Intel Board Flashcards

1
Q

101.1 Discuss the concept of ORM

A

101.1 - Used as a framework to increase effectiveness by managing risk -
Is a decision making tool used by personnel at all levels to increase operational
effectiveness by identifying, assessing, and managing risks. It is a 5 step process.
By reducing the potential for loss, the probability of a successful mission is
increased.
* Minimizes risks to acceptable levels, commensurate with mission
accomplishment. Correct application of the ORM process will reduce mishaps
and associated costs resulting in more efficient use of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

101.2 Explain the 5-step ORM Process

A

102.2
a. Identify the Hazards:
A hazard is any condition with the potential to negatively impact mission accomplishment or cause injury, death, or property damage.

b. Assess the Hazards:
For each hazard identified, determine the associated degree of risk in terms of probability and severity.

c. Make Risk Decisions:
There are three basic actions which ultimately lead to making informed risk decisions:
(1) Identifying control options.
(2) Determine the effect of these controls on the hazard or risk.
(3) Decide how to proceed.

d. Implement Controls:
(1) Ensure the plan is clearly communicated to all the involved personnel
(2) Establish Accountability.
(3) Provide Necessary Support.

e. Supervise:
Supervise and review involves determining the effectiveness of risk controls throughout the mission or task.
(1) Monitor the effectiveness of risk controls.
(2) Determine the need for further assessment of all or a portion of the task due to an anticipated change.
(3) Provide feedback- both positive and negative lessons learned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

101.3 Discuss the safefy aspects of the following:
a. Tag-out precautions [ref. b, vol. I, ch. B11]
b. Electrical fires [ref. b, vol. III, ch. C9]
c. First aid for electricity-related injury [ref. b, vol. III, ch. C9]
d. Electronic precautions [ref. b, vol. III, ch. C9]
e. HERO/HERP/HERF [ref. c, ch. 3]

A

a. Tag-Out Precautions
DANGER 􀂱 DO NOT OPERATE􀂴 red 􀁗ags 􀁚/ locks
Notify personnel of equipment out of operation; prevent injury, equipment damage
b. Electrical Fires
Class Charlie Fire
Use carbon dioxide (black on red), dry powder (blue on red), vaporizing foam (green on red) extinguishers
Shut off power to equipment
Starve fire of oxygen
Prevention for electrical fires
Keep equipment clean, maintenance, report problems
c. First Aid for Electrical Shock
Shut off power first
No physical contact until isolated from power source
Non-conductive insulating material to transport
Report casualty/call for medical
Perform CPR
d. Electronic Precautions
Repair equipment w/ circuit deenergized
Unless i􀁗􀂶s an emergenc􀁜 condi􀁗ion 􀁚/ CO􀂶s appro􀁙al
Warning signs to limit exposure
Cables, antennas can be a shock/burn hazard
e. HERO/HERP/HERF 􀂱 Hazards of Electromagnetic Radiation to ____
Ordnance
Tests conducted at NERF to classify susceptibility to EM radiation
SAFE, SUSCEPTIBLE, UNSAFE
Personnel
Radiation Hazard (RADHAZ) surveys determine RADHAZ distance
Ensure personnel are not exposed to excessive power intensities
Fuel
Potential for accidentally igniting fuel vapors by RF-induced arcs
Fuel handling ops near high-powered radio/radar transmitting antennas
Radiation surveys to determine if hazard exists in fuel handling/fuel areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

101.4 Discuss safety considerations during execution of the Emergency Action Plan.

A

All personnel involved must be familiar with the tasks associated with emergency destruction. Use personal protective equipment when using an ax or sledge hammer. Station safety observers if time and space permit.

􀆔 Review local EAP/EDP
􀅼 Perform ORM steps
􀆔 Train on procedures annually/semi-annually
􀆔 Destruction tools could be potential hazards
􀅼 Shredder, axe/hammer, electrical, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

102.2 Define and discuss security classification levels, receipt, custody, document markings, and handling requirements for the following:
a. TOP SECRET, SECRET, CONFIDENTIAL
b. U//FOUO
c. Sensitive Compartmented Information (SCI):
d. Special Access Program (SAP):
e. SPECAT
f. Allied Information/ NATO Control Documents:
g. ACCM [ref. m, encl. 4]

A

a. Top Secret - exceptionally grave damage
-Pack and Wrap - classification only on inner wrapper, generic title/addresses on outer
-Use Defense Courier Service of DoS Diplomatic Courier Service
-Secret - grave damage , Pack and Wrap, USPS registered (U.S. and U.S. territories)
- Confidential - damage - USPS registered
b. U//FOUO - this information is unclassified, but not to be disseminated freely outside the construct of government operations
c. Sensitive Compartmented Information (SCI) - classified information concerning or derived from intelligence sources, methods, or analytical processes that is required to be handled exclusively within formal access control systems established by the Director of National Intelligence.
d. Special Access Program (SAP) - access requirements that exceed those normally required for information at the same classification level.
e. SPECAT - Special Category messages require strict distribution limitations.
f. Allied Information/ NATO Control Documents - NATO has four levels of classified information: COSMIC TOP SECRET, NATO SECRET, NATO CONFIDENTIAL, and NATO RESTRICTED. Certain NATO information is further classified in a specific category as ATOMAL which can be either RESTRICTED DATA (RD) or FORMERLY RESTRICRED DATA (FRD).
g. ACCM (Alternative Compensatory Control Measures)
–Enforce 􀂳need-to-know for classified information, where SAP controls not warranted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. 7 Define and discuss how to find authorized document markings and explain the below:
    a. NOFORN
    b. REL TO USA
    c. RELIDO
    d. ORCON
    e. PROPIN
    f. IMCON
    g. RSEN
    h. GAMMA
    i. HCS
    j. Downgrading and declassification instructions
A

Authorized Document Markings will be annotated next to classification Marking.

a. NOFORN- Not Releasable to Foreign Nationals

b. REL TO USA: Release to Distribution to citizens of the countries listed is permitted, providing they have appropriate accesses and need to know. Example: “REL
TO USA, AUS, CAN, GBR, NZL” indicates that the information may be shared with appropriate personnel from Australia, the United Kingdom, Canada, and New Zealand.
• FVEY is the country code used as shorthand for Five Eyes.

c. RELIDO: Releasable by Information Disclosure Official. Indication by classification originator has authorized Designated Intelligence Disclosure Officials (DIDO) to make further sharing decisions in accordance with the existing procedures for uncaveated intelligence material (intelligence with no restrictive dissemination controls).
d. ORCON: Originator controls dissemination and/or release of the document.
e. PROPIN: CAUTION- Proprietary Information Involved. Refers to things like trade secrets which are not classified, but would cause damage to the commercial owner of the data.
f. IMCON: Controlled Imagery. Applies to information that is derived from analytical methodologies that can be associated with (but not restricted to) WMD programs, or issues that if disclosed or released could mollify or measurably reduce the effectiveness of certain sensitive analytical methodologies that are particularly vulnerable to countermeasures
g. RSEN: Risk Sensitive. Term used to protect especially sensitive imaging capabilities and exploitation techniques.
h. GAMMA: Signals Intelligence Information
i. HCS: HUMINT Control System (a type of Sensitive Compartmented Information- SCI)

j. Downgrading and declassification instructions
not required for every classified document, but must be placed on the face of each document to which they apply. Downgrading instructions shall not be applied to documents containing foreign government information or Restricted Data or Formerly Restricted Data. “Declassify on” line, with instructions concerning the declassification of the information in the document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

101.8 Discuss Original Classification Authority and what organizations have this authority.

A

OCA is the initial determination that information could be expected to cause damage to national security

The authority to classify information originally may be exercised only by:
• the President and the Vice President
• Agency heads and officials designated by the President
• United States Government officials delegated this authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. 13 Define and discuss the following:
    a. Access
    b. Eligibility
    c. Need-to-know
A

a. Access: Given by Command. Access to classified information will be granted only if allowing access will promote the furtherance of the DON mission while preserving the interests of national security.
b. Eligibility: Security Clearance at the level or above the level or classified material. Also, background investigations must be “inscope” of the given security clearance (up to date).
c. Need-to-know: Intrinsic to this discipline is acquiring or disseminating only that information essential to effectively carrying out the assignment. No person shall be deemed to have a need to know solely by virtue of rank, title, or position.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

101.15 Discuss the difference between the SSO and Security Manager.

A

Special Security Officer (SSO) is responsible for the operation (e.g., security, control, use, etc.) of all command Sensitive Compartmented Information Facilities (SCIFs)

Security manager must account for all clearances and access determinations made on members of the command

SSO can be Security Manager, Security Manager shouldn’t be SSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

101.16 Define both a loss and a compromise of classified material, and the steps taken in the event you discover either has occurred.

A

Classified Material is Compromised when it is lost or stolen.

  • Individual: An individual who becomes aware that classified information is lost or compromised shall immediately notify their security manager or commanding officer of the incident, as well as their supervisory chain of command.
  • Commanding Officer: When a loss or compromise of classified information occurs, the cognizant commanding officer or security manager shall immediately initiate a Preliminary Inquiry (PI). NCIS will be notified in case of loss/compromise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

102.1 Define Command and Control

A

Command and Control, commonly, referred to as C2, is the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. 2 Discuss the responsibilities of the following:
    a. Secretaries of the Military Departments:
    b. Chairman Joint Chiefs of Staff:
    c. Component Commanders
A

a. Secretaries of the Military Departments: The Secretaries of the Military Departments exercise administrative control (ADCON) over Service retained forces through their respective Service Chiefs. Organize, Train, Equip
b. Chairman Joint Chiefs of Staff: The CJCS is the principal military advisor to the President, National Security Council, Homeland Security Council, and SecDef.

c. Component Commanders
Service component commander are responsible for all their Service forces, such as individuals, units, detachments, organizations, and installations under that command, including the support forces that have been assigned to a combatant command or further assigned to a subordinate unified command or joint task force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. 3 Define the following:
    a. Combatant Command (CCMD)
    b. Subordinate Unified Command
    c. Joint Task Force (JTF)
    d. Service Components
    e. Functional Components
A

a. Combatant Command (CCMD): A unified or specified command with a broad continuing mission under a single commander established and so designated by the President, through the Secretary of Defense and with the advice and assistance of the Chairman of the Joint Chiefs of Staff.
b. Subordinate Unified Command: A command established by commanders of unified commands, when so authorized by the Secretary of Defense through the Chairman of the Joint Chiefs of Staff, to conduct operations on a continuing basis in accordance with the criteria set forth for unified commands.
c. Joint Task Force (JTF): A joint force that is constituted and so designated by the Secretary of Defense, a combatant commander, a subunified commander, or an existing joint task force commander.
d. Service Components: A command consisting of the Service component commander and all those Service forces, such as individuals, units, detachments, organizations, and installations under that command, including the support forces that have been assigned to a combatant command or further assigned to a subordinate unified command or joint task force.
e. Functional Components: A command normally, but not necessarily, composed of forces of two or more Military Departments which may be established across the range of military operations to perform particular operational missions that may be of short duration or may extend over a period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

102.4 Define the Conflict Continuum and Range of Military Operations and discuss how they interrelate.

A

The range encompasses three primary categories (low to high):
military engagement, security cooperation, and deterrence;

crisis response and limited contingency operations;

and large-scale combat operations.

Conflict continuum: Peace to war

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

102.5 Define the phases of a joint operation.

A
  1. Shape: Plan.
  2. Deter: Protect friendly forces, assets, in preparation for subsequent phases.
  3. Seize Initiative: Offensive and Defensive operations in support of operation. Decisive Action.
  4. Dominate: Break enemy will and control Operational Environment (OE).
  5. Stabilize: Shift from combat operations to stabilizing the OE.
  6. Enable civil authority: Joint force support to legitimize civil governance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

102.6 Identify and describe the missions of the Functional Combatant Commands.

A
  • U.S. Special Operations Command (USSOCOM): USSOCOM’s primary mission is to organize, train, and equip special operations forces (SOF) - MacDill Air Force Base, Tampa, Florida
  • U.S. Strategic Command (USSTRATOM): USSTRATCOM’s primary responsibility is the stewardship and employment of U.S. nuclear weapons and to detect, deter, and prevent attacks - Offutt Air Force Base, Nebraska
  • U.S. Cyber Command (USCYBERCOM): plans, coordinates, integrates, synchronizes, and conducts activities to defend DOD information networks and also conducts cyber space activities to enable U.S. military activities - Fort Meade, Maryland
  • U.S. Transportation Command (USTRANSCOM): Protect transportation vehicles and methods - Scott Air Force Base, Illinois
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

102.6 Identify and describe the missions of the Geographic Combatant Commands.

A
  • U.S. Africa Command (USAFRICOM): All Africa except Egypt. U.S. Central Command maintains its traditional relationship with Egypt, though USAFRICOM coordinates with Egypt on issues relating to Africa security.” - Kelley Barracks, Stuttgart, Germany
  • U.S. Central Command (USCENTCOM): Middle east, Egypt, -MacDill Air Force Base, Tampa, Florida
  • U.S. European Command (USEUROCOM): Europe and Russia. USEUCOM forces constitute the United States military contribution to NATO. The USEUCOM Commander also traditionally serves as the Supreme Allied Commander of NATO (SACEUR). -Patch Barracks, Stuttgart, Germany
  • U.S. Northern Command (USNORTHCOM): All North America, Bahamas, Puerto Rico, stops after Mexico, doesn’t include Cuba, Haiti, Dominican Republic. “USNORTHCOM’s mission is to conduct homeland defense, civil support and security cooperation to defend and secure the United States and its interests. Go out to the surrounding water out to approximately 500 nautical miles. It also includes the Gulf of Mexico, the Straits of Florida, portions of the Caribbean region to include The Bahamas, Puerto Rico, and the U.S. Virgin Islands. The commander of USNORTHCOM is responsible for theater security cooperation with Canada, Mexico, and The Bahamas.” -Peterson Air Force Base, Colorado
  • U.S. Indo-Pacific Command (USINDPACOM): Mongolia, China, India, and Pacific. “USPACOM protects and defends, in concert with other U.S. Government agencies, the territory of the United States, its people, and its interests. USPACOM’s AOR covers half of the earth and is home to three billion people living in three dozen countries with five of these nations being U.S. allies and with many more important economic and security partners. USPACOM’s AOR contains the world’s three largest economies and almost one-third of U.S. twoway trade in goods and services. In addition, much of the world’s trade and energy that fuels the global economy transits Asia’s sea and air lines of communication. -Camp H.M. Smith, Hawaii
  • U.S. Southern Command (USSOUTHCOM): “USSOUTHCOM is responsible for providing contingency planning, operations, and security cooperation for Central and South America, the Caribbean (except U.S. commonwealths, territories, and possessions), Cuba; as well as for the force protection of U.S. military resources at these locations. USSOUTHCOM is also responsible for ensuring the defense of the Panama Canal and canal area.” -Miami, Florida
  • U.S. Space Command (USSPACECOM): United States Space Command (USSPACECOM) conducts operations in, from, and to space -Schriever Space Force Base, Colorado
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
102.8	Identify the Component Commands and their associated supporting Naval entity for the following:  
•	CENTCOM
•	AFRICOM
•	EUCOM
•	NORTHCOM
•	INDOPACOM
•	SOUTHCOM
A
  • CENTCOM - “U.S. Naval Forces Central Command (NAVCENT) - 5th Fleet
  • AFRICOM - U.S. Naval Forces, Africa (NAVAF) - 6th Fleet
  • EUCOM - U.S. Naval Forces Europe (NAVEUR) - 6th Fleet
  • NORTHCOM - U.S. Fleet Forces Command (USFF) - 2nd Fleet / 10 Fleet
  • INDOPACOM - US Naval Forces Indo-Pacific Command (PACFLT) - 3rd (central/east pacific) and 7th Fleet (west pacific)
  • SOUTHCOM - U.S. Naval Forces Southern Command - 4th Fleet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
102.8	Identify the Component Commands and their associated supporting Naval entity for the following:  
•	SOCOM
•	TRANSCOM
•	STRATCOM
•	CYBERCOM
A
  • SOCOM - Naval Special Warfare Command (NSWC) - NSWC consists of Sea, Air, and Land (SEAL) teams that conduct operations in both maritime and ground environments
  • TRANSCOM - Military Sealift Command (MSC) “MSC provides sealift transportation services to deploy, sustain and redeploy U.S. forces around the globe.
  • STRATCOM - Joint Force maritime Component Command (JFMCC): Located in Naval Station Norfolk, VA. The mission of JFMCC is to conduct joint maritime operations to execute the maritime aspects of strategic deterrence.
  • CYBERCOM - Fleet Cyber Command/Tenth Fleet: The mission of Fleet Cyber Command is to serve as central operational authority for networks, cryptologic/signals intelligence, information operations, cyber, electronic warfare, and space capabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

102.9 Define the Decision and Execution Cycle.

A
  1. Observe
  2. Orient
  3. Decide
  4. Act
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. 10 Define the following:
    a. Unity of Effort
    b. Collaborative Planning
    c. Decentralized Control and Execution
    d. Command by Negation
A

a. Unity of Effort: Coordination and cooperation toward common objectives, even if the participants are not necessarily part of the same command or organization, which is the product of successful unified action.

b. Collaborative Planning: Navy commanders are able to conduct planning for the operations at hand with the aid of subordinate and supporting units (as desired), and then provide their orders and intentions to the subordinate commanders and coordinators for execution. The
senior commander will normally leave the details of plan execution to his subordinate commander, but may choose to remain directly involved in some duties.

c. Decentralized Control and Execution: Subordinate commanders and coordinators keep the commanders advised as to the status of operations and resources, allowing the commander to effectively monitor the progress of operations. Subordinate commanders are expected to make autonomous decisions and employ their assigned units and assets as they believe will best accomplish the mission of the force.
d. Command by Negation: Able to proceed until Commander says no. The subordinate is to take the required action without delay, keeping the commander informed of the situation with the expectation that silence is consent. The commander retains the power to negate or modify any particular action, but will do so actively. Note: Command by negation is referred to as command by veto in the North Atlantic Treaty Organization (NATO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. 11 Discuss the CWC concept and purpose, to include the following:
    b. Identify the Warfare Commanders and describe their corresponding responsibilities.
A

Subordinate to the CWC (Composite Warfare Commander) are up to five warfare commanders:

W- Air and Missile Defense Commander (AMDC)
Q- Information Operations Warfare Commander (IWC)
P- Strike Warfare Commander (STCW)
X- Antisubmarine Warfare Commander (ASWC)
S- Surface Warfare Commander (SUWC)
Z- Combines S and X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

102.14 Define and discuss the following:
a. Campaign Plan
b. Operation Plan (OPLAN)
c. Support Plan (SUPPLAN)
d. Concept Plan (CONPLAN)
e. Concept of Operations (CONOPS)
f. Warning Order (WARNORD)
g. Execute Order (EXORD)
h. Operation Order (OPORD)
i. FRAGORD
j. Operational General (message) (OPGEN)
k. Operational Tasking (message) (OPTASK)
l. Daily Intentions Message (DIM)
m. Intelligence Annex
n. Time-Phased Force and Deployment Data (TPFDD)

A

a. Campaign Plan: A joint operation plan for a series of related major operations aimed at achieving strategic or operational objectives within a given time and space.
b. Operation Plan (OPLAN): 1. Any plan for the conduct of military operations prepared in response to actual and potential contingencies. 2. A complete and detailed joint plan containing a full description of the concept of operations, all annexes applicable to the plan, and a timephased force and deployment data.
c. Support Plan (SUPPLAN): an operation plan prepared by a supporting commander, a subordinate commander, or an agency to satisfy the requests or requirements of the supported commander’s plan. For example, the Navy component commander develops a supporting plan as to how NAVFOR will support the joint force commander’s campaign plan or OPLAN.
d. Concept Plan (CONPLAN): an OPLAN in an abbreviated format that requires considerable expansion or alteration to convert it into a complete operation plan or operation order. Often branches and sequels are written in the form of concept plans. As time and the potential allow for executing a particular branch or sequel, these concept plans are developed in detail into OPLANs.
e. Concept of Operations (CONOPS): A verbal or graphic statement that clearly and concisely expresses what the joint force commander intends to accomplish and how it will be done using available resources.
f. Warning Order (WARNORD): a planning directive that describes the situation, allocates forces and resources, establishes command relationships, provides other initial planning guidance, and initiates subordinate mission planning. A warning order is a preliminary notice of an order or action that is to follow. A WARNORD increases subordinates’ planning time, provides details of the impending operation, and lists events that accompany preparation and execution. The amount of detail a WARNORD includes depends on the information and time available when it is issued and the information subordinate commanders need for planning and preparation. Unless specifically stated, a WARNORD does not authorize execution other than planning and the words warning order precede the message text.
g. Execute Order (EXORD): 1. An order issued by the Chairman of the Joint Chiefs of Staff, at the direction of the Secretary of Defense, to implement a decision by the President to initiate military operations. 2. An order to initiate military operations as directed.
h. Operation Order (OPORD): A directive issued by a commander to subordinate commanders for the purpose of effecting the coordinated execution of an operation.
i. FRAGORD: An abbreviated form of an operation order issued as needed after an operation order to change or modify that order or to execute a branch or sequel to that order.
j. Operational General (message) (OPGEN): Maritime-unique formatted message used by both the U.S. Navy and NATO to promulgate general matters of policy and instructions and common aspects of operations; also may include detailed instructions for warfare responsibilities.
k. Operational Tasking (message) (OPTASK): Maritime-unique formatted message used by both the U.S. Navy and NATO to provide detailed information for specific aspects within individual areas of warfare and for tasking resources. This includes logistics, may be issued at all levels above the unit, and may be Navy-wide or focused on a particular theater or strike group.
l. Daily Intentions Message (DIM): an unformatted message with an immediate impact on operations, intended to convey direction from the latest iteration of the commander’s decision cycle. The DIM is issued at operational and tactical levels of command to amplify or modify information contained in orders, OPGENs, OPTASKs, and their supplements.
m. Intelligence Annex: The purpose of annex B (Intelligence) is to provide detailed information/intelligence on the adversary and the operational environment and to provide guidance on intelligence and counterintelligence functions. The intel annex normally provides intelligence preparation of the operational environment products to help further planning and execution. They include such products as the situation template and modified combined obstacle overlay.

n. Time-Phased Force and Deployment Data (TPFDD): The time-phased force data, non-unit cargo and personnel data, and movement data for the operation plan or operation order or ongoing rotation of forces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

103.1 Identify the member organizations of the Intelligence Community and discuss each organization’s role.

A

The intelligence Community is comprised of 18 separate member organizations.

o Office of the Director of National Intelligence (ODNI): Plans / Program / People
The Director of National Intelligence (DNI) has overall responsibility for intelligence support to the President and the day-to-day management of the IC. Specifically, the DNI establishes objectives and priorities for the IC and manages and directs the tasking of national intelligence collection, analysis, production, and dissemination..

o Central Intelligence Agency (CIA): HUMINT and OSINT program manager
o Defense Intelligence Agency (DIA): MASINT program manager
o National Security Agency (NSA): SIGINT program manager
o National Geospatial- Intelligence Agency (NGA): GEOINT program manager
o National Reconnaissance Office (NRO): responsible for integrating unique and innovative space-based reconnaissance technologies
o Army Intelligence (G-2): responsible for policy formulation, planning, programming, budgeting, management, staff supervision, evaluation, and oversight for intelligence activities for the Department of the Army
o Navy: the leading provider of maritime intelligence
o Marine Corps: produces tactical and operational intelligence for battlefield support
o Air Force Intelligence, Surveillance, and Reconnaissance (USAF ISR) Enterprise: America’s leading provider of finished intelligence derived from airborne, space, and cyberspace sensors.
o Space Force Intelligence

o Department of Energy’s Office of Intelligence and Counter-Intelligence: responsible for the intelligence and counterintelligence activities throughout the DOE complex, including nearly 30 intelligence and counterintelligence offices nationwide. The mission is to protect, enable, and represent the vast scientific brain trust resident in DOE’s laboratories and plants
o Department of Homeland Security
 Office of Intelligence and Analysis: responsible for using information and intelligence from multiple sources to identify and assess current and future threats to the U.S. DHS
 U.S. Coast Guard Intelligence: responsibilities include protecting citizens from the sea (maritime safety),
o Department of Justice
 Federal Bureau of Investigation: an intelligence and law enforcement agency, responsible for understanding threats to our national security and penetrating national and transnational networks that have a desire and capability to harm the U.S.

 Drug Enforcement Agency’s Office of National Security Intelligence: responsible for enforcing the controlled substance laws and regulations of the United States.

o Department of State’s Bureau of Intelligence and Research: provides the Secretary of State with timely, objective analysis of global developments as well as real-time insights from all-source intelligence.

o Department of the Treasury’s Office of Intelligence and Analysis: OIA is a component of the U.S. Department of the Treasury’s Office of Terrorism and Financial Intelligence (TFI). TFI marshals the Department’s intelligence and enforcement functions with the twin aims of safeguarding the financial system against illicit use and combating rogue nations, terrorist facilitators, weapons of mass destruction proliferators, money launderers, drug kingpins, and other national security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. 2 Identify and discuss the role of each of the following Naval Intelligence Commands
    a. OPNAV N2/N6
    b. ONI
    c. NAVIFOR
    d. NEIC
A

a. OPNAV N2/N6: Assured Command and Control, Battlespace Awareness, and Integrated Fires. N2/N6E is also known as the Oceanography, Space and Maritime Domain Awareness Directorate.
b. ONI: The “Office of Naval Intelligence (ONI) is the military intelligence agency of the United States Navy. Established in 1882 primarily to advance the Navy’s modernization efforts, ONI is the oldest member of the United States Intelligence Community and serves as the nation’s premier source of maritime intelligence.”
c. NAVIFOR: Naval Information Forces NAVIFOR’s mission is to support operational commanders ashore and afloat by providing combat-ready information warfare forces, which are forward deployable, fully trained, properly manned, capably equipped, always ready, well maintained and combat sustainable.
d. NEIC: Navy Expeditionary Intelligence Command - With multi-intelligence, surveillance and reconnaissance (ISR) collection capabilities operating at the tactical level, NEIC has unique access to areas and environments - from blue to green water, the coastal littoral, and far inland - that are constrained by more traditional ISR assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. 3 Discuss the mission and organization of the following COCOM Intelligence Organizations:
    a. PACOM J2
    b. CENTCOM J2
    c. etc, etc, etc.
A

provide I&W’s and dedicated assessment for COCOM. Ensure PIR’s are met and integrated into collection plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

103.4 Identify the missions of each ONI Center of Excellence.

A
  • Nimitz Operational Intelligence Center: OPINTEL - Global Maritime Intelligence Integration and Maritime Domain Awareness – civilian merchant vessels.
  • Farragut Technical Analysis Center: S&TI analysis of foreign naval capabilities.
  • Kennedy Irregular Warfare Center: products and services to meet Navy, DoD, National, NSW and NECC maritime Irregular Warfare intelligence requirements
  • Hopper Information Services Center: IT systems/data delivery, to the Fleet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. 5 Discuss the roles and responsibilities of the following:
    f. SUPPLOT/EXPLOT
A
  • Supplementary Plot (SUPPLOT): the all-source intelligence fusion center onboard the CVN monitoring the geopolitical situation and foreign military operations within the AO to which a CSG is assigned.
  • Expeditionary Plot: The function of EXPLOT is to gather indications and warning (I&W) information and pass it quickly to the pertinent warfare commander(s). The difference between SUPPLOT and EXPLOT is that EXPLOTs are located on board Expeditionary Platforms (LHDs) while SUPPLOTs are located on carriers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. 5 Discuss the roles and responsibilities of the following:
    j. CAG AI
A

The CVW (Carrier Air Wing) intelligence officer, more commonly known as the “CAG AI”, is the SIO on the CVW staff and is directly responsible for all intelligence support to the strike warfare commander (STWC) and the CVW. The CAG AI is well versed in all aspects of intelligence support to strike aviation and has normally completed an initial tour as a squadron air intelligence officer (AI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. 8 Discuss the missions, functions, tasks, and products of the following analytic groups:
    a. ONI SWORD
    b. ONI SABER
    c. ONI SPEAR
    d. ONI SPECTRUM
    e. ONI FARRAGUT Technical Analysis Center
    f. ONI NIMITZ Geo Cells
A

a. ONI SWORD
Mission: Submarine Warfare Operations Research Division (SWORD) provides all source assessments on foreign submarine and anti-submarine warfare capabilities of selected world navies.

b. ONI SABER
Surface Warfare

c. ONI SPEAR
RED air intel - SPEAR (Strike Projection Evaluation and Anti-Air Warfare Research)

d. ONI SPECTRUM
Cyber/electronic warfare/C4ISR (Command, Control, Communications, Computers, Intelligence,
Surveillance and Reconnaissance)

e. ONI FARRAGUT Technical Analysis Center
The Farragut Center ensures the Navy understands the foreign-force capabilities it is likely to encounter

f. ONI NIMITZ Geo Cells
The Geographically Oriented Cells are teams focused on specific area of interest and provide extensive knowledge to the Naval forces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

104.1 Define Intelligence and discuss the differences of intelligence at each level of war.

A

Intelligence: “the product resulting from the collection, exploitation, processing, integration, analysis, evaluation, and interpretation of available information concerning foreign countries or areas.

  • Strategic Intelligence: required for the formation of policy and military plans at national and international levels. At the strategic level, intelligence is oriented toward national objectives and supports the formulation of policies and determination of priorities. Strategic intelligence focuses first on discerning the capabilities and intentions of potential adversaries as well as considering the strategic intentions of allies and other potential multinational partners. Strategic intelligence plays a central role in identifying an adversary’s center of gravity.
  • Operational Intelligence: required for planning operations within regional theaters or areas of operations. It concentrates on intelligence collection, identification, location, and analysis to support the operational level of warfare, which includes identifying an adversary’s operational critical vulnerabilities. Further, it assists the commander in deciding how best to employ forces while minimizing risk.
  • Tactical Intelligence: required for planning and conducting tactical operations at the component or unit level. It focuses on a potential adversary’s capabilities, his immediate intentions, and the environment. It is oriented more toward combat than long-range planning. Far more than at any other level, tactical intelligence support is the primary focus on naval intelligence.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

104.2 Discuss the difference and relationship between data, information, and intelligence.

A
  • Data is raw inputs that have been gathered-usually in vast quantities.
  • Information is data collected and organized, but has not been fully correlated, analyzed, or interpreted.
  • Intelligence is fully synthesized information that has been applied in support of a mission or objective.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

104.3 Discuss the importance of the intelligence cycle, explaining each phase and the importance of continual evaluation and feedback.

A

The intelligence cycle ensures intelligence products are relevant to the Commander’s requirements. The cycle is broken up into five steps:

  1. Planning and Direction: Commander identifies and prioritizes his information requirements. After doing so, the intelligence officer formulates a collection plan taking into account collection assets available, taking stock of potential intelligence gaps.
  2. Collection: Organic, attached, and supporting collection resources are tasked with intelligence gathering. To be effective, the Intelligence Staff must know the capabilities and limitations of available collection resources, understand the process to obtain additional collection resources, and identify collection resources that can contribute to fulfilling mission requirements.
    • Organic Intel Resources- intel assets or capabilities permanently assigned to a particular command
    • Attached Intel Resources- separate assets attached to the joint force to a support a particular operation or phase of the operation
    • Supporting Intel Resources- resources from another AOR, theater, COCOM, or national organization
  3. Processing and Exploitation: Covert collected information into a form suitable for usable intelligence. Timelines and accuracy are important!
  4. Analysis and Production: Integration, analysis, evaluation, and interpretation of information from all available sources into tailored usable intelligence.
  5. Dissemination and Integration: Provide the right amount of appropriately classified intelligence when, where, and how it is needed. Gather feedback from the Commander or other users to ensure that intelligence requirements are satisfied.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

104.4 Define the categories of intelligence and discuss each category’s focus and purpose.

A

Counterintelligence (CI) CI is information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers

Geospatial Intelligence (GEOINT) is the exploitation and analysis of imagery and geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the Earth

Human intelligence (HUMINT) is a category of intelligence derived from information collected and provided by human sources

Measurement and signature intelligence (MASINT) is intelligence obtained by quantitative and qualitative analysis of data (metric, angle, spatial, wavelength, time dependence, modulation, plasma, and hydromagnetic) derived from specific technical sensors for the purpose of identifying any distinctive features associated with the emitter or sender, and to facilitate subsequent identification and/or measurement of the same

Open-source intelligence (OSINT) is information of potential intelligence value that is available to the general public

Signals intelligence (SIGINT) is defined as: (1) a category of intelligence comprising either individually or in combination all communications intelligence, electronic intelligence, and foreign instrumentation signals intelligence, however transmitted; (2) intelligence derived from communications, electronic, and foreign instrumentation signals
These are under SIGINT:
-COMINT
-ELINT
-----TECHELINT
-----OPELINT
-FISINT

Technical intelligence (TECHINT) is intelligence derived from the collection, processing, analysis, and exploitation of data and information pertaining to foreign equipment and materiel for the purposes of preventing technological surprise, assessing foreign scientific and technical capabilities, and developing countermeasures designed to neutralize an adversary’s technological advantages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

104.5 Discuss the principles of Naval Intelligence and explain their significance in providing effective intelligence support to operations.

A

PUKE-C

  • Know the Adversary- because Naval forces are often the first to respond and deployed overseas, our intelligence must be up on adversaries, terrorist groups, etc at all times.
  • The Commander’s Needs are Paramount- In order to lead an effective fighting force, the Commander must limit uncertainty about the adversary, and ensure Intelligence supports the war effort.
  • Ensure Unity of Intelligence Effort- Clearly stating and prioritizing information requirements are essential. In a joint and/or multinational effort, concise language and planning is essential to ensure unity of effort.
  • Plan for Combat- Naval Intelligence must bridge the gap between a peace-time navy and a navy engaged with the enemy. This requires intelligence forces be continuously assessing the enemy and producing products geared towards combat operations.
  • Use an All-source Approach- the most useful intelligence assessments emerge after a fusion of data from multiple sources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

104.6 Identify the characteristics of intelligence excellence, and discuss some of the challenges that affect the production of intelligence

A

Anticipatory: anticipate commanders needs
Objective: free from bias
Complete: produces sufficient confidence
Accurate: factually correct
Timely: within required timeframes
Usable: in a form that imparts meaning to commander
Relevant: must meet commander’s requirements
Available: readily accessible to commander

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

104.7 Discuss the Navy’s Core Capabilities. Describe the key role intelligence plays in enabling those capabilities.
Navy’s core capabilities and Key Roles of Intelligence

A
  • Forward presence (All Domain Access): ability to project military force in contested areas with sufficient freedom of action to operate effectively (domains: air, space, maritime, land, and information environment). Intelligence supports by identifying threats to domains, typically denial capabilities, and monitors areas for attempts at denial. This is done through analysis on adversary capabilities, COAs, and COGs.
  • Deterrence: action that convinces adversaries that they cannot win the fight or the cost of aggression would be unacceptable. Provided through CSGs, Surface, Subsurface Combatants, and Marine Air-Ground Task Forces (MAGTF). Intelligence supports by developing friendly COAs, identifying COGs vulnerable to deterrence campaigns, and monitors current deterrence ops for response if op fails.
  • Sea control: allows naval forces to establish local maritime superiority while denying the adversary same ability. Essential elements: surface warfare; undersea warfare, strike warfare, mine warfare, air and missile defense, maritime domain awareness (MDA), and ISR. Intelligence supports by identifying probably enemy COAs, locating enemy assets within the operational environment, and determining the adversary’s intent and capabilities to disrupt or deny areas.
  • Power projection: allows conventional strikes against targets ashore, integrated lethal and nonlethal fires against enemy forces, advance force operations, raids, amphibious assaults, seabased fire support to forces ashore in support of NSW and SOF missions. These capabilities are conducted by aircraft carriers, surface combatants, submarines, etc. It is important to note that power projection can also be created through humanitarian assistance and disaster response. Intelligence supports by helping with strike planning (crucial vulnerabilities of COGs and enemy capabilities) and IPOE.
  • Maritime security: ability to protect U.S. sovereignty and maritime resources, support free and open seaborne commerce, and counter weapons proliferation, terrorism, transnational crime, piracy, illegal exploitation of the maritime environment, and unlawful seaborne immigration. Intelligence supports by identifying threats to security and helping with planning to counter those threats. “Intelligence provides actionable intelligence to the common maritime picture (CMP)- common tactical picture (CTP) by fusing information from local, theater, and national intelligence sources into the correlated CMP-CTP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

104.9 List and discuss the four phases of Intelligence Preparation of the Operational Environment (IPOE).

A
  1. Define the maritime operational environment.
  2. Describe the impact of the maritime operational environment.
  3. Evaluate the adversary.
  4. Determine adversary courses of action (COAs).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
  1. 1 Discuss the responsibilities of the following organizations in the collection, production, and dissemination of SIGINT.
    a. National Security Agency
    b. Naval Information Operations Centers
    c. Fleet Information Operations Centers
A

a. National Security Agency- Unified Organization structured to provide for the SIGINT mission of the US and to ensure the protection of the national security systems. Per Executive Order 12333, United States Intelligence Activities, the Director NSA is designated as the functional manager for SIGINT.
b. Naval Information Operations Centers- NIOCs are force providers to both NSA sites and FIOCs under COMTENTHFLT. Personnel assigned to NSA Cryptologic Centers are focused on national and theater-specific missions.
c. Fleet Information Operations Centers- The missions of the FIOCs varies, but typically includes fleet and unit-level cryptologic and/or information operations (IO) and intelligence analysis support, as well as providing fleet direct support personnel to deploying naval units.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

105.2 Discuss the purpose, capabilities, and limitations of SIGINT.

A

SIGINT is intelligence produced by exploiting foreign communications systems and noncommunications emitters. SIGINT provides unique intelligence information, complements intelligence derived from other sources and is often used for cueing other sensors to potential targets of interest. For example, SIGINT which identifies activity of interest may be used to cue GEOINT to confirm that activity. Conversely, changes detected by GEOINT can cue SIGINT collection against new targets. The discipline is subdivided into three subcategories: communications intelligence (COMINT), electronic intelligence (ELINT), and foreign instrumentation signals intelligence (FISINT).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

105.5 Discuss the purpose, capabilities, and limitations of ELINT.

A

ELINT is intelligence derived from the interception and analysis of noncommunications emitters
(e.g., radar). ELINT consists of two subcategories; operational ELINT (OPELINT) and technical ELINT (TECHELINT). OPELINT is concerned with operationally relevant information such as the location, movement, employment, tactics, and activity of foreign noncommunications emitters and their associated weapon systems. TECHELINT is concerned with the technical aspects of foreign noncommunications emitters such as signal characteristics, modes, functions, associations, capabilities, limitations, vulnerabilities, and technology levels. (Source: NWP 2-0)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

105.6 Discuss the purpose, capabilities, and limitations of COMINT.

A

COMINT is intelligence and technical information derived from collecting and processing intercepted foreign communications passed by radio, wire, or other electromagnetic means. COMINT also may include imagery, when pictures or diagrams are encoded by a computer network/radio frequency method for storage and transmission. The imagery can be static or streaming. (Source: NWP 2-0)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

105.9 Discuss the purpose, capabilities, and limitations of FISINT.

A

FISINT involves the technical analysis of data intercepted from foreign equipment and control systems such as telemetry, electronic interrogators, tracking/fusing/arming/firing command systems, and video data links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

105.10 Discuss the purpose, capabilities, and limitations of MASINT.

A

Information produced by quantitative and qualitative analysis of physical attributes of targets and events to characterize, locate, and identify targets and events, and derived from specialized, technically derived measurements of physical phenomenon intrinsic to an object or event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

105.11 Discuss the purpose, capabilities, and limitations of ACINT.

A

Acoustic Intelligence is an intelligence gathering discipline that collects and processes acoustic phenomena. It is a subdiscipline of MASINT (Measurement and Signature Intelligence). As a simple example, narrowband analysis might identify whether a subject of interest has single or multiple propeller shafts; how many blades per shaft and other salients that may help identify the platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

105.12 Discuss the contents, reporting, and timeline requirements for a CRITIC.

A

What is Critical Information?
“Critical information is information concerning possible threats to U.S. national Security that are so significant that they require the immediate attention of the President and the National Security Council. Critical information includes the decisions, intentions, or actions of foreign governments, organizations, or individuals that could imminently and materially jeopardize vital U.S. policy, economic, information systems, critical infrastructure, cyberspace, or military interests. “

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

105.13 Discuss the risk associated with using single source SIGINT.

A

As with any uncorroborated intelligence source, single source SIGINT may prove unreliable or outright deceptive if an adversary is aware that SIGINT collection operations are being conducted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

106.1 Discuss the responsibilities of the following organizations in the collection, production, and dissemination of GEOINT.

A

a. National Geospatial-Intelligence Agency
National Geospatial-Intelligence Agency (NGA) is the functional manager for GEOINT at the national level.
b. National Reconnaissance Organization
The NRO is the U.S. Government agency in charge of designing, building, launching, and maintaining America’s intelligence satellites. Activities include creating the latest innovations in satellite technology, contracting with industrial suppliers, conducting rigorous launch schedules, providing the high-quality products to customers, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

106.2 Discuss the purpose, capabilities, and limitations of GEOINT.

A

Geospatial intelligence (GEOINT) is the exploitation and analysis of imagery and geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the Earth. Geospatial intelligence consists of imagery, imagery intelligence, and geospatial information.
Limitations:
• Collection hinderances (weather, satellite resource availability, terrain- overheads, etc)
• Lack of on-the-ground awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

106.3 Explain the difference between the following types of imagery to include the strengths and weaknesses of each:

A

Sensor/ Phenomenology Acronym Characteristics Examples
Synthetic Aperture Radar SAR
-Illuminates objects with microwave energy pulses. Applies signal processing to a series of pulses to produce a single image.
-Penetrates foliage, material, and ground (with limitations), detects barriers and overhead power lines. Used in most weather, light conditions. Creates a black and white (Grayscale) image.

Infrared IR

  • Uses the infrared portion of the spectrum to detect heat/ radiance
  • Detects presence of living entities and active vehicles and equipment in day or night. May be limited by bad weather/ light conditions, smoke.

Electro-Optical Sensor EO

  • Typically a passive sensor, uses natural energy sources, ultraviolet through infrared portions of EM spectrum.
  • For detailed, literal, photo-like picture of a scene and objects within in.

Full Motion Video FMV

  • Uses many frames per second to create a nearreal-time video capability, which may be displayed as visible or IR and may be recorded by digital or analog means.
  • This near-real time capability allows observation of rapidly developing events and is a valuable tool for ongoing operations. It also provides continuous observation of an object, such as a person or vehicle, to analyze its patterns over long periods.

Hyperspectral Imaging HSI

  • Uses hundreds of visible and infrared bands to provide a greater detail and additional characteristics.
  • Same as multispectral but with greater levels of detail.

Hand Held Imagery/ Photography

  • Simple photograph.
  • A human taking photographs (known as hand-held photography).

Light Detection and Ranging LIDAR

  • Uses laser pulses in the visible and infrared sections of spectrum.
  • See objects beneath vegetation canopy, battlefield visualization.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

106.4 Discuss the risks associated with using single source intelligence for GEOINT.

A

Using GEOINT as a single source of intelligence, similar to other sources, would result in an inaccurate representation of the information and an incomplete picture of conditions on the ground. This is because GEOINT lacks the ability to give high confidence when viewing an image from overhead. Specifically, GEOINT should be used in conjunction with HUMINT or SIGINT to corroborate overhead images of possible targets, battlespaces, places of interest, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

106.5 Discuss the capabilities of GEOINT collection assets:

A

a. National Technical Means
Satellites – Imagery data is collected from space by two satellite sources: Government-owned satellites and private industry-owned satellites, known as commercial systems. U.S. Government satellites are used for both unclassified and classified purposes. Satellites orbit at a far higher altitude than airborne platforms, enabling them to collect above any airspace, including sovereign airspace of any nation, hostile territory, and areas to which airborne platforms are denied access.

b. Airborne Assets: Airborne platforms consist of manned, unmanned, fixed wing, and rotatory aircraft, as well as balloons and dirigibles. The sensors and cameras mounted on airborne platforms can provide continuous (known as persistent) coverage of a location or target.
c. Ground - buildings/poles/vehicles/ppl/ground sensors
d. Sea/ships/buoys/subs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

106.8 Describe the purpose of NGA’s NCO.

A

Non-Combatant Evacuations Operation (NEO) and Contingency Operations (NCO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

106.9 Define NIIRS and discuss the NIIRS scale.

A

(O to 9), with several interpretation tasks or criteria forming each level. These criteria indicate the amount of information that can be extracted from an image at a given interpretability level. With a NIIRS 2 image, for example, analysts should lust be able to detect large buildings, while on NIIRS 6 imagery they should just be able to identify automobiles as sedans or station wagons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

107.1 Discuss the purpose, capabilities, and limitations of FISINT and MASINT.

A

Purpose:
FISINT = machine to machine communication
Can collect everything, limitation is the processing/exploitation side

MASINT = quantitative and qualitative analysis of data derived from specific technical sensors
Can detect things like radiation, far off collection
Requires someone with specialized skills to exploit/understand

Limitations:
• FISINT and MASINT often allow for an overview of an adversary’s capabilities and are therefore more useful in technical analysis rather than operational awareness.
• Due to the restricted access to FISINT and MASINT and the technical “know-how” component of analyzing these types of intelligence, they cannot be disseminated and effectively utilized like simpler forms of intelligence.
• Most of this kind of intelligence is produced after the fact (blast zone of missiles, speed of ballistics, etc). (Source: NWP 2-0)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

107.2 Discuss the responsibility of the following organizations in the collection, production, and dissemination of FISINT and MASINT:

A

a. National Security Agency:
NSA is responsible for FISINT Collection (SIGINT functional manager). Unknown on MASINT.

b. Defense Special Missile and Aerospace Center
The U.S. DoD’s (in collaboration with NSA and NGA) Defense Special Missile and Aerospace Center (DEFSMAC) serves in the forefront of U.S. missile and space intelligence. The Center coordinates the collection of intelligence information on foreign missiles and satellites

c. National Air and Space Intelligence Center - foreign air and space forces, weapons, and systems.
d. Air Force Technical Analysis Center - monitor nuclear treaty compliance, and develops advanced proliferation detection technologies to preserve our nation’s security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

108.1 Identify the Intelligence Community Organizations that support OSINT, to include their roles and functions, and provide examples of the products produced by each.

A

CIA Director: The OSINT functional manager for the IC

DoD: OSINT DoD lead is the Director of DIA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

108.3 Discuss the risks associated with OSINT to include assessing and using it as a single source.

A

Like other types of intelligence, OSINT is susceptible to adversary deception attempts. Incorrect information may be deliberately planted in public sources. OSINT is also subject to source bias and inaccuracy. All-source intelligence should combine, compare, and analyze classified and open source material and attempt to cross-verify information obtained from different sources. In addition, OSINT requires tradecraft in the areas of research expertise and OPSEC for Internetbased activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

109.1 Discuss CIA HUMINT roles and functions.

A

The CIA is the lead HUMINT agency in the intelligence community. It conducts and coordinates espionage activities to meet requirements of the government. It does the following:
• Conducts and coordinates counterintelligence activities ABROAD.
• Conducts and coordinates intel liaison with foreign intelligence and security services on espionage and CI activities.
• Maintains a central index of foreign CI info regarding CI activities abroad.
• Assists other IC components to satisfy cover support requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

109.2 Discuss DIA Defense HUMINT roles and functions.

A

• Conducts CI activities in support of DOD components abroad in coordination with CIA as appropriate.
• Conducts HUMINT operations for the DOD to include:
o Case officers o Strategic debriefers o Interrogators o Field collection officers o Defense attaches o Etc.

61
Q

109.5 Discuss the difference between CI and HUMINT.

A

CI attempts to deny or shape adversary knowledge of friendly forces, while HUMIT shapes our understanding of the adversary

62
Q

109.7 Define and discuss the differences between overt, clandestine, and covert collections.

A

Collection Type - Effects - Sponsor
Overt- Known - Known
Covert - Known - Unknown
Clandestine - Unknown - Unknown

63
Q

109.8 Discuss the difference between tactical questioning and interrogation.

A

TQ is like canvasing, Interrogation is like actual backroom interrogation

• Tactical Questioning: Expedient initial questioning for information of immediate tactical value. It is performed on-scene by members of patrols or any DOD personnel.
o TQ is:
 Gathering information from people.
 An expedited interview in the field.
 Used to gain and exploit time-sensitive information for follow-on missions.
 Always an interview, NOT an interrogation.

• Interrogation: Systematic effort to procure information to answer specific collection requirements by direct and indirect questioning of a person in custody.

64
Q

109.9 List and discuss the five primary HUMINT methodologies.

A
  1. Interrogation – in the field, captured person of interest
  2. Debriefing – someone just came from Iraq, question him at airport
  3. Source operations – source provides cell number of person of interest
  4. Screenings – you have an Iranian student at Columbia university?
  5. Liaison – Jordanian liaison to help you in country
65
Q

109.11 List and discuss the types of HUMINT sources.

A

• A HUMINT source is a person from whom information can be obtained.
• The source may either possess first- or second-hand knowledge normally obtained through sight or hearing.
• Potential HUMINT sources include threat, neutral, and friendly military and civilian personnel.
• Confidence levels are assigned from primary collectors, not assigned analysts.
• Categories of HUMINT sources include but are not limited to:
o Detainees o Refugees
o DPs
o Local inhabitants o Friendly forces
o Members of foreign governmental and non-governmental organizations (NGOs). (Reference: Army Human Intelligence Collector Operations Field Manual, FM 2-22.3)

66
Q

109.13 Explain the following and discuss how each applies to HUMINT operations.

A

a. Intelligence Information Report (IIR): The primary vehicle to provide HUMINT info to the consumer by utilizing a message format structure that supports automated data entry into IC community databases.
• Used across all Intelligence disciplines (HUMINT, SIGNINT, MASINT, etc)
• Follow the same data format
o TD – Tactical Dissemination = What CIA calls their internal IIRs

b. Knowledgeability Briefing (KB): Defense HUMINT service uses the KB to notify customers of refugee, defector, or émigré debriefings.
• Used across all intelligence disciplines

c. IIR Evaluation: Any government agency or uniformed service that wants to provide feedback on IIRs can fill out a standard form to help facilitate future information gathering.
• Example: DHS IIR evaluation program evaluates Defense HUMINT reporting by providing timely and substantive feedback on DHS reporting to consumers.

d. Source Directed Requirement (SDR): specific request directed to a department that can get you the requested information.
• “I need information on x by this date for this purpose.”
• SDR levies requirements tailored to exploit a specific source or collection opportunity.
• Consumers submit them in response to notification of unique opportunities.
• Example: Request information on individual that the Command is meeting with in the future (background information, bio, etc)

e. HUMINT Collection Requirement (HCR): Expansion on one or more of the broad requirements in the National HUMINT Collection Directives (NHCDs). An HCR can support more than one NHCD. They support DOD operational policy formulation, decision-making, planning, and intel production. HCRs provide collectors details that enable them to focus and target collection efforts effectively.
f. Adhoc HUMINT Collection Requirement (AHCR): Enables customers to ID short and medium term requirements on emerging critical issues. Originator must supply rationale to explain the priority and urgency of the request and use of the results. AHCRs cannot exceed 120 days and must be limited in coverage and topical interest.

g. Time-Sensitive Collection Requirement (TSCR): Used to obtain high priority, time-critical information in crisis periods. Requires immediate attention and reporting within 48 hours.
• Requires significant justification for processing.

h. Notice of Intelligence Potential (NIP) A NIP is used to inform the US Intelligence Community of the availability of a source of potential interest and to notify them of what agency has responsibility for questioning that source and where to forward questions and requests for information from that agency.
• Used for deconfliction.

67
Q

109.14 List and discuss the different types of CI activities.

A

o Special operations: involve direct or indirect engagement with Foreign Intelligence Services (FIS) through human source or technical efforts.
 Generally carried out under the auspices of the National Foreign
Counterintelligence Program

o General operations: are usually defensive in nature and are aimed at supporting force protection programs and formal security programs of commanders at all levels.  
	Advice and assistance programs. 
	Technical support activities. 
	Support to acquisition and SAP. 
	Support to intelligence disciplines. 
	Support to treaty verification.
68
Q

110.1 Discuss the following Force Protection Conditions and when they are used at your unit:

A

a. Normal: applies when a general global threat of possible terrorist activity exists and warrants a routine security posture
b. Alpha: applies when there is an increased general threat of possible terrorist activity against personnel or facilities, the nature and extent of which are unpredictable. Alpha measures must be capable of being maintained indefinitely.
c. Bravo: applies when an increased or more predictable threat of terrorist activity exists. Sustaining Bravo measures for a prolonged period may affect operational capability and relations with local authorities.
d. Charlie: applies when an incident occurs or intelligence is received indicating some form of terrorist action or targeting against personnel or facilities is likely. Prolonged implementation of Charlie measures may create hardship and affect the activities of the unit and its personnel.
e. Delta: applies in the immediate area where a terrorist attack has occurred or when intelligence is received that terrorist action against a specific location or person is imminent. Normally, this FPCON is declared as a localized condition. FPCON Delta measures are not intended to be sustained for substantial periods.

69
Q

What is a SPOT Report and what does SALUTE mean?

A

Per JP 1-02: SPOT Report: A concise narrative report of essential information covering events or conditions that may have an immediate and significant effect on current planning and operations that is afforded the most expeditious means of transmission consistent with requisite security.

SALUTE is the acronym that stands for size, activity, location, uniform, time and equipment and is mnemonic device to help remember what to report.

70
Q

110.4 Discuss the terrorism Threat levels:

A

Somalia – best example of high threat level in current environment

a. High: An anti-U.S. terrorist group is operationally active and uses large casualty producing attacks as their preferred method of operation. There is a substantial DOD presence and the operating environment favors the terrorist.
b. Significant: An anti-U.S. terrorist group is operationally active and their preferred method of operation is to attack personnel; or the terrorist group’s preferred method of operation is to execute large casualty producing attacks but has limited operational activity. The operating environment is neutral.
c. Moderate Terrorist groups are present but there is no indication of anti-U.S. activity. The operating environment favors the host nation / United States.
d. Low No terrorist group is detected or the group activity is nonthreatening.

71
Q

110.5 Discuss how Navy CI/HUMINT personnel support AT/FP:

A

NCIS is the Navy’s CI authority

• NCIS initiates, conducts, and directs CI, terrorism and related investigations designed to identify, detect, or neutralize espionage or terrorist planning and activities o Investigations o Interrogations o Etc.

72
Q
  1. 1 Describe the purpose, government legal authorities, and intelligence support to the following:
    a. MIO (Maritime Interception Operations)
    b. EMIO (Expanded Maritime Interception Operation)
    c. Counter Proliferation
    d. Sanctions Enforcement
    e. Homeland Security
    f. Visit, Board, Search, and Seizure (VBSS) Operations
A

a. MIO (Maritime Interception Operations): Efforts to monitor, query, and board merchant vessels in international waters to enforce sanctions against other nations, such as those in support of United Nations Security Council resolutions (UNSCRs) and/or prevent the transport of restricted goods.
• On a US Navy surface combatant, an Anti-terrorism officer will typically be in charge of VBSS (Visit, Board, Search, and Seizure) and MIO/ EMIO.
Note: The U.S. term “maritime interception operations” is not equivalent to the allied term “maritime interdiction operations” though the acronyms are identical. Referenced publication is referring to “maritime interception operations” when using the acronym MIO.

b. EMIO (Expanded Maritime Interception Operation): terrorism related interception ops. Broadened maritime interception operations to intercept targeted personnel or material posing an imminent threat to the U.S.; may involve multinational forces and be implemented without sanctions.
• Authorized by the President and directed by the Secretary of Defense to deter, degrade, and/or disrupt or gather intelligence to prevent attacks against the US and its allies.
• May involve multinational forces or Other Government Agencies (OGAs)

c. Counter Proliferation • Weapons of Mass Destruction Maritime Interdiction (WMDMI):

d. Sanctions Enforcement
• Sanctions Enforcement MIO: Operations against vessels suspected of violating UNSC, national authority, or other regional organizations’ resolutions forbidding the purchase or sale of sanctioned goods.

e. Homeland Security
• Law Enforcement Operations (LEO): as defined under United States Code (U.S.C.) 14 Section 89, provide the USCG statutory authority to make inquiries, examinations, inspections, searches, seizures, and arrests upon the high seas and waters over which the U.S. has jurisdiction for the prevention, detection, and suppression of violations of the laws of the U.S.

f. Visit, Board, Search, and Seizure (VBSS) Operations Maritime operations and TTP designed to:
1. Combat terrorism, piracy, and smuggling.
2. Conduct customs, safety, and other inspections as employed by Navies, marine and maritime services, and military and police forces.
3. Interdict enemy vessels, including the right to approach and visit; stop, board, and search; and seize a vessel and its crew if there is jurisdiction and the authority exists.

73
Q

111.3 Discuss intelligence support to the five phases of MIO:

A

a. Detection & surveillance- ships sensors, P-3’s, overhead monitoring (satellites)
b. Query, approach & stopping- Intel has data on types of ships, best approach, weaknesses, best speed, etc.
c. Board & search- Intel has data on various diagrams of ship’s compartments from manufacturers, historical data on where other similar types of ships had hidden cargo, historical data on the specific ship’s history.
d. Debarkation- Need to get them into port, or higher trained team come in to access
e. Post-boarding-Exploitation of material discovered, logging where contraband was found for future VBSS teams.

74
Q

111.5 Define and discuss how intelligence supports MDA for the following:

A

MDA= maritime domain awareness

Surveillance area > Classification, identification, and engagement area > Vital Area

a. Vital Area (VA): based on enemy strike range.
A designated area or installation to be defended by air defense units. The VA typically extends from the center of a defended asset to a distance equal to or greater than the expected threat’s weapons release range. The intent is to engage legitimate threats prior to them breaching the perimeter of the VA. The size of the VA is strictly a function of the anticipated threat. In some operating environments, such as the littorals, engaging threats prior to their breaching the VA is not possible because operations are required within the weapons release range of potential threats. Preplanned responses should include measures for when contacts are initially detected within the VA.

b. Classification, identification, and engagement area (CIEA): In maritime operations, the area within the surveillance area and surrounding the vital area(s) in which all objects detected must be classified, identified, and monitored; and the capability maintained to escort, cover, or engage. The goal is not to destroy all contacts in the CIEA, but rather to make decisions about actions necessary to mitigate the risk that the contact poses. The CIEA typically extends from the outer edge of the vital area (VA) to the outer edge of where surface forces effectively monitor the operational environment. It is a function of friendly force assets/capabilities and reaction time, threat speed, the warfare commander’s desired decision time, and the size of the VA.
Note: Potential exists for multiple organizations conducting operations within a joint force maritime component commander’s (JFMCC’s) area of operations. To ensure unity of command and unity of effort the JFMCC should ensure common processes and procedures exist for the shifting of tracking across organizational seams.

c. Surveillance area: In surface warfare, the operational environment that equals the force’s ability to conduct a systematic observation of a surface area using all available and practical means to detect any vessel of possible military concern. The dimensions of the surveillance area are a function of strike group surveillance capabilities, sensors, and available theater and national assets.

75
Q
  1. 6 Discuss the following messages sent in support of MIO/VBSS:
    a. After Action Report (AAR)
    b. SHIR (Standard Human Intelligence Report)
    c. IIR (Intelligence Information Report)
    d. Evidence Package
A

a. After Action Report (AAR)
• Upon completion of a boarding, a detailed AAR shall be made, including serial numbers, number of products dispensed, and language of products dispensed. The AAR shall be included in the remarks section of the boarding report. The comments shall include: o A detailed summary of the overall interaction between the vessel master/crew and the Boarding Team Members (BTMs)
o Comments on the master or crewmembers relating to the general attitude towards security in the maritime environment
o Other important information of note or of special concern regarding the master and crew.
• The BO’s remarks shall include observations of unusual conditions, such as:
o A fishing boat with no fishing activity o Unusually large crew size o Well-dressed and out-of-place crewmembers o Any extraordinary nervousness or tension detected.
• Specific requirements and formats for AARs are provided in the AO-specific OPTASK MIO SUPPs.
(Source: NTTP 3-07.11M, VBSS Operations)

b. SHIR (Standard Human Intelligence Report)
• Filed in response to standing intel collection requirements (ICRs), ad hoc ICRs, PIRs/CCIRs (Source: info found on a quizlet online)

c. IIR (Intelligence Information Report)
• The BO is responsible to the CO for completion of the AAR, and if sufficient perishable intelligence information is gathered, an IIR must be included.
• The primary vehicle used to provide HUMINT information to the consumer. It utilizes a message format structure that supports automated data entry into Intelligence Community databases. Also called IIR. (JP 2-01.2) (US DoD)
(Sources: NTTP 3-07.11M, VBSS Operations;
https://www.militaryfactory.com/dictionary/military-terms-defined.asp?term_id=2714)

d. Evidence Package
• Evidence gathering is a critical part of MIO. When a vessel is diverted, an evidence package must be compiled. The CO is responsible for ensuring the package is compiled and completed in a thorough and professional manner. The completed package is sent to the MIOC and will be reviewed by ONI and the judge advocate general. This package will be used by nations that may auction seized vessels. The package is required to be submitted within 72 hours of completing the boarding.
• The evidence package, while required for diverted vessels, is complementary to the information package, which can be compiled for any boarded vessel. BOs should approach all boardings as if an evidence package will be required and gather required elements automatically as they are encountered during the course of the boarding, vice waiting to compile them after a diversion decision has been made. In law enforcement boardings, USCG personnel complete a standard law enforcement case package according to forms and guidance set forth in Appendix G of the USCG MLEM.
(Source: NTTP 3-07.11M, VBSS Operations)

76
Q

111.9 Discuss the mission and capabilities of SNOOPIE Team.

A

SNOOPIE = Ship’s Nautical or Otherwise Photographic Interpretation and Examination

  • Mostly pictures, video only in cases where everything must be recorded. Think adversary warships observing rules of the road in South China Sea.
  • Team is called out whenever there is a “picture worthy” event. Recorder will write down the position of the ship and all pertinent information.
77
Q

111.10 Discuss the purpose and content of OPTASK VI.

A

Operational Task Visual Information (OPTASK VI):
• A coordinated Navy-wide operational tasking message that defines the Navy requirements and procedures for the collection and dissemination of Fleet VI.
• Purpose: to win the battle of the narrative of unsafe and unprofessional interactions by foreign militaries against our maritime vessels.
• OPTASK VI sets a 40-minute goal for transmitting Fleet VI to the appropriate maritime operations center and/or fleet command at the end of an event.
o Nevertheless, a broadcast-quality product at one hour is better than a poor product at 40 minutes. Content, context, and time together are ingredients needed to win the battle of the narrative.
• To effectively integrate content, context, and timing, Fleet VI teams (typically SNOOPIE Teams) need to be trained to capture and transmit still photos with full-motion and high definition videos at sea anytime day or night.
• Some of the training includes capturing video clips that do not exceed 60-seconds in length; these video clips help tell the story of the event.
o They must maintain consistent point-of-view and field-of-view with both ships in frame.
o Video clips should also be sent with at least one photo of the event that can further help detail the story.
o Additional Guidance is provided in SIPRNET on what to report.

78
Q

111.12 Discuss AIS and its importance.

A

• Automatic Information System (AIS) forms part of the Global Maritime Distress and Safety System (GMDSS) which provides a safety net/means of rescue for merchant vessels world-wide
• Transmits, on VHF, information in digital form:
o Vessel Identification o Vessel Location o Vessel Particulars
o SOG and COG (Speed and Course over Ground) o True Heading
o Other useful information (Destination, crew on board, etc) can be programmed in for transmission
o Etc.

• AIS is requirement for all vessels:
o Over 300 tons on international voyages o 500 tons non international
o All passenger ships

79
Q

112.3 Describe the elements of an IADS, to include:

A

Reference not found, but an Integrated Air Defense System (IADS) is a term used to describe the components in a system that that counters an enemy’s airborne threat over friendly territories. It performs three functions- air surveillance, battle management, and weapons control.
Example: S300- high end Russians system (SA-12 missiles)
Air Defense Operations Center (ADOC)= develop national picture of airspace (highest command post in IADS)
a. Sector Operations Center= Develop regional picture of the airspace/ threats
b. Intercept Operations Center= fire control solutions for weapons?
c. Reporting Posts= feed info to Command Posts
d. Command Posts= develop local picture from reporting posts
e. Observation Posts= feed info to Reporting Posts

80
Q

112.6 List and discuss the six-steps of the Joint Targeting Cycle.

A
  1. End state and commander’s objectives.
    • What are we trying to accomplish?
  2. Target development and prioritization.
    • Who are we trying to target?
  3. Capabilities analysis.
    • What does blue have to target them?
  4. Commander’s decision and force assignment.
    • What are we going to use?
  5. Mission planning and force execution.
    • Execute.
  6. Assessment.
    • Did we accomplish the objective?
    • BDA, MEA, Reattack Recommendations
81
Q

112.9 Describe the F3EAD SOF targeting process and intelligence support to that process.

A

Find, fix, finish, exploit, analyze, and disseminate (F3EAD)
• Steps:
o FIND- Locate targets. Intel disciplines (all the INTS) can be used to support it, joint coordination centers and civil affairs and cultural advisors can support as well. Previous exploitation of people, places, and things are also useful.
o FIX- Use resources to keep target in a specific location, or constant tracking of a target to always know their location. Intel ISR assets can accomplish this step.
o FINISH- Conduct desired actions on the target (kill, capture, influence). Intel can help with weapon selection, Battle Damage Assessment (BDA), surveillance of the area, etc. o EXPLOIT- Take advantage of information from people/places/things that have been o Tactical site exploitation teams will yield useful information, questioning, biometrics, forensics, technology.
o ANALYZE- fusing all the exploited information into a usable product. What do I see and what does it mean?
o DISSEMINATE-Push products to audiences that can utilize the intel to further US missions and interests.

82
Q
  1. 10 Discuss the similarities and differences between the following:
    a. Joint Integrated Prioritized Target List (JIPTL)
    b. Restricted Targets List
    c. No-Strike List (NSL)
A

a. Joint Integrated Prioritized Target List (JIPTL): A list of targets from the Target Nomination Lists (TNLs) which are prioritized according to JFC objectives.
Note: The draft JIPTL usually contains more targets than there are resources available to take action on during a given time period. Thus, a draft JIPTL cut line is usually established. This cut line should reflect which targets will most likely have action taken against them.

b. Restricted Targets List
A Restricted target list is a list of validated targets upon which there are target engagement restrictions.

Note: A restricted target is a valid target that has specific restrictions placed on the actions authorized against it due to operational considerations. Actions that exceed specified restrictions are prohibited until coordinated and approved by the establishing headquarters. Attacking restricted targets may interfere with projected friendly operations. Targets may have certain specific restrictions associated with them that should be clearly documented in the ETF (for example, do not strike during daytime, strike only with a certain weapon). When targets are restricted from lethal attacks, commanders should consider nonlethal capabilities as a means to achieve or support the commander’s objectives. However, use of nonlethal capabilities in targeting should not be limited to the case where lethal capability use is restricted.

c. No-Strike List (NSL)
A list of objects or entities characterized as protected from the effects of military operations under international law and/or rules of engagement. List is typically provided by the JFC.

Note: No-strike entities are protected from the effects of military operations under international law and/or the ROE. Attacking these may violate the laws of war (e.g., cultural and religious sites, embassies belonging to noncombatant countries, hospitals, schools) or interfere with friendly relations with other nations, indigenous populations, or governments. NSLs are not target lists, since the entities on the NSLs are not targets. NSLs are continuously updated with the latest information from the operational environment. For more information on no-strike entities and NSLs, see CJCSI 3160.01, No Strike and the Collateral Damage Estimation Methodology.

83
Q

112.13 Define the four outputs from the Assessment step of the Joint Targeting Cycle.

A
  1. Battle Damage Assessment (BDA): BDA measures the effect of target engagements at three levels: the target element level (commonly called phase 1 BDA), the target level (phase 2 BDA), and the target system level (phase 3 BDA).
  2. Munitions effectiveness assessment (MEA): MEA is an element of Combat Assessment as the assessment of the military force applied in terms of the weapons system and munitions effectiveness to determine and recommend any required changes to the methodology,
    tactics, weapon system, munitions, fusing, and/or weapon delivery parameters to increase force effectiveness.
  3. Collateral damage assessment (CDA): (see above section)
  4. Reattack recommendations.
84
Q
  1. 1 Discuss the submarine threat from potential adversary countries in your AOR, with an emphasis on the following areas:
    g. Order of Battle
A

• This would be adversary platforms, capabilities and training, tactics, and procedures (TTPs) for the given geographic OPAREA

85
Q

113.2 Discuss full spectrum ASW.

A
  • Full Spectrum Anti Submarine Warfare was codified in Navy Doctrine in 2005, after it became apparent that sensor-centric (think acoustic detection) approaches to submarine warfare were no longer effective against modern, more quiet submarines.
  • Holistic approach to submarine warfare that focuses on “defeating” a submarine through rendering it irrelevant, rather than “detecting” a submarine, which requires a considerable amount of time, resources, and sometimes luck.
86
Q

113.6 Describe the following types of ASW searches:
Area Search
Barrier Search
Datum Search

A

a. Area Search: Large area search by fixed-wing aircraft for open ocean searches involving areas too large for datum investigation tactics or when insufficient target intel is available for barrier searches.
b. Barrier Search: Line of sensors arranged in a linear pattern perpendicular to suspected contact’s heading.
c. Datum Search: Used to investigate a known/suspected datum or contact point, allowing for factors such as search platform capabilities.

87
Q

113.9 Describe the roles and command and control relationships of the following commands:
Naval Operational Processing Facilities (NOPF)

A

NOPF Dam Neck o Naval Ocean Processing Facility (NOPF) Dam Neck was commissioned in September 1979 and is a tenant command of Commander, Undersea Surveillance, a unit of Submarine Force, U.S. Pacific Fleet.
o As one of the few remaining Integrated Undersea Surveillance (IUSS) facilities, NOPF Dam Neck has become the premier Undersea Surveillance Site, conducting operations throughout the Atlantic Ocean, North Atlantic, and Norwegian Sea.

NOPF Whidbey Island
o The mission of NOPF is to provide timely and accurate acoustic cueing to operating and supporting forces, and conduct continuous maritime surveillance for Homeland Security.
o NOPF is divided into two major divisions that operate in the same facility:
 Shore Side: The shore side has various rates that all support the operations watch floor in completing its mission.
 Sea Side (Sea Component West): The sea side consists of Sonar Technicians (STG’s) that rotate out to the five SURTASS ships that operate under NOPF.

88
Q

113.12 Discuss the difference between mine hunting and mine sweeping.

A

Mine Sweeping:
• Detonation using both mechanical and influence methods.

Mine Hunting:
• The search for mines using magnetic, visual, and sonic means either through the use of divers, unmanned undersea vehicles (UUVs), or hull-mounted and towed instrumentation.

89
Q

113.13 Discuss the difference between mechanical and influence sweeping.

A
  • Influence minesweeping uses acoustic, magnetic, and pressure signals to detonate emplaced mines.
  • Mechanical sweeping uses a towed sled or other type of device to cut the cables of moored mines. These mines then float to the surface and are detonated by other means.
90
Q
  1. 15 Discuss the following counter-sweeping methods and impacts on MCM: 113.16 Discuss the following as they relate to MIW:
    a. Three types of ship damage that can be inflicted by a mine’s detonation:
A

Direct damage
o Usually only created by contact mines, direct damage is a hole blown in the ship.

Bubble jet effect
o The bubble jet effect occurs when a mine or torpedo detonates in the water a
short distance away from the targeted ship.

Shock effect
o If the mine detonates at a distance from the ship, the change in water pressure causes the ship to resonate and shake violently

91
Q
  1. 16 Discuss the following as they relate to MIW:

b. Three primary methods of mine actuation

A

Contact - touched by target
Influence - magnetic/electric field/water pressure
Controlled - triggered remotely

92
Q

113.17 Describe the three minefield categories:

A

a. Offensive: Mines planted in enemy controlled waters (Harbors, territorial waters, Sea Lines of
Communication- SLOCs)
b. Defensive: Laid in neutral/international waters to prevent penetration of defensive positions.
c. Protective: Laid in friendly waters to impede and slow the enemy, providing opportunity for a counterattack, diversion, or early warning of enemy movement.

93
Q

113.19 Discuss offensive and defensive MCM.

A
  • Offensive MCM: To render ineffective one or more of the critical links in the mine laying process- destroying the mines before they can be placed or destroy/disable the enemy’s equipment to lay the mines.
  • Defensive MCM: To defeat existing minefields or reduce the effectiveness of the mines without eliminating them.
94
Q

114.1 List, define, and describe the five core capabilities of IO.

A
Information Operations (IO):  
The integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries while protecting our own. (Source: JP 3-13, Information Operations) 

1) MILDEC (Military Deception): Actions executed to mislead adversary military decision makers as to friendly capabilities, intentions, and operations-forcing the enemy to take actions to aid friendly operations inadvertently.
2) MISO (Military Information Support Operations)/ PSYOP (Psychological Operations): Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motive, reasoning, and ultimately, foreign government behavior.
3) EW (Electronic Warfare): Military action involving the use of electromagnetic and/or directed energy to control the electromagnetic spectrum.
4) OPSEC (Operations Security): IDing critical information and analyzing friendly actions connected to military operations and other activities to eliminate or reduce the risk of enemy exploitation with said information.
5) Cyberspace Ops/ CNO (Computer Network Operations): Hacking enemy networks and defense of our own.

95
Q
114.2 	Describe the IO functions of the following commands: 
NIOC
FIOC
NSA
NCDOC
A

a. National Information Operations Center (NIOC): Provides IO training, support, doctrine development, tactics, techniques, procedures, and manages IO data.

CTF 1050 (NIOC Georgia) - We provide critical support to deployed naval, air, and ground forces operating in the U.S. European and Central Command areas of responsibility. We are continuously focused on real time operations in support of naval, joint, and other forward deployed commanders engaged in military and combat operations.

b. Fleet Information Operations Center (FIOC): Conduct planning and execution of IO to support fleet combatant commanders.
• Reach-Back Support

d. National Security Agency (NSA): the functional manager of SIGINT within the IC Community.
e. Navy Cyber Defense Operations Command (NCDOC): executes defensive cyberspace operations (DCO) and enables global power projection through proactive network defense.

96
Q

114.3 Discuss the organizations responsible for MISO (formerly known as PSYOP).

A

• PSYOP units are assigned within the 1st Special Forces Command of US Army Special Operations Command which falls under US SOCOM.

97
Q

114.5 Discuss the five phases of OPSEC and intelligence support to each:

A

a. Identification of Critical Information: Information vitally needed by the enemy to exploit our operations. How secure are our comms, can overhead ISRs detect our deployment, etc.
b. Analysis of Threats: Identifying the enemy and understanding their motivation, intent and capability-who are they and what can they bring to bear on you and your operations.
c. Analysis of Vulnerabilities: How can your operation expose information not known by your enemies. Can the enemy exploit your communications, can they identify timetables, assets used, etc.
d. Assessment of Risk: Prioritizing your vulnerabilities-what are you willing to risk exposing and why.
e. Application of OPSEC Measures: Put measures and controls in place to reduce the enemy’s ability to exploit your weaknesses in the operation. Weigh the cost of protection vs. the benefits of protection.

98
Q

114.7 Discuss the purpose of MILDEC.

A

• Military deception is used to mislead enemy military decision makers as to friendly capabilities, intentions, and operations.

99
Q

114.8 Discuss the following means of deception:

A

MILDEC Means: MILDEC employs three basic means (physical, technical, and administrative) independently or in collaboration depending on the situation.

a. Physical: Activities and resources used to convey or deny selected information to an adversary.
Includes operational activities and resources such as:
• Movement of forces.
• Exercises and training activities.
• Dummy and decoy equipment and devices.
• Tactical actions.
• Logistics actions, and location of stockpiles and repair facilities.
• Test and evaluation activities.
• Reconnaissance and surveillance activities.

b. Technical: Those military material resources and their associated operating techniques used to convey or deny selected information to an adversary. As with any use of US military material resources, any use of technical means to achieve MILDEC will strictly comply with domestic and international law. A variety of technical means include:
• Deliberate radiation, alteration, absorption, or reflection of energy.
• Emission or suppression of chemical or biological odors.
• Emission or suppression of nuclear particles.
• Multi-media (radio, television, sound broadcasting, or computers).

c. Administrative: Administrative means include resources, methods and techniques designed to convey or deny oral, pictorial, documentary, or other physical evidence

100
Q

114.9 Discuss counter deception.

A

Efforts to negate, neutralize, diminish the effects of, or gain advantage from a foreign deception operation. Counterdeception does not include the intelligence function of identifying foreign deception operations. (Source: JP 1-02)

101
Q

114.10 Discuss the following categories as related to deception tactics:

A

a. Acoustic: Producing sounds in the water to distract/mislead the enemy, sound absorbing tiles on subs.
b. Visual: utilizing camouflage, hiding assets or increasing the quantity of assets with mock ups.
c. Electromagnetic: the deliberate radiation, absorption, or reflection of EM energy to convey misleading information-radar deception.
d. Communications: False communications, misleading information on deployments, etc.

102
Q

114.11 Define cyberspace

A

A global domain within the information environment consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers, characterized by the use of electronics and the EM spectrum to store, modify, and exchange data. (DOD Dictionary. Source: JP 3-12)

103
Q

114.12 Define cyberspace operations (formerly computer network operations).

A

o Offensive Cyber Operations (OCO): Includes actions taken via computer networks to disrupt, deny, degrade, or destroy the information within computers and computer networks and/or the computers/networks themselves.  Operate in “red” space - enemy’s networks

o Defensive Cyber Operations (DCO): Includes actions taken via computer networks to protect, monitor, analyze, detect and respond to network attacks, intrusions, disruptions or other unauthorized actions that would compromise or cripple defense information systems and networks.

o Cyber Exploitation: Includes enabling actions and intelligence collection via computer networks that exploit data gathered from target or enemy information systems or networks.

104
Q

114.13 List and describe the principle organizations involved in cyberspace operations, to include key roles and missions.

A

• Domestic: DHS Cybersecurity and Infrastructure Security Agency (CISA)
 CISA builds the national capacity to defend against cyber attacks and works with the federal government to provide cybersecurity tools, incident response services and assessment capabilities to safeguard the ‘.gov’ networks that support the essential operations of partner departments and agencies.
 For cybersecurity, CISA’s main focus areas include:
• Combatting Cyber Crime and Cyber Incident Response
• Securing Federal Networks, Protecting Critical Infrastructure, and providing Cybersecurity Governance
• Promoting Information Sharing, Training and Exercises, and Cyber Safety information
• Law Enforcement: FBI Cyber Division
 a Federal Bureau of Investigation division which heads the national effort to investigate and prosecute internet crimes, including “cyber based terrorism, espionage, computer intrusions, and major cyber fraud.”
 Uses the information it gathers during investigation to inform the public of current trends in cyber crime.
 Focuses around three main priorities:
• Computer intrusion
Identity theft • Cyber fraud.
• Department of Defense: United States Cyber Command (USCYBERCOM): plans, coordinates, integrates, synchronizes and conducts activities to defend Department of Defense information networks and; prepare to conduct “full spectrum military cyberspace operations” to ensure US/Allied freedom of action in cyberspace and deny the same to adversaries.
o National Security Agency (NSA):
 a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.
o Fleet Cyber Command:
 an operating force of the United States Navy responsible for the Navy’s cyber warfare programs.
 Tenth Fleet is a force provider for Fleet Cyber Command.

105
Q

114.14 List and define the six categories of cyber threats.

A
  1. Traditional-Countries employing traditional military forces to deny use of cyberspace.
  2. Irregular-terrorist- ransomware Use of cyberspace as asymmetric means to counter traditional advantages.
  3. Catastrophic-Use of WMD or methods similar to physically destroy access/use of cyberspace.
  4. Disruptive-Operations to reduce our advantage in warfighting domains.
  5. Natural-Floods, earthquakes, and other disasters
  6. Accidental-Insider accident - Unpredictable accidents and events that damage cyberspace infrastructure.
106
Q

114.15 Define electronic warfare and its three major subdivisions.

A

• Electronic warfare (EW): any action involving the use of the electromagnetic spectrum (EM spectrum) or directed energy to control the spectrum, attack an enemy, or impede enemy assaults.
o Denies the adversary the advantage of, and ensure friendly unimpeded access to, the EM spectrum.
o Can be applied from air, sea, land, and/or space by manned and unmanned systems, and can target humans, communication, radar, or other assets (military and civilian).
o 3 types of EW described below.

• Electronic attack (EA): involves the offensive use of EM energy, directed energy, or antiradiation weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability including human life.
o In the case of EM energy, this action is most commonly referred to as “jamming” and can be performed on communications systems or radar systems.
o In the case of anti-radiation weapons, many times this includes missiles or bombs that can home in on a specific signal (radio or radar) and follow that path directly to impact, thus destroying the system broadcasting.

• Electronic protection (EP): involves actions taken to protect friendly forces (personnel, facilities, and equipment) from any effects of friendly or enemy use of the electromagnetic spectrum that degrade, neutralize, or destroy friendly combat capability (EA).
o EP is the ability to defeat EA

• Electronic warfare support (ES): involves actions taken by an operational commander or operator to detect, intercept, identify, locate, and/or localize sources of intended and unintended radiated electromagnetic (EM) energy.
o Often referred to as Reconnaissance; Intelligence, Surveillance and Reconnaissance (ISR); or Intelligence, Surveillance, Target Acquisition, and Reconnaissance (ISTAR).
o The purpose is to provide immediate recognition, prioritization, and targeting of threats to battlefield commanders.
o Signals intelligence (SIGINT): a discipline overlapping with ES, is the related process of analyzing and identifying intercepted transmissions from sources such as radio communication, mobile phones, radar or microwave communication.
 Three categories: electronic intelligence (ELINT), communications intelligence (COMINT), and foreign instrumentation signals intelligence FISINT. Analysis parameters measured in signals of these categories can include frequency, bandwidth, modulation, and polarization.

107
Q

114.21 Describe River City procedures and how they affect intelligence functions.

A

• River City procedures protect against outgoing information from the ship or installation.

108
Q

114.22 Describe INFOCON procedures and how they affect intelligence functions.

A

• INFOCON= Information Operations Conditions
o Protects against incoming transmissions by restricting certain frequencies, band width, etc.

o NORMAL - Lowest level, normal activity, no significant probability of attack
o ALPHA - Increased probability of attack
 Primary consideration: Consider if any planned/ongoing operation that requires increased security of information systems
o BRAVO - Specific probability of attack
 Primary consideration: Planned/ongoing major military operation or contingency, attempted network penetration or Denial of Service (DoS) that has no current or expected impact on DoD operations
o CHARLIE - Occurrence of limited attacks
 Primary consideration: Limited attack, detected attack(s) on information systems with limited impact to DoD operations
• Limited impact = minimal success of attacker and attack is successfully counteracted with little or no data/systems compromised
o DELTA - Occurrence of general attacks
 Primary considerations: Detected, successful attack(s) on information systems that impact DoD operations, widespread incidents

109
Q
  1. 1 Discuss the mission, structure, and capabilities of the following Naval Expeditionary Combat Command forces:
    a. Explosive Ordinance Disposal (EOD):
    b. Navy Expeditionary Logistics Support Group (NAVELSG)
    c. Navy Expeditionary Intelligence Command
    d. Naval Construction Force (NCF):
A

Navy Expeditionary Combat Command:
• Serves as the single functional command for the Navy’s expeditionary forces and as central management for the readiness, resources, manning, training and equipping of those forces.

a. Explosive Ordinance Disposal (EOD):
• Explosive Ordnance Disposal technicians render safe all types of ordnance (improvised, chemical, biological, and nuclear).
b. Navy Expeditionary Logistics Support Group (NAVELSG)
Provides expeditionary logistic capabilities for the Navy, primarily within the maritime domain of the littorals, and conducts cargo/logistics support and expeditionary communications.
c. Navy Expeditionary Intelligence Command
Provide tactical intelligence, I&W, force protection intelligence, targeting to support expeditionary operations. Tactical ISR.
d. Naval Construction Force (NCF):
• More often known as Navy “Seabees.”
• Provide construction support to military operations, disaster control, and recovery operations- “Can do.”

110
Q

115.2 Describe the Missions and manning of NEIC.

A
  • Navy Expeditionary Intelligence Command (NEIC), falls under Navy Expeditionary Combat Command (NECC)
  • Provides tactical force protection/indications and warning intelligence collection, enabling Navy commanders to conduct missions across the full spectrum of expeditionary operations.
111
Q
  1. 3 Discuss the following:

a. Purpose of a NEO [Executive Summary]

A

An operation whereby noncombatant evacuees are evacuated from a threatened area abroad, which includes areas facing actual or potential danger from natural or manmade disaster, civil unrest, imminent or actual terrorist activities, hostilities, and similar circumstances, that is carried out with the assistance of the Department of Defense.

112
Q

115.4 Describe the purpose of NGA’s NCO.

A

NGA’s Non-Combatant Evacuations and Contingency Operations (NCO) provide a framework and plans for future NEO operations in foreign countries.

113
Q

115.6 Describe the five phases of an amphibious operation and discuss the doctrinal requirements governing intelligence support during the planning and execution of amphibious operations.

A

Five Phases of an Amphibious Assault:
1. Planning: The planning phase normally denotes the period extending from the issuance of an initiating directive that triggers planning for a specific operation and ends with the embarkation of landing forces. However, planning is continuous throughout the operation. Although planning never ends, it is useful to distinguish between the planning phase and subsequent phases because of the change that may occur in the relationship between amphibious force commanders at the time the planning phase terminates and the next phase begins.
• N2- Collect intelligence products
i. Terrain- beach and inbound
ii. Threat analysis: Any sort of threat to ships, aircraft, and lending forces

  1. Embarkation: The embarkation phase is the period during which the landing force with its equipment and supplies, embark in assigned shipping. The landing plan and the scheme of maneuver ashore will influence which staffs and units are embarked on which ships, the number and type of landing craft that will be embarked, and how the units will be phased ashore. The organization for embarkation needs to provide for flexibility to support changes to the original plan. The extent to which changes in the landing plan can be accomplished may depend on the ability to reconfigure embarked forces.
  2. Rehearsal: The rehearsal phase is the period during which the prospective operation is rehearsed to:
    • Test the adequacy of plans, timing of detailed operations, and combat readiness of participating forces.
    • Ensure all echelons are familiar with plans.
    • Test communications and information systems.
    • Provide an opportunity to reconfigure embarked forces and equipment.
    • Note: Rehearsal may consist of an actual landing or may be conducted as a command post exercise.
  3. Movement: The movement phase is the period during which various elements of the amphibious force move from points of embarkation or from a forward-deployed position to the operational area. This move may be via rehearsal, staging, or rendezvous areas. The movement phase is completed when the various elements of the amphibious force arrive at their assigned positions in the operational area.
  4. Action: The action phase is the period from the arrival of the amphibious force in the operational area, through the accomplishment of the mission and the termination of the amphibious operation
114
Q
115.7 	Discuss the composition and purpose of the following groups within a traditional amphibious operation: 
MAGTF
MEF
MEB
MEU
A

b. Marine Air Ground Task Force (MAGTF): Used when Marine Forces are employed as a landing force. The MAGTF is functionally grouped into four core elements: a command element (CE), a ground combat element (GCE), an aviation combat element (ACE), and a logistics combat element (LCE). The basic structure of the MAGTF never varies, but the number, size, and type of Marine Corps units comprising each of the four elements are always mission dependent.

• MEF (Marine Expeditionary Force): A MEF is the largest MAGTF and is the Marine Corps‘ principal warfighting organization o Normally commanded by a lieutenant general.
o A MEF is capable of missions across the full range of military operations, including amphibious assault and sustained operations ashore in any environment.
o It can operate from a sea base, land base, or both. o Typically deploys with more than 45,000 personnel o Up to 60 days of sustainment (DOS).

• MEB (Marine Expeditionary Brigade): A MEB is a mid-sized MAGTF o Usually commanded by a brigadier or major general
o A MEB is capable of rapid deployment via amphibious shipping and intratheater airlift and sealift.
o The MEB can conduct forcible entry operations.
o Comprised of 8,000 to 18,000 Marines.
o It can operate by itself with a capability of 30 DOS.

• MEU (Marine Expeditionary Unit): A MEU is a small MAGTF.
o It is normally commanded by a Marine colonel.
o Its expeditionary warfare capabilities make it extremely useful for crisis response, immediate reaction operations such as NEO, humanitarian assistance, limited objective attacks, raids, and for acting as an advance force for a larger follow-on MAGTF. o Can rapidly deploy via amphibious shipping, by airlift, or any combination thereof. o Does not regularly conduct opposed amphibious operations and can only conduct amphibious operations of limited duration and scope.
o It fulfills the Marine Corps‘ forward, sea-based deployment requirements and deploys with up to 15 DOS.
o Comprised of approximately 2,200 Marines and Sailors.

115
Q

115.8 Define and describe an insurgency.

A

• An insurgency is the organized use of subversion and violence to seize, nullify, or challenge political control of a region. Insurgency can also refer to the group itself (JP 3-24).

116
Q

116.2 List, describe, and provide an example of the nine core SOF mission sets.

A
  1. Special Reconnaissance: Obtaining specific, well-defined, and time-sensitive information when other systems are constrained by weather, hostility, etc. Can include environmental recon, coastal patrol/interdiction, target and threat assessment, and poststrike recon.
  2. Direct Action: Short duration strikes and other small-scale offensive operations by SOF to seize, destroy, capture, or inflict damage on designated material or personnel. Can include raids, ambushes, direct assaults, mine laying, stand-off attacks, or providing terminal guidance for precision weapons, sabotage, or anti-ship operations.
  3. Unconventional Warfare: Includes guerilla warfare, subversion, sabotage, intel activities, evasion, and escape. Can have political/psych objectives (low intensity conflict) or military objectives (supporting conventional operations).
  4. Foreign Internal Defense: Aiding another government in its own protection. Includes organizing, training, equipping, advising, and assisting host nation security forces.
  5. Counterterrorism: Offensive measures taken to prevent, deter, and respond to terrorism.
  6. Counter-proliferation of WMD: Actions taken to seize, destroy, render safe, capture, or recover WMD. SOF supports recon or direct action to do so.
  7. Information Operations: Actions taken to affect enemy information and information systems while defending one’s own. Includes EW, PSYOPS, MILDEC, CNO, and OPSEC.
  8. Psychological Operations (PSYOP): Induces or reinforces foreign attitudes favorable to our objectives by conveying selected information to foreigners to “win hearts and minds.” Propaganda.
  9. Civilian Affairs: Facilitates military operations and consolidates activities by assisting commanders in establishing, maintaining, influencing, or exploiting military/civilian relations.
117
Q

116.3 Describe the F3EAD SOF targeting process and intelligence support to that process.

A

Find, fix, finish, exploit, analyze, and disseminate (F3EAD): provides maneuver leaders at all levels with a methodology that enables them to organize resources and array forces across the range of military operations.

• Steps:
o FIND- Locate targets. Intel disciplines (all the INTS) can be used to support it, joint coordination centers and civil affairs and cultural advisors can support as well. Previous exploitation of people, places, and things are also useful.
o FIX- Use resources to keep target in a specific location, or constant tracking of a target to always know their location. Intel ISR assets can accomplish this step.
o FINISH- Conduct desired actions on the target (kill, capture, influence). Intel can help with weapon selection, Battle Damage Assessment (BDA), surveillance of the area, etc.
o EXPLOIT- Tactical site exploitation teams will yield useful information, questioning, biometrics, forensics, technology.
o ANALYZE- fusing all the exploited information into a usable product. What do I see and what does it mean?
o DISSEMINATE-Push products to audiences that can utilize the intel to further US missions and interests.

118
Q

116.8 Discuss the elements of a Target Intelligence Packages (TIP) for a HVI:

A

a. Biographic summary: Brief biography of the target. It can give insight into habits, help pinpoint locations, and likely courses of actions.
b. Target Significance: Provides insight into the impact of killing, capturing, or neutralizing the target.
c. Reporting highlights: Gives information on recent or significant information concerning the target. It can help verify habits and likely Courses of Action (COAs).
d. Data and imagery of known or assessed historical locations: Bed down, meeting, dining, and worship locations help to determine which location (or transit route between locations) is best to conduct operation.
e. Analysis to determine likely target courses of action: Used to anticipate target reactions to real or perceived threats
f. Identification of Intelligence Indicators and Observations: Help to create pattern of life studies, likely COAs, associates, etc.
g. Collection plan: Identifies what resources, personnel, and time lines are needed for target interrogation, site exploitation, BDA, etc.
h. Latest Time Information Is Of Value (LTIOV) for HVI How long with the TIP be useful before it must be refreshed if an operation must be put on hold for weather, or other concerns.

119
Q

117.5 Discuss the following with regard to CASREPs:

A

a. Purpose:
CASREP= Casualty Report
Submitted when Casualty reduces unit’s ability to perform primary or secondary mission.

b. Categories (CATs):
• 4 – Major degradation to primary mission/total loss
• 3 – Major degradation to primary mission
• 2 – Major degradation to secondary/minor to primary
• 1 – Minor degradation to secondary (not really used in fleet)

c. Procedure for submission
• Goes out on SIPRNet. There is a software application where CASREPs are submitted.
• Message to CNO/fleet commanders reporting malfunction or deficiency which cannot be corrected within 48 hours

d. Timeline:
• INITIAL – First CASREP
• UPDATE (CASUP) – After trying to troubleshoot, something else breaks, new updates
• CORRECT (CASCOR) – Rescind something already sent
• CANCEL (CASCAN) – Cancel entirely (not just a correction)

120
Q

118.2 Discuss the organic collection systems within a CSG/ESG.

A

• F/A-18
o EO/IR

• EA-18
o EO/IR, ES

• MH-60 R/S
o EO/IR, ES
o Sonar
o RADAR-dipping sonar buoy

• SSES (Ships Signals Exploitation Space)
o SIGINT

121
Q
  1. 5 Discuss the following platforms to include primary missions, capabilities, and limitations:
    a. E-2C/D HAWKEYE
A

• Primary Mission: o Airborne Early Warning (AEW) o C2
 “mobile air traffic controller (ATC)”
• Capabilities:
o Radar
o IFF (Identification, Friend/ Foe) o Passive Detection System o Carrier Air Wing o Aerial refueling
• Limitations:
o Crew fatigue
o Slower flight, lower altitudes o No Armament
• Additional Notes:
o D Variant has new Avionics Suite
 AN/APY-9 Radar
 Glass cockpit

122
Q
  1. 5 Discuss the following platforms to include primary missions, capabilities, and limitations:
    b. EP-3E ARIES II
A

• Primary Mission: o ES (Electronic Support) o SIGINT o COMINT
• Capabilities: o 12+ hour endurance and a
3000+ nautical mile range
• Limitations: o Land based o Crew fatigue o Slower flight
o Older flight controls and systems o Less electro optics and IR capability
• Additional Notes: o April 2001: An aerial collision between a Navy EP-3E ARIES II and a PLAN Shenyang J-8II fighter resulted in an international incident between the United States and China. o 2010: Cancellation of the EP-X Program. Navy has planned to replace the EP-3E Aries II with the MQ-4C Broad Area Maritime Surveillance (BAMS) unmanned aircraft and the MQ-8B Fire Scout unmanned helicopter.
o All P-3 Orion aircraft assigned to special projects squadrons (VPU) and all EP-3E Aries II aircraft are expected to fully retire by 2025.

123
Q
  1. 5 Discuss the following platforms to include primary missions, capabilities, and limitations:
    c. P-8A POSEIDON
A

• Primary Mission:
o ASW ISR o ASUW ISR o Shipping Interdiction
• Capabilities: o Sonobuoys o Torpedoes o Depth Charges o Harpoon Anti-ship Missiles o Aerial refueling
o Longer air-time, higher altitudes, and more air time
• Limitations: o Land-based
• Additional Notes:
o Designed to operate in conjunction with MQ-4C Triton

124
Q
  1. 5 Discuss the following platforms to include primary missions, capabilities, and limitations:
    d. P-3C ORION
A
•	Primary Mission: 
o	ASW ISR o ASuW ISR 
•	Capabilities: 
o	MAD Boom (Magnetic 
Anomaly Detector) o Sonobuoys o Torpedoes   o Depth Charges o Harpoon Anti-ship Missiles 
•	Limitations: 
o	Prop-plane= slower 
o	Lower altitude  

• Additional Notes:
o Replaced by P-8

125
Q
  1. 5 Discuss the following platforms to include primary missions, capabilities, and limitations:
    e. E-3A/C AWACS E-3A
A
•	Primary Mission:  
o	Air Force Airborne Early 
Warning (AEW) o C2 
	“mobile air traffic controller (ATC)”  
•	Capabilities: 
o	Long-range scanning radar o IFF (Identification, Friend/ Foe) o Passive Detection System o Aerial refueling  o Larger aircraft, long range 
•	Limitations: 
o	Land-based  o Crew fatigue  
o	No armament
126
Q
  1. 5 Discuss the following platforms to include primary missions, capabilities, and limitations:
    f. EC-130 E/H/J
A

• Primary Mission: o Note: many different
variants used by different services
• Capabilities: o SIGINT collection
o MISO / Civil Affairs
 Broadcasting FM, video, etc o Radar Jamming Pods
o TACAMO- Take Charge and Move Out Capabilities
 For navy= coordinating with Subs o Aerial refueling o High- altitude flights
• Limitations: o Range o Tested to land on a carrier, but not equipped to in regular operations.
o No Armaments

127
Q
  1. 5 Discuss the following platforms to include primary missions, capabilities, and limitations:
    g. J-STARS (E-8 Joint Surveillance Target Attack Radar System)
A

• Primary Mission: o AF C4I System
• Capabilities: o Specialized radar, comms, and
control subsystems
o Jam Resistant Systems o Aerial refueling
• Limitations: o Land-based o No armaments
• Additional Notes: o Militarized 707-300 Aircraft
o It tracks ground vehicles and some aircraft, collects imagery, and relays tactical
pictures to ground and air theater commanders.

128
Q

118.5 Discuss the following platforms to include primary missions, capabilities, and limitations:
RC-12D/H Guardrail

A
  • Primary Mission: o SIGINT Collection
  • Capabilities: o SIGINT antennas o COMINT intercept antennas
  • Limitations: o 5 hour airtime o Slow flight o Low altitude o No armaments
  • Additional Notes: o Typically used by Army in Africa and South America
129
Q
  1. 5 Discuss the following platforms to include primary missions, capabilities, and limitations:
    i. RC-135S/U/V/W
A

• Primary Mission: o SIGINT
• Capabilities: o Collection and analysis o Aerial refueling
• Limitations: o No armaments
• Additional Notes: o Supports on-scene, real time, collection, analysis and dissemination to theater
and national commanders.

130
Q
  1. 5 Discuss the following platforms to include primary missions, capabilities, and limitations:
    j. U-2 Dragon Lady
A

• Primary Mission: o High altitude recon
• Capabilities: o GEOINT o MASINT o SIGINT
o HSI (Hyper-spectral Imagery)
• Limitations: o Crew fatigue
o No armaments

131
Q
  1. 5 Discuss the following platforms to include primary missions, capabilities, and limitations:
    k. EA-18G GROWLER
A
•	Primary Mission:  o Electronic Warfare (EW) 
•	Capabilities: o EA Jamming 
o	Fly ahead of fighters/ bombers to 
jam anti-aircraft radars 
o	Aerial refueling  
•	Limitations: 
o	Crew fatigue
132
Q
  1. 5 Discuss the following platforms to include primary missions, capabilities, and limitations:
    l. RQ-4 GLOBALHAWK
A

• Primary Mission: o Air Force UAV ISR
• Capabilities: o High-Altitude Long Endurance
Platform o SAR (Synthetic Aperture Radar) o EO/IR
• Limitations: o Cost overruns
• Additional Notes: o Controlled from ground station

133
Q
  1. 5 Discuss the following platforms to include primary missions, capabilities, and limitations:
    m. MQ-1 PREDATOR
A

• Primary Mission: o ISR, multi-mission OTH
• Capabilities: o SIGINT
o FMB (full-motion video) o Can carry two AGM-114 Hellfire missiles or other munitions
• Limitations: o Smaller payload o Slower (max speed 135 knots)
• Additional Notes: o Sustainment, no new aircraft being built o Being phased out and replaced by the REAPOR
 REAPOR is bigger, faster ,and can support larger payload packages.
o Controlled from ground station

134
Q
  1. 5 Discuss the following platforms to include primary missions, capabilities, and limitations:
    n. MQ-9 REAPOR
A

• Primary Mission: o ISR, multi-mission OTH o Strike (“Hunter Killer”)
• Capabilities:
o EO/IR
o SAR to enable future GBU-38 Joint Direct Attack Munitions targeting. o Laser range finder/designator= designates targets for employment of laser-guided munitions, such as the Guided Bomb Unit-12 Paveway II. o Can employ four laser-guided, Air-to-Ground Missile (AGM)-114 Hellfire missiles
• Limitations:
o Cost overruns
• Additional Notes: o Significantly larger than the Predator and Gray Eagle o Controlled from ground station

135
Q
  1. 5 Discuss the following platforms to include primary missions, capabilities, and limitations:
    o. SCAN EAGLE
A

• Primary Mission: o Short Range ISR
• Capabilities: o EO/IR Camera o Can be ship launched o Long endurance o Skyhook utilized, no runway
necessary
o Can be controlled from C2 aircraft o Autonomous System
• Limitations: o Low altitude o Range limitations
o Skyhook retrieval system sometimes causes damage to the aircraft

136
Q
  1. 5 Discuss the following platforms to include primary missions, capabilities, and limitations:
    p. BAMS (Broad Area Maritime Surveillance Program) MQ-4 Triton selected to be BAMS program aircraft.
A

• Primary Mission: o UAV ISR
 Calls on the selected airframe to drop to low level to allow the visual identification of naval vessels.
• Capabilities:
o EO/IR
o SAR (Synthetic Aperture Radar) o ISAR (inverse Synthetic Aperture Radar) o AIS (Automatic Identification System) o ELINT
• Limitations:
o N/A

137
Q
  1. 5 Discuss the following platforms to include primary missions, capabilities, and limitations:
    q. MQ-4C TRITON
A

• Primary Mission: o RQ-4 GlobalHawk for the Navy
 Designed slightly different for maritime operations- reinforced airframe and lightning protection
 Can descend through cloud layers and fly lower for maritime surveillance missions
 Different color scheme o BAMS (Broad Area Maritime Surveillance) UAV o Conduct Maritime ISR, owned at theater-level
• Capabilities: o Complement P-8 mission set o SAR
• Limitations: o Cost overruns in the program
o Delay in production due to budgets

138
Q

What are EEI’s?`

A

Essential elements of information (EEI) is any critical intelligence information required by intelligence consumers to perform their mission. The EEI are specific to a particular event, thing, or other target individual. The EEI are written out in advance as questions by consumers of the EEI information.

139
Q

What’s the difference between Title 10 and Title 50?

A

Title 10 describes the legal authority for military operations regarding the DoD’s organizational structure.

Meanwhile, Title 50 captures CIA’s authority to conduct its intelligence operations and covert action.

140
Q

What is Title 22?

A

Title 22 funds are appropriated to the State Department, which often transfers them to DoD, which in turn manages and executes most security assistance programs. Title 22 includes Foreign Military Sales programs.

141
Q

What are the steps of JIPOE

A

Define the Operational Environment
Describe the impact of the operational environment
Evaluate the adversary
Determine adversary COAs

142
Q

What Executive order do you need to know and what is it about?

A

Executive Order 12333 - Intel oversight: Ensure that DoD personnel are not gathering on US persons.

143
Q

PIRs, FFIRs, EEFIs and CCIRs

A

Priority Intelligence Requirements: Hostile Information Threat - Have ships left port?

Friendly force information requirements: friendly forces capabilities - aviation mishap which occurs on the ship

Essential Elements of Friendly Information: property damage due to weather or loss of classified information

Commander’s Critical Information Requirements: info that you would wake up the CO for: is enemy going to attack within the next hour?

144
Q

What is collection management?

A

Mapping requirements to assets that can collect for those requirements. Requesting access/time of those assets to meet the requirements

145
Q

List the theater special ops commands (TSOCs)

A
SOC Central (SOCCENT) - MacDill AFB, Florida
SOC Northern (SOCNORTH) - Peterson AFB, Colorado
SOC Southern (SOCSOUTH) - Homestead AFB, Florida
SOC Europe (SOCEUR) - Patch Barracks, Stuttgart Germany
SOC PACIFIC (SOCPAC) - Camp Smith, Hawaii
SOC Korea (SOCKOR) - Yongsan, Korea
SOC Africa (SOCAFRICA) - Kelley Barracks, Stuttgart Germany
146
Q

List of fleets, their HQs and AORs

A

2nd fleet - Norfolk, VA - North Atlantic/Arctic
3rd fleet - San Diego, CA - East Pacific
4th fleet - Mayport, Florida - South Atlantic
5th fleet - Manama, Bahrain - Middle East
6th fleet - Naples, Italy - Europe, Med Sea and Black Sea
7th fleet - Yokosuka, Japan - West Pacific
10th fleet - Fort Meade, Maryland - Fleet Cyber Command

147
Q

List NIOCs, locations, and what areas they cover

A

NIOC GA - Centcom
NIOC HI - Indopacom
NIOC TX - Southcom
NIOC Whidbey Island - Information Operations missions
NIOC CO - Global intel support, at Buckley Space Force Base
NIOC Pensacola - SIGINT and cyber ops training

148
Q

What makes up a carrier air wing?

A
9 squadrons
F/A 18 - Super hornets
MH-60 Seahawks (helos)
EA-18 Growlers - electronic attack
E-2C Hawkeyes - radar dome
C-2 Greyhounds - transport