Deck 9: Covert Operations

ملء الشاشة (f)
exit full mode
سؤال
According to the text, what conditions do covert operations NOT influence?

A) Social
B) Economic
C) Military
D) Political
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Of the following examples, which is NOT an example of covert action?

A) Sabotage
B) Regime change
C) Political assassination
D) Military air strike
سؤال
An operation sponsored or conducted by governmental departments or agencies in such a way as to assure secrecy or concealment is the definition of a:

A) Clandestine operation
B) Covert action
C) Deception operation
D) Denial operation
سؤال
Military deception operations apply four basic deception techniques. Which of the following is NOT one of those techniques?

A) Feints
B) Disinformation
C) Ruses
D) Displays
سؤال
Which of the following statements is true?

A) A clandestine operation differs from a covert operation in that emphasis is neither placed on concealment of the operation nor on concealment of the identity of the sponsor.
B) A clandestine operation differs from a covert operation in that emphasis is placed on concealment of the operation and on concealment of the identity of the sponsor.
C) A covert operation differs from a clandestine operation in that emphasis is placed on concealment of the operation rather than on concealment of the identity of the sponsor.
D) A clandestine operation differs from a covert operation in that emphasis is placed on concealment of the operation rather than on concealment of the identity of the sponsor.
سؤال
The law that establishes procedure for the authorization and reporting of covert actions is:

A) National Security Act of 1947
B) Intelligence Reform and Terrorism Prevention Act of 2004
C) 28 C. F.R. Part 23
D) None of the Above
سؤال
According to Joint Publication 3-13.4, military deception operations include all the following principles except:

A) Focus
B) Objective
C) Centralized planning and control
D) Decision Advantage
E) Each of the above is a principle
سؤال
Discuss how an agency ensures plausible deniability.
سؤال
What are the six principles of military deception? List and describe them.
سؤال
Differentiate between covert action and clandestine operations. How are they alike? How are they different?
سؤال
What is the Gang of Eight, and how does it relate to covert actions?
سؤال
"Many consider covert operations as the _________________________________, more extreme than diplomacy, but less extreme than direct military action."
سؤال
Give a historical example of both a covert action and a clandestine operation. Provide details related to both occurrences, and explain how the operations differed from each other.
سؤال
Discuss your views regarding extraordinary rendition. Is it a necessary tool when dealing with terrorism? Does it constitute an ethical violation? Do you think that the United States should discontinue its use of renditions-why or why not?
سؤال
The text states arguments both for and against covert action. Which argument do you agree with? What standard would you propose for evaluating whether or not a covert operation is successful?
سؤال
How will the proliferation of cyber devices and the Internet of Things influence the use of covert operations by the IC?
سؤال
In the long run, have covert operations helped or hurt U.S. long-term interests? Justify your answer.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/17
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Covert Operations
1
According to the text, what conditions do covert operations NOT influence?

A) Social
B) Economic
C) Military
D) Political
A
2
Of the following examples, which is NOT an example of covert action?

A) Sabotage
B) Regime change
C) Political assassination
D) Military air strike
D
3
An operation sponsored or conducted by governmental departments or agencies in such a way as to assure secrecy or concealment is the definition of a:

A) Clandestine operation
B) Covert action
C) Deception operation
D) Denial operation
A
4
Military deception operations apply four basic deception techniques. Which of the following is NOT one of those techniques?

A) Feints
B) Disinformation
C) Ruses
D) Displays
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following statements is true?

A) A clandestine operation differs from a covert operation in that emphasis is neither placed on concealment of the operation nor on concealment of the identity of the sponsor.
B) A clandestine operation differs from a covert operation in that emphasis is placed on concealment of the operation and on concealment of the identity of the sponsor.
C) A covert operation differs from a clandestine operation in that emphasis is placed on concealment of the operation rather than on concealment of the identity of the sponsor.
D) A clandestine operation differs from a covert operation in that emphasis is placed on concealment of the operation rather than on concealment of the identity of the sponsor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
6
The law that establishes procedure for the authorization and reporting of covert actions is:

A) National Security Act of 1947
B) Intelligence Reform and Terrorism Prevention Act of 2004
C) 28 C. F.R. Part 23
D) None of the Above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
7
According to Joint Publication 3-13.4, military deception operations include all the following principles except:

A) Focus
B) Objective
C) Centralized planning and control
D) Decision Advantage
E) Each of the above is a principle
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
8
Discuss how an agency ensures plausible deniability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
9
What are the six principles of military deception? List and describe them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
10
Differentiate between covert action and clandestine operations. How are they alike? How are they different?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is the Gang of Eight, and how does it relate to covert actions?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
12
"Many consider covert operations as the _________________________________, more extreme than diplomacy, but less extreme than direct military action."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
13
Give a historical example of both a covert action and a clandestine operation. Provide details related to both occurrences, and explain how the operations differed from each other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
14
Discuss your views regarding extraordinary rendition. Is it a necessary tool when dealing with terrorism? Does it constitute an ethical violation? Do you think that the United States should discontinue its use of renditions-why or why not?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
15
The text states arguments both for and against covert action. Which argument do you agree with? What standard would you propose for evaluating whether or not a covert operation is successful?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
16
How will the proliferation of cyber devices and the Internet of Things influence the use of covert operations by the IC?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
17
In the long run, have covert operations helped or hurt U.S. long-term interests? Justify your answer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.