Intel Board Flashcards
101.1 Discuss the concept of ORM
101.1 - Used as a framework to increase effectiveness by managing risk -
Is a decision making tool used by personnel at all levels to increase operational
effectiveness by identifying, assessing, and managing risks. It is a 5 step process.
By reducing the potential for loss, the probability of a successful mission is
increased.
* Minimizes risks to acceptable levels, commensurate with mission
accomplishment. Correct application of the ORM process will reduce mishaps
and associated costs resulting in more efficient use of resources.
101.2 Explain the 5-step ORM Process
102.2
a. Identify the Hazards:
A hazard is any condition with the potential to negatively impact mission accomplishment or cause injury, death, or property damage.
b. Assess the Hazards:
For each hazard identified, determine the associated degree of risk in terms of probability and severity.
c. Make Risk Decisions:
There are three basic actions which ultimately lead to making informed risk decisions:
(1) Identifying control options.
(2) Determine the effect of these controls on the hazard or risk.
(3) Decide how to proceed.
d. Implement Controls:
(1) Ensure the plan is clearly communicated to all the involved personnel
(2) Establish Accountability.
(3) Provide Necessary Support.
e. Supervise:
Supervise and review involves determining the effectiveness of risk controls throughout the mission or task.
(1) Monitor the effectiveness of risk controls.
(2) Determine the need for further assessment of all or a portion of the task due to an anticipated change.
(3) Provide feedback- both positive and negative lessons learned.
101.3 Discuss the safefy aspects of the following:
a. Tag-out precautions [ref. b, vol. I, ch. B11]
b. Electrical fires [ref. b, vol. III, ch. C9]
c. First aid for electricity-related injury [ref. b, vol. III, ch. C9]
d. Electronic precautions [ref. b, vol. III, ch. C9]
e. HERO/HERP/HERF [ref. c, ch. 3]
a. Tag-Out Precautions
DANGER DO NOT OPERATE red ags / locks
Notify personnel of equipment out of operation; prevent injury, equipment damage
b. Electrical Fires
Class Charlie Fire
Use carbon dioxide (black on red), dry powder (blue on red), vaporizing foam (green on red) extinguishers
Shut off power to equipment
Starve fire of oxygen
Prevention for electrical fires
Keep equipment clean, maintenance, report problems
c. First Aid for Electrical Shock
Shut off power first
No physical contact until isolated from power source
Non-conductive insulating material to transport
Report casualty/call for medical
Perform CPR
d. Electronic Precautions
Repair equipment w/ circuit deenergized
Unless is an emergenc condiion / COs approal
Warning signs to limit exposure
Cables, antennas can be a shock/burn hazard
e. HERO/HERP/HERF Hazards of Electromagnetic Radiation to ____
Ordnance
Tests conducted at NERF to classify susceptibility to EM radiation
SAFE, SUSCEPTIBLE, UNSAFE
Personnel
Radiation Hazard (RADHAZ) surveys determine RADHAZ distance
Ensure personnel are not exposed to excessive power intensities
Fuel
Potential for accidentally igniting fuel vapors by RF-induced arcs
Fuel handling ops near high-powered radio/radar transmitting antennas
Radiation surveys to determine if hazard exists in fuel handling/fuel areas
101.4 Discuss safety considerations during execution of the Emergency Action Plan.
All personnel involved must be familiar with the tasks associated with emergency destruction. Use personal protective equipment when using an ax or sledge hammer. Station safety observers if time and space permit.
Review local EAP/EDP
Perform ORM steps
Train on procedures annually/semi-annually
Destruction tools could be potential hazards
Shredder, axe/hammer, electrical, etc.
102.2 Define and discuss security classification levels, receipt, custody, document markings, and handling requirements for the following:
a. TOP SECRET, SECRET, CONFIDENTIAL
b. U//FOUO
c. Sensitive Compartmented Information (SCI):
d. Special Access Program (SAP):
e. SPECAT
f. Allied Information/ NATO Control Documents:
g. ACCM [ref. m, encl. 4]
a. Top Secret - exceptionally grave damage
-Pack and Wrap - classification only on inner wrapper, generic title/addresses on outer
-Use Defense Courier Service of DoS Diplomatic Courier Service
-Secret - grave damage , Pack and Wrap, USPS registered (U.S. and U.S. territories)
- Confidential - damage - USPS registered
b. U//FOUO - this information is unclassified, but not to be disseminated freely outside the construct of government operations
c. Sensitive Compartmented Information (SCI) - classified information concerning or derived from intelligence sources, methods, or analytical processes that is required to be handled exclusively within formal access control systems established by the Director of National Intelligence.
d. Special Access Program (SAP) - access requirements that exceed those normally required for information at the same classification level.
e. SPECAT - Special Category messages require strict distribution limitations.
f. Allied Information/ NATO Control Documents - NATO has four levels of classified information: COSMIC TOP SECRET, NATO SECRET, NATO CONFIDENTIAL, and NATO RESTRICTED. Certain NATO information is further classified in a specific category as ATOMAL which can be either RESTRICTED DATA (RD) or FORMERLY RESTRICRED DATA (FRD).
g. ACCM (Alternative Compensatory Control Measures)
–Enforce need-to-know for classified information, where SAP controls not warranted
- 7 Define and discuss how to find authorized document markings and explain the below:
a. NOFORN
b. REL TO USA
c. RELIDO
d. ORCON
e. PROPIN
f. IMCON
g. RSEN
h. GAMMA
i. HCS
j. Downgrading and declassification instructions
Authorized Document Markings will be annotated next to classification Marking.
a. NOFORN- Not Releasable to Foreign Nationals
b. REL TO USA: Release to Distribution to citizens of the countries listed is permitted, providing they have appropriate accesses and need to know. Example: “REL
TO USA, AUS, CAN, GBR, NZL” indicates that the information may be shared with appropriate personnel from Australia, the United Kingdom, Canada, and New Zealand.
• FVEY is the country code used as shorthand for Five Eyes.
c. RELIDO: Releasable by Information Disclosure Official. Indication by classification originator has authorized Designated Intelligence Disclosure Officials (DIDO) to make further sharing decisions in accordance with the existing procedures for uncaveated intelligence material (intelligence with no restrictive dissemination controls).
d. ORCON: Originator controls dissemination and/or release of the document.
e. PROPIN: CAUTION- Proprietary Information Involved. Refers to things like trade secrets which are not classified, but would cause damage to the commercial owner of the data.
f. IMCON: Controlled Imagery. Applies to information that is derived from analytical methodologies that can be associated with (but not restricted to) WMD programs, or issues that if disclosed or released could mollify or measurably reduce the effectiveness of certain sensitive analytical methodologies that are particularly vulnerable to countermeasures
g. RSEN: Risk Sensitive. Term used to protect especially sensitive imaging capabilities and exploitation techniques.
h. GAMMA: Signals Intelligence Information
i. HCS: HUMINT Control System (a type of Sensitive Compartmented Information- SCI)
j. Downgrading and declassification instructions
not required for every classified document, but must be placed on the face of each document to which they apply. Downgrading instructions shall not be applied to documents containing foreign government information or Restricted Data or Formerly Restricted Data. “Declassify on” line, with instructions concerning the declassification of the information in the document.
101.8 Discuss Original Classification Authority and what organizations have this authority.
OCA is the initial determination that information could be expected to cause damage to national security
The authority to classify information originally may be exercised only by:
• the President and the Vice President
• Agency heads and officials designated by the President
• United States Government officials delegated this authority
- 13 Define and discuss the following:
a. Access
b. Eligibility
c. Need-to-know
a. Access: Given by Command. Access to classified information will be granted only if allowing access will promote the furtherance of the DON mission while preserving the interests of national security.
b. Eligibility: Security Clearance at the level or above the level or classified material. Also, background investigations must be “inscope” of the given security clearance (up to date).
c. Need-to-know: Intrinsic to this discipline is acquiring or disseminating only that information essential to effectively carrying out the assignment. No person shall be deemed to have a need to know solely by virtue of rank, title, or position.
101.15 Discuss the difference between the SSO and Security Manager.
Special Security Officer (SSO) is responsible for the operation (e.g., security, control, use, etc.) of all command Sensitive Compartmented Information Facilities (SCIFs)
Security manager must account for all clearances and access determinations made on members of the command
SSO can be Security Manager, Security Manager shouldn’t be SSO
101.16 Define both a loss and a compromise of classified material, and the steps taken in the event you discover either has occurred.
Classified Material is Compromised when it is lost or stolen.
- Individual: An individual who becomes aware that classified information is lost or compromised shall immediately notify their security manager or commanding officer of the incident, as well as their supervisory chain of command.
- Commanding Officer: When a loss or compromise of classified information occurs, the cognizant commanding officer or security manager shall immediately initiate a Preliminary Inquiry (PI). NCIS will be notified in case of loss/compromise
102.1 Define Command and Control
Command and Control, commonly, referred to as C2, is the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission.
- 2 Discuss the responsibilities of the following:
a. Secretaries of the Military Departments:
b. Chairman Joint Chiefs of Staff:
c. Component Commanders
a. Secretaries of the Military Departments: The Secretaries of the Military Departments exercise administrative control (ADCON) over Service retained forces through their respective Service Chiefs. Organize, Train, Equip
b. Chairman Joint Chiefs of Staff: The CJCS is the principal military advisor to the President, National Security Council, Homeland Security Council, and SecDef.
c. Component Commanders
Service component commander are responsible for all their Service forces, such as individuals, units, detachments, organizations, and installations under that command, including the support forces that have been assigned to a combatant command or further assigned to a subordinate unified command or joint task force.
- 3 Define the following:
a. Combatant Command (CCMD)
b. Subordinate Unified Command
c. Joint Task Force (JTF)
d. Service Components
e. Functional Components
a. Combatant Command (CCMD): A unified or specified command with a broad continuing mission under a single commander established and so designated by the President, through the Secretary of Defense and with the advice and assistance of the Chairman of the Joint Chiefs of Staff.
b. Subordinate Unified Command: A command established by commanders of unified commands, when so authorized by the Secretary of Defense through the Chairman of the Joint Chiefs of Staff, to conduct operations on a continuing basis in accordance with the criteria set forth for unified commands.
c. Joint Task Force (JTF): A joint force that is constituted and so designated by the Secretary of Defense, a combatant commander, a subunified commander, or an existing joint task force commander.
d. Service Components: A command consisting of the Service component commander and all those Service forces, such as individuals, units, detachments, organizations, and installations under that command, including the support forces that have been assigned to a combatant command or further assigned to a subordinate unified command or joint task force.
e. Functional Components: A command normally, but not necessarily, composed of forces of two or more Military Departments which may be established across the range of military operations to perform particular operational missions that may be of short duration or may extend over a period of time.
102.4 Define the Conflict Continuum and Range of Military Operations and discuss how they interrelate.
The range encompasses three primary categories (low to high):
military engagement, security cooperation, and deterrence;
crisis response and limited contingency operations;
and large-scale combat operations.
Conflict continuum: Peace to war
102.5 Define the phases of a joint operation.
- Shape: Plan.
- Deter: Protect friendly forces, assets, in preparation for subsequent phases.
- Seize Initiative: Offensive and Defensive operations in support of operation. Decisive Action.
- Dominate: Break enemy will and control Operational Environment (OE).
- Stabilize: Shift from combat operations to stabilizing the OE.
- Enable civil authority: Joint force support to legitimize civil governance.
102.6 Identify and describe the missions of the Functional Combatant Commands.
- U.S. Special Operations Command (USSOCOM): USSOCOM’s primary mission is to organize, train, and equip special operations forces (SOF) - MacDill Air Force Base, Tampa, Florida
- U.S. Strategic Command (USSTRATOM): USSTRATCOM’s primary responsibility is the stewardship and employment of U.S. nuclear weapons and to detect, deter, and prevent attacks - Offutt Air Force Base, Nebraska
- U.S. Cyber Command (USCYBERCOM): plans, coordinates, integrates, synchronizes, and conducts activities to defend DOD information networks and also conducts cyber space activities to enable U.S. military activities - Fort Meade, Maryland
- U.S. Transportation Command (USTRANSCOM): Protect transportation vehicles and methods - Scott Air Force Base, Illinois
102.6 Identify and describe the missions of the Geographic Combatant Commands.
- U.S. Africa Command (USAFRICOM): All Africa except Egypt. U.S. Central Command maintains its traditional relationship with Egypt, though USAFRICOM coordinates with Egypt on issues relating to Africa security.” - Kelley Barracks, Stuttgart, Germany
- U.S. Central Command (USCENTCOM): Middle east, Egypt, -MacDill Air Force Base, Tampa, Florida
- U.S. European Command (USEUROCOM): Europe and Russia. USEUCOM forces constitute the United States military contribution to NATO. The USEUCOM Commander also traditionally serves as the Supreme Allied Commander of NATO (SACEUR). -Patch Barracks, Stuttgart, Germany
- U.S. Northern Command (USNORTHCOM): All North America, Bahamas, Puerto Rico, stops after Mexico, doesn’t include Cuba, Haiti, Dominican Republic. “USNORTHCOM’s mission is to conduct homeland defense, civil support and security cooperation to defend and secure the United States and its interests. Go out to the surrounding water out to approximately 500 nautical miles. It also includes the Gulf of Mexico, the Straits of Florida, portions of the Caribbean region to include The Bahamas, Puerto Rico, and the U.S. Virgin Islands. The commander of USNORTHCOM is responsible for theater security cooperation with Canada, Mexico, and The Bahamas.” -Peterson Air Force Base, Colorado
- U.S. Indo-Pacific Command (USINDPACOM): Mongolia, China, India, and Pacific. “USPACOM protects and defends, in concert with other U.S. Government agencies, the territory of the United States, its people, and its interests. USPACOM’s AOR covers half of the earth and is home to three billion people living in three dozen countries with five of these nations being U.S. allies and with many more important economic and security partners. USPACOM’s AOR contains the world’s three largest economies and almost one-third of U.S. twoway trade in goods and services. In addition, much of the world’s trade and energy that fuels the global economy transits Asia’s sea and air lines of communication. -Camp H.M. Smith, Hawaii
- U.S. Southern Command (USSOUTHCOM): “USSOUTHCOM is responsible for providing contingency planning, operations, and security cooperation for Central and South America, the Caribbean (except U.S. commonwealths, territories, and possessions), Cuba; as well as for the force protection of U.S. military resources at these locations. USSOUTHCOM is also responsible for ensuring the defense of the Panama Canal and canal area.” -Miami, Florida
- U.S. Space Command (USSPACECOM): United States Space Command (USSPACECOM) conducts operations in, from, and to space -Schriever Space Force Base, Colorado
102.8 Identify the Component Commands and their associated supporting Naval entity for the following: • CENTCOM • AFRICOM • EUCOM • NORTHCOM • INDOPACOM • SOUTHCOM
- CENTCOM - “U.S. Naval Forces Central Command (NAVCENT) - 5th Fleet
- AFRICOM - U.S. Naval Forces, Africa (NAVAF) - 6th Fleet
- EUCOM - U.S. Naval Forces Europe (NAVEUR) - 6th Fleet
- NORTHCOM - U.S. Fleet Forces Command (USFF) - 2nd Fleet / 10 Fleet
- INDOPACOM - US Naval Forces Indo-Pacific Command (PACFLT) - 3rd (central/east pacific) and 7th Fleet (west pacific)
- SOUTHCOM - U.S. Naval Forces Southern Command - 4th Fleet
102.8 Identify the Component Commands and their associated supporting Naval entity for the following: • SOCOM • TRANSCOM • STRATCOM • CYBERCOM
- SOCOM - Naval Special Warfare Command (NSWC) - NSWC consists of Sea, Air, and Land (SEAL) teams that conduct operations in both maritime and ground environments
- TRANSCOM - Military Sealift Command (MSC) “MSC provides sealift transportation services to deploy, sustain and redeploy U.S. forces around the globe.
- STRATCOM - Joint Force maritime Component Command (JFMCC): Located in Naval Station Norfolk, VA. The mission of JFMCC is to conduct joint maritime operations to execute the maritime aspects of strategic deterrence.
- CYBERCOM - Fleet Cyber Command/Tenth Fleet: The mission of Fleet Cyber Command is to serve as central operational authority for networks, cryptologic/signals intelligence, information operations, cyber, electronic warfare, and space capabilities
102.9 Define the Decision and Execution Cycle.
- Observe
- Orient
- Decide
- Act
- 10 Define the following:
a. Unity of Effort
b. Collaborative Planning
c. Decentralized Control and Execution
d. Command by Negation
a. Unity of Effort: Coordination and cooperation toward common objectives, even if the participants are not necessarily part of the same command or organization, which is the product of successful unified action.
b. Collaborative Planning: Navy commanders are able to conduct planning for the operations at hand with the aid of subordinate and supporting units (as desired), and then provide their orders and intentions to the subordinate commanders and coordinators for execution. The
senior commander will normally leave the details of plan execution to his subordinate commander, but may choose to remain directly involved in some duties.
c. Decentralized Control and Execution: Subordinate commanders and coordinators keep the commanders advised as to the status of operations and resources, allowing the commander to effectively monitor the progress of operations. Subordinate commanders are expected to make autonomous decisions and employ their assigned units and assets as they believe will best accomplish the mission of the force.
d. Command by Negation: Able to proceed until Commander says no. The subordinate is to take the required action without delay, keeping the commander informed of the situation with the expectation that silence is consent. The commander retains the power to negate or modify any particular action, but will do so actively. Note: Command by negation is referred to as command by veto in the North Atlantic Treaty Organization (NATO).
- 11 Discuss the CWC concept and purpose, to include the following:
b. Identify the Warfare Commanders and describe their corresponding responsibilities.
Subordinate to the CWC (Composite Warfare Commander) are up to five warfare commanders:
W- Air and Missile Defense Commander (AMDC)
Q- Information Operations Warfare Commander (IWC)
P- Strike Warfare Commander (STCW)
X- Antisubmarine Warfare Commander (ASWC)
S- Surface Warfare Commander (SUWC)
Z- Combines S and X
102.14 Define and discuss the following:
a. Campaign Plan
b. Operation Plan (OPLAN)
c. Support Plan (SUPPLAN)
d. Concept Plan (CONPLAN)
e. Concept of Operations (CONOPS)
f. Warning Order (WARNORD)
g. Execute Order (EXORD)
h. Operation Order (OPORD)
i. FRAGORD
j. Operational General (message) (OPGEN)
k. Operational Tasking (message) (OPTASK)
l. Daily Intentions Message (DIM)
m. Intelligence Annex
n. Time-Phased Force and Deployment Data (TPFDD)
a. Campaign Plan: A joint operation plan for a series of related major operations aimed at achieving strategic or operational objectives within a given time and space.
b. Operation Plan (OPLAN): 1. Any plan for the conduct of military operations prepared in response to actual and potential contingencies. 2. A complete and detailed joint plan containing a full description of the concept of operations, all annexes applicable to the plan, and a timephased force and deployment data.
c. Support Plan (SUPPLAN): an operation plan prepared by a supporting commander, a subordinate commander, or an agency to satisfy the requests or requirements of the supported commander’s plan. For example, the Navy component commander develops a supporting plan as to how NAVFOR will support the joint force commander’s campaign plan or OPLAN.
d. Concept Plan (CONPLAN): an OPLAN in an abbreviated format that requires considerable expansion or alteration to convert it into a complete operation plan or operation order. Often branches and sequels are written in the form of concept plans. As time and the potential allow for executing a particular branch or sequel, these concept plans are developed in detail into OPLANs.
e. Concept of Operations (CONOPS): A verbal or graphic statement that clearly and concisely expresses what the joint force commander intends to accomplish and how it will be done using available resources.
f. Warning Order (WARNORD): a planning directive that describes the situation, allocates forces and resources, establishes command relationships, provides other initial planning guidance, and initiates subordinate mission planning. A warning order is a preliminary notice of an order or action that is to follow. A WARNORD increases subordinates’ planning time, provides details of the impending operation, and lists events that accompany preparation and execution. The amount of detail a WARNORD includes depends on the information and time available when it is issued and the information subordinate commanders need for planning and preparation. Unless specifically stated, a WARNORD does not authorize execution other than planning and the words warning order precede the message text.
g. Execute Order (EXORD): 1. An order issued by the Chairman of the Joint Chiefs of Staff, at the direction of the Secretary of Defense, to implement a decision by the President to initiate military operations. 2. An order to initiate military operations as directed.
h. Operation Order (OPORD): A directive issued by a commander to subordinate commanders for the purpose of effecting the coordinated execution of an operation.
i. FRAGORD: An abbreviated form of an operation order issued as needed after an operation order to change or modify that order or to execute a branch or sequel to that order.
j. Operational General (message) (OPGEN): Maritime-unique formatted message used by both the U.S. Navy and NATO to promulgate general matters of policy and instructions and common aspects of operations; also may include detailed instructions for warfare responsibilities.
k. Operational Tasking (message) (OPTASK): Maritime-unique formatted message used by both the U.S. Navy and NATO to provide detailed information for specific aspects within individual areas of warfare and for tasking resources. This includes logistics, may be issued at all levels above the unit, and may be Navy-wide or focused on a particular theater or strike group.
l. Daily Intentions Message (DIM): an unformatted message with an immediate impact on operations, intended to convey direction from the latest iteration of the commander’s decision cycle. The DIM is issued at operational and tactical levels of command to amplify or modify information contained in orders, OPGENs, OPTASKs, and their supplements.
m. Intelligence Annex: The purpose of annex B (Intelligence) is to provide detailed information/intelligence on the adversary and the operational environment and to provide guidance on intelligence and counterintelligence functions. The intel annex normally provides intelligence preparation of the operational environment products to help further planning and execution. They include such products as the situation template and modified combined obstacle overlay.
n. Time-Phased Force and Deployment Data (TPFDD): The time-phased force data, non-unit cargo and personnel data, and movement data for the operation plan or operation order or ongoing rotation of forces.
103.1 Identify the member organizations of the Intelligence Community and discuss each organization’s role.
The intelligence Community is comprised of 18 separate member organizations.
o Office of the Director of National Intelligence (ODNI): Plans / Program / People
The Director of National Intelligence (DNI) has overall responsibility for intelligence support to the President and the day-to-day management of the IC. Specifically, the DNI establishes objectives and priorities for the IC and manages and directs the tasking of national intelligence collection, analysis, production, and dissemination..
o Central Intelligence Agency (CIA): HUMINT and OSINT program manager
o Defense Intelligence Agency (DIA): MASINT program manager
o National Security Agency (NSA): SIGINT program manager
o National Geospatial- Intelligence Agency (NGA): GEOINT program manager
o National Reconnaissance Office (NRO): responsible for integrating unique and innovative space-based reconnaissance technologies
o Army Intelligence (G-2): responsible for policy formulation, planning, programming, budgeting, management, staff supervision, evaluation, and oversight for intelligence activities for the Department of the Army
o Navy: the leading provider of maritime intelligence
o Marine Corps: produces tactical and operational intelligence for battlefield support
o Air Force Intelligence, Surveillance, and Reconnaissance (USAF ISR) Enterprise: America’s leading provider of finished intelligence derived from airborne, space, and cyberspace sensors.
o Space Force Intelligence
o Department of Energy’s Office of Intelligence and Counter-Intelligence: responsible for the intelligence and counterintelligence activities throughout the DOE complex, including nearly 30 intelligence and counterintelligence offices nationwide. The mission is to protect, enable, and represent the vast scientific brain trust resident in DOE’s laboratories and plants
o Department of Homeland Security
Office of Intelligence and Analysis: responsible for using information and intelligence from multiple sources to identify and assess current and future threats to the U.S. DHS
U.S. Coast Guard Intelligence: responsibilities include protecting citizens from the sea (maritime safety),
o Department of Justice
Federal Bureau of Investigation: an intelligence and law enforcement agency, responsible for understanding threats to our national security and penetrating national and transnational networks that have a desire and capability to harm the U.S.
Drug Enforcement Agency’s Office of National Security Intelligence: responsible for enforcing the controlled substance laws and regulations of the United States.
o Department of State’s Bureau of Intelligence and Research: provides the Secretary of State with timely, objective analysis of global developments as well as real-time insights from all-source intelligence.
o Department of the Treasury’s Office of Intelligence and Analysis: OIA is a component of the U.S. Department of the Treasury’s Office of Terrorism and Financial Intelligence (TFI). TFI marshals the Department’s intelligence and enforcement functions with the twin aims of safeguarding the financial system against illicit use and combating rogue nations, terrorist facilitators, weapons of mass destruction proliferators, money launderers, drug kingpins, and other national security threats.