• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back
1) Every nation uses intelligence in some way
Warning
Getting an edge on your competitors
Fear of attack
Plan to take action against others
Can be internal in some cases
Understand political dynamics
Spot activity that might be dangerous to us
Win political or commercial contests
Get business
2) Types of intelligence: function
Military intelligence
Warning of attack
Intention
Launch
Order of battle
Track enemies, subvert systems
Political intelligence
Bilateral relations
Diplomatic maneuver
Intention
3) Types of intelligence: collection systems with acronyms
Images (IMINT or GEOINT)
Signals (SIGINT or COMINT)
Open Source (OSINT)
Human source (HUMINT)
Technical
Measurements & Signatures (MASINT)
Telemetry
Emissions
4) Intelligence Targets
Nations
Political: Government and political groups/parties
Military
Multinational groups
OPEC
Any groupings of nations of concern
Non-state groups or networks
Terrorists
Proliferators
Criminals
Individuals
5) Transnational Issues
Issues that may involve more than one nation state, or groups that come from various nations.
Support to terrorism
Weapons proliferation
Narcotics trafficking
Organized crime
6) Intelligence: Timing
Predictive
Warning
Maneuver

Reactive
Investigative
Explanation
Identification
Forecasting or Estimating
7) Customers for intelligence
Strategic intelligence typically goes to the leadership of a nation: president, ministers, etc.
Military services are major consumers of intelligence as well as collectors
Diplomatic services are more consumers but also do overt collection
Law enforcement agencies collect and use intelligence, but not easily
8) Who gets to ask the questions?
Requirements (questions) come from intelligence customers, but not all customers are allowed to ask binding questions.
Military intelligence units take their orders from their senior officers
Dedicated units (INR at State) support their principles and take direction from them.
National level agencies take direction from the President and the NSC. Questions from other customers are processed through a validation system and are not necessarily accepted.
National level requirements are assigned to specific collectors as part of this process
Collection time is limited and jealously defended.
Human source collection is validated by the National HUMINT Requirements Tasking Center at CIA
NSA validates signals collection in the same manner
9) Questions for intelligence
Who is spying on us? Which of our secrets has been compromised?
What resources does our enemy have? How good is his equipment and how good is he with it? How will he use the tools he has?
What will it take to get agreement with us? What is the minimum we can offer to get our way?
What does our enemy plan to do?
Who is allied with our adversaries?
Does our enemy know where we are weak?
10) Answering the questions
Watch everywhere of interest.
Monitor everything that could be important.
Study everything and discern the meaning.
Look for clues your adversary does not know she is giving
Get someone to explain what your adversary is planning
Acquire an insider who can give you the adversary’s intention
11) Watch everywhere
Observe every inch of enemy territory using any means possible.
Develop technology to allow you to see what is never to be seen.
Build airplanes that fly higher and faster than any others.
Put a network of satellites in space that permit you to watch your adversary’s territory in real time
12) Monitor everything
Our adversaries are clever and skilled, but they must talk, plan, coordinate, and report. If we cast a wide enough net, we will catch their communications.
They will hide the meaning of their messages, but we are clever enough to divine that meaning anyway.
We will learn who supports our enemies by spotting the contacts they make.
13) Study everything
There is little that is really secret. Most of the information of the world is “out there” for those smart enough to get the message.
The information explosion means that most questions can be answered by paying close attention. Most people are inattentive. We won’t be. Because we are very smart, we will see the patterns and defeat our opponents by exploiting the information they emit.
14) Look for clues your adversary does not know she is giving
Technology makes things easier, but all technology creates some types of risk. We can capture emanations from technology that will reveal what is going on.
The more complex the activity, the more likelihood that facts are leaking out. It is just a matter of recognizing what these leaks are and exploiting them.
15) Use a human spy
Get an ally or an associate of your enemy on your side. Use their friendship to obtain information.
Find someone in the very heart of the enemy camp and get that person to tell you their secrets.
Put your person inside the enemy group.
16) Who controls intelligence?
In the USA
President/NSC/Congress nationally
Agency heads/DNI/Office level managers
In the UK
PM. Some oversight from Parliament
In Mexico
El Presidente and often political leadership of party
In Pakistan
President on paper, President and select military commanders in reality
Only part of the service is loyal to the President