What are the four wars that have changed the pace of intelligence?
1. World War I
2. World War II
3. Cold War
4. Global War on Terror
What are the 3 sectors of intelligence?
State, Corporate, Non-State Sovereignty
Name 3 types of Intelligence products.
Assessments, Estimates, Briefings, etc.
What are the 5 Loci of Intelligence?
President
National Security Council
Congress
Intelligence Community
Departments
True or False:
Intelligence failures can occur at all phases of the intelligence cycle.
True.
After approval from congress... what is the next step to move forward with Covert Action?
As in where does it go and WHAT is needed?
It goes to the executive branch where the President must have a written approval.
What are the three types of counterintelligence?
Collection, Defensive, Offensive
What is the difference between morals and ethics?
Morals are self imposed and vary from individual to individual while ethics are created externally by society.
Name three groups of individuals who study intelligence.
Professors, scholars, researchers, journalists, policymakers
______ refers to agencies
resources and ability to
obtain and analyze
information and take effective
action
Capacity
Most decisions are made from this type of intelligence.
Current
What are the three types of actions of power that policy makers can partake in?
Symbolic, Materialistic, Physical
Discuss one reason why policy makers may resist intelligence?
• They consider themselves highly competent and
political analysis
• They are essentially people who think of others not
history or trends
• Policymakers have met the people, analysts they
are writing about
• Policymakers believe they read all people equally
well
• Intelligence does not align with their perspective
Given the implications that come with covert action, it is often considered to be the third and last option.
What are the other options that must be considered first?
(1) No action
(2) Military Action
Name the big 5.
United States, Great Britain, New Zealand, Australia, Canada
What are the four pillars of ethics?
Autonomy, Justice, Truth, Beneficience,
Realist.
This occurs when many collection sources are put
together and compensate from each other
Collection Synergy
What are the Three Ts of intelligence that the analyst must keep in mind when creating a product.
Product must be:
There must be trust, product must be tailored to the client, and product must be delivered in a timely manner.
Name the late national security advisor that was not only contreversial but very influential.
Henry Kissinger
Describe at least three limits that exist in the field of intelligence.
Cognitive Limitations
• Difficulties identifying targets
• Tendency to concentrate on internal
bureaucratic obstacles
• Turf wars
• Each analyst views intelligence within their own
context, and has their own perspective of the
human condition
What is the most violent type of covert action?
Conducting Paramilitary Operations
What are three reasons for the utilization of counterintelligence?
identify, deceive,exploit, disrupt or protect against espionage and other activities, through state or not state actors.
Which type of ethical approach is being described:
ther people should be treated as ends in
themselves. This means that their rights should not be violated
Deontological
The unauthorized disclosure could be expected to cause exceptionally grave damage to national security
Top Secret Information
Cross reference multiple independent sources.
Note: they all indicate toward the same thing. :)
Traingulation
What are the two components of an estimate?
(1) Judgement (2) Confidence Levels
Who makes up the national security council?
Hint: 6 Individuals
President, Vice
President, Secretaries of Defense and
Secretary of Energy, Director of the CIA as well
as the Director of National Intelligence
Which of the following type of politicization is taking place:
President Strawberry Shortecake, wants to drill for fudge in Gum Drop Mountain. The following was stated in the assessment report.
Drilling in Gum Drop Mountain will produce thousands of cubic gallons of fudge and will most likely increase the GDP of Candyland and it is probable that there will be an influx of jobs for citizens. Upon drilling in the Gum Drop Mountain it will likely pollute the nearby Licorice Forest, will harm hundreds of endangered Swedish Fish, and it is unclear how many citizens of Gum Drop Mountain will be displaced.
From such an assessment President Strawberry Shortcake decides to move forward with such a project based solely on the economic factors and ONLY discusses them in her Presidential press conference.
Cherry Picking
What are some of the characteristsics of propaganda?
State at least 2.
• Deliberate
• Routine part of organization
• Response is irrelevant, as long as there is one
4 Reasons that an individual may partake in espionage?
Money
Ideology
Cohersion
Ego
Discuss how oversight is conducted in the field of intelligence.
Answers may vary however include the branches of power in answer.
Knowing something will
happen but not knowing when or
where is what type of surprise?
Hint: 9/11 or Viet Cong Battle Fields
Tactical
This occurs when Information is directly
sent out it can be true or false
Decepetion
In estimates how are confidence levels demonstrated?
In Terms/ Expressions
Give at least 3 reasons that describe the purpose of intelligence.
Gives warnings, highlights opportunities, increase options, ease the decision making process, etc.
Name and discuss and Intelligence Failure.
(NOT 9/11)
Answers will vary.
This type of covert action is an a category of its own. It occurs when there is a seizure of individuals wanted by the United States, they are living abroad often
in countries where the United States cannot get to them by legal means.
Rendition
This type of individidual conducts espionage from inside of the organization.
Mole
In the Just War Theory what are the 3 aspects of ethical conduct that must be followed.
Discrimibation, Proportionality, Responsibility
In order, what is the steps in the intelligence cycle.
Planning/Targeting, Collecting, Analyzing, Processing, Dissemination
Name 5 different types of intelligence.
Open Source, Cyber, Signals, Communication, Human, Technical, Geo, etc.
Two analysts are working on a threat assessment together. While one analyst posits that is its unclear whether or not Argentina's unemplyment rate will decrease in the next year, the other analyst posits that the unemployment rate is expected to decrease. In the final edit of the aseessment the follwoing is states:
Given the increase in capital given to Argentina by the United States it can be anticpated that the state's unemplotment rate will decrease.
Essentially the analysts met in the middle. What is this called?
Lowest Common Denominator
What is a COVERT action that has the greatest plausible deniability?
*** Meaning that it is easier to deny any association/responsibility to such an action.
Propaganda
What is the differnece between Type I and Type II errors in terms of discussing intelligence failures?
Type I error, where policymakers responded to a threat that did not exist.
Type II error,where policymakers ignored a threat
that actually existed.
This type of drone strike is conducted based on observed activities.
Signature Strikes
Leaks occur when someone inside one’s own government or intelligence service willingly makes public classified or sensitive information.To deter leaks from occuring individuals who have access to classified information are placed on what list?
Bigot List.
Discuss one history lesson I have opened class lecture with.
Answers will vary.