Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
16 Cards in this Set
- Front
- Back
1) Every nation uses intelligence in some way
|
Warning
Getting an edge on your competitors Fear of attack Plan to take action against others Can be internal in some cases Understand political dynamics Spot activity that might be dangerous to us Win political or commercial contests Get business |
|
2) Types of intelligence: function
|
Military intelligence
Warning of attack Intention Launch Order of battle Track enemies, subvert systems Political intelligence Bilateral relations Diplomatic maneuver Intention |
|
3) Types of intelligence: collection systems with acronyms
|
Images (IMINT or GEOINT)
Signals (SIGINT or COMINT) Open Source (OSINT) Human source (HUMINT) Technical Measurements & Signatures (MASINT) Telemetry Emissions |
|
4) Intelligence Targets
|
Nations
Political: Government and political groups/parties Military Multinational groups OPEC Any groupings of nations of concern Non-state groups or networks Terrorists Proliferators Criminals Individuals |
|
5) Transnational Issues
|
Issues that may involve more than one nation state, or groups that come from various nations.
Support to terrorism Weapons proliferation Narcotics trafficking Organized crime |
|
6) Intelligence: Timing
|
Predictive
Warning Maneuver Reactive Investigative Explanation Identification Forecasting or Estimating |
|
7) Customers for intelligence
|
Strategic intelligence typically goes to the leadership of a nation: president, ministers, etc.
Military services are major consumers of intelligence as well as collectors Diplomatic services are more consumers but also do overt collection Law enforcement agencies collect and use intelligence, but not easily |
|
8) Who gets to ask the questions?
|
Requirements (questions) come from intelligence customers, but not all customers are allowed to ask binding questions.
Military intelligence units take their orders from their senior officers Dedicated units (INR at State) support their principles and take direction from them. National level agencies take direction from the President and the NSC. Questions from other customers are processed through a validation system and are not necessarily accepted. National level requirements are assigned to specific collectors as part of this process Collection time is limited and jealously defended. Human source collection is validated by the National HUMINT Requirements Tasking Center at CIA NSA validates signals collection in the same manner |
|
9) Questions for intelligence
|
Who is spying on us? Which of our secrets has been compromised?
What resources does our enemy have? How good is his equipment and how good is he with it? How will he use the tools he has? What will it take to get agreement with us? What is the minimum we can offer to get our way? What does our enemy plan to do? Who is allied with our adversaries? Does our enemy know where we are weak? |
|
10) Answering the questions
|
Watch everywhere of interest.
Monitor everything that could be important. Study everything and discern the meaning. Look for clues your adversary does not know she is giving Get someone to explain what your adversary is planning Acquire an insider who can give you the adversary’s intention |
|
11) Watch everywhere
|
Observe every inch of enemy territory using any means possible.
Develop technology to allow you to see what is never to be seen. Build airplanes that fly higher and faster than any others. Put a network of satellites in space that permit you to watch your adversary’s territory in real time |
|
12) Monitor everything
|
Our adversaries are clever and skilled, but they must talk, plan, coordinate, and report. If we cast a wide enough net, we will catch their communications.
They will hide the meaning of their messages, but we are clever enough to divine that meaning anyway. We will learn who supports our enemies by spotting the contacts they make. |
|
13) Study everything
|
There is little that is really secret. Most of the information of the world is “out there” for those smart enough to get the message.
The information explosion means that most questions can be answered by paying close attention. Most people are inattentive. We won’t be. Because we are very smart, we will see the patterns and defeat our opponents by exploiting the information they emit. |
|
14) Look for clues your adversary does not know she is giving
|
Technology makes things easier, but all technology creates some types of risk. We can capture emanations from technology that will reveal what is going on.
The more complex the activity, the more likelihood that facts are leaking out. It is just a matter of recognizing what these leaks are and exploiting them. |
|
15) Use a human spy
|
Get an ally or an associate of your enemy on your side. Use their friendship to obtain information.
Find someone in the very heart of the enemy camp and get that person to tell you their secrets. Put your person inside the enemy group. |
|
16) Who controls intelligence?
|
In the USA
President/NSC/Congress nationally Agency heads/DNI/Office level managers In the UK PM. Some oversight from Parliament In Mexico El Presidente and often political leadership of party In Pakistan President on paper, President and select military commanders in reality Only part of the service is loyal to the President |