Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
48 Cards in this Set
- Front
- Back
4 Types of Classification
|
TS: Will Cause Exceptional Damage
S: Will Cause Serious Damage C: Will Cause Damage U: May Cause Damage |
|
Release/Dissemination
|
NF: No Foreign Nationals
RELIDO: Decided by Intel Disclosure Officer REL TO: Releasable to group or countries listed LES: Law enforcement-->Must be in banner |
|
Definition of Elicitation
|
Simple conversation technique, non-threatening, guided or carefully planned
|
|
Elicitation tactics
|
Appeal to ego, Mutual interests (false flag), Disagreement (false statement), Leading/Volunteering info, Quid Pro Pro, Word Repetition, Humor, Sympathy, Prompting
|
|
Elicitation counters
|
Deflect (silence/change subject/ignorance) or Respond (public information, need time to answer)
|
|
16 Members
|
Army, Navy, Coast Guard, Marines, Air Force, State, Treasury, Energy, DIA, CIA, NSA, FBI, NGA, NRO, DHS, DEA
|
|
5 Intel Types and agencies
|
MASINT: DIA
OSINT: All HUMINT: CIA/FBI GEOINT: NGA SIGINT: NSA |
|
Intel Cycle Steps
|
Requirements, Planning and Direction, Collection, Processing and Exploitation, Analysis and Production, Dissemination
|
|
Top 3 Priorities
|
1. Protect the US from terrorist attacks
2. protect the US from foreign intelligence operations and espionage 3. Protect the US from cyber and HIGH TECH crimes |
|
FD-71
|
Criminal Complaint Form
|
|
FD-302
|
Debrief of interview/investigative activity
|
|
FD-1023
|
Debrief of CHS
|
|
EC 3 Types
|
Electronic Macro for formal internal communication
1. Analytical 2. Administrative 3. INVESTIGATIVE |
|
IIR
|
Raw intelligence report that is time sensitive, new, and perishable
-IC, FBI, Some Federal Agencies |
|
SIR
|
Raw intel that has been previously disseminated, relevant to local/state/tribal LE
-SLTLE |
|
Intel Bulletin
|
NOT STRATEGIC
-New Developments or trends - "so what" -FBI, USIC, and LE |
|
Intel Assessment
|
IS Strategic
-Conveys analytic conclusions based on comprehensive analysis -FBI, USIC, and LE |
|
IN
|
-Tactical and Operational, Recommendations
-FBI ONLY |
|
Difference between IA and IB
|
IA is strategic while IB is not
|
|
Ad-Hoc
|
Short term for special events or new/emerging threats. After 90 days, can be renewed for another 90 days, expires, or becomes standing. After 180 it expires or becoming standing.
|
|
Standing
|
Long-term for 12-18 months, then reviewed. If any updates or changes there is a 6 month period for update, renewed to become 18-24 months.
|
|
Source Driven
|
Short term generated by anyone in IC for a source listed on a requirement.
|
|
5 Parts Analytical Writing
|
ITTPS
Intel Q, Title, Thesis, Paragraphs, Sentences |
|
5 Parts ARGUMENT
|
Thesis, Substantiation, perspective, outlook, implications
|
|
Domain Management Def
|
Process for Maintaining and Improving Strategic Understanding of Domain threats, vulnerabilities, and gaps
|
|
4 Domain Questions
|
What do you know, what don't you know, what do you need to know, what are you going to do about it
|
|
Assumption
|
Statements believed to be true without proof
|
|
Bias
|
Preference or inclination which inhibits impartial judgment
|
|
Mindset
|
Patterns of expectations which predispose certain thinking
|
|
CBias: Representativeness
|
"Can't have a grand effect without a grand cause"
-Strategy of quickly estimating probability based on particular category |
|
CBias: Intuition
|
Patterns and connections in a random universe
|
|
CBias: Perception
|
Process of perception alters what we see (one face or two?)
|
|
CBias: Anchoring
|
Relying too heavily on "anchoring" - greater weight to past data Zebra v. horse
|
|
CBias: Framing
|
Information always understood within a context "in a great frame, must be a great picture"
|
|
CBias: Absence of Evidence
|
Something is unexplained so not true, dog not barking in the night
|
|
CBias: Confirmation
|
Notice and look for what confirms beliefs
|
|
CBias: Errors in Physical Evidence
|
Problems with physical evidence
|
|
Link Analysis
|
Review and interpretation of data to determine presence of associations AND deriving significance of those associations and their associations to criminals/criminal activity
|
|
3 Types Probabilistic Evidence
|
Point: Actual 63%
Ballpark: Area of 50% Range: B/n 40-60% |
|
4 Criteria for evaluating argument
|
R: Relevance
A: Acceptability S: Sufficiency R: Resistance to Rebuttal |
|
3 parts to argument:
|
claim, evidence reasoning
|
|
brainstorming definition
|
group problem solving technique that involves SPONTANEOUS contribution from all members
|
|
benefits of brainstorming
|
creativity, prevents data loss, large # of ideas, equalizes team members
|
|
sorting definition
|
placing items into like categories
|
|
benefits of sorting
|
organizes data, focuses thinking, improves logical flow, structures large volumes of data to id issues and intel gaps
|
|
affinity diagram
|
extends and structures brainstorming and graphically organizes ideas, hypotheses, and alternatives
|
|
sorting tools
|
· Chronology/timeline
· Link Chart · Association Matrix |
|
Electronic Surveillance
|
§ Pen Register – records all outgoing calls from a target phone line
§ Trap and Trace – records all incoming calls to a target phone line § Cloned Pagers / Phones – “replicas” of a phone that receives real-time transmissions § Title III (Wire-tap) / FISA |