Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
46 Cards in this Set
- Front
- Back
Define Elicitation
|
Elicitation is a simple conversation technique, non-threatening, guided or carefully planned
|
|
Elicitation Techniques
|
· Appeal to the ego
· Mutual interests (False flag) · Disagreement (False statements) · Leading/volunteer information · Quid pro quo · Word repetition · Humor · Sympathy · Prompting |
|
Define FBI Mission
|
The central mission of the FBI’s Intelligence Program is to optimally position the FBI to meet current and emerging national security and criminal threats - while protecting civil liberties and First Amendment Rights.
|
|
Top 3 Priorities
|
- Protect the US from terrorist attack
- Protect the US against foreign intelligence operations and espionage - Protect the US from Cyber-based attacks and high-technology crimes |
|
Classifications and Damages
|
· Top Secret (TS) – exceptionally grave damage
· Secret (S) – serious damage · Confidential (C) – damage · Unclassified (U) – possible damage |
|
IC Community
|
CIA
NSA DIA FBI NGA DHS STATE NRO DEA NAVY ARMY MARINE CORPS AIR FORCE COAST GUARD Treas Energy |
|
5 INTs and Agencies
|
HUMINT: CIA overseas, FBI domestic
SIGINT: NSA GEOINT: NGA MASINT: DIA OSINT: All |
|
Intelligence Cycle
|
Requirements
Planning and Direction Collection Processing and Exploitation Analysis and Production Dissemination |
|
Ad-hoc Requirements
|
Short term for special events or new/emerging threats. After 90 days, can be renewed for another 90 days, expires, or becomes standing. After 180 it expires or becoming standing.
|
|
Standing Requirements
|
Long-term for 12-18 months, then reviewed. If any updates or changes there is a 6 month period for update, renewed to become 18-24 months.
|
|
Source directed
|
Short term generated by anyone in IC for a source listed on a requirement.
|
|
Collection Process
|
Strategy: Set priorities
Plan: Strategy, Sources, Requirements, Gaps Posture: Statement of collection abilities |
|
FD-302
|
Report of an interview or investigative activity
|
|
FD-1023
|
Report of information to debrief a CHS
|
|
FD-71
|
Complaint form used to allege criminal activity
|
|
IIR
|
Provides Raw Intel that is time sensitive, no thorough evaluation or analysis
|
|
IB
|
New development or trend, the "so what"
|
|
IA
|
STRATEGIC product, conveys analytic conclusions based on comprehensive analysis
|
|
IN
|
Tactical and operational intelligence on specific cases or threats
|
|
SIR
|
Conveys local information to LE/state/local authorities
|
|
5 main intel products
|
IB, IA, IN, IM, IS
|
|
Diff b/n IA and IB
|
IA is a strategic product
|
|
5 parts analytical writing structure
|
Intel question, title, thesis, paragraphs, sentences
|
|
5 parts of analytical argument
|
Thesis statement, substantiation, perspective, outlook, implications
|
|
Inverted Pyramid Style
|
Begin with most important, most recent, best sourced information/Begin with a topic sentence or analytic judgment
then, Present supporting evidence or secondary judgment |
|
Domain Management Definition
|
Domain management: process for maintaining and improving strategic understanding of domain’s threats, vulnerabilities, and gaps.
|
|
4 fundamental questions of Domain
|
What do you know, what do you need to know, what don't you know, what are you going to do about it
|
|
Explain why mapping is an important aspect of domain management
|
it allows law enforcement to see broader trends and concentration of crime across a given area based on certain variables/characteristics. It also allows law enforcement to share information through certain mapping programs.
|
|
3 essential parts of an argument
|
Claim, Evidence, Reasoning
|
|
Criteria for Evaluating Argument (ED)
|
RASR: Relevance, Acceptability, Sufficiency, Rebuttal
|
|
Link Analysis Definition
|
Link analysis is the review and interpretation of data to determine the presence (or possible presence) of associations among individuals, businesses and/or organizations involved in known or suspected criminal activity – AND – deriving the significance of those associations to the criminals and criminal activities.
|
|
Electronic Surveillance
|
§ Pen Register – records all outgoing calls from a target phone line
§ Trap and Trace – records all incoming calls to a target phone line § Cloned Pagers / Phones – “replicas” of a phone that receives real-time transmissions § Title III (Wire-tap) / FISA |
|
3 types of ECs
|
o Administrative: transfer requests, training requests
o Analytical/Intelligence: results of telephone analysis o Investigative: case updates |
|
Probabalistic Judgment
|
· Single-Point: “There is a 63.5% chance of rain today in the viewing area.”
· Ballpark: “The chance of rain in the area is about 60%.” · Range: “The chance of rain in the area is between 50 and 75 percent.” |
|
Affinity Diagrams
|
Definition of affinity diagram: the tool is commonly used within project management and allows large numbers of ideas stemming from brainstorming to be sorted into groups for review and analysis. Affinity diagrams sort by affinities, common themes or categories to support further analysis. Affinity diagram extends and structures brainstorming:
|
|
Definition of Brainstorming
|
a group problem-solving technique that involves the spontaneous contribution of ideas from all members of the group, also: the mulling over of ideas by one or more individuals in an attempt to devise or find a solution to a problem.
|
|
2 types of brainstorming and affinity diagrams
|
o Unstructured tends to work better for smaller groups (about 4 to 8 persons max) and informal settings.
o Structured tends to work better for larger groups (about 6 or more persons) in more formal settings. |
|
Pros and Cons of Brainstorming/Affinity
|
PROS (brainstorming/affinity)
· Fosters creativity · Organization prevents data loss · Generates large number of ideas or possibilities · Breaks from old, ineffective ideas · Equalizes team members CONS (brainstorming/affinity) · Individual or clique/sub-group may dominate · Tendency to “affirm” expected/desired outcome · Consensus can hide a valuable outlier |
|
Sorting Tools
|
· Chronology/timeline
· Link Chart · Association Matrix |
|
3 kinds of probabalistic judgments
|
· Single-Point: “There is a 63.5% chance of rain today in the viewing area.”
· Ballpark: “The chance of rain in the area is about 60%.” · Range: “The chance of rain in the area is between 50 and 75 percent.” |
|
(1) What three classifications markings are required on all documents?
|
Portion Markings, Banner Line, and Classification Authority Block
|
|
What are two methods to counter elicitation?
|
Deflecting and Responding
|
|
What does MASINT mean and which agency has responsibility for MASINT collection?
|
MASINT stands for Measures and Signatures Intelligence and DIA has responsibility.
|
|
Tripwire example
|
Developing a contact at a flight school, such as an employee, so that individual is able to report back to the FBI when suspicious activities occur at the facility.
|
|
3 kinds of bias
|
Cognitive, Motivational, and Assimilation/Accommodation
|
|
8 cognitive biases
|
Perception, Anchoring, Absence of Evidence, Confirmation, Intuition, Framing, Representativeness, Errors in Physical Evidence, Motivational Biases, Assmiliation/Accomodation biases
|