Deck 4: Collection
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/22
Play
Full screen (f)
Deck 4: Collection
1
Of the following examples, which best describes all-source intelligence?
A) Unmanned aerial vehicles (UAVs) operating over Afghanistan, Pakistan, and other countries, such as Yemen.
B) In 2005, President Bush ordered the monitoring of conversations of individuals in the United States who were calling suspected foreign terrorists overseas.
C) The capturing and killing of Osama bin Laden
D) The breaking of the German Enigma cipher
A) Unmanned aerial vehicles (UAVs) operating over Afghanistan, Pakistan, and other countries, such as Yemen.
B) In 2005, President Bush ordered the monitoring of conversations of individuals in the United States who were calling suspected foreign terrorists overseas.
C) The capturing and killing of Osama bin Laden
D) The breaking of the German Enigma cipher
C
2
Which agency administers domestic intelligence and terrorism wiretaps?
A) FBI
B) NSA
C) CIA
D) Both A and B
A) FBI
B) NSA
C) CIA
D) Both A and B
A
3
Which one of the following statements is true?
A) Listening in on international calls using SIGINT is not allowed without a judge's approval
B) Listening in on domestic calls using SIGINT is not allowed without a judge's approval
C) Listening in on both international and domestic calls using SIGINT is not allowed without a judge's approval
D) None of the above is true
A) Listening in on international calls using SIGINT is not allowed without a judge's approval
B) Listening in on domestic calls using SIGINT is not allowed without a judge's approval
C) Listening in on both international and domestic calls using SIGINT is not allowed without a judge's approval
D) None of the above is true
B
4
Indirect measurements of technical data are:
A) SIGINT
B) MASINT
C) GEOINT
D) IMINT
A) SIGINT
B) MASINT
C) GEOINT
D) IMINT
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
5
What do analysts and briefers use to alert policymakers to the level of confidence they have in their judgments, based on the available information?
A) Estimative language
B) All-source intelligence
C) Collection source
D) Collection plan
A) Estimative language
B) All-source intelligence
C) Collection source
D) Collection plan
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
6
descripe the advantages and disadvantages of the following collection system :
-MASINT.
-MASINT.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
7
descripe the advantages and disadvantages of the following collection system :
-OSINT.
-OSINT.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
8
descripe the advantages and disadvantages of the following collection system :
-HUMINT.
-HUMINT.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
9
descripe the advantages and disadvantages of the following collection system :
-GEOINT.
-GEOINT.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
10
descripe the advantages and disadvantages of the following collection system :
-Warning .
-Warning .
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
11
define the following levels of classification:
-Confidential.
-Confidential.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
12
define the following levels of classification:
-Secret.
-Secret.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
13
define the following levels of classification:
-Top Secret.
-Top Secret.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
14
List the "INTS," their full titles, and the function of each.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
15
List and explain each of the confidence levels.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
16
What is all-source intelligence? Explain and provide an example of its use.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
17
In order to view classified information, one has to have:
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
18
The Sixth Amendment allows citizens to confront witnesses against them in court. However, in regard to intelligence, some witnesses are protected and cannot allow their identities to be known. Do you think this is fair and necessary, or do you feel that this is violation of the constitutional rights of the accused? Explain.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
19
Do you believe that HUMINT is more important today than it was 30 years ago? Why or why not?
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
20
Why is it so important that analysts communicate effectively with policy-makers?
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
21
Some have described the relationship between analysts and policymakers as a "producer-consumer" relationship. What does that mean? Do you agree with that? Explain.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
22
Do you believe there are inherent tensions in the relationship between analysts and collectors? Justify your answer.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck