intelligence cycle The process of tasking, collecting, processing, analyzing and disseminating
intelligence
Human Intelligence (HUMINT) intelligence gathered by means of interpersonal contact, info collected from
human sources also by using known documents and social media.
, Signals Intelligence (SIGINT) collecting foreign intelligence from communications and information systems for
which the NSA is in charge of.
Imagery (IMINT) Representation of objects reproduced on cameras, or other media. Also includes
photos, sensors, infrared sensors, lasers and electro optics
Open-Source Intelligence (OSINT) Information that is readily available to the public and doesn't require any type of
malicious activity to obtain. Some of it is classified
How many steps is there to OSINT four
OSINT Discovery open source data, a complex field of sources. Photographs, Images, Documents,
audio and video recordings.
OSINT Discrimination Open source information's data appropriately filtered by OSD data analysis
OSINT Distillation OSINT info derived from a process of analysis, filtering, distillation, and
dissemination ex: a picture can help locate where and how the military can attack
rebels
OSINT Dissemination Validated open source intelligence to which a high degree of certainty has been
attributed
Integrated Defense ID is the incorporation of multidisciplinary active and passive, offensive and
defensive capabilities it is employed to mitigate potential risks to the air force
How many levels of threats is there Three
Level I Threat enemy agents and terrorists who's primary missions include espionage, sabotage
and subversion (small time terrorists)
Level II Threat include small scale, irregular forces conducting unconventional warfare that can
pose serious threat to military and civilians
Level III Threat Threats have the capability of projecting combat power by air, land and sea
anywhere into the operational area
Threats may include, conventional military units, special forces, foreign intelligence agents
and services
Terrorism The calculated use of violence to instill fear and is intended to coerce or
intimidate governments or societies
how many types of structures are in terrorism? Three, Hierarchical structure, Networked structure, Lone terrorist
hierarchical structure A terrorist organization that has a well defined chain of command, and well
established command and support. such as ISIS