What are the two types of ways to collect HUMINT.
Overt and Covert Action
What is another word for non-literal intelligence?
Technical
What are the three Ts an analyst must keep in mind when creating an intelligence product?
Trust, Timely, Tailored.
What is the processes for communication intel?
Target, Access, Process, Analyze, Disseminate
What makes non-literal intel different from litera intel?
Hint: Who is needed?
Experts in Different Fields
Name 3 types of communication intel.
Phone Calls, emails, telegrams, cipher wheels, semaphore
Why are we interested in material aquisistion?
Reverse engineer a component or a piece
of equipment
Performance Analysis
Identify sources of material and volume
production
Name a type of intelligence product.
National Intellienge Estimate
Briefing
National Threat Assessment
What is the last step in the cyber intelligence collection process?
Maintaining a sustained connection
In Cyber intelligence what is considered to be hard target countries?
Iran, China, North Korea
What are the 4 types of exploits used in cyber intelligence collection?
(1) Trojan Horse (2)Work (3) Rootkit (4) Keystroke Loggers
Name three types of intelligence collection platforms?
Unmanned Aerial Vehicle, Submarines, Satellites, Ground Platforms, Ships, Aircrafts
What are the two components of an intelligence estimate?
Judgement and level of confidence
The first step in the human intelligence process is that of recruiting. What makes an individual a better candidate to be recruited?
Money, Ideology, Cohersion, Ego
Describe some pros and cons of using a UAV
1. Flexibility
– 2. Surveil a specific Area
– 3. Ability to get close to a target (Provide great image
quality).
– Vulnerable to attacks
– Cannot fly in denied areas
– Aerostats
In open source intelligence, what is an example of grey literature?
Chats, Online Rooms, Electronic Drives
What is the purpose of biological sampling and sensing?
Identify biological agents that cause disease
Identify when agents for biological warfare are manufactured
Describe the role of an intelligence analyst.
At least three things.
• Highlights Opportunities and Risks
• Informs the client
• Discusses and evaluates possibilities AND their probabilities
• Does not make decisions
• Should not push for decision
• Collaborate
What type of intelligence is often the start of all-source intel process?
Open Source Intel
What is one discipline that overlaps with geospatial intelligence?
• Cartography
• Geology
• Geography
• Remote Sensing
• Geodesy
• Photogrammetry
Name at keast two things we need to check for when validating open source intel?
* Accuracy
*Credibility and Authenticity
* Currency
* Sponsorship
What are some things we look for in biometric sampling?
+DNA
+Retina
+Fingerprints
+Handshape
+Voice Prints
What is the purpose of intelligence?
Hint at least 3 reasons.
• Reduce Uncertainty
• Drives Decision Making
• Inform Policy
How are priorities identified in the intelligence field today?
National Intelligence Priorities Framework (NIPF)
* Cell Matrix Score
This incident during the Bush administartion created significant discussion surrounding the ethics in Human Intel.
Enhanced Interrogation Methods/Black Sites
Name and describe a way that human intel is passed on.
– Dead Drops
– Brush Passes
– Encryption
– Stenography
– Microdot
– Change in Pixel Color
How can geospatial intelligence be applied to national security?
Give at least one example and elaborate why.
• Food Scarcity
• Environmental Disasters
• Movement of troops
• Development of Facilities
• Population of a Region
• Tracking Targets
• Crisis Mapping
What is the 'softest' form an analyst can experience politization?
Having a Shared Mindset
What is the differnece betwen convergent and sequential intelligence collection process.
Convergent different intel collection processes occuring at once.
Sequential means that one intelligence collection method is collected at a time.
Name one type o intelligence failure and discuss its flawss.
9/11
Iraq Weapons of Mass Destruction
Fall of the Shah of Iran
Hurricane Katrina