The United States uses multiple collection disciplines (INTs) including imagery, signals, measurement and signatures, and human intelligence to collect intelligence. These collection methods each have strengths and weaknesses and there are ongoing debates around resource prioritization and development of new collection systems. Additionally, greater emphasis on collection over analysis processing has also been an issue. The document then discusses various collection methods and issues around balancing collection capabilities with protecting sources and methods.
Intelligence as a set of permanent institutions dates back only to the second half of the nineteenth century. But as information and news - in the dictionary meaning used in English since the middle of the fifteenth century, of 'knowledge as to events, communicated by or obtained from another, especially military' - it has always been collected as part of warfare
For a military, it can mean knowledge of the enemy and can distinguish between to defeat and to lose because information means knowledge and knowledge are power. Analysts see it as a package of information pending for clarification, and policymakers consider they should be informed so that they can meet the needs, stated or understood.
Intelligence gathers under the same umbrella the informational component of national security, internal and external policies, as well as certain aspects of international security in the case of global cross-entities (states, organizations).
This presentation is built up by gathering information from different references (Book, Articles, and Newspapers) by the author.
Intelligence as a set of permanent institutions dates back only to the second half of the nineteenth century. But as information and news - in the dictionary meaning used in English since the middle of the fifteenth century, of 'knowledge as to events, communicated by or obtained from another, especially military' - it has always been collected as part of warfare
For a military, it can mean knowledge of the enemy and can distinguish between to defeat and to lose because information means knowledge and knowledge are power. Analysts see it as a package of information pending for clarification, and policymakers consider they should be informed so that they can meet the needs, stated or understood.
Intelligence gathers under the same umbrella the informational component of national security, internal and external policies, as well as certain aspects of international security in the case of global cross-entities (states, organizations).
This presentation is built up by gathering information from different references (Book, Articles, and Newspapers) by the author.
Intelligence Led Policing for Police Decision MakersDeborah Osborne
Intelligence-Led Policing for Decision-Makers Webinar
Audio is at http://www.blogtalkradio.com/Deborah-Osborne/2009/09/23/Intelligence-Led-Policing-for-Decision-Makers-Webinar
This webinar, designed for law enforcement managers, covers the following topics:
* Intelligence: what it is, what it is not, and what it can be
* The role of the decision-maker in the intelligence cycle
* Defining Intelligence-Led Policing and the 3 i's cycle
* The 7 stages of Intelligence-Led Policing
* Resources for learning more about Intelligence-Led Policing
International Humanitarian Law Lecture 6 - Core Principles of IHLNilendra Kumar
This lecture lays down the application and the practice of International Humanitarian Law also known as Law of Armed Conflicts (LOAC). It gives a detailed explanation of the core principles of IHL.
You have spent a ton of money on your security infrastructure. But how do you string all those things together so you can achieve your goals of reducing time to response, and early detection and prevention of events. See a live demonstration that will showcase how to operationalize those resources so that your organization can reap the maximum benefit.
Terrorism, one of the most widely discussed issues of the present time, remains as one of the least understood aspect. It exudes horror and fascinations, their shocking and unexpected character has captured headlines for years; It has become the most publicized form of political violence. But the serious study of terrorism still remains in its infancy and widely divergent views continue to prevail-with regard to its origins, its true impact on international politics and the forms it may assume in future.
· One pageThe Secret Universe of the CellDocumentary - The Hid.docxoswald1horne84988
· One page
The Secret Universe of the Cell
Documentary - The Hidden Life of the Cell- https://youtu.be/SoIP1_fbNpI
• Create a document with 10 bullet point notes
Explain- 10 things you learned or find fascinating about
•The microscopic universe of the cell
•The complexity of cellular life and how it continues to evolve
•The epic battle between cells and viruses
Explain- Why human diversity & biodiversity in general is a vitally important factor in this ongoing battle between viruses and cells.
By now you should have a strong understanding of the history of intelligence in the U.S.; how the intelligence community functions; how intelligence is produced; and the role of local, state and the federal governments in intelligence activities. But, you may still be wondering where does all the information that these entities collect actually come from. And, just as importantly, how is this information obtained.
In lesson three, we learned about the intelligence process and used the Central Intelligence Agency’s (CIA’s) five-phase cycle to examine the various steps. As you recall, in the process, phase two is the collection phase. We briefly also identified and defined the six basic sources of information. These are referred to as “intelligence collection disciples” or the “INTs”
1. Human Intelligence (HUMINT)
2. Signals Intelligence (SIGINT) derived from all communications intelligence (COMINT), electronic intelligence (ELINT), or foreign instrumentation signals intelligence (FISINT).
3. Imagery Intelligence (IMINT)
4. Measurement and Signatures Intelligence (MASINT)
5. Open-Source Intelligence (OSINT)
6. Geospatial intelligence (GEOINT)
These six disciplines are the sources of all the information that is collected to produce intelligence products. Remember, it is a bit of a misperception that secret “movie-like” missions collect all information. While it is true that some is indeed collected in the more classic “spy” type way; a great deal of information is collected by looking at sources that everyone can access.
For the purposes of this class, we will use the Federal Bureau of Investigation’s (FBI’s) explanations of the first five INTs, which include a high level discussion of which members of the IC use the those INTs. The description of the last INT, GEOINT, remains the same as lesson three and is provided by the CIA.
Human Intelligence (HUMINT) is the collection of information from human sources. The collection may be done openly. For example: when FBI agents interview witnesses or suspects, or it may be done through clandestine or covert means (espionage). Within the United States, HUMINT collection is the FBI’s responsibility. Beyond U.S. borders, HUMINT is generally collected by the CIA, but also by other U.S. components abroad.
Signals Intelligence (SIGINT) refers to electronic transmissions that can be collected by ships, planes, ground sites, or satellites. Communications Intelligence (COMINT) is a type of SIGINT and refers to the.
Intelligence Led Policing for Police Decision MakersDeborah Osborne
Intelligence-Led Policing for Decision-Makers Webinar
Audio is at http://www.blogtalkradio.com/Deborah-Osborne/2009/09/23/Intelligence-Led-Policing-for-Decision-Makers-Webinar
This webinar, designed for law enforcement managers, covers the following topics:
* Intelligence: what it is, what it is not, and what it can be
* The role of the decision-maker in the intelligence cycle
* Defining Intelligence-Led Policing and the 3 i's cycle
* The 7 stages of Intelligence-Led Policing
* Resources for learning more about Intelligence-Led Policing
International Humanitarian Law Lecture 6 - Core Principles of IHLNilendra Kumar
This lecture lays down the application and the practice of International Humanitarian Law also known as Law of Armed Conflicts (LOAC). It gives a detailed explanation of the core principles of IHL.
You have spent a ton of money on your security infrastructure. But how do you string all those things together so you can achieve your goals of reducing time to response, and early detection and prevention of events. See a live demonstration that will showcase how to operationalize those resources so that your organization can reap the maximum benefit.
Terrorism, one of the most widely discussed issues of the present time, remains as one of the least understood aspect. It exudes horror and fascinations, their shocking and unexpected character has captured headlines for years; It has become the most publicized form of political violence. But the serious study of terrorism still remains in its infancy and widely divergent views continue to prevail-with regard to its origins, its true impact on international politics and the forms it may assume in future.
· One pageThe Secret Universe of the CellDocumentary - The Hid.docxoswald1horne84988
· One page
The Secret Universe of the Cell
Documentary - The Hidden Life of the Cell- https://youtu.be/SoIP1_fbNpI
• Create a document with 10 bullet point notes
Explain- 10 things you learned or find fascinating about
•The microscopic universe of the cell
•The complexity of cellular life and how it continues to evolve
•The epic battle between cells and viruses
Explain- Why human diversity & biodiversity in general is a vitally important factor in this ongoing battle between viruses and cells.
By now you should have a strong understanding of the history of intelligence in the U.S.; how the intelligence community functions; how intelligence is produced; and the role of local, state and the federal governments in intelligence activities. But, you may still be wondering where does all the information that these entities collect actually come from. And, just as importantly, how is this information obtained.
In lesson three, we learned about the intelligence process and used the Central Intelligence Agency’s (CIA’s) five-phase cycle to examine the various steps. As you recall, in the process, phase two is the collection phase. We briefly also identified and defined the six basic sources of information. These are referred to as “intelligence collection disciples” or the “INTs”
1. Human Intelligence (HUMINT)
2. Signals Intelligence (SIGINT) derived from all communications intelligence (COMINT), electronic intelligence (ELINT), or foreign instrumentation signals intelligence (FISINT).
3. Imagery Intelligence (IMINT)
4. Measurement and Signatures Intelligence (MASINT)
5. Open-Source Intelligence (OSINT)
6. Geospatial intelligence (GEOINT)
These six disciplines are the sources of all the information that is collected to produce intelligence products. Remember, it is a bit of a misperception that secret “movie-like” missions collect all information. While it is true that some is indeed collected in the more classic “spy” type way; a great deal of information is collected by looking at sources that everyone can access.
For the purposes of this class, we will use the Federal Bureau of Investigation’s (FBI’s) explanations of the first five INTs, which include a high level discussion of which members of the IC use the those INTs. The description of the last INT, GEOINT, remains the same as lesson three and is provided by the CIA.
Human Intelligence (HUMINT) is the collection of information from human sources. The collection may be done openly. For example: when FBI agents interview witnesses or suspects, or it may be done through clandestine or covert means (espionage). Within the United States, HUMINT collection is the FBI’s responsibility. Beyond U.S. borders, HUMINT is generally collected by the CIA, but also by other U.S. components abroad.
Signals Intelligence (SIGINT) refers to electronic transmissions that can be collected by ships, planes, ground sites, or satellites. Communications Intelligence (COMINT) is a type of SIGINT and refers to the.
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docxdoylymaura
INTL304 – Intelligence Collection
Strategic and Tactical Intelligence Collection Requirements:
In this first week you will be looking at the differences between strategic and tactical intelligence collection, which address quite different problems and have different pressures and demands. To complete this discussion board you should review IIE Part 3 (3.doc), Strategic Intelligence, review the IPB, and CIA collection operations. Also review chapter 12 in the Clark book.
Once you are prepared please address the following question: Your initial post should be a substantive 250+ words, student responses 250+ words
Identify at least 5 significant differences (there are many more) between intelligence collection for strategic analysis and intelligence collection for tactical military requirements. Remember to take a strategic view of this question. Think about source of requirements, tasking of platforms, turnaround times, the effect on analysis, collection planning, etc.
Use examples, demonstrate you have read the materials, and apply critical thinking skills to earn maximum points on this board. Show your sources as well...it assists in the rigor of your thinking. You are welcome to draw on additional readings, but your work must at least reflect that you've completed the required readings.
Student Response #1 – Michael
One of the many significant differences between strategic and tactical intelligence is what it is used for and who the major consumers are for each type. Strategic intelligence is used to create strategy, plans and policy at the nation and theater level and created by national security issues.1 Where tactical intelligence is used for planning and conducting tactical operations and used by field commanders.2 This creates a completely different consumer set for each type of information produced.
Another difference is how Intelligence Preparation of the Battlefield (IPB) is conducted. For strategic levels the theater is evaluated and the doctrinal principles are applied in a long range large scale model. This means that every aspect of the theater is looked at from geography to the local belief systems and the overall operational plan (example: Enduring Freedom) is created and sent to the tactical units. IPB for the tactical units is what I and my team did in Afghanistan. As the ISR collection manager I used every asset I had available to collect on the terrain and saturate the target area with ISR. Mean while my team dug though the databases and HUMINT information available and created target packages. Each time we did a major air assault we had nine to ten weeks of collection going on before the troops left the Forward Operating Base (FOB). The difference is in this order. Kabul looked at the theater and conducted IPB based on that, while Kandahar conducted regional IPB’s and fed that to Kabul, we conducted area IPB in support of combat missions and fed that to both regional and theater IPB’s.3
Weather is anot.
ECON 202 Written AssignmentDue April 28th Submitted through BlacEvonCanales257
ECON 202 Written Assignment
Due April 28th Submitted through Blackboard
Topic: You can choose a business or industry that has been impacted by COVID 19. I want you to write a 2 page paper on how you think the pandemic has effected the business and the impact on society. I want you to relate the topic to the economic effects on the society. This will require you to use the terms we have learned and relate the economic principles we have studied in class.
When I say 2 pages I MEAN content of 2 pages. Do not put your name, class section, or any other info at the top or bottom of the page. I will know who it is when you submit it in blackboard, but, if you want to put that information on your paper, Do A Title Page! Use double spacing and a font of 14 for your paper.
The rubric is:
Economic termsuse a minimum of 15 @ 2points each 30 points
Length of paper minimum of 2 pages, 5 paragraphs 10 points
Content of paper is your paper logical, did you present an
Economic position, is it relevant to society? 10 points
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
The Cyber Domain
Metcalf, Andy, USMC;Scott, Dan
Marine Corps Gazette; Aug 2015; 99, 8; ProQuest
pg. 57
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Cyber Espionage: The Silent Crime of Cyberspace
Virginia Greiman
Boston University, Boston, USA
[email protected]
Abstract: In recent years, the disclosure of secrets through cyber infiltration of America’s largest intelligence organization,
the National Security Agency (NSA), has raised the fears of veteran intelligence officials and close allies around the globe that
no institution or government is secure from those who roam the discrete halls of cyberspace. Although espionage has existed
since before the days of the Greek mythological Trojan horse, no one could have envisioned the sophisticated use of
espionage in today’s networked world. Espionage has been used for political and military intelligence and economic and
industrial pursuits with a lack of understanding of all of the impacts on our daily lives. In the context of foreign or international
law, espionage is sometimes characterized as lawless, without controls or regulation, and it rarely distinguishes between
economic and security based cyber espionage. Through empirical analysis this paper explores the treatment of espionage
under various legal systems including those countries and regions considered the most advanced at cyber espionage, the
United States, the United Kingdom, Russia and China. To provide greater insight into the different perspectives of cyber
espionage from a legal standpoint, this paper distinguishes the law of national intelligence collection from the cr ...
Information Sharing, Dot Connecting and Intelligence Failures.docxannettsparrow
Information Sharing, Dot Connecting and Intelligence Failures:
Revisiting Conventional Wisdom
By
Russell Travers
Deputy Director, Information Sharing and Knowledge Development
National Counterterrorism Center
This paper, written in August 2009, was submitted to the Director of National Intelligence
2009 Galileo Awards Program. The Galileo Awards Program is an annual Intelligence
Community-wide competition designed to encourage and recognize innovative workforce
ideas that address current challenges and help shape the future of U.S. Intelligence.
All statements of fact, opinion, or analysis expressed are those of the author and do not
reflect the official positions or views of the National Counterterrorism Center (NCTC) or
any other U.S. Government agency. Nothing in the contents should be construed as
implying U.S. Government or NCTC endorsement of the author’s views. This material has
been reviewed to prevent the disclosure of classified information.
The year is 2014. The Intelligence Community is ten years into its efforts to
implement the Intelligence Reform and Terrorism Prevention Act (IRTPA). While
change has been evident on many fronts, nothing was more closely identified with
intelligence reform than information sharing; ever since the 9/11 Commission
declared that “the biggest impediment to all-source analysis – to a greater
likelihood of connecting the dots – is the human or systemic resistance to sharing
information”1, the two had been inextricably linked. And while we were pushing
more electrons than ever before, dissatisfaction continued: in 2014, as in 2009,
no analyst in the IC had effective access to all information; analysts in many parts
of the Community complained that they couldn’t get operational traffic or law
enforcement information; we had little ability to do large scale processing of
foreign and domestic data sets; our non Federal partners were still dissatisfied
with the quality of information sharing. A dizzying array of directives had been
issued. Arbitration procedures had been established. And yet organizations
weren’t getting the information they claimed to “need.” Legitimate issues
coexisted with tripe. According to the critics, we still couldn’t connect those dots.
The reality, however, was far more complex: the only question was whether it
took a major intelligence failure to realize that fact.
This is the path we’re on. We will continue to hear claims that information sharing has
“barely improved since 9/11.” Such hyperbole is unmitigated nonsense. The robust sharing of
information between and among the key organizations has undoubtedly contributed to the fact
that we haven’t suffered a major attack. And by any objective standard, the level of sharing
1 The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United
States; U.S. Government Print.
Cyber Espionage The Silent Crime of Cyberspace Virginia GOllieShoresna
Cyber Espionage: The Silent Crime of Cyberspace
Virginia Greiman
Boston University, Boston, USA
[email protected]
Abstract: In recent years, the disclosure of secrets through cyber infiltration of America’s largest intelligence organization,
the National Security Agency (NSA), has raised the fears of veteran intelligence officials and close allies around the globe that
no institution or government is secure from those who roam the discrete halls of cyberspace. Although espionage has existed
since before the days of the Greek mythological Trojan horse, no one could have envisioned the sophisticated use of
espionage in today’s networked world. Espionage has been used for political and military intelligence and economic and
industrial pursuits with a lack of understanding of all of the impacts on our daily lives. In the context of foreign or international
law, espionage is sometimes characterized as lawless, without controls or regulation, and it rarely distinguishes between
economic and security based cyber espionage. Through empirical analysis this paper explores the treatment of espionage
under various legal systems including those countries and regions considered the most advanced at cyber espionage, the
United States, the United Kingdom, Russia and China. To provide greater insight into the different perspectives of cyber
espionage from a legal standpoint, this paper distinguishes the law of national intelligence collection from the criminal laws
of economic/industrial espionage on the domestic front. The purpose of this research is to analyze the development of cyber
espionage as a preferred means of contemporary warfare, as well as a tool for economic and political intelligence. The paper
concludes by responding to the challenges faced by nation-states in the development of an effective legal system governing
espionage at the domestic and international level.
Keywords: cyber espionage, cybercrime, foreign surveillance, national intelligence, economic espionage, cyber warfare
1. Introduction
Although many countries all over the world are committing cyber espionage, the United States, Russia, and China
represent the most sophisticated cyber spying capabilities (Senate, 2014). A 2011 Report by the Office of the
National Counterintelligence Executive (ONCIX) suggested that the rise of cyberspace as a platform for
innovation and storage of trade secrets was greatly enhancing the risks faced by American firms. The report also
found that the United States remains the prime target for foreign economic collection and industrial espionage
by virtue of its global technological leadership and innovation (ONCIX, 2011).
Cyber espionage has also become an accepted and even preferred means of warfare. That is not to say that
cyber espionage will replace traditional means of warfare, but it is already affecting the nature of nation-state
conflict. Dunn Cavelty (2012) suggests that this shift began with the Cold War ...
Presentation by Jared Jageler, David Adler, Noelia Duchovny, and Evan Herrnstadt, analysts in CBO’s Microeconomic Studies and Health Analysis Divisions, at the Association of Environmental and Resource Economists Summer Conference.
Russian anarchist and anti-war movement in the third year of full-scale warAntti Rautiainen
Anarchist group ANA Regensburg hosted my online-presentation on 16th of May 2024, in which I discussed tactics of anti-war activism in Russia, and reasons why the anti-war movement has not been able to make an impact to change the course of events yet. Cases of anarchists repressed for anti-war activities are presented, as well as strategies of support for political prisoners, and modest successes in supporting their struggles.
Thumbnail picture is by MediaZona, you may read their report on anti-war arson attacks in Russia here: https://en.zona.media/article/2022/10/13/burn-map
Links:
Autonomous Action
http://Avtonom.org
Anarchist Black Cross Moscow
http://Avtonom.org/abc
Solidarity Zone
https://t.me/solidarity_zone
Memorial
https://memopzk.org/, https://t.me/pzk_memorial
OVD-Info
https://en.ovdinfo.org/antiwar-ovd-info-guide
RosUznik
https://rosuznik.org/
Uznik Online
http://uznikonline.tilda.ws/
Russian Reader
https://therussianreader.com/
ABC Irkutsk
https://abc38.noblogs.org/
Send mail to prisoners from abroad:
http://Prisonmail.online
YouTube: https://youtu.be/c5nSOdU48O8
Spotify: https://podcasters.spotify.com/pod/show/libertarianlifecoach/episodes/Russian-anarchist-and-anti-war-movement-in-the-third-year-of-full-scale-war-e2k8ai4
Understanding the Challenges of Street ChildrenSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
Canadian Immigration Tracker March 2024 - Key SlidesAndrew Griffith
Highlights
Permanent Residents decrease along with percentage of TR2PR decline to 52 percent of all Permanent Residents.
March asylum claim data not issued as of May 27 (unusually late). Irregular arrivals remain very small.
Study permit applications experiencing sharp decrease as a result of announced caps over 50 percent compared to February.
Citizenship numbers remain stable.
Slide 3 has the overall numbers and change.
What is the point of small housing associations.pptxPaul Smith
Given the small scale of housing associations and their relative high cost per home what is the point of them and how do we justify their continued existance
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
A process server is a authorized person for delivering legal documents, such as summons, complaints, subpoenas, and other court papers, to peoples involved in legal proceedings.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Many ways to support street children.pptxSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
Up the Ratios Bylaws - a Comprehensive Process of Our Organizationuptheratios
Up the Ratios is a non-profit organization dedicated to bridging the gap in STEM education for underprivileged students by providing free, high-quality learning opportunities in robotics and other STEM fields. Our mission is to empower the next generation of innovators, thinkers, and problem-solvers by offering a range of educational programs that foster curiosity, creativity, and critical thinking.
At Up the Ratios, we believe that every student, regardless of their socio-economic background, should have access to the tools and knowledge needed to succeed in today's technology-driven world. To achieve this, we host a variety of free classes, workshops, summer camps, and live lectures tailored to students from underserved communities. Our programs are designed to be engaging and hands-on, allowing students to explore the exciting world of robotics and STEM through practical, real-world applications.
Our free classes cover fundamental concepts in robotics, coding, and engineering, providing students with a strong foundation in these critical areas. Through our interactive workshops, students can dive deeper into specific topics, working on projects that challenge them to apply what they've learned and think creatively. Our summer camps offer an immersive experience where students can collaborate on larger projects, develop their teamwork skills, and gain confidence in their abilities.
In addition to our local programs, Up the Ratios is committed to making a global impact. We take donations of new and gently used robotics parts, which we then distribute to students and educational institutions in other countries. These donations help ensure that young learners worldwide have the resources they need to explore and excel in STEM fields. By supporting education in this way, we aim to nurture a global community of future leaders and innovators.
Our live lectures feature guest speakers from various STEM disciplines, including engineers, scientists, and industry professionals who share their knowledge and experiences with our students. These lectures provide valuable insights into potential career paths and inspire students to pursue their passions in STEM.
Up the Ratios relies on the generosity of donors and volunteers to continue our work. Contributions of time, expertise, and financial support are crucial to sustaining our programs and expanding our reach. Whether you're an individual passionate about education, a professional in the STEM field, or a company looking to give back to the community, there are many ways to get involved and make a difference.
We are proud of the positive impact we've had on the lives of countless students, many of whom have gone on to pursue higher education and careers in STEM. By providing these young minds with the tools and opportunities they need to succeed, we are not only changing their futures but also contributing to the advancement of technology and innovation on a broader scale.
This session provides a comprehensive overview of the latest updates to the Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (commonly known as the Uniform Guidance) outlined in the 2 CFR 200.
With a focus on the 2024 revisions issued by the Office of Management and Budget (OMB), participants will gain insight into the key changes affecting federal grant recipients. The session will delve into critical regulatory updates, providing attendees with the knowledge and tools necessary to navigate and comply with the evolving landscape of federal grant management.
Learning Objectives:
- Understand the rationale behind the 2024 updates to the Uniform Guidance outlined in 2 CFR 200, and their implications for federal grant recipients.
- Identify the key changes and revisions introduced by the Office of Management and Budget (OMB) in the 2024 edition of 2 CFR 200.
- Gain proficiency in applying the updated regulations to ensure compliance with federal grant requirements and avoid potential audit findings.
- Develop strategies for effectively implementing the new guidelines within the grant management processes of their respective organizations, fostering efficiency and accountability in federal grant administration.
Chapter 5 collection and the collection disciplines
1. Chapter 5: Collection and the Collection
Disciplines
________________________________________
* what is "collection," and what does it
entail?
* what are the overarching themes and
problems concerning collection?
* what are the strengths and weaknesses of
this stage of the intelligence cycle?
-- include mention of different types of
collection activities
2.
3. The United States and several other
nations use multiple means of collecting
the intelligence they require.
4. The means of collecting
intelligence are sometimes
referred to as collection
disciplines or INTs.
5. Several issues within the
collection disciplines tend to
drive many of the debates and
decisions on intelligence
collection.
6. Decision makers placed greater
emphasis on collection systems
than on the processing and
exploitation needed to deal with
the intelligence collected.
7. The terrorist attacks in 2001
raised additional questions
about the utility of these
systems, as terrorist targets
require greater use of human
intelligence.
8. One of the director of national
intelligence (DNI) John Negroponte's
major collection decisions, he ordered
the Boeing Company to stop work on a
system known as the Future Imagery
Architecture (FIA), widely thought to
be the next generation of imagery
satellites.
9. However, the TPEDs problem
remains and may grow worse
as new collection systems are
launched, as they will have
increased collection
capabilities.
10. No matter how satisfactory current
collection capabilities are, there
are several impulses to build new
systems: to improve collection
capabilities, to take advantage of
new technologies, and to respond
to changing intelligence priorities.
11. Reaching the decision to build a new system
involves additional time (sometimes several
years) as intelligence agencies and their policy
customers debate among competing systems in
an always constrained budget about:
which intelligence needs should take
priority
which technologies should be pursued
what trade-offs should be made
12. One of the major advantages of
having multiple means of collection
is that one system or discipline can
provide tips or clues that can be
used to guide collection by other
systems.
13. Intelligence community is to
produce all-source intelligence, or
fusion intelligence. Intelligence
based on as many collection sources
as possible to compensate for the
shortcomings of each and to profit
from their combined strength.
14. At the same time, the diverse
array allows collection managers
to increase collection in
breadth, that is, to increase the
number of issues being covered,
albeit with less depth for a
particular issue.
15. Although analysts were slow to
understand that Soviet premier
Nikita Khrushchev was willing to
make such a risky move as
deploying medium- and
intermediate-range missiles in
Cuba, the intelligence community
brought a variety of collection
means to bear.
16. Imagery then provided crucial
intelligence about the status of the
missile sites and the approximate time
before completion, as did Soviet
technical manuals turned over to the
United States by Soviet colonel Oleg
Penkovsky, a spy in the employ of the
United States and Britain.
17. Imagery then provided crucial
intelligence about the status of the
missile sites and the approximate time
before completion, as did Soviet
technical manuals turned over to the
United States by Soviet colonel Oleg
Penkovsky, a spy in the employ of the
United States and Britain.
18. It also reflects years of budget
choices by the intelligence
community and Congress that
have favored new collection
systems over improving P&E
capabilities.
19. As noted, the intelligence
committees find it difficult to put
money into new collection systems
when they are told that only as
many images or signals will be
processed and exploited as was the
case for the previous generations of
collectors.
20. This refers to the tendency of all
collectors or collection agencies
to collect on an issue that is
deemed important, whether or
not they bring anything useful
to the table or can offer an
appropriate type of collection.
21. For example, if a high-priority issue
were the cyber-attack capabilities
of a hostile state, little value would
be gained by imagery, although
imagery collection managers might
be tempted to contribute to the
issue based solely on its priority.
22. Second, the agreement must be
rigorously enforced, and agencies must
not be penalized for not collecting
against issues not suited to them
regardless of the issues' importance
and must be recognized for
concentrating on the issues about
which they can collect needed
intelligence.
23. The security classifications are
driven by concerns that the
disclosure of capabilities will allow
those nations that are collection
targets to take steps to prevent
collection, thus effectively negating
the collection systems.
24. Intelligence community has
grown concerned about
protecting intelligence sources
and methods during post-cold
war military operations that
involve cooperation with
nations that are not U.S.
25. In these cases the need to protect intelligence
sources and methods must be balanced
against the need to share intelligence not only
for the sake of the operation but also to
ensure that military partners in the operation
are not put in a position in which their actions
or inactions prove to be dangerous to U.S.
26. Thus, classification related to
intelligence collection
underscores both the
importance of the information
and the fragility of its source
something that would be
difficult to replace if disclosed.
27. The United States and
Britain said they would
provide intelligence on
Iraqi WMD to United
Nations (UN) inspectors
but not necessarily all
available intelligence.
28. Some controversy arose after DCI Tenet
said the United States was cooperating
fully but the CIA later revealed that it had
shared intelligence on 84 of 105 suspected
priority weapons sites, which some
members of Congress felt was not what
they had understood to be the agreed
level of intelligence sharing.
29. First, all of the technical Collection disciplines
geospatial intelligence (GEOINT, formerly
imagery or IMINT), signals intelligence (SIGINT),
and measurement and signatures intelligence
(MASINT) and the nontechnical human
intelligence (HUMINT), or espionage, have end-
to-end processes, from collection through
dissemination.
30. The INTs sometimes vie with one
another to respond to requests for
intelligence largely as a means of
ensuring continuing funding levels
regardless of which INT is best
suited to provide the required
intelligence.
31. These mission managers report to
both the deputy DNIs for analysis
and Collection and are responsible
for ensuring that the two aspects of
intelligence work together to
improve both collection and
analysis.
32. A targeted nation can use
knowledge about the collection
capabilities of an opponent to avoid
collection (known as denial); the
target can use the same knowledge
to transmit information to a
collector.
33. Does the United States require the same
extensive array of collection systems to deal
with post- cold war intelligence issues? Also,
some of the leading intelligence issues the so-
called transnational issues such as narcotics,
Terrorism, and crime may be less susceptible to
the technical collection capabilities built to deal
with the Soviet Union or other classic political-
military intelligence problems.
35. Moreover, the intelligence
community harbors some
institutional prejudice against open-
source intelligence, as it seems to
run counter to the purposes for
which the intelligence community
was created.
36. The United States is extremely
dependent on satellites for
intelligence collection, for
communications, and for a host
of commercial applications.
37. Imagery capabilities have become
better known, states can take steps
to deceive collection using
camouflage or dummies or to
preclude collection by conducting
certain activities at times when they
are unlikely or less likely to be
observed.
38. The agency's actions expanded the
overall collection capability of the
United States and allowed it to
reserve more sophisticated imagery
capabilities for those areas where
they were most needed, while
IKONOS took up other collection
tasks.
39. Bush signed a directive stating that the United
States would rely on commercial imagery "to the
maximum practical extent" for a wider range of
requirements: "military, intelligence, foreign
policy, homeland security and civil uses." This
refers to the need to consider the value of the
intelligence that is going to be collected (the
take) against the risk of discovery either in
political terms or in the collection technology
that may then be revealed to another nation.
40. As with the other collection
disciplines, SIGINT was
developed to collect
intelligence on the Soviet
Union and other nations.
42. At the same time, all nations know
that the UN is an excellent
intelligence collection target as
virtually all nations of the world
have missions and representatives
there.
43. Is this person a double agent who is
collecting information on your intelligence
agency's HUMINT techniques and
capabilities even as he or she passes
information to you? Such an idea runs
counter to the concept of an all-source
intelligence process that seeks to apply as
many Collection disciplines as possible to a
given intelligence need.
44. Clearly, having a collection system
that is strong and flexible and can
be modulated to the intelligence
requirement at hand is better than
one that swings between
apparently opposed fashions of
technical and human collection.
45. For the United States, at least, it
remains important to view HUMINT
as part of a larger collection
Strategy instead of as the single INT
that meets the country's most
important intelligence needs.
46. Even during the height of the
cold war, according to one
senior intelligence official, at
least 20 percent of the
intelligence about the Soviet
Union came from open sources.
47. In addition to GEOINT,
SIGINT, HUMINT, OSINT, and
MASINT, intelligence officers,
in their lighter moments,
speak of other INTs
(collection disciplines).
48. DNI McConnell has referred to
OSINT as the starting point for
collection, as have others before
him in other words, looking for the
needed intelligence in open sources
first before tasking classified
collection sources, either technical
or human.
49. Putting this seemingly obvious plan into
practice has proven difficult over the years
for a number of reasons, including
preferences within the intelligence
community and among policy makers for
classified sources and the difficulty that the
intelligence community's open source
activity has had in keeping pace with the
explosion of open sources.
50. Second, it is able to apply
more than one collection INT
to an issue, which enhances
the likelihood of meeting the
collection requirements for
that issue.
51. However, the intelligence
community cannot provide answers
to every question that is asked, nor
does it have the capability to meet
all possible requirements at any
given time. The collection system is
simultaneously powerful and
limited.