Basics of Intelligence
Collecting Intelligence
Analyzing Intelligence
Intelligence and Policy Makers
Intelligence Failures
Covert Action
Counter-Intelligence
Ethics and Accountability/Misc
100

What are the four wars that have changed the pace of intelligence?

1. World War I

2. World War II

3. Cold War

4. Global War on Terror

100

What are the 3 sectors of intelligence?

State, Corporate, Non-State Sovereignty

100

Name 3 types of Intelligence products.

Assessments, Estimates, Briefings, etc.

100

What are the 5 Loci of Intelligence?

President

National Security Council

Congress

Intelligence Community

Departments

 


100

True or False:

Intelligence failures can occur at all phases of the intelligence cycle.

True.

100

After approval from congress... what is the next step to move forward with Covert Action?


As in where does it go and WHAT is needed?

It goes to the executive branch where the President must have a written approval.

100

What are the three types of counterintelligence?

Collection, Defensive, Offensive

100

What is the difference between morals and ethics?

Morals are self imposed and vary from individual to individual while ethics are created externally by society.

200

Name three groups of individuals who study intelligence. 

Professors, scholars, researchers, journalists, policymakers

200

______ refers to agencies
resources and ability to
obtain and analyze
information and take effective
action

Capacity

200

Most decisions are made from this type of intelligence.

Current

200

What are the three types of actions of power that policy makers can partake in?

Symbolic, Materialistic, Physical

200

Discuss one reason why policy makers may resist intelligence?

• They consider themselves highly competent and
political analysis
• They are essentially people who think of others not
history or trends
• Policymakers have met the people, analysts they
are writing about
• Policymakers believe they read all people equally
well
• Intelligence does not align with their perspective

200

Given the implications that come with covert action, it is often considered to be the third and last option. 

What are the other options that must be considered first?

(1) No action

(2) Military Action

200

Name the big 5.

United States, Great Britain, New Zealand, Australia, Canada

200

What are the four pillars of ethics?

Autonomy, Justice, Truth, Beneficience, 

300
This theory was a created as a response to the liberal theory post World War II.

Realist.

300

This occurs when many collection sources are put
together and compensate from each other


Collection Synergy

300

What are the Three Ts of intelligence that the analyst must keep in mind when creating a product.

Product must be:

There must be trust, product must be tailored to the client, and product must be delivered in a timely manner.

300

Name the late national security advisor that was not only contreversial but very influential.

Henry Kissinger

300

Describe at least three limits that exist in the field of intelligence.

Cognitive Limitations
• Difficulties identifying targets
• Tendency to concentrate on internal
bureaucratic obstacles
• Turf wars
• Each analyst views intelligence within their own
context, and has their own perspective of the
human condition


 

300

What is the most violent type of covert action?

Conducting Paramilitary Operations

300

What are three reasons for the utilization of counterintelligence?

identify, deceive,exploit, disrupt or protect against espionage and other activities, through state or not state actors.

300

Which type of ethical approach is being described:

ther people should be treated as ends in
themselves. This means that their rights should not be violated

Deontological

400

The unauthorized disclosure could be expected to cause exceptionally grave damage to national security


Top Secret Information

400

Cross reference multiple independent sources.

Note: they all indicate toward the same thing. :)

Traingulation

400

What are the two components of an estimate?

(1) Judgement (2) Confidence Levels

400

Who makes up the national security council?

Hint: 6 Individuals

President, Vice
President, Secretaries of Defense and
Secretary of Energy, Director of the CIA as well
as the Director of National Intelligence

400

Which of the following type of politicization is taking place:

President Strawberry Shortecake, wants to drill for fudge in Gum Drop Mountain. The following was stated in the assessment report.

Drilling in Gum Drop Mountain will produce thousands of cubic gallons of fudge and will most likely increase the GDP of Candyland and it is probable that there will be an influx of jobs for citizens. Upon drilling in the Gum Drop Mountain it will likely pollute the nearby Licorice Forest, will harm hundreds of endangered Swedish Fish, and it is unclear how many citizens of Gum Drop Mountain will be displaced.

From such an assessment President Strawberry Shortcake decides to move forward with such a project based solely on the economic factors and ONLY discusses them in her Presidential press conference.

Cherry Picking

400

What are some of the characteristsics of propaganda?

State at least 2.


• Deliberate
• Routine part of organization
• Response is irrelevant, as long as there is one

400

4 Reasons that an individual may partake in espionage?

Money

Ideology

Cohersion 

Ego

400

Discuss how oversight is conducted in the field of intelligence.

Answers may vary however include the branches of power in answer.

500

Knowing something will
happen but not knowing when or
where is what type of surprise?

Hint: 9/11 or Viet Cong Battle Fields

Tactical

500

This occurs when Information is directly
sent out it can be true or false


Decepetion

500

In estimates how are confidence levels demonstrated?

In Terms/ Expressions

500

Give at least 3 reasons that describe the purpose of intelligence.

Gives warnings, highlights opportunities, increase options, ease the decision making process, etc. 

500

Name and discuss and Intelligence Failure.

(NOT 9/11)

Answers will vary.

500

This type of covert action is an a category of its own. It occurs when there is a  seizure of individuals wanted by the United States, they are living abroad often
in countries where the United States cannot get to them by legal means. 

Rendition

500

This type of individidual conducts espionage from inside of the organization.

Mole

500

In the Just War Theory what are the 3 aspects of ethical conduct that must be followed.

Discrimibation, Proportionality, Responsibility

600

In order, what is the steps in the intelligence cycle.

Planning/Targeting, Collecting, Analyzing, Processing, Dissemination

600

Name 5 different types of intelligence.

Open Source, Cyber, Signals, Communication, Human, Technical, Geo, etc.

600

Two analysts are working on a threat assessment together. While one analyst posits that is its unclear whether or not Argentina's unemplyment rate will decrease in the next year, the other analyst posits that the unemployment rate is expected to decrease. In the final edit of the aseessment the follwoing is states:

Given the increase in capital given to Argentina by the United States it can be anticpated that the state's unemplotment rate will decrease. 


Essentially the analysts met in the middle. What is this called?

Lowest Common Denominator

600

What is a COVERT action that has the greatest plausible deniability?

*** Meaning that it is easier to deny any association/responsibility to such an action.

Propaganda 

600

What is the differnece between Type I and Type II errors in terms of discussing intelligence failures?

Type I error, where policymakers responded to a threat that did not exist.
Type II error,where policymakers ignored a threat
that actually existed.

600

This type of drone strike is conducted based on observed activities.

Signature Strikes

600

Leaks occur when someone inside one’s own government or intelligence service willingly makes public classified or sensitive information.To deter leaks from occuring individuals who have access to classified information are placed on what list?

Bigot List.

600

Discuss one history lesson I have opened class lecture with.

Answers will vary.