Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

SIS 315 Test 1 With Complete Solution., Exams of Advanced Education

SIS 315 Test 1 With Complete Solution.

Typology: Exams

2024/2025

Available from 06/11/2025

belluna-skyler
belluna-skyler 🇺🇸

777 documents

1 / 10

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
SIS 315 Test 1 With Complete Solution
What is the core mission of the USIC? - ANSWER to provide decision
advantage to U.S policy officials, that will allow them to protect and advance
U.S interests.
What are the four key functions in support of the core mission? - ANSWER
Requirements: What do we need to know
Collection: How can we gather what is needed to fill requirements
Analysis: How do we make sense of this info
Counter-Intel: How do we protect our secrets
Cover action is a key function necessary for the core mission (T or F) -
ANSWER Covert action is not a key function necessary for the core mission of
providing decision advantage.
What are the five key centers for U.S. national security policy, as discussed in
class? How does this list differ from Mark Lowenthal's list? - ANSWER 1.
Office of the President of the US
2. National Security Council and its staff (the white house)
3. Key Departments: State, Defense, Justice, Homeland Security, Treasury,
Commerce, Energy, Etc. (The State Department and defense are usually
fighting)
4. JCS (Joint Cheifs of Staff) and Combatant Commanders
5. US Congress
pf3
pf4
pf5
pf8
pf9
pfa

Partial preview of the text

Download SIS 315 Test 1 With Complete Solution. and more Exams Advanced Education in PDF only on Docsity!

SIS 315 Test 1 With Complete Solution

What is the core mission of the USIC? - ANSWER to provide decision advantage to U.S policy officials, that will allow them to protect and advance U.S interests.

What are the four key functions in support of the core mission? - ANSWER Requirements: What do we need to know

Collection: How can we gather what is needed to fill requirements

Analysis: How do we make sense of this info

Counter-Intel: How do we protect our secrets

Cover action is a key function necessary for the core mission (T or F) - ANSWER Covert action is not a key function necessary for the core mission of providing decision advantage.

What are the five key centers for U.S. national security policy, as discussed in class? How does this list differ from Mark Lowenthal's list? - ANSWER 1. Office of the President of the US

  1. National Security Council and its staff (the white house)
  2. Key Departments: State, Defense, Justice, Homeland Security, Treasury, Commerce, Energy, Etc. (The State Department and defense are usually fighting)
  3. JCS (Joint Cheifs of Staff) and Combatant Commanders
  4. US Congress

Prof. Avery underscored the importance of seeing intelligence and national security policy as distinct processes that interact. Why? - ANSWER They approach their issues from different perspectives. IC is from perspective of impact of foreign actors on US national interests while policy officers are from the perspective of an interaction of US and foreign actors.

Why did the CIA declare that the President is its First Customer? What are the risks from focusing too much on the President's intelligence needs? - ANSWER 1. All Federal Government employees and elected officials are expected to serve U.S. public interests first and defend the U.S. Constitution. You cannot serve a president well apart from serving others.

  1. A direct interactive relationship with the president is ideal from the POV of the IC, but a lot will depend on the foreign policy players around the president and the POTUS's own style, including whether or not formal NSC meetings are common. It is critical for the POTUS to have a good relationship with the director of National Intelligence.
  2. The IC risks its access when it steps into policy discussions.

Why should the setting of collection requirements be the result of a structured dialogue?What would be the risks in having policymakers set the priorities unilaterally? - ANSWER Because there needs to be an understanding / communication between the policy community and the intelligence community. Policy makers make policies without asking, then its possible they could enact policies that will not matter. Which is why dialogue should be a thing. If the USIC set risk unilaterally, you don't want to have the same people gathering information and make the policies which is how biases could happen.

(Lowenthal) What did Mark Lowenthal mean by the "tyranny of the ad hocs?"

referred to as wheat versus chaff

In HUMINT collection, what is the proper name for the "spy" and who is he or she? - ANSWER Person doing the spying is the "asset" or "agent"

The case officer is the person who the asset provides information to

(Lowenthal) In HUMINT collection, what is a "developmental?" What is a "walk in?" - ANSWER a potential source who is being brought along largely through repeated contacts and conversations to assess his or her value (validation) and susceptibilities.

Walk in: An asset who voluntarily offers to conduct espionage

What are the five steps in the agent acquisition cycle? - ANSWER Targeting - Spotting an individual w/ access to desired info.

Assessing - Gaining assets confidence/trust and seeing if they are good enough

Pitching - Recruiting the individual to spy

Handling - Managing the active asset

Terminating - Asset proven unreliable or info is not needed; let them go; don't kill them

What US intelligence agency has the lead on GEOINT? - ANSWER NGA

When is low-resolution imagery better than high-resolution imagery? - ANSWER Low resolution is more useful when a large area must be searched to find a particular object/set of objects

(Lowenthal) What is a geosynchronous orbit? When is it important? - ANSWER Geosynchronous means that the satellite orbits with the same

angular velocity as the Earth.

allow satellites to maintain a set position over the globe makes them particularly useful for weather monitoring

What US intelligence agency has the lead on SIGINT? - ANSWER The National Security Agency (NSA)

What are the comparative strengths of GEOINT versus SIGINT? - ANSWER GEOINT often highlights an adversary's capabilities and actions.

Good SIGINT (or HUMINT) may reveal more about the adversary's plans and intentions.

What two US intelligence agencies share the lead on MASINT? - ANSWER Responsibility for MASINT is shared between the Defense Intelligence Agency (DIA) and NGA.

What does it mean to say that analysis begins with requirements and collection? - ANSWER The requirements process, collection tradecraft, counterintelligence, and the evaluation of collection all entail analytic processes to move from broad requirements to specific collection needs, to target and protect collection efforts, and to evaluate resulting collection

What does the USIC mean by denial and deception? Explain each term. - ANSWER A way for foreign intelligence to covertly disrupt collection

Denial - Covert means to prevent collection system from getting desired info.

cause SERIOUS damage to national security"

TOP Secret: Information that unauthorized disclosure "could be expected to cause EXCEPTIONALLY GRAVE damage to national security"

How do compartmentation and classification relate? Can someone with TS clearance see very TS document? What is "Need to Know" versus "Need to Share?" - ANSWER Compartmentation means that you have to have a business need to see some TS docs and have been read into (been briefed on and agreed to maintain strict secrecy) the particular compartment or code word channel.

No, you cannot see every TS doc if you have a TS clearance

Need to Know makes sure that something does not go to a person

Need to Share ensures that information goes to a person who needs it

(Lowenthal) What does the acronym MICE stand forth in terms of motives for espionage? - ANSWER Money, Ideology, Compromise/Coercion, and Ego

What is the definition of covert action? What does all legitimate covert action require? - ANSWER Covert Action - Activity or activities of the United States Government to influence political, economic, or military conditions abroad, where it is intended that the role of the USG will not be apparent or acknowledged publicly

A presidential finding is needed to execute legitimate covert action. The policy process for covert action must begin with policy makers justifying the action (the president isn't the only one that can raise the responsibility of covert action).

Violence and the plausibility of covert action are related because covert action can sometimes be used to circumvent large scale violence.

Propoganda, Political/Economic, Paramilitary, Lethal force (banned)

What are the five types of covert action that we discussed in class? - ANSWER Propaganda - An age-old technique of disseminating information that has been created with a specific political or military outcome in mind

House

Despite the ban on assassination, we have used unmanned aerial vehicles to kill terrorist leaders. Why is killing terrorist leaders considered acceptable? - ANSWER Because they are actively involved in the harm of U.S. interests and the president is given power by the constitution to protect the nation if it is under imminent threat of attack or being targeted

What are two key obligations that the USIC has to its human assets overseas?

  • ANSWER 1-Warning the potential asset about the risks associated with violating national laws by selling secrets.

2- Making extraordinary efforts to protect the source in the event that his or her role as a U.S. asset has become known.