






Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
SIS 315 Exam1 With Complete Solution.
Typology: Exams
1 / 10
This page cannot be seen from the preview
Don't miss anything!
How did Prof. Avery define the core mission of the USIC? - ANSWER The USIC core mission is to provide decision advantage to US policy makers, war-fighters and law enforcement officials that will aid them in protecting and advance US interests.
What are the four key functions in support of that core mission? Why did Prof. Avery include counterintelligence but not covert action? - ANSWER 1) Requirements
Collection
Analysis
Counter-Intelligence
What are the five key centers for U.S. national security policy, as discussed in class? - ANSWER 1 ) Presidential Office of the United States
National Security Council + Staff
Key Departments: State, defense, justice, Homeland, Treasury, Commerce, Energy etc.
JCS & Combatant Commanders
US Congress.
Why did the CIA declare that the President is its First Customer? What are the
risks from focusing too much on the President's intelligence needs? - ANSWER a. All Federal Government employees and elected officials are expected to serve U.S. public interests first and defend the U.S. Constitution. You cannot serve a president well apart from serving others. A direct, interactive relationship with the president is ideal from the POV of the IC, but a lot will depend on the foreign policy players around the president and the POTUS's own style, including whether or not formal NSC meetings are common. It is critical for the POTUS to have a good relationship with director of National Intelligence.
b. The IC risks its access when it steps into policy discussions.
Prof. Avery underscored the importance of seeing intelligence and national security policy as distinct processes that interact. Why? - ANSWER a. They approach their issues from different perspectives. IC is from perspective of impact of foreign actors on US national interests while policy officers are from the perspective of an interaction of US and foreign actors.
Why should the setting of collection requirements be the result of a structured dialogue? What would be the risks in having policymakers set the priorities unilaterally? What would be the risks in having the USIC set the priorities unilaterally? - ANSWER a. Because policy officials do not generally have time to focus on setting IC priorities, generally lack expertise, do not know what info. is openly available/what key pieces of intel. are needed to answer their key questions, and may be focused on immediate vs long term policy needs.
b. Risks would be less work getting done/too much time being spent focusing on an unimportant thing when something else is imperative at the time
b. The case officer is the person who the asset provides information to
c. Developmental - A developmental is the process of meeting someone through repeated contacts and conversations to assess his or her value and susceptibilities to the point where a developmental can be pitched. IT'S A PROCESS
b. Assessing - Gaining assets confidence/trust and seeing if they are good enough
c. Pitching - Recruiting the individual to spy
d. Handling - Managing the active asset
e. Terminating - Asset proven unreliable or info is not needed; let them go; don't kill them
target and protect collection efforts, and to evaluate resulting collection
b. Denial - Covert means to prevent collection system from getting desired info.
c. Deception - Covert means of feeding false or selective information, such that those seeking it will be convinced that their system is working, but be mislead by false or selective results. A good example of a deception is a counterspy.
b. Analysis: Drawing conclusions about an opponent's intelligence capabilities, plans, and intentions
c. Defensive: Thwarting efforts by hostile intelligence services to penetrate one's service
d. Offensive: Turning an opponent's agents into double agents or feeding them false information that they then report home.
b. A presidential finding is needed to execute legitimate covert action
c. Violence and the plausibility of covert action are related because covert action can sometimes be used to circumvent large scale violence.
d. Propoganda, Political/Economic, Paramilitary, Lethal force (banned)
b. An intel. officer will lie about his/her job and seek to get a person to betray his/her country
c. Same framework of public trust that applies to all actions of government within a democracy
of some "higher good"
b. Proportionality - Says that as long as the expected gains (good) outweighs the expected losses (bad), the ends justify the means and the proposed action is good
b. To seek to protect an asset who is discovered to be spying for the U.S>, although it is not always feasible to do so in practice.
b. The authority to collect information via intelligence means is also limited to avoid possible abuses, leading either to collection of intelligence for
leaders. If we don't use assassination, why is killing terrorist leaders considered acceptable? - ANSWER a. Because they are actively involved in the harm of U.S. interests?
The president is given power by the constitution to protect the nation if it is under imminent threat of attack or being targeted