assassination
Title 50
Outlines covert action and clandestine operation rules
Black tom
US arms factory in NY that supplied Britain with many weapons, blown up by the Germans in WW1 (1916) while the US was still neutral.
Heinrich albert
One of the German spies that helped sabotage black tom
Aldrich Ames
Infamous CIA officer turned spy who betrayed the United States by selling classified information to the Soviet Union/Russia during the 1980s and 1990s. His actions resulted in the compromise of numerous CIA assets and the deaths of multiple agents.
Ana montes
Former senior intelligence analyst for the U.S. Defense Intelligence Agency (DIA) who was convicted of espionage in 2002. passed classified information to the Cuban government for 16 years.
What is the most common kind of insider threats
Unintentional
SIGINT lead agency
NSA
MASINT lead agency
DIA
GEOINT lead agency
NGA
Remote sensing
Obtaining information about objects or areas from a distance
What scale measures GEOINT image resolution, what numbers
NIIRS, 0-9
Lead HUMINT & OSINT agency
CIA
Surveillance vs. Reconnaissance
Surveillance - Observing target area or group usually extended time. Reconnaissance - Acquire info about target, short term and possibly 1 time thing
Why is OSINT easier to share
No methods or sources to protect
Morality
System of values with requirements for the individual to follow to be a good person
Securitization
The attempt to refocus a subject from its normal, nonmilitary context to the realm of security
Deontology
Philosophical system in which the moral principles that constitute it must be obeyed as a duty without exception.
Utilitarianism
Moral evaluation of conduct should be based on which decisions produce the greatest amount of happiness for the most people.
Daniel Ellsberg
Pentagon intelligence analyst who leaked thousands of pages about the Vietnam war to the press. His acts created the Whistleblower Protection Act of 1989 and laid out the framework for protections against US IC whistleblowers.
Enhanced interrogation techniques
Contracted program created by psychologists where CIA and Military interrogators employed techniques specifically in the 1984 Convention Against Torture. Treaty sponsored by the US
Ticking time bomb scenario
Utilitarians believe this is the only morally correct scenario for torture. Must be used to save lives, target must know the info, interrogator must think they will talk, must contain specific threat.
Anwar al Awlaki
First US Citizen killed by a drone strike in Yemen. Prominent Islamic extremist and preacher, associated with Al-Qaeda. Known for his influential online presence and involvement in several terrorist attacks Killed in a U.S. drone strike in 2011.
Iran-Contra scandal
Reagan gave contras $ to fight in south america after selling Iran arms. Was illegal due to no presidential findings