200 EIWS Series Flashcards
Discuss how imagery was first recognized as an advantage in battle:
American Civil War from 1861 - 1865
State the primary imagery systems on CVN/LHD/LHA
DCGS-N (Distributed Common Ground System - Navy)
State the first imaging system to provide all weather, near real time imagery
KH-11
Define the mission and responsibility of the following TYCOMs (AIRFOR/SURFOR/CYBERFOR)
AIRFOR - man, train, equip and maintain Naval Air Force that immediately employable, forward deployed and engaged.
SURFOR - Commander Naval Surface Force, US Pacific Fleet (COMNAVSURFPAC) is comprised of surface ships, and support and maintenance commands, provides operational commands with well-trained, highly effective, and tech superior surface ship and Sailors.
CYBERFOR - Navy Type Commander (TYCOM) for cryptologic/signals Intelligence, Cyber electronic warfare, information operations, intelligence, networks and space.
Discuss the operational chain of command from the level of elements to the Fleet Commander using Task Force Organization designator (OPCON)
USS BONHOMME RICHARD -> PHIBRON 11 -> CTF76 -> C7F -> PACFLT
State the function of the following departments within a staff (ADCON)
N0 - Commander N1 - Manpower and Personnel / Manpower Management N2 - Naval Intelligence N3 - Operations N4 - Logistics N5 - Plans and Policy N6 - Communications N7 - Training N8 - Capabilities and Resources / Comptroller N9 - Strategic Planning
State the role of N2/N6 with respect to ref (a)
TYCOM - in its TYCOM role CYBERCOM provides systems and trained personnel and the support to both to effectively operate, maintain, and defend the Navy’s information networks
State and discuss the mission of (CVN/LHD)
CVN - US Navy power projection: Furthering the efforts and objectives of US diplomacy, sustainability and endurance, speed, air strike capability
LHD - Multi-purpose Amphibious Assault ships are the largest amphibious ships in the world. LHD mission is to conduct prompt, sustained, combat operations at sea, as a part of the Navy’s amphibious strategy.
Identify the IDC work centers onboard a LHD
SESS - Ships Signals Exploitations Space
JIC - Joint Intelligence Center
IPIC - Imagery Production Intelligence Center
XPOLT - Expeditionary Plot
ADP - Automated Data Processing
METOC - Meteorology and Oceanographic
CIC - Combat Information Center (Only because the AN/SLQ 32(V)3 is manned by CTTs in CIC)
RADIO
Define the following (SIO/ASIO/EWO/SIWO/CSIO/CSO/CSMO/ADPO)
SIO - Ships Intelligence Officer
ASIO - Assistant Ships Intelligence Officer
EWO - Electronic Warfare Officer
SIWO - Ships Information Warfare Officer
CSIO - Combat Systems Information Officer
CSO - Combat Systems Officer
CSMO - Combat Systems Maintenance Officer
ADPO - Automated Data Processing Officer
Explain the adjudication process to include (Investigations/Appeals/LOI/LOD/JCAVS)
Investigation - start of the adjudication process once completed SF-86 is received by DONCAF
Appeals - Can be made in person or in writing the Personnel Security Appeals Board (PSAB)
LOI - Letter of intent; issued to a member with the intent to revoke a security determination. Member will have 15 days to issue a response and appeal within 30 days.
LOD - Letter of Denial; issue by DODCAF upon determination that member’s security clearance and access to classified materials, member can appeal within 30 days of the appeal
JCAVS - Joint Clearance Access Verification System; Also referred to as JPAS, used to verify current members access to classified materials
Discuss JIC integration with the following (CIC/TAO/Weather)
CIC - Provides fused analysis, via organic and non-organic intelligence, on tracking data of red forces via GCCS-M in support of indications and warning for the ship and readiness group/strike group
TAO - Provides immediate threat indications and warning from organic and non-organic fused analysis via Fleet Information Warfare Officer
EW - Uses ELINT derived from SLQ-32 fused with non-organic sensors to correlate/identify tracks
Weather Office - Monitors environmental conditions affecting the battlegroup and provides data to use weather for possible tactical advantage. Provide forecasts of radar effectiveness and acoustic propagation conditions to aid in optional positioning and use of accompanying ships and aircraft.
SESS - Cryptologic operations play a key role in supporting naval expeditionary operations. Naval cryptologic personnel, afloat and ashore, employ tactical sensor systems that provide the commander time-sensitive combat information and an adversary composition, disposition, locations and intent.
Describe the three imaging systems and type of imagery they provide:
EO (Electro-Optical) - Detects reflected Electromagnetic energy and requires an illumination source (i.e. Sun or artificial light) to detect useful information; similar to a human eye requiring a light source to see; affected by weather conditions; day use only; black and white imagery.
IR (Infrared) - Imagery produced as a result of Electromagnetic radiations emitted or reflected from a given target surface (ex. Warmer objects appear darker than color objects) affected by weather conditions; day/night use.
RADAR (SAR) - Detects the presence of objects and determines their location by using radio waves; can operate at day/night; used in all weather conditions.
Describe the purpose of the Image Product Library (IPL):
Used to story, query, and retrieve imagery to support individual organizations.
Describe the purpose of the Precision Targeting Workstation (PTW):
Strike analyst use for targeting purposes
Define the following acronyms (IPIPR/IPL/IMINT/NGA/PTW/DCGS-N)
IPIPR (Initial Photo Interpretation Report)
IPL (Image Product Library) - used to store, query, and retrieve imagery to support individual organizations
IMINT (Imagery Intelligence) - A gather discipline which collects information via satellite and aerial photography
NGA (National Geospatial Agency) - Provides geospatial intelligence in support of national security
PTW (Precision Targeting Workstation) - strike analyst use for targeting
DCGS-N (Distributed Common Ground System - NAVY) program provides the Navy’s primary intelligence, surveillance, reconnaissance and targeting (ISR&T) support capability. Afloat or ashore, DCGS-N tools are critical for operational commander’s battlespace awareness and net-centric operations.
State the first attempt to satisfy requirements for a space-based satellite imaging system:
KH-4 CORONA
CIA’s first attempt to satisfy requirements for a space-based satellite imaging system
Electro-Optical (EO) reconnaissance satellite
Discuss the roles and responsibilities of the following organizations (NGA/NRO/NSG).
NGA (National Geospatial Agency) - Provides timely, relevant and accurate geospatial intelligence in support of nation security. Fulfills POTUS national security priorities to protect the nation.
NRO (National Reconnaissance Office) - Builds and operates US Reconnaissances satellites for the US government and provides satellite intelligence to several government agencies; mainly supports NSA, NGA, and DIA.
NSG (National Support for Geospatial Intelligence) - The technology, policies, capabilities, doctrine, activities, data and people needed to produce Geospatial intelligence; overseen by NGA.
Discuss the phases of imagery exploitation
First Phase - (Bean Counting): Time dominant; exploitation of newly acquired imagery within a specified time from receipt.
Second Phase - (Pattern Analysis): Non-time dominant; detailed exploitation of imagery scheduled within the bounds of analytic requirements and timelines of need.
Third Phase - (Predictive Analysis): In depth, long range analysis; most detailed reports; timeliness not bounded and typically exceed one week after receipt of imagery.
Discuss the importance of Full Motion Video:
STRENGTHS:
- Allows the intel community to discern patters of life and behaviors associated with people and the networks they operate in which often leads to an opportunity to conduct a raid
WEAKNESS:
- Massive amount of data
- Hours of video that may not be used
- Mis-interpretation of data
Discuss the importance of UAVs:
- Unmanned Aerial Vehicle
- Also known as a drone
- Unpiloted and or remotely piloted
- Use primarily for military and special operation missions; may also be used in civil applications
Define and discuss the following Geospatial tools and systems (IPL and NIL)
IPL (Image Product Library) - local storage and archive for afloat/shore units; users can access and pull imagery into their own workstations; smaller version of the NIL
NIL (National Image Library) - central repository for all imagery
Define and discuss grid systems and coordinates used on different maps and charts:
Geographic coordinates
State the procedures for sanitizing a SCIF for un-cleared visitors
- Turn off all SCI and or SECRET monitors
- Secure classified information
- Remain vigilant and advise cleared personnel using common areas not to discuss classified material
- Stay with visitor and keep “eyes on” at all times
- Ensure visitor is logged and appropriate badge is issued
- Ensure all badges are returned to appropriate office when visitor departs
Discuss the Navy’s policy on PED within classified spaces.
Not authorized within SCIF or Secure Areas (i.e. Radio, ADP, CIC)
Explain Security Challenge Procedures
Immediately upon noticing a person with the proper badge displayed or escort present, escort individual out of space an report to Command Security Manager (CSM - ??) and SSO
Define the following classification designation/release ability statements, handling and storage:
Top Secret - Info if released would cause exceptionally grave damage to national security
Secret - Info if released would cause serious damage to national security
Confidential - Info if released would cause damage to national security
NATO - Info relation to NATO
CMFC - Info pertaining to Combined Maritime Forces Command
FVEY - Classification representing FIVE EYES
ACGU - Classification representing FOUR EYES
Sensitive But Unclassified: info not classified but could cause harm
FOUO - Info that is unclas but could impact OPSEC
PII - Personally Identified Information
NOFORN - Info not to be share with foreign nationals
Controlled Unclassified Information
Unclassified- No classified information
State the responsibility of the person discovering a compromise or suspected compromise.
Notify Command Security Manager. If it is believed that either of those persons are involved, the individual shall report it to the next higher person
Define/discuss the following terms: (Access/Compromise/Personal For/Physical Security)
Access: the ability and opportunity to obtain knowledge or possession of classified information
Compromise: Exposure of classified information to an unauthorized person
Personal For: a message or information that has specific recipient
Physical Security: measures taken to preclude unauthorized access to a mechanism/facility/information
Discuss the requirement for transporting classified materials
Personnel must have a valid courier card or courier letter on hand in order to transport information. Proper wrapping should be verified with SSO prior to transporting any information
State the reasons a Security Clearance could be revoke or suspend:
- Reoccurring pattern of questionable judgment
- Emotionally unstable behavior
- Dishonorable discharge
- Unreported financial problems
- Using unlawful controlled substances
- Mentally incompetent
- Convicted of a crime in U.S. Courts and consequently serve one year incarcerated
Discuss the procedures for creating classified working papers.
- Must be dated when created and marked with working papers
- Must be marked with highest classification
- Must be protected as a finished document at the same classification
- Must be destroyed when no longer needed
- Control and mark as final document when sent from BHR, retained for more than 90 days from date of origin, or filed permanently
State the requirements for storage, control, safeguarding of each classification level of material.
- Sensitive compartmented information
- TOP Secret
- SECRET
- SECRET
- CONFIDENTIAL
State how to properly dispose of the following
SCI hard drives
GENSER hard drives
UNCLASSIFIED hard drives
State the purpose of an SF86
Questionnaire for National Security Positions; background investigation to determine suitability for sensitive positions
Discuss the procedures for the following
- Destruction of burn bags that contain classified material: depends on the classification level of the bag
- Destruction of classified CD/DVDs: CD shredder
- Reporting a security violation or compromise: Report to Supervisor, CMS, SSO, Self-reporting
- Unofficial foreign travel while holding a SCI clearance: Conducted by SSO and noted in file
- SAER (Security Access Eligibility Report) report incidents via JPAS
What is the Navy Mobile Diving and Salvage?
Conduct harbor clearance operations in rivers, harbors and coastal areas providing diving services to surface ships.
What is an Explosive Ordnance Disposal?
The primary mission is to disarm and render safe any explosive devices, conventional or improvised.
What is the MEU?
Provides a forward deployed flexible Sea Based Marine Air Ground Task Force (MAGTF) capable of conducting Expeditionary Operations, Military Operations Other Than War (MOOTW) and other supporting operations as required
What is Navy Special Warfare?
Designated naval warfare specialty that conducts operations in the coastal, riverine, and maritime environments. These operations are characterized by stealth, speed, and precise, violent application of force.
What is a high priority target?
A target the enemy commander requires for the successful completion of the mission.
What is a high pay off target?
A target who’s loss to the enemy will significantly contribute to the success of the friendly course of action.
What are the eight categories of cultural?
- Racial Background
- Country of origin
- Religious belief
- Type of work
- Family Values
- Age Group
- Gender issues
- Other common interest factors
What is the mission and function of EMIO?
Expanded Maritime Interdiction Operations - EMIO broadens VBSS operations to intercept targeted personnel or material that poses an imminent threat to thee Unite States.
What are the types of amphibious operations?
Amphibious Assault Amphibious Raid Amphibious Demonstration Amphibious Withdrawal Amphibious Support to other operations
What are the types of SECDEF, CJCS, COCOM orders?
OPLAN - operational plan OPORD - Operational order WANORD - Warning Order PLANORD - Planning Order EXORD - Executing Order CONPLAN - Contingency Plan
What are the planning phases of amphibious operations?
Mission Analysis COA - Course of action Development COA war-game COA comparison Decision; Orders development Transition
What is the mission & function of maritime interception operations (MIO)?
MIO is a military mission that can be used across the spectrum of military operations from peacetime to international armed conflict. Ex. Sending armed boarding parties to visit merchant ships bound to, through, or out of a defined area
What are the advantages and disadvantages of amphibious warfare?
Advantages:
- Reduce risk to amphibious task force ships
- Simplified air defense
- Reduced mine threat to amphibious task force ships
Disadvantages:
- Extended vulnerability of landing craft
- Lost or reduced availability of naval surface fire support
- Greater susceptibility to sea state
State the parent agency responsible for each intelligence discipline
a) HUMINT – DIA (Defense Intelligence Agency)
b) SIGINT – NSA (National Security Agency)
c) IMINT – NGA (National Geo-Spatial Intelligence Agency)
State what types of intelligence U.S. Navy ships can collect and exploit.
a) CG / DDG / LPD – SIGINT
b) CVN – IMINT, SIGINT
c) LHD / LHA – IMINT, SIGINT
State one example of intelligence collection platform for the following
a) Tactical imagery – SHARP Pod
b) National – Satellite
Explain why Intelligence Oversight was established
The need for a Department of Defense (DoD) Intelligence Oversight (IO) program came about as a result of certain activities conducted by DoD intelligence and counter-intelligence units against U.S. persons involved in the Civil Rights and anti-Vietnam War movements. During the 1960s and 1970s, the United States experienced significant civil demonstrations from protesters associated with these movements. Some of these demonstrations were believed to be beyond the ability of civilian authorities to control, and military forces were used to assist in the restoration of order. Units deploying for this purpose discovered they needed basic pre-deployment intelligence to perform their missions. The Army, designated as executive agent for providing aid to civilian authorities, requested assistance from the Federal Bureau of Investigation (FBI). When the FBI was unable to provide the information needed, the Army began collecting it. Over time, this collection mushroomed and led to abuse of the Constitutional rights of our citizens. Eventually, DoD intelligence personnel were using inappropriate clandestine and intrusive means to collect information on the legitimate political positions and expressions of U.S. persons, accumulating that information in a nationwide data bank, and sharing that information with law enforcement authorities.
Explain who to report questionable intelligence activity to
According to Procedure 15 of DoD 5240.1-R, one reports what they believe is a questionable intelligence activity to any of the following: your supervisor, (any) intelligence oversight officer, commander, unit legal advisor (either the judge advocate general or general counsel) and/or your unit’s inspector general. Although we prefer that you use your chain of command, this is not always practical. In those situations, you may contact either the Assistant to the Secretary of Defense for Intelligence Oversight or the DoD General Counsel’s office directly.
Describe the purpose and applicability of the Intelligence Oversight Program
Applies to all DON intelligence components and governs all intelligence activities undertaken by personnel assigned to those components. This instruction also applies to non-intelligence personnel, engaged in any intelligence activity (e.g., collection, research, analysis, production, retention, dissemination), as well as all other DON components and personnel when that component conducts intelligence and/or intelligence-related activities.
Describe the purpose of the following publications: (USSID SP0009, USSID SP0018, and USSID SP0018 Annex A)
a) USSID SP0009 (ref. d) Exception to disseminate SIGINT on host nation
b) USSID SP0018 (ref. e) Exception to disseminate SIGINT in reference to a US Person
c) USSID SP0018 Annex A (ref. c) Legal Compliance
Describe the Task Force structure established during HUMANITARIAN ASSISTANCE / DISASTER RELIEF (HA/DR)
Joint Task Force
o The Joint Task Force organization for HA/DR is similar to traditional military organizations with a commander, command element and mission-tailored forces. However the nature of HA/DR usually results in combat support and combat service support forces serving more prominent roles than combat elements.
Describe how the following intelligence disciplines play a role in conducting HA/DR
- HUMINT -Primary Collection Means
- IMINT - Secondary Collection Means
- OSINT- Used to determine host nation’s agendas and patterns of operation
Describe the capabilities of U.S. Navy shipboard assets as it pertains to HA/DR
Expeditionary Strike Groups (ESG) - Provide health services where members are brought aboard.
Carrier Strike Groups (CSG) - Airlift Support
Hospital Ships - USNS Mercy and USNS Comfort provide 12 operating rooms and 1,000 beds etc.
State the purpose of METOC in supporting the HA/DR mission
Joint forces depend on timely, accurate, and reliable METOC information to plan and direct HA/DR operations.
Describe the four Maritime Operations Center readiness levels
- Policy Level - President/SECDEF/Joint Staff
- Strategic Level - Combatant Commander
- Operational Level - Naval Combatant Commander/Fleet Commander
- Tactical Level - Carrier Strike Group/Expeditionary Strike Group
Define the purpose of EXPLOT
All-source intelligence plot (Fusion Center). ). EXPLOT on a LHD monitors the geopolitical situation, provides I&W support to the flag plot and CIC, and updated situation information to mission planning on a regular basis..
Define BMD and state the purpose of BMD missions worldwide (provide example)
BMD is Ballistic Missile Defense. Strategic positioning of point defense capable assets to detect, engage, and destroy ballistic missiles launched by hostile nations and organizations. Example: The announced deployment of four Aegis-equipped US Naval vessels to Rota, Spain, in 2013.
What comprises a CSG and ESG
A carrier strike group (CSG) is typically comprised of one CSG staff, one aircraft carrier (CVN), one air wing (CVW), and one destroyer squadron (DESRON). Each of the organizations maintains it’s own intelligence structure. If a requirement exists that a flag or general officer command an ARG/MEU, the formation is referred to as an expeditionary strike group (ESG), which includes an embarked flag or general officer and their associated command element (CE) staff. Regardless of the Service orientation of the commander, the CE consists of both Navy and Marine Corps personnel. Additional surface combatants may or may not be assigned to an ARG/MEU or ESG.
Define the EXPLOT watch positions. (SICOR/NOA/RDBM/FIWO/CASE)
a) SICOR/BFCA – Signals Intelligence CORelator/Battle Force COMINT Analyst: Analyzes Communications Intelligence (Rate: CTR)
b) NOA/BFEA – National Opelint Analyst/Battle Force ELINT Analyst: Analyzes Electronic Intelligence (Rate: CTT)
c) RDBM – Red DataBase Manager; Track/manage foreign military contact/track data. The analyst will operate the GCCS workstation, managing the database of forces, and maintain a manual plot. (Rate: IS)
d) FIWO – Fleet Intelligence Watch Officer; Responsible for overseeing and managing all intelligence activities within EXPLOT. (Rate: IS)
e) CASE – Cryptologic Augmentation Support Element; provides analysts to fill SICOR/NOA/NODAL Analysis (optional position) positions in EXPLOT. Also serves as oversight of cryptologic and electronic warfare operations of the ESG/ARG under the cryptologic resource coordinator. (Rate: CTR)
Explain the purpose of the CWC doctrine.
It enables the officer in tactical command (OTC) to wage combat operations against air, surface, and subsurface threats, while carrying out the primary mission of the force. (Command by negation)
State the Navy’s Counter-piracy Task Force.
CTF-151
Explain the difference between the levels of intelligence:
a) Strategic – National strategic intelligence is produced for the President, Congress, SECDEF, senior military leaders, and the CCDRs. It is used to develop national strategy and policy, monitor the international situation, prepare military plans, determine major weapon systems and force structure requirements, and conduct strategic operations.
b) Operational – Used to describe intelligence support to theater operational forces.
c) Tactical – Focuses on combat intelligence, which is used by commanders, planners, and operators for planning and conducting battles, engagements, and special missions.
Define and discuss OPINTEL and the intelligence cycle
Intelligence required for planning and conducting campaigns and major operations to accomplish strategic objectives within theaters or areas of operations. The process of gathering, evaluating, and using intelligence is known as the intelligence cycle. The cycle consists of 5 phases. (Planning and direction, collection, processing, production, and dissemination)
List and describe the Intelligence Disciplines used by OPINTEL Analysts and what do they provide.
ELINT (electronic intelligence), COMINT (communications intelligence), ACINT (acoustic intelligence), HUMINT (human intelligence), IMINT (imagery intelligence)
Describe the difference between Information and Intelligence.
Intelligence is processed information, meaning that several pieces of information are needed to be able to produce credible, reliable intelligence.