Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

SIS 315 Exam1 With Complete Solution., Exams of History

SIS 315 Exam1 With Complete Solution.

Typology: Exams

2024/2025

Available from 06/11/2025

belluna-skyler
belluna-skyler šŸ‡ŗšŸ‡ø

777 documents

1 / 10

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
SIS 315 Exam1 With Complete Solution
How did Prof. Avery define the core mission of the USIC? - ANSWER The USIC
core mission is to provide decision advantage to US policy makers,
war-fighters and law enforcement officials that will aid them in protecting
and advance US interests.
What are the four key functions in support of that core mission? Why did
Prof. Avery include counterintelligence but not covert action? - ANSWER 1)
Requirements
2) Collection
3) Analysis
4) Counter-Intelligence
- Covert action is not included because it is technically not a key function in
the core mission of the USIC
What are the five key centers for U.S. national security policy, as discussed in
class? - ANSWER 1 ) Presidential Office of the United States
2) National Security Council + Staff
3) Key Departments: State, defense, justice, Homeland, Treasury, Commerce,
Energy etc.
4) JCS & Combatant Commanders
5) US Congress.
Why did the CIA declare that the President is its First Customer? What are the
pf3
pf4
pf5
pf8
pf9
pfa

Partial preview of the text

Download SIS 315 Exam1 With Complete Solution. and more Exams History in PDF only on Docsity!

SIS 315 Exam1 With Complete Solution

How did Prof. Avery define the core mission of the USIC? - ANSWER The USIC core mission is to provide decision advantage to US policy makers, war-fighters and law enforcement officials that will aid them in protecting and advance US interests.

What are the four key functions in support of that core mission? Why did Prof. Avery include counterintelligence but not covert action? - ANSWER 1) Requirements

  1. Collection

  2. Analysis

  3. Counter-Intelligence

  • Covert action is not included because it is technically not a key function in the core mission of the USIC

What are the five key centers for U.S. national security policy, as discussed in class? - ANSWER 1 ) Presidential Office of the United States

  1. National Security Council + Staff

  2. Key Departments: State, defense, justice, Homeland, Treasury, Commerce, Energy etc.

  3. JCS & Combatant Commanders

  4. US Congress.

Why did the CIA declare that the President is its First Customer? What are the

risks from focusing too much on the President's intelligence needs? - ANSWER a. All Federal Government employees and elected officials are expected to serve U.S. public interests first and defend the U.S. Constitution. You cannot serve a president well apart from serving others. A direct, interactive relationship with the president is ideal from the POV of the IC, but a lot will depend on the foreign policy players around the president and the POTUS's own style, including whether or not formal NSC meetings are common. It is critical for the POTUS to have a good relationship with director of National Intelligence.

b. The IC risks its access when it steps into policy discussions.

Prof. Avery underscored the importance of seeing intelligence and national security policy as distinct processes that interact. Why? - ANSWER a. They approach their issues from different perspectives. IC is from perspective of impact of foreign actors on US national interests while policy officers are from the perspective of an interaction of US and foreign actors.

Why should the setting of collection requirements be the result of a structured dialogue? What would be the risks in having policymakers set the priorities unilaterally? What would be the risks in having the USIC set the priorities unilaterally? - ANSWER a. Because policy officials do not generally have time to focus on setting IC priorities, generally lack expertise, do not know what info. is openly available/what key pieces of intel. are needed to answer their key questions, and may be focused on immediate vs long term policy needs.

b. Risks would be less work getting done/too much time being spent focusing on an unimportant thing when something else is imperative at the time

b. The case officer is the person who the asset provides information to

c. Developmental - A developmental is the process of meeting someone through repeated contacts and conversations to assess his or her value and susceptibilities to the point where a developmental can be pitched. IT'S A PROCESS

  1. What are the five steps in the agent acquisition cycle? - ANSWER a. Targeting - Spotting an individual w/ access to desired info.

b. Assessing - Gaining assets confidence/trust and seeing if they are good enough

c. Pitching - Recruiting the individual to spy

d. Handling - Managing the active asset

e. Terminating - Asset proven unreliable or info is not needed; let them go; don't kill them

  1. When is low-resolution imagery better than high-resolution imagery? - ANSWER a. Low resolution is more useful when a large area must be searched to find a particular object/set of objects
  2. What does it mean to say that analysis begins with requirements and collection? - ANSWER a. The requirements process, collection tradecraft, counterintelligence, and the evaluation of collection all entail analytic processes to move from broad requirements to specific collection needs, to

target and protect collection efforts, and to evaluate resulting collection

  1. What does the USIC mean by denial and deception? Explain each term. - ANSWER a. A way for foreign intelligence to covertly disrupt collection

b. Denial - Covert means to prevent collection system from getting desired info.

c. Deception - Covert means of feeding false or selective information, such that those seeking it will be convinced that their system is working, but be mislead by false or selective results. A good example of a deception is a counterspy.

  1. What are the four distinct activities involved in good counterintelligence? - ANSWER a. Collection: Gaining information about an opponent's intelligence collection capabilities, plans, and intentions

b. Analysis: Drawing conclusions about an opponent's intelligence capabilities, plans, and intentions

c. Defensive: Thwarting efforts by hostile intelligence services to penetrate one's service

d. Offensive: Turning an opponent's agents into double agents or feeding them false information that they then report home.

  1. What are the levels of classification? How is each defined? - ANSWER a. Confidential: Expected to cause damage to national security

b. A presidential finding is needed to execute legitimate covert action

c. Violence and the plausibility of covert action are related because covert action can sometimes be used to circumvent large scale violence.

d. Propoganda, Political/Economic, Paramilitary, Lethal force (banned)

  1. Briefly describe the overall framework that we discussed in class for approaching moral and ethical issues for public servants within the U.S. Intelligence Community (USIC). - ANSWER a. Expected to administer their duties based on the moral/ethical norms of our society and without favoritism, without bias based on race, creed, or color, not for personal gain, and in accordance with the law

b. An intel. officer will lie about his/her job and seek to get a person to betray his/her country

c. Same framework of public trust that applies to all actions of government within a democracy

  1. Briefly explain the concepts of "do no fundamental moral evil" versus "proportionality." - ANSWER a. Do no fundamental moral evil - Even good ends do not justify fundamentally morally evil means i.e. a fundamental moral evil is not made "good" because we decide to accept it in the pursuit

of some "higher good"

b. Proportionality - Says that as long as the expected gains (good) outweighs the expected losses (bad), the ends justify the means and the proposed action is good

  1. Can sex or blackmail be used by the USIC to recruit human assets? Why or why not? - ANSWER a. U.S. moral and ethical standards and legal authorities rule out the use of blackmail or sex to acquire human assets
  2. Briefly explain two key obligations that the USIC has to its human assets overseas. - ANSWER a. To follow through on promises that are made (and, therefore, to not make promises that it can't keep).

b. To seek to protect an asset who is discovered to be spying for the U.S>, although it is not always feasible to do so in practice.

  1. What are the two reasons why intelligence collection and reporting against U.S. persons is restricted? What is a U.S. person? - ANSWER a. As U.S. public servants, we carry a special responsibility to help safeguard the privacy of U.S. citizens and to follow the Constitution and laws that protect that privacy

b. The authority to collect information via intelligence means is also limited to avoid possible abuses, leading either to collection of intelligence for

leaders. If we don't use assassination, why is killing terrorist leaders considered acceptable? - ANSWER a. Because they are actively involved in the harm of U.S. interests?

The president is given power by the constitution to protect the nation if it is under imminent threat of attack or being targeted