Intel Board Flashcards
101.1 Discuss the concept of ORM
101.1 - Used as a framework to increase effectiveness by managing risk -
Is a decision making tool used by personnel at all levels to increase operational
effectiveness by identifying, assessing, and managing risks. It is a 5 step process.
By reducing the potential for loss, the probability of a successful mission is
increased.
* Minimizes risks to acceptable levels, commensurate with mission
accomplishment. Correct application of the ORM process will reduce mishaps
and associated costs resulting in more efficient use of resources.
101.2 Explain the 5-step ORM Process
102.2
a. Identify the Hazards:
A hazard is any condition with the potential to negatively impact mission accomplishment or cause injury, death, or property damage.
b. Assess the Hazards:
For each hazard identified, determine the associated degree of risk in terms of probability and severity.
c. Make Risk Decisions:
There are three basic actions which ultimately lead to making informed risk decisions:
(1) Identifying control options.
(2) Determine the effect of these controls on the hazard or risk.
(3) Decide how to proceed.
d. Implement Controls:
(1) Ensure the plan is clearly communicated to all the involved personnel
(2) Establish Accountability.
(3) Provide Necessary Support.
e. Supervise:
Supervise and review involves determining the effectiveness of risk controls throughout the mission or task.
(1) Monitor the effectiveness of risk controls.
(2) Determine the need for further assessment of all or a portion of the task due to an anticipated change.
(3) Provide feedback- both positive and negative lessons learned.
101.3 Discuss the safefy aspects of the following:
a. Tag-out precautions [ref. b, vol. I, ch. B11]
b. Electrical fires [ref. b, vol. III, ch. C9]
c. First aid for electricity-related injury [ref. b, vol. III, ch. C9]
d. Electronic precautions [ref. b, vol. III, ch. C9]
e. HERO/HERP/HERF [ref. c, ch. 3]
a. Tag-Out Precautions
DANGER DO NOT OPERATE red ags / locks
Notify personnel of equipment out of operation; prevent injury, equipment damage
b. Electrical Fires
Class Charlie Fire
Use carbon dioxide (black on red), dry powder (blue on red), vaporizing foam (green on red) extinguishers
Shut off power to equipment
Starve fire of oxygen
Prevention for electrical fires
Keep equipment clean, maintenance, report problems
c. First Aid for Electrical Shock
Shut off power first
No physical contact until isolated from power source
Non-conductive insulating material to transport
Report casualty/call for medical
Perform CPR
d. Electronic Precautions
Repair equipment w/ circuit deenergized
Unless is an emergenc condiion / COs approal
Warning signs to limit exposure
Cables, antennas can be a shock/burn hazard
e. HERO/HERP/HERF Hazards of Electromagnetic Radiation to ____
Ordnance
Tests conducted at NERF to classify susceptibility to EM radiation
SAFE, SUSCEPTIBLE, UNSAFE
Personnel
Radiation Hazard (RADHAZ) surveys determine RADHAZ distance
Ensure personnel are not exposed to excessive power intensities
Fuel
Potential for accidentally igniting fuel vapors by RF-induced arcs
Fuel handling ops near high-powered radio/radar transmitting antennas
Radiation surveys to determine if hazard exists in fuel handling/fuel areas
101.4 Discuss safety considerations during execution of the Emergency Action Plan.
All personnel involved must be familiar with the tasks associated with emergency destruction. Use personal protective equipment when using an ax or sledge hammer. Station safety observers if time and space permit.
Review local EAP/EDP
Perform ORM steps
Train on procedures annually/semi-annually
Destruction tools could be potential hazards
Shredder, axe/hammer, electrical, etc.
102.2 Define and discuss security classification levels, receipt, custody, document markings, and handling requirements for the following:
a. TOP SECRET, SECRET, CONFIDENTIAL
b. U//FOUO
c. Sensitive Compartmented Information (SCI):
d. Special Access Program (SAP):
e. SPECAT
f. Allied Information/ NATO Control Documents:
g. ACCM [ref. m, encl. 4]
a. Top Secret - exceptionally grave damage
-Pack and Wrap - classification only on inner wrapper, generic title/addresses on outer
-Use Defense Courier Service of DoS Diplomatic Courier Service
-Secret - grave damage , Pack and Wrap, USPS registered (U.S. and U.S. territories)
- Confidential - damage - USPS registered
b. U//FOUO - this information is unclassified, but not to be disseminated freely outside the construct of government operations
c. Sensitive Compartmented Information (SCI) - classified information concerning or derived from intelligence sources, methods, or analytical processes that is required to be handled exclusively within formal access control systems established by the Director of National Intelligence.
d. Special Access Program (SAP) - access requirements that exceed those normally required for information at the same classification level.
e. SPECAT - Special Category messages require strict distribution limitations.
f. Allied Information/ NATO Control Documents - NATO has four levels of classified information: COSMIC TOP SECRET, NATO SECRET, NATO CONFIDENTIAL, and NATO RESTRICTED. Certain NATO information is further classified in a specific category as ATOMAL which can be either RESTRICTED DATA (RD) or FORMERLY RESTRICRED DATA (FRD).
g. ACCM (Alternative Compensatory Control Measures)
–Enforce need-to-know for classified information, where SAP controls not warranted
- 7 Define and discuss how to find authorized document markings and explain the below:
a. NOFORN
b. REL TO USA
c. RELIDO
d. ORCON
e. PROPIN
f. IMCON
g. RSEN
h. GAMMA
i. HCS
j. Downgrading and declassification instructions
Authorized Document Markings will be annotated next to classification Marking.
a. NOFORN- Not Releasable to Foreign Nationals
b. REL TO USA: Release to Distribution to citizens of the countries listed is permitted, providing they have appropriate accesses and need to know. Example: “REL
TO USA, AUS, CAN, GBR, NZL” indicates that the information may be shared with appropriate personnel from Australia, the United Kingdom, Canada, and New Zealand.
• FVEY is the country code used as shorthand for Five Eyes.
c. RELIDO: Releasable by Information Disclosure Official. Indication by classification originator has authorized Designated Intelligence Disclosure Officials (DIDO) to make further sharing decisions in accordance with the existing procedures for uncaveated intelligence material (intelligence with no restrictive dissemination controls).
d. ORCON: Originator controls dissemination and/or release of the document.
e. PROPIN: CAUTION- Proprietary Information Involved. Refers to things like trade secrets which are not classified, but would cause damage to the commercial owner of the data.
f. IMCON: Controlled Imagery. Applies to information that is derived from analytical methodologies that can be associated with (but not restricted to) WMD programs, or issues that if disclosed or released could mollify or measurably reduce the effectiveness of certain sensitive analytical methodologies that are particularly vulnerable to countermeasures
g. RSEN: Risk Sensitive. Term used to protect especially sensitive imaging capabilities and exploitation techniques.
h. GAMMA: Signals Intelligence Information
i. HCS: HUMINT Control System (a type of Sensitive Compartmented Information- SCI)
j. Downgrading and declassification instructions
not required for every classified document, but must be placed on the face of each document to which they apply. Downgrading instructions shall not be applied to documents containing foreign government information or Restricted Data or Formerly Restricted Data. “Declassify on” line, with instructions concerning the declassification of the information in the document.
101.8 Discuss Original Classification Authority and what organizations have this authority.
OCA is the initial determination that information could be expected to cause damage to national security
The authority to classify information originally may be exercised only by:
• the President and the Vice President
• Agency heads and officials designated by the President
• United States Government officials delegated this authority
- 13 Define and discuss the following:
a. Access
b. Eligibility
c. Need-to-know
a. Access: Given by Command. Access to classified information will be granted only if allowing access will promote the furtherance of the DON mission while preserving the interests of national security.
b. Eligibility: Security Clearance at the level or above the level or classified material. Also, background investigations must be “inscope” of the given security clearance (up to date).
c. Need-to-know: Intrinsic to this discipline is acquiring or disseminating only that information essential to effectively carrying out the assignment. No person shall be deemed to have a need to know solely by virtue of rank, title, or position.
101.15 Discuss the difference between the SSO and Security Manager.
Special Security Officer (SSO) is responsible for the operation (e.g., security, control, use, etc.) of all command Sensitive Compartmented Information Facilities (SCIFs)
Security manager must account for all clearances and access determinations made on members of the command
SSO can be Security Manager, Security Manager shouldn’t be SSO
101.16 Define both a loss and a compromise of classified material, and the steps taken in the event you discover either has occurred.
Classified Material is Compromised when it is lost or stolen.
- Individual: An individual who becomes aware that classified information is lost or compromised shall immediately notify their security manager or commanding officer of the incident, as well as their supervisory chain of command.
- Commanding Officer: When a loss or compromise of classified information occurs, the cognizant commanding officer or security manager shall immediately initiate a Preliminary Inquiry (PI). NCIS will be notified in case of loss/compromise
102.1 Define Command and Control
Command and Control, commonly, referred to as C2, is the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission.
- 2 Discuss the responsibilities of the following:
a. Secretaries of the Military Departments:
b. Chairman Joint Chiefs of Staff:
c. Component Commanders
a. Secretaries of the Military Departments: The Secretaries of the Military Departments exercise administrative control (ADCON) over Service retained forces through their respective Service Chiefs. Organize, Train, Equip
b. Chairman Joint Chiefs of Staff: The CJCS is the principal military advisor to the President, National Security Council, Homeland Security Council, and SecDef.
c. Component Commanders
Service component commander are responsible for all their Service forces, such as individuals, units, detachments, organizations, and installations under that command, including the support forces that have been assigned to a combatant command or further assigned to a subordinate unified command or joint task force.
- 3 Define the following:
a. Combatant Command (CCMD)
b. Subordinate Unified Command
c. Joint Task Force (JTF)
d. Service Components
e. Functional Components
a. Combatant Command (CCMD): A unified or specified command with a broad continuing mission under a single commander established and so designated by the President, through the Secretary of Defense and with the advice and assistance of the Chairman of the Joint Chiefs of Staff.
b. Subordinate Unified Command: A command established by commanders of unified commands, when so authorized by the Secretary of Defense through the Chairman of the Joint Chiefs of Staff, to conduct operations on a continuing basis in accordance with the criteria set forth for unified commands.
c. Joint Task Force (JTF): A joint force that is constituted and so designated by the Secretary of Defense, a combatant commander, a subunified commander, or an existing joint task force commander.
d. Service Components: A command consisting of the Service component commander and all those Service forces, such as individuals, units, detachments, organizations, and installations under that command, including the support forces that have been assigned to a combatant command or further assigned to a subordinate unified command or joint task force.
e. Functional Components: A command normally, but not necessarily, composed of forces of two or more Military Departments which may be established across the range of military operations to perform particular operational missions that may be of short duration or may extend over a period of time.
102.4 Define the Conflict Continuum and Range of Military Operations and discuss how they interrelate.
The range encompasses three primary categories (low to high):
military engagement, security cooperation, and deterrence;
crisis response and limited contingency operations;
and large-scale combat operations.
Conflict continuum: Peace to war
102.5 Define the phases of a joint operation.
- Shape: Plan.
- Deter: Protect friendly forces, assets, in preparation for subsequent phases.
- Seize Initiative: Offensive and Defensive operations in support of operation. Decisive Action.
- Dominate: Break enemy will and control Operational Environment (OE).
- Stabilize: Shift from combat operations to stabilizing the OE.
- Enable civil authority: Joint force support to legitimize civil governance.
102.6 Identify and describe the missions of the Functional Combatant Commands.
- U.S. Special Operations Command (USSOCOM): USSOCOM’s primary mission is to organize, train, and equip special operations forces (SOF) - MacDill Air Force Base, Tampa, Florida
- U.S. Strategic Command (USSTRATOM): USSTRATCOM’s primary responsibility is the stewardship and employment of U.S. nuclear weapons and to detect, deter, and prevent attacks - Offutt Air Force Base, Nebraska
- U.S. Cyber Command (USCYBERCOM): plans, coordinates, integrates, synchronizes, and conducts activities to defend DOD information networks and also conducts cyber space activities to enable U.S. military activities - Fort Meade, Maryland
- U.S. Transportation Command (USTRANSCOM): Protect transportation vehicles and methods - Scott Air Force Base, Illinois
102.6 Identify and describe the missions of the Geographic Combatant Commands.
- U.S. Africa Command (USAFRICOM): All Africa except Egypt. U.S. Central Command maintains its traditional relationship with Egypt, though USAFRICOM coordinates with Egypt on issues relating to Africa security.” - Kelley Barracks, Stuttgart, Germany
- U.S. Central Command (USCENTCOM): Middle east, Egypt, -MacDill Air Force Base, Tampa, Florida
- U.S. European Command (USEUROCOM): Europe and Russia. USEUCOM forces constitute the United States military contribution to NATO. The USEUCOM Commander also traditionally serves as the Supreme Allied Commander of NATO (SACEUR). -Patch Barracks, Stuttgart, Germany
- U.S. Northern Command (USNORTHCOM): All North America, Bahamas, Puerto Rico, stops after Mexico, doesn’t include Cuba, Haiti, Dominican Republic. “USNORTHCOM’s mission is to conduct homeland defense, civil support and security cooperation to defend and secure the United States and its interests. Go out to the surrounding water out to approximately 500 nautical miles. It also includes the Gulf of Mexico, the Straits of Florida, portions of the Caribbean region to include The Bahamas, Puerto Rico, and the U.S. Virgin Islands. The commander of USNORTHCOM is responsible for theater security cooperation with Canada, Mexico, and The Bahamas.” -Peterson Air Force Base, Colorado
- U.S. Indo-Pacific Command (USINDPACOM): Mongolia, China, India, and Pacific. “USPACOM protects and defends, in concert with other U.S. Government agencies, the territory of the United States, its people, and its interests. USPACOM’s AOR covers half of the earth and is home to three billion people living in three dozen countries with five of these nations being U.S. allies and with many more important economic and security partners. USPACOM’s AOR contains the world’s three largest economies and almost one-third of U.S. twoway trade in goods and services. In addition, much of the world’s trade and energy that fuels the global economy transits Asia’s sea and air lines of communication. -Camp H.M. Smith, Hawaii
- U.S. Southern Command (USSOUTHCOM): “USSOUTHCOM is responsible for providing contingency planning, operations, and security cooperation for Central and South America, the Caribbean (except U.S. commonwealths, territories, and possessions), Cuba; as well as for the force protection of U.S. military resources at these locations. USSOUTHCOM is also responsible for ensuring the defense of the Panama Canal and canal area.” -Miami, Florida
- U.S. Space Command (USSPACECOM): United States Space Command (USSPACECOM) conducts operations in, from, and to space -Schriever Space Force Base, Colorado
102.8 Identify the Component Commands and their associated supporting Naval entity for the following: • CENTCOM • AFRICOM • EUCOM • NORTHCOM • INDOPACOM • SOUTHCOM
- CENTCOM - “U.S. Naval Forces Central Command (NAVCENT) - 5th Fleet
- AFRICOM - U.S. Naval Forces, Africa (NAVAF) - 6th Fleet
- EUCOM - U.S. Naval Forces Europe (NAVEUR) - 6th Fleet
- NORTHCOM - U.S. Fleet Forces Command (USFF) - 2nd Fleet / 10 Fleet
- INDOPACOM - US Naval Forces Indo-Pacific Command (PACFLT) - 3rd (central/east pacific) and 7th Fleet (west pacific)
- SOUTHCOM - U.S. Naval Forces Southern Command - 4th Fleet
102.8 Identify the Component Commands and their associated supporting Naval entity for the following: • SOCOM • TRANSCOM • STRATCOM • CYBERCOM
- SOCOM - Naval Special Warfare Command (NSWC) - NSWC consists of Sea, Air, and Land (SEAL) teams that conduct operations in both maritime and ground environments
- TRANSCOM - Military Sealift Command (MSC) “MSC provides sealift transportation services to deploy, sustain and redeploy U.S. forces around the globe.
- STRATCOM - Joint Force maritime Component Command (JFMCC): Located in Naval Station Norfolk, VA. The mission of JFMCC is to conduct joint maritime operations to execute the maritime aspects of strategic deterrence.
- CYBERCOM - Fleet Cyber Command/Tenth Fleet: The mission of Fleet Cyber Command is to serve as central operational authority for networks, cryptologic/signals intelligence, information operations, cyber, electronic warfare, and space capabilities
102.9 Define the Decision and Execution Cycle.
- Observe
- Orient
- Decide
- Act
- 10 Define the following:
a. Unity of Effort
b. Collaborative Planning
c. Decentralized Control and Execution
d. Command by Negation
a. Unity of Effort: Coordination and cooperation toward common objectives, even if the participants are not necessarily part of the same command or organization, which is the product of successful unified action.
b. Collaborative Planning: Navy commanders are able to conduct planning for the operations at hand with the aid of subordinate and supporting units (as desired), and then provide their orders and intentions to the subordinate commanders and coordinators for execution. The
senior commander will normally leave the details of plan execution to his subordinate commander, but may choose to remain directly involved in some duties.
c. Decentralized Control and Execution: Subordinate commanders and coordinators keep the commanders advised as to the status of operations and resources, allowing the commander to effectively monitor the progress of operations. Subordinate commanders are expected to make autonomous decisions and employ their assigned units and assets as they believe will best accomplish the mission of the force.
d. Command by Negation: Able to proceed until Commander says no. The subordinate is to take the required action without delay, keeping the commander informed of the situation with the expectation that silence is consent. The commander retains the power to negate or modify any particular action, but will do so actively. Note: Command by negation is referred to as command by veto in the North Atlantic Treaty Organization (NATO).
- 11 Discuss the CWC concept and purpose, to include the following:
b. Identify the Warfare Commanders and describe their corresponding responsibilities.
Subordinate to the CWC (Composite Warfare Commander) are up to five warfare commanders:
W- Air and Missile Defense Commander (AMDC)
Q- Information Operations Warfare Commander (IWC)
P- Strike Warfare Commander (STCW)
X- Antisubmarine Warfare Commander (ASWC)
S- Surface Warfare Commander (SUWC)
Z- Combines S and X
102.14 Define and discuss the following:
a. Campaign Plan
b. Operation Plan (OPLAN)
c. Support Plan (SUPPLAN)
d. Concept Plan (CONPLAN)
e. Concept of Operations (CONOPS)
f. Warning Order (WARNORD)
g. Execute Order (EXORD)
h. Operation Order (OPORD)
i. FRAGORD
j. Operational General (message) (OPGEN)
k. Operational Tasking (message) (OPTASK)
l. Daily Intentions Message (DIM)
m. Intelligence Annex
n. Time-Phased Force and Deployment Data (TPFDD)
a. Campaign Plan: A joint operation plan for a series of related major operations aimed at achieving strategic or operational objectives within a given time and space.
b. Operation Plan (OPLAN): 1. Any plan for the conduct of military operations prepared in response to actual and potential contingencies. 2. A complete and detailed joint plan containing a full description of the concept of operations, all annexes applicable to the plan, and a timephased force and deployment data.
c. Support Plan (SUPPLAN): an operation plan prepared by a supporting commander, a subordinate commander, or an agency to satisfy the requests or requirements of the supported commander’s plan. For example, the Navy component commander develops a supporting plan as to how NAVFOR will support the joint force commander’s campaign plan or OPLAN.
d. Concept Plan (CONPLAN): an OPLAN in an abbreviated format that requires considerable expansion or alteration to convert it into a complete operation plan or operation order. Often branches and sequels are written in the form of concept plans. As time and the potential allow for executing a particular branch or sequel, these concept plans are developed in detail into OPLANs.
e. Concept of Operations (CONOPS): A verbal or graphic statement that clearly and concisely expresses what the joint force commander intends to accomplish and how it will be done using available resources.
f. Warning Order (WARNORD): a planning directive that describes the situation, allocates forces and resources, establishes command relationships, provides other initial planning guidance, and initiates subordinate mission planning. A warning order is a preliminary notice of an order or action that is to follow. A WARNORD increases subordinates’ planning time, provides details of the impending operation, and lists events that accompany preparation and execution. The amount of detail a WARNORD includes depends on the information and time available when it is issued and the information subordinate commanders need for planning and preparation. Unless specifically stated, a WARNORD does not authorize execution other than planning and the words warning order precede the message text.
g. Execute Order (EXORD): 1. An order issued by the Chairman of the Joint Chiefs of Staff, at the direction of the Secretary of Defense, to implement a decision by the President to initiate military operations. 2. An order to initiate military operations as directed.
h. Operation Order (OPORD): A directive issued by a commander to subordinate commanders for the purpose of effecting the coordinated execution of an operation.
i. FRAGORD: An abbreviated form of an operation order issued as needed after an operation order to change or modify that order or to execute a branch or sequel to that order.
j. Operational General (message) (OPGEN): Maritime-unique formatted message used by both the U.S. Navy and NATO to promulgate general matters of policy and instructions and common aspects of operations; also may include detailed instructions for warfare responsibilities.
k. Operational Tasking (message) (OPTASK): Maritime-unique formatted message used by both the U.S. Navy and NATO to provide detailed information for specific aspects within individual areas of warfare and for tasking resources. This includes logistics, may be issued at all levels above the unit, and may be Navy-wide or focused on a particular theater or strike group.
l. Daily Intentions Message (DIM): an unformatted message with an immediate impact on operations, intended to convey direction from the latest iteration of the commander’s decision cycle. The DIM is issued at operational and tactical levels of command to amplify or modify information contained in orders, OPGENs, OPTASKs, and their supplements.
m. Intelligence Annex: The purpose of annex B (Intelligence) is to provide detailed information/intelligence on the adversary and the operational environment and to provide guidance on intelligence and counterintelligence functions. The intel annex normally provides intelligence preparation of the operational environment products to help further planning and execution. They include such products as the situation template and modified combined obstacle overlay.
n. Time-Phased Force and Deployment Data (TPFDD): The time-phased force data, non-unit cargo and personnel data, and movement data for the operation plan or operation order or ongoing rotation of forces.
103.1 Identify the member organizations of the Intelligence Community and discuss each organization’s role.
The intelligence Community is comprised of 18 separate member organizations.
o Office of the Director of National Intelligence (ODNI): Plans / Program / People
The Director of National Intelligence (DNI) has overall responsibility for intelligence support to the President and the day-to-day management of the IC. Specifically, the DNI establishes objectives and priorities for the IC and manages and directs the tasking of national intelligence collection, analysis, production, and dissemination..
o Central Intelligence Agency (CIA): HUMINT and OSINT program manager
o Defense Intelligence Agency (DIA): MASINT program manager
o National Security Agency (NSA): SIGINT program manager
o National Geospatial- Intelligence Agency (NGA): GEOINT program manager
o National Reconnaissance Office (NRO): responsible for integrating unique and innovative space-based reconnaissance technologies
o Army Intelligence (G-2): responsible for policy formulation, planning, programming, budgeting, management, staff supervision, evaluation, and oversight for intelligence activities for the Department of the Army
o Navy: the leading provider of maritime intelligence
o Marine Corps: produces tactical and operational intelligence for battlefield support
o Air Force Intelligence, Surveillance, and Reconnaissance (USAF ISR) Enterprise: America’s leading provider of finished intelligence derived from airborne, space, and cyberspace sensors.
o Space Force Intelligence
o Department of Energy’s Office of Intelligence and Counter-Intelligence: responsible for the intelligence and counterintelligence activities throughout the DOE complex, including nearly 30 intelligence and counterintelligence offices nationwide. The mission is to protect, enable, and represent the vast scientific brain trust resident in DOE’s laboratories and plants
o Department of Homeland Security
Office of Intelligence and Analysis: responsible for using information and intelligence from multiple sources to identify and assess current and future threats to the U.S. DHS
U.S. Coast Guard Intelligence: responsibilities include protecting citizens from the sea (maritime safety),
o Department of Justice
Federal Bureau of Investigation: an intelligence and law enforcement agency, responsible for understanding threats to our national security and penetrating national and transnational networks that have a desire and capability to harm the U.S.
Drug Enforcement Agency’s Office of National Security Intelligence: responsible for enforcing the controlled substance laws and regulations of the United States.
o Department of State’s Bureau of Intelligence and Research: provides the Secretary of State with timely, objective analysis of global developments as well as real-time insights from all-source intelligence.
o Department of the Treasury’s Office of Intelligence and Analysis: OIA is a component of the U.S. Department of the Treasury’s Office of Terrorism and Financial Intelligence (TFI). TFI marshals the Department’s intelligence and enforcement functions with the twin aims of safeguarding the financial system against illicit use and combating rogue nations, terrorist facilitators, weapons of mass destruction proliferators, money launderers, drug kingpins, and other national security threats.
- 2 Identify and discuss the role of each of the following Naval Intelligence Commands
a. OPNAV N2/N6
b. ONI
c. NAVIFOR
d. NEIC
a. OPNAV N2/N6: Assured Command and Control, Battlespace Awareness, and Integrated Fires. N2/N6E is also known as the Oceanography, Space and Maritime Domain Awareness Directorate.
b. ONI: The “Office of Naval Intelligence (ONI) is the military intelligence agency of the United States Navy. Established in 1882 primarily to advance the Navy’s modernization efforts, ONI is the oldest member of the United States Intelligence Community and serves as the nation’s premier source of maritime intelligence.”
c. NAVIFOR: Naval Information Forces NAVIFOR’s mission is to support operational commanders ashore and afloat by providing combat-ready information warfare forces, which are forward deployable, fully trained, properly manned, capably equipped, always ready, well maintained and combat sustainable.
d. NEIC: Navy Expeditionary Intelligence Command - With multi-intelligence, surveillance and reconnaissance (ISR) collection capabilities operating at the tactical level, NEIC has unique access to areas and environments - from blue to green water, the coastal littoral, and far inland - that are constrained by more traditional ISR assets
- 3 Discuss the mission and organization of the following COCOM Intelligence Organizations:
a. PACOM J2
b. CENTCOM J2
c. etc, etc, etc.
provide I&W’s and dedicated assessment for COCOM. Ensure PIR’s are met and integrated into collection plans
103.4 Identify the missions of each ONI Center of Excellence.
- Nimitz Operational Intelligence Center: OPINTEL - Global Maritime Intelligence Integration and Maritime Domain Awareness – civilian merchant vessels.
- Farragut Technical Analysis Center: S&TI analysis of foreign naval capabilities.
- Kennedy Irregular Warfare Center: products and services to meet Navy, DoD, National, NSW and NECC maritime Irregular Warfare intelligence requirements
- Hopper Information Services Center: IT systems/data delivery, to the Fleet
- 5 Discuss the roles and responsibilities of the following:
f. SUPPLOT/EXPLOT
- Supplementary Plot (SUPPLOT): the all-source intelligence fusion center onboard the CVN monitoring the geopolitical situation and foreign military operations within the AO to which a CSG is assigned.
- Expeditionary Plot: The function of EXPLOT is to gather indications and warning (I&W) information and pass it quickly to the pertinent warfare commander(s). The difference between SUPPLOT and EXPLOT is that EXPLOTs are located on board Expeditionary Platforms (LHDs) while SUPPLOTs are located on carriers.
- 5 Discuss the roles and responsibilities of the following:
j. CAG AI
The CVW (Carrier Air Wing) intelligence officer, more commonly known as the “CAG AI”, is the SIO on the CVW staff and is directly responsible for all intelligence support to the strike warfare commander (STWC) and the CVW. The CAG AI is well versed in all aspects of intelligence support to strike aviation and has normally completed an initial tour as a squadron air intelligence officer (AI).
- 8 Discuss the missions, functions, tasks, and products of the following analytic groups:
a. ONI SWORD
b. ONI SABER
c. ONI SPEAR
d. ONI SPECTRUM
e. ONI FARRAGUT Technical Analysis Center
f. ONI NIMITZ Geo Cells
a. ONI SWORD
Mission: Submarine Warfare Operations Research Division (SWORD) provides all source assessments on foreign submarine and anti-submarine warfare capabilities of selected world navies.
b. ONI SABER
Surface Warfare
c. ONI SPEAR
RED air intel - SPEAR (Strike Projection Evaluation and Anti-Air Warfare Research)
d. ONI SPECTRUM
Cyber/electronic warfare/C4ISR (Command, Control, Communications, Computers, Intelligence,
Surveillance and Reconnaissance)
e. ONI FARRAGUT Technical Analysis Center
The Farragut Center ensures the Navy understands the foreign-force capabilities it is likely to encounter
f. ONI NIMITZ Geo Cells
The Geographically Oriented Cells are teams focused on specific area of interest and provide extensive knowledge to the Naval forces.
104.1 Define Intelligence and discuss the differences of intelligence at each level of war.
Intelligence: “the product resulting from the collection, exploitation, processing, integration, analysis, evaluation, and interpretation of available information concerning foreign countries or areas.
- Strategic Intelligence: required for the formation of policy and military plans at national and international levels. At the strategic level, intelligence is oriented toward national objectives and supports the formulation of policies and determination of priorities. Strategic intelligence focuses first on discerning the capabilities and intentions of potential adversaries as well as considering the strategic intentions of allies and other potential multinational partners. Strategic intelligence plays a central role in identifying an adversary’s center of gravity.
- Operational Intelligence: required for planning operations within regional theaters or areas of operations. It concentrates on intelligence collection, identification, location, and analysis to support the operational level of warfare, which includes identifying an adversary’s operational critical vulnerabilities. Further, it assists the commander in deciding how best to employ forces while minimizing risk.
- Tactical Intelligence: required for planning and conducting tactical operations at the component or unit level. It focuses on a potential adversary’s capabilities, his immediate intentions, and the environment. It is oriented more toward combat than long-range planning. Far more than at any other level, tactical intelligence support is the primary focus on naval intelligence.
104.2 Discuss the difference and relationship between data, information, and intelligence.
- Data is raw inputs that have been gathered-usually in vast quantities.
- Information is data collected and organized, but has not been fully correlated, analyzed, or interpreted.
- Intelligence is fully synthesized information that has been applied in support of a mission or objective.
104.3 Discuss the importance of the intelligence cycle, explaining each phase and the importance of continual evaluation and feedback.
The intelligence cycle ensures intelligence products are relevant to the Commander’s requirements. The cycle is broken up into five steps:
- Planning and Direction: Commander identifies and prioritizes his information requirements. After doing so, the intelligence officer formulates a collection plan taking into account collection assets available, taking stock of potential intelligence gaps.
- Collection: Organic, attached, and supporting collection resources are tasked with intelligence gathering. To be effective, the Intelligence Staff must know the capabilities and limitations of available collection resources, understand the process to obtain additional collection resources, and identify collection resources that can contribute to fulfilling mission requirements.
• Organic Intel Resources- intel assets or capabilities permanently assigned to a particular command
• Attached Intel Resources- separate assets attached to the joint force to a support a particular operation or phase of the operation
• Supporting Intel Resources- resources from another AOR, theater, COCOM, or national organization - Processing and Exploitation: Covert collected information into a form suitable for usable intelligence. Timelines and accuracy are important!
- Analysis and Production: Integration, analysis, evaluation, and interpretation of information from all available sources into tailored usable intelligence.
- Dissemination and Integration: Provide the right amount of appropriately classified intelligence when, where, and how it is needed. Gather feedback from the Commander or other users to ensure that intelligence requirements are satisfied.
104.4 Define the categories of intelligence and discuss each category’s focus and purpose.
Counterintelligence (CI) CI is information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers
Geospatial Intelligence (GEOINT) is the exploitation and analysis of imagery and geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the Earth
Human intelligence (HUMINT) is a category of intelligence derived from information collected and provided by human sources
Measurement and signature intelligence (MASINT) is intelligence obtained by quantitative and qualitative analysis of data (metric, angle, spatial, wavelength, time dependence, modulation, plasma, and hydromagnetic) derived from specific technical sensors for the purpose of identifying any distinctive features associated with the emitter or sender, and to facilitate subsequent identification and/or measurement of the same
Open-source intelligence (OSINT) is information of potential intelligence value that is available to the general public
Signals intelligence (SIGINT) is defined as: (1) a category of intelligence comprising either individually or in combination all communications intelligence, electronic intelligence, and foreign instrumentation signals intelligence, however transmitted; (2) intelligence derived from communications, electronic, and foreign instrumentation signals These are under SIGINT: -COMINT -ELINT -----TECHELINT -----OPELINT -FISINT
Technical intelligence (TECHINT) is intelligence derived from the collection, processing, analysis, and exploitation of data and information pertaining to foreign equipment and materiel for the purposes of preventing technological surprise, assessing foreign scientific and technical capabilities, and developing countermeasures designed to neutralize an adversary’s technological advantages
104.5 Discuss the principles of Naval Intelligence and explain their significance in providing effective intelligence support to operations.
PUKE-C
- Know the Adversary- because Naval forces are often the first to respond and deployed overseas, our intelligence must be up on adversaries, terrorist groups, etc at all times.
- The Commander’s Needs are Paramount- In order to lead an effective fighting force, the Commander must limit uncertainty about the adversary, and ensure Intelligence supports the war effort.
- Ensure Unity of Intelligence Effort- Clearly stating and prioritizing information requirements are essential. In a joint and/or multinational effort, concise language and planning is essential to ensure unity of effort.
- Plan for Combat- Naval Intelligence must bridge the gap between a peace-time navy and a navy engaged with the enemy. This requires intelligence forces be continuously assessing the enemy and producing products geared towards combat operations.
- Use an All-source Approach- the most useful intelligence assessments emerge after a fusion of data from multiple sources.
104.6 Identify the characteristics of intelligence excellence, and discuss some of the challenges that affect the production of intelligence
Anticipatory: anticipate commanders needs
Objective: free from bias
Complete: produces sufficient confidence
Accurate: factually correct
Timely: within required timeframes
Usable: in a form that imparts meaning to commander
Relevant: must meet commander’s requirements
Available: readily accessible to commander
104.7 Discuss the Navy’s Core Capabilities. Describe the key role intelligence plays in enabling those capabilities.
Navy’s core capabilities and Key Roles of Intelligence
- Forward presence (All Domain Access): ability to project military force in contested areas with sufficient freedom of action to operate effectively (domains: air, space, maritime, land, and information environment). Intelligence supports by identifying threats to domains, typically denial capabilities, and monitors areas for attempts at denial. This is done through analysis on adversary capabilities, COAs, and COGs.
- Deterrence: action that convinces adversaries that they cannot win the fight or the cost of aggression would be unacceptable. Provided through CSGs, Surface, Subsurface Combatants, and Marine Air-Ground Task Forces (MAGTF). Intelligence supports by developing friendly COAs, identifying COGs vulnerable to deterrence campaigns, and monitors current deterrence ops for response if op fails.
- Sea control: allows naval forces to establish local maritime superiority while denying the adversary same ability. Essential elements: surface warfare; undersea warfare, strike warfare, mine warfare, air and missile defense, maritime domain awareness (MDA), and ISR. Intelligence supports by identifying probably enemy COAs, locating enemy assets within the operational environment, and determining the adversary’s intent and capabilities to disrupt or deny areas.
- Power projection: allows conventional strikes against targets ashore, integrated lethal and nonlethal fires against enemy forces, advance force operations, raids, amphibious assaults, seabased fire support to forces ashore in support of NSW and SOF missions. These capabilities are conducted by aircraft carriers, surface combatants, submarines, etc. It is important to note that power projection can also be created through humanitarian assistance and disaster response. Intelligence supports by helping with strike planning (crucial vulnerabilities of COGs and enemy capabilities) and IPOE.
- Maritime security: ability to protect U.S. sovereignty and maritime resources, support free and open seaborne commerce, and counter weapons proliferation, terrorism, transnational crime, piracy, illegal exploitation of the maritime environment, and unlawful seaborne immigration. Intelligence supports by identifying threats to security and helping with planning to counter those threats. “Intelligence provides actionable intelligence to the common maritime picture (CMP)- common tactical picture (CTP) by fusing information from local, theater, and national intelligence sources into the correlated CMP-CTP.
104.9 List and discuss the four phases of Intelligence Preparation of the Operational Environment (IPOE).
- Define the maritime operational environment.
- Describe the impact of the maritime operational environment.
- Evaluate the adversary.
- Determine adversary courses of action (COAs).
- 1 Discuss the responsibilities of the following organizations in the collection, production, and dissemination of SIGINT.
a. National Security Agency
b. Naval Information Operations Centers
c. Fleet Information Operations Centers
a. National Security Agency- Unified Organization structured to provide for the SIGINT mission of the US and to ensure the protection of the national security systems. Per Executive Order 12333, United States Intelligence Activities, the Director NSA is designated as the functional manager for SIGINT.
b. Naval Information Operations Centers- NIOCs are force providers to both NSA sites and FIOCs under COMTENTHFLT. Personnel assigned to NSA Cryptologic Centers are focused on national and theater-specific missions.
c. Fleet Information Operations Centers- The missions of the FIOCs varies, but typically includes fleet and unit-level cryptologic and/or information operations (IO) and intelligence analysis support, as well as providing fleet direct support personnel to deploying naval units.
105.2 Discuss the purpose, capabilities, and limitations of SIGINT.
SIGINT is intelligence produced by exploiting foreign communications systems and noncommunications emitters. SIGINT provides unique intelligence information, complements intelligence derived from other sources and is often used for cueing other sensors to potential targets of interest. For example, SIGINT which identifies activity of interest may be used to cue GEOINT to confirm that activity. Conversely, changes detected by GEOINT can cue SIGINT collection against new targets. The discipline is subdivided into three subcategories: communications intelligence (COMINT), electronic intelligence (ELINT), and foreign instrumentation signals intelligence (FISINT).
105.5 Discuss the purpose, capabilities, and limitations of ELINT.
ELINT is intelligence derived from the interception and analysis of noncommunications emitters
(e.g., radar). ELINT consists of two subcategories; operational ELINT (OPELINT) and technical ELINT (TECHELINT). OPELINT is concerned with operationally relevant information such as the location, movement, employment, tactics, and activity of foreign noncommunications emitters and their associated weapon systems. TECHELINT is concerned with the technical aspects of foreign noncommunications emitters such as signal characteristics, modes, functions, associations, capabilities, limitations, vulnerabilities, and technology levels. (Source: NWP 2-0)
105.6 Discuss the purpose, capabilities, and limitations of COMINT.
COMINT is intelligence and technical information derived from collecting and processing intercepted foreign communications passed by radio, wire, or other electromagnetic means. COMINT also may include imagery, when pictures or diagrams are encoded by a computer network/radio frequency method for storage and transmission. The imagery can be static or streaming. (Source: NWP 2-0)
105.9 Discuss the purpose, capabilities, and limitations of FISINT.
FISINT involves the technical analysis of data intercepted from foreign equipment and control systems such as telemetry, electronic interrogators, tracking/fusing/arming/firing command systems, and video data links.
105.10 Discuss the purpose, capabilities, and limitations of MASINT.
Information produced by quantitative and qualitative analysis of physical attributes of targets and events to characterize, locate, and identify targets and events, and derived from specialized, technically derived measurements of physical phenomenon intrinsic to an object or event.
105.11 Discuss the purpose, capabilities, and limitations of ACINT.
Acoustic Intelligence is an intelligence gathering discipline that collects and processes acoustic phenomena. It is a subdiscipline of MASINT (Measurement and Signature Intelligence). As a simple example, narrowband analysis might identify whether a subject of interest has single or multiple propeller shafts; how many blades per shaft and other salients that may help identify the platform.
105.12 Discuss the contents, reporting, and timeline requirements for a CRITIC.
What is Critical Information?
“Critical information is information concerning possible threats to U.S. national Security that are so significant that they require the immediate attention of the President and the National Security Council. Critical information includes the decisions, intentions, or actions of foreign governments, organizations, or individuals that could imminently and materially jeopardize vital U.S. policy, economic, information systems, critical infrastructure, cyberspace, or military interests. “
105.13 Discuss the risk associated with using single source SIGINT.
As with any uncorroborated intelligence source, single source SIGINT may prove unreliable or outright deceptive if an adversary is aware that SIGINT collection operations are being conducted.
106.1 Discuss the responsibilities of the following organizations in the collection, production, and dissemination of GEOINT.
a. National Geospatial-Intelligence Agency
National Geospatial-Intelligence Agency (NGA) is the functional manager for GEOINT at the national level.
b. National Reconnaissance Organization
The NRO is the U.S. Government agency in charge of designing, building, launching, and maintaining America’s intelligence satellites. Activities include creating the latest innovations in satellite technology, contracting with industrial suppliers, conducting rigorous launch schedules, providing the high-quality products to customers, etc.
106.2 Discuss the purpose, capabilities, and limitations of GEOINT.
Geospatial intelligence (GEOINT) is the exploitation and analysis of imagery and geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the Earth. Geospatial intelligence consists of imagery, imagery intelligence, and geospatial information.
Limitations:
• Collection hinderances (weather, satellite resource availability, terrain- overheads, etc)
• Lack of on-the-ground awareness
106.3 Explain the difference between the following types of imagery to include the strengths and weaknesses of each:
Sensor/ Phenomenology Acronym Characteristics Examples
Synthetic Aperture Radar SAR
-Illuminates objects with microwave energy pulses. Applies signal processing to a series of pulses to produce a single image.
-Penetrates foliage, material, and ground (with limitations), detects barriers and overhead power lines. Used in most weather, light conditions. Creates a black and white (Grayscale) image.
Infrared IR
- Uses the infrared portion of the spectrum to detect heat/ radiance
- Detects presence of living entities and active vehicles and equipment in day or night. May be limited by bad weather/ light conditions, smoke.
Electro-Optical Sensor EO
- Typically a passive sensor, uses natural energy sources, ultraviolet through infrared portions of EM spectrum.
- For detailed, literal, photo-like picture of a scene and objects within in.
Full Motion Video FMV
- Uses many frames per second to create a nearreal-time video capability, which may be displayed as visible or IR and may be recorded by digital or analog means.
- This near-real time capability allows observation of rapidly developing events and is a valuable tool for ongoing operations. It also provides continuous observation of an object, such as a person or vehicle, to analyze its patterns over long periods.
Hyperspectral Imaging HSI
- Uses hundreds of visible and infrared bands to provide a greater detail and additional characteristics.
- Same as multispectral but with greater levels of detail.
Hand Held Imagery/ Photography
- Simple photograph.
- A human taking photographs (known as hand-held photography).
Light Detection and Ranging LIDAR
- Uses laser pulses in the visible and infrared sections of spectrum.
- See objects beneath vegetation canopy, battlefield visualization.
106.4 Discuss the risks associated with using single source intelligence for GEOINT.
Using GEOINT as a single source of intelligence, similar to other sources, would result in an inaccurate representation of the information and an incomplete picture of conditions on the ground. This is because GEOINT lacks the ability to give high confidence when viewing an image from overhead. Specifically, GEOINT should be used in conjunction with HUMINT or SIGINT to corroborate overhead images of possible targets, battlespaces, places of interest, etc.
106.5 Discuss the capabilities of GEOINT collection assets:
a. National Technical Means
Satellites – Imagery data is collected from space by two satellite sources: Government-owned satellites and private industry-owned satellites, known as commercial systems. U.S. Government satellites are used for both unclassified and classified purposes. Satellites orbit at a far higher altitude than airborne platforms, enabling them to collect above any airspace, including sovereign airspace of any nation, hostile territory, and areas to which airborne platforms are denied access.
b. Airborne Assets: Airborne platforms consist of manned, unmanned, fixed wing, and rotatory aircraft, as well as balloons and dirigibles. The sensors and cameras mounted on airborne platforms can provide continuous (known as persistent) coverage of a location or target.
c. Ground - buildings/poles/vehicles/ppl/ground sensors
d. Sea/ships/buoys/subs
106.8 Describe the purpose of NGA’s NCO.
Non-Combatant Evacuations Operation (NEO) and Contingency Operations (NCO)
106.9 Define NIIRS and discuss the NIIRS scale.
(O to 9), with several interpretation tasks or criteria forming each level. These criteria indicate the amount of information that can be extracted from an image at a given interpretability level. With a NIIRS 2 image, for example, analysts should lust be able to detect large buildings, while on NIIRS 6 imagery they should just be able to identify automobiles as sedans or station wagons.
107.1 Discuss the purpose, capabilities, and limitations of FISINT and MASINT.
Purpose:
FISINT = machine to machine communication
Can collect everything, limitation is the processing/exploitation side
MASINT = quantitative and qualitative analysis of data derived from specific technical sensors
Can detect things like radiation, far off collection
Requires someone with specialized skills to exploit/understand
Limitations:
• FISINT and MASINT often allow for an overview of an adversary’s capabilities and are therefore more useful in technical analysis rather than operational awareness.
• Due to the restricted access to FISINT and MASINT and the technical “know-how” component of analyzing these types of intelligence, they cannot be disseminated and effectively utilized like simpler forms of intelligence.
• Most of this kind of intelligence is produced after the fact (blast zone of missiles, speed of ballistics, etc). (Source: NWP 2-0)
107.2 Discuss the responsibility of the following organizations in the collection, production, and dissemination of FISINT and MASINT:
a. National Security Agency:
NSA is responsible for FISINT Collection (SIGINT functional manager). Unknown on MASINT.
b. Defense Special Missile and Aerospace Center
The U.S. DoD’s (in collaboration with NSA and NGA) Defense Special Missile and Aerospace Center (DEFSMAC) serves in the forefront of U.S. missile and space intelligence. The Center coordinates the collection of intelligence information on foreign missiles and satellites
c. National Air and Space Intelligence Center - foreign air and space forces, weapons, and systems.
d. Air Force Technical Analysis Center - monitor nuclear treaty compliance, and develops advanced proliferation detection technologies to preserve our nation’s security
108.1 Identify the Intelligence Community Organizations that support OSINT, to include their roles and functions, and provide examples of the products produced by each.
CIA Director: The OSINT functional manager for the IC
DoD: OSINT DoD lead is the Director of DIA.
108.3 Discuss the risks associated with OSINT to include assessing and using it as a single source.
Like other types of intelligence, OSINT is susceptible to adversary deception attempts. Incorrect information may be deliberately planted in public sources. OSINT is also subject to source bias and inaccuracy. All-source intelligence should combine, compare, and analyze classified and open source material and attempt to cross-verify information obtained from different sources. In addition, OSINT requires tradecraft in the areas of research expertise and OPSEC for Internetbased activities.
109.1 Discuss CIA HUMINT roles and functions.
The CIA is the lead HUMINT agency in the intelligence community. It conducts and coordinates espionage activities to meet requirements of the government. It does the following:
• Conducts and coordinates counterintelligence activities ABROAD.
• Conducts and coordinates intel liaison with foreign intelligence and security services on espionage and CI activities.
• Maintains a central index of foreign CI info regarding CI activities abroad.
• Assists other IC components to satisfy cover support requirements.