Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
75 Cards in this Set
- Front
- Back
SIGNALS ANALYSIS
|
IS A CUTTING EDGE TECHNICAL DISCIPLINE THAT SEEKS TO RECOVER, UNDERSTAND, AND DERIVE INTELLIGENCE FOR FOREIGN SIGNALS
|
|
CRYPTANALYSIS
|
IS THE ANALYTIC INVESTIGATION OF AN INFORMATION SYSTEMS W/THE GOAL OF ILLUMINATING HIDDEN ASPECTS OF THE SYSTEMS. "HIDDEN PARAMETERS"
|
|
TRAFFIC IC ANALYSIS
|
BRANCH OF CRYPTOLOGY WHICH DEALS WITH THE STUDY OF EXTERNAL CHARACTERISTICS OF SIGNALS COMMUNICATIONS AND RELATED MATERIALS FOR THE PURPOSE OF OBTAINING INFORMATION CONCERNING THE ORGANIZATION AND OPERATION OF COMMUNICATIONS SYSTEMS.
|
|
FUSION ANALYSIS
|
THE PROCESS OF EXAMINING ALL SOURCES OF INTELLIGENCE AND INFORMATION TO DERIVE A COMPLETE ASSESSMENT OF ACTIVITY
|
|
RASIN MANUAL
USSID |
RADIO SIGNALS NOTATION MANUAL USED BY USSS AS A GUIDE TO THE COMINT SIGNAL CLASSIFICATION SYSTEM.
UNITED STATES SIGNALS INTELLIGENCE DIRECTIVES DESIGNED TO CONTAIN THE PLANNING, DOCTRINAL, TASKING, AND CONTROL MATERIAL GOVERNING US SIGNALS INTELLIGENCE (SIGNINT) OPERATION THROUGHOUT THE WORLD. |
|
DESCRIBE LINE OF SIGHT (LOS) COMMUNICATION
|
LOS COMMUNICATION IS A SIGNAL THAT IS SIMPLE TRANSMITTED DIRECTLY FROM THE TRANSMITTING ANTENNA TO THE RECEIVING ANTENNA
CURVATURE OF THE EARTH LIMITING LOS TO APPOX 25 TO 40 MILES |
|
DEFINE THE DOPPLER EFFECT
|
REFRACTION DUE TO MOTION THE APPARENT CHANGE IN FREQUENCY OR PITCH WHEN A SOUND SOURCES MOVE EITHER TOWARDS OR AWAY FROM A LISTERNER
|
|
DEFINE AND DISCUSS MORSE CODE
|
IS A METHOD OF TRANSMITTING TEXTUAL INFORMATION AS A SERIES OF ON-OFF TONES, LIGHTS OR CLICKS THAT CAN BE DIRECTLY UNDERSTOOD BY A SKILLED LISTENER OR OBSERVER WITHOUT SPECIAL EQUIPMENT
|
|
DEFINE SAMPLING AND HOW IT RELATES TO SIGNALS COLLECTION
|
SAMPLING IS A SETP IN THE ANALOG TO DIGITAL CONVERSION PROCESS.
ELECTRIC SWITCHES USED TO SAMPLE AN ANALOG SIGNAL NUMEROUS TIMES IN ONE SECOND CREATING A SERIES OF PULSES REPRESENTING THE INSTANTANEOUS AMPLITUDE OF THE ANALOG WAVE AT VARIOUS MOMENTS |
|
DIRECTION FINDING
|
A METHODE OF LOCATING RADIO TRANSMITTING THROUGH THE USE OF SPECIALLY CONSTRUCTED RECEIVING ANTENNA AND EQUIPMENT
|
|
GEOLOCATION
|
THE IDENTIFICATION OF THE REAL WORLD GEOGRAPHIC LOCATION OF AN OBJECT SUCH AS A CELL PHONE OR INTERNET CONNECTED COMPUTER.
|
|
DEFINE AND INFORMATION ENVIRONMENT
|
AS THE AGGREGATED OF INVIDUALS ORGANIZATIONS AND SYSTEMS THAT COLLECT PROCESS AND DISSEMINATE OR ACT ON INFORMATION
|
|
DISCUSS THE 3 DIMENSION THAT MAKE UP AN INFORMATION ENVIRONMENT
|
PHYSICAL: THE REAL WORLD ENVIRONMENT OF LAND, SEA, AIR, SPACE.
INFORMATIONAL: CONSISTS OF INFORMATION AND IS WHERE THE FUNCTIONS OF INFORMATION CREATED COGNITIVE: WHERE INFORMATION IS USED TO FORM PERCEPTIONS AND ATTITUDES AND MAKE DECISIONS |
|
DEFINE COMMAND AND CONTROL
|
AS THE EXERCISE OF AUTHORITY AND DIRECTION BY A PROPERLY DESIGNATED COMMANDER OVER ASSIGNED AND ATTACHED FORCES IN THE ACCOMPLISHMENT OF THE MISSION
|
|
DISCUSS HOW INFORMATION OPERATIONS SUPPORTS OPERATION AT THE 3 LEVELS OF WAR
|
STRATEGIC: DIRECTED BY THE NCA AND PLANNED IN COORDINATION WITH OTHER AGENCIES.
OPERATIONAL: CONDUCTED BY A COMBATANT COMMANDER WITHIN THE ASSIGNED AOR. TACTICAL: SERVICE OR FUNCTIONAL COMPONENT COMMANDER UNDER A SUBORDINATE UNIFIED COMMAND. |
|
OFFENSIVE IO
|
INVOLVES THE INTEGRATED USE OF ASSIGNED AND SUPPORTING CAPABILITIES AND ACTIVITIES, MUTUALLY SUPPORTED BY INTELLIGENCE TO AFFECT ADVERSARY DECISION MAKERS AND ACHIEVE OR PROMOTE SPECIFIC OBJECTIVES.
|
|
DEFENSIVE IO
|
ARE CONDUCTED AND ASSISTED THROUGH INFORMATION ASSURANCE, OPERATIONAL SECURITY, PHYSICAL SECURITY, COUNTER DECEPTION, COUNTER PROPAGANDA, COUNTER INTELLIGENCE, EW, SPECIAL INFORMATION OPERATIONS, DEFENSIVE IO ENSURE TIMELY ACCURATE, AND RELEVANT TIMELY DENY ADVERSARIES
|
|
DISCUSS THE TWO TYPES OF WARFARE PLANNING
|
CRISIS ACTION PLANNING(CAP): PROVIDES THE CJCS AND CCDR'S A PROCESS FOR GETTING VITAL DECISION MAKING INFORMATION UP THE CHAIN OF COMMAND TO THE PRESIDENT AND SECDEF
DELIBERATE PLANNING: ENCOMPASSES THE PREPARATION OF PLANS THAT OCCUR IN NON-CRISIS SITUATIONS USED TO DEVELOP CAMPAIGN AND CONTINGUENCY PLANS. |
|
CENTERS OF GRAVITY
|
COG THE SOURCE OF POWER THAT PROVIDE MORAL OR PHYSICAL STRENGTH, FREEDOM OF ACTION OR WILL TO ACT.
|
|
HARDKILL (KINETIC)
|
PHYSICAL ATTACK/DESTRUCTION BY DELIVERY OF MUNITIONS/ORDINANCE TO DESTROY OR DEGRADE A TARGET
|
|
SOFTKILL (NON-KINECTIC)
|
THE TEMPORARY ELIMINATION DEGRADATION OR INTERRUPTION OF A NODE, LINK OR SYSTEM
|
|
MEASURES OF EFFECTIVENESS
|
ASSESS CHANGES IN SYSTEM BEHAVIOR, CAPABILITY OR THE OPERATION ENVIRONMENT
|
|
MEASURES OF PERFORMANCE
|
CRITERIA FOR MEASURING TASK PERFORMANCE OR ACCOMPLISHMENT
|
|
TACTICAL REPORT
|
TACREP
PRINCIPAL REPORTING TOOL THAT SUPPORTS TACTICAL WARNING, TARGETING, INDICATIONS AND WARNING AND MANEUVERING |
|
TACELINT
|
TACTICAL ELECTRONIC INTELLIGENCE REPORT
TIME-CRITICAL OPERATIONAL ELING(OPELINT) AND PARAMETRIC INFORMATION THAT MAY BE USED FOR INDICATIONS AND WARNING, DATA BASE MAINTENANCE, ORDER OF BATTEL INFORMATION AND STRIKE PLANNING |
|
MAREP
|
PRIMARY FORMAL US NAVY SYSTEM FOR TASKING AND MESSAGE REPORTING OF MARITIME OPERATIONAL, INTELLIGENCE, AND MANAGEMENT INFORMATION.
|
|
MAREP RED:
MAREP WHITE MAREP BLACK |
COMMAND AND CONTROL PURPOSES WITH THE ENEMY OR SPECIAL INTEREST FORCES.
MOVEMENT OR LOCATIONS OF FRIENDLY NAVY AND ROUTING MERCHANT SHIPPING. A PERIODIC SUMMARY OF THE ACTIVITY OF ENEMY OR SPECIAL INTEREST FORCES. |
|
ELINT (ELNOT)
|
ELECTRONIC INTELLIGENCE A FIVE POSITION GROUP OF CHARACTERS ASSIGNED TO EACH NON-COMMUNICATION EMISSION FOR COLLECTION AND REPORTING PURPOSES.
|
|
AEN
|
ARBITRARY ELINT NOTATION ASSIGNED TO DESIGNATE OTHERWISE NOT FULLY IDENTIFIABLE RADAR ACTIVITY
|
|
PEN
|
PARAMETRICALLY ORDERED ELINT NOTATION(PEN) SPECIFIC ELNOT'S GROUPED INTO TWO RADIO FREQUENCY RANGES
|
|
CENOT
|
COMMUNICATIONS EMITTER NOTATION A FIVE CHARACTER DESIGNATION USED TO IDENTIFY A COMMUNICATIONS EMITTER
|
|
AUTOMATIC IDENTIFICATION SYSTEM
|
AIS AN INFORMATION AND COMMUNICATIONS VHF SYSTEM USED BY VESSELS AND VESSEL TRAFFIC SYSTEMS (VTS) PRINCIPALLY FOR THE IDENTIFICATION OF VESSELS AT SEA. BY USE OF VHF FREQUENCY, SHIPS TRANSMIT THEIR GPS LOCATION, NAME, TRUE HEADING, MMSI, SPEED, RUDDER ANGLE
|
|
MMSI
|
MOBILE MARITIME SERVICE IDENTIFIER UNIQUE 9 DIGIT 3 ASSIGNED TO A SPECIFIC VESSEL
|
|
FOUR ITEMS THAT ASSIST THE ANALYST IN TRACKING A CONTACT USING AIS
|
NEXT PORT OF CALL DESTINATION
SHIPS AT ANCHOR OR UNDERWAY SPEED OF VESSEL SHIPS CURRENT POSITION AND TIME |
|
LIST THE FIVE COLLECTION MANAGEMENT TOOLS
|
RFI REQUEST FOR INFORMATION
PVR PRODUCT VERIFICATION REPORT EUI ENHANCED USER INTERFACE CESR CONSOLIDATED EXERCISE SUPPORT REQUEST COLISEUM |
|
EXPLAIN WHAT THE JOINT TACTICAL TERMINAL (JTT) PROVIDES TO THE OPELINE WATCH
|
JTT IS A UHF TACTICAL INTELLIGENCE TERMINAL THAT PROVIDES THE CAPABILITY TO DISSEMINATE TIME SENSITIVE C4I AND BATTLEFIED TARGETING INFORMATION TO TACTICAL COMMAND AND INTELLIGENCE NODES.
|
|
EW
|
ELECTRONIC WARFARE: MILITARY ACTION INVOLVING THE USE OF ELECTRO-MAGNETIC ENERGY TO DETERMIN, EXPLOIT, REDUCE OR PREVENT HOSTILE USE OF THE ELECTRO-MAGNETIC SPECTRUM
|
|
ES
EA EP |
ELECTRONIC SUPPORT-THE ACTIONS TAKEN TO SEARCH FOR DETECT, LOCALIZE AND IDENTIFY SOURCES OF RADIATED ELECTROMAGNETIC ENERGY FOR TACTICAL PURPOSE.
ELECTRONIC ATTACK- INVOLVES THE USE OF EQUIPMENT DEVICES AND TACTICS TO PREVENT OR REDUCE THE ENEMIES EFFECTIVE USE OF THE EMS. ELECTRONIC PROTECT-ACTIONS TAKEN TO ENSURE FRIENDLY EFFECTIVE USE OF THE EMS, DESPIRT AN ENEMIES USE OF EA. |
|
ASMD
BDA |
ANTI-SHIP MISSILE DEFENSE: ENCOMPASSES ALL ASPECTS OF DEFENDING A SHIP AGAINST MISSILE ATTACK.
BATTLE DAMAGE ASSESSMENT: THE ESTIMATE OF DAMAGE RESULTING FROM THE APPLICATION OF LETHAL OR NONLETHAL MILITARY FORCE. |
|
CTTG
|
COUNTER TARGETING
EMPLOYED DURING PRE-HOSTILITIES CONSISTENT WITH ROE TO DENY, REDUCE, OR CONFUSE AND ADVERSARIES TARGETING PROCESS. |
|
RCS
|
RADAR CROSS SECTION: A MEASURE IN SQUARE METERS OF A SHIPS REFLECTED ELECTROMAGNETIC ENERGY
|
|
MILDEC
|
MILITARY DECEPTION: DELIBERATELY MISLEAD ADVISORY MILITARY DECISION MAKERS AS TO FRIENDLY MILITARY CAPABILITIES, INTENTIONS AND OPERATIONS THEREBY CAUSING THE ADVISARY TO TAKE SPECIFIC ACTIONS OR INACTIONS WHICH WILL CONTRIBUTE TO THE ACCOMPLISHMENT OF THE FRIENDLY MISSION.
|
|
PURPOSE OF OWN FORCE MONITORING
|
PROCESS OF MONITORING THE ELECTROMAGNETIC EMISSIONS FROM ONE'S OWN UNIT AS WELL AS OTHER UNITS IN A TASK FORCE, TASK GROUP, OF STRIKE GROUP FOR THE PURPOSE OF ENSURING COMPLIANCE WITH A GIVEN EMCON CONDITION
|
|
AN/SLQ-32(V)
|
SURFACE NAVY'S PRIMARY EW SUITE DESIGNED AS AN ASMD SYSTEMS FOR SURFACE COMBATANTS ELINT COLLECTION
|
|
PROVIDES THE CAPABILITY TO PERFORM DETAILED ANALYSIS OF SLQ-32 COLLECTED EMITTER DATA
|
AN/ULQ-16
|
|
PASSIVE DECOY
ACTIVE/PASSIVE DECOY |
MK-36 DECOY LAUNCHING SYSTEM
MK-53 |
|
AN/SLQ-1013
|
PROTECTS THE SLQ-32 RECEIVERS FROM SATURATION BY ONBOARD RADAR SIGNALS
|
|
ENABLES PRECISE MEASUREMENT OF SELECTIVE EMITTER PARAMETERS AND CHARACTERISTICS
|
AN/SSX-1
|
|
PROVIDES IMPROVED INTER OPERABILITY AND DISSEMINATION OF CRITICAL INTELLIGENCE AND TARGETING INFORMATION
|
AN/USQ-51 JTT JOINT TACTICAL TERMINAL
|
|
DEFINE THE FOLLOWING TYPES OF DECEPTIVE COUNTERMEASURES
|
ELECTRONIC: THE DELIBERATE RADIATION, RE-RADIATION, ALTERNATION, SUPPRESSION, OR REFLECTION OF ELECTROMAGNETIC ENERGY IN A MANNER INTENDED TO CONVEY MISLEADING INFORMATION.
MECHANICAL: THE DELIBERATE ABSORPTION AND REFLECTION OF ELECTROMAGNETIC ENERGY USING MECHANICAL DECOYS IN A MANNER INTENDED TO CONVEY MISLEADING INFORMATION TO ENEMY RADAR OPERATORS. |
|
STATE THE PURPOSE OF THE FOLLOWING MECHANICAL COUNTERMEASURES
|
MK 216 DISTRACTION
MK 214 SEDUCTION MK 245 GIANT (INFRARED IR) MK 234 NULKA (COMBINED ACTIVE/PASSIVE/IR) |
|
SATVUL
PCMS |
SATELLITE VULNERABILITY-DESIGNED TO MITIGATE VULNERABILITY OF SHIP EMISSION TO SPACE BASED SENSORS
PASSIVE COUNTERMEASURES SYSTEM-REDUCES RCS THROUGH THE APPLICATION OF RADAR ABSORBENT MATERIAL TO THE SUPER STRUCTURE RADAR ABSORBENT BLANKETS TO AREAS THAT CANNOT BE COATED, MODIFIED EW EXPENDABLE LAUNCHERS |
|
DECEPTIVE JAMMING
|
DESIGNED TO INJECT FALSE INFORMATION INTO A VICTIM RADAR TO DENY CRITICAL INFORMATION ON A TARGET AZIMUTH, RANGE, VELOCITY OR A COMBINATION OF THESE PARAMETERS.
|
|
EMCON
|
EMISSIONS CONTROL. THE SELECTIVE AND CONTROLLED USE OF ELECTROMAGNETIC, ACOUSTIC, OR OTHER EMITTERS TO OPTIMIZE COMMAND AND CONTROL CAPABILITIES WHILE MINIMIZING FOR OPERATIONS SECURITY DETECTION BY ENEMY SENSORS
|
|
ELECTROMAGNETIC INTERFERENCE
|
ANY ELECTROMAGNET DISTURBANCE THAT INTERRUPTS, OBSTRUCTS OR OTHERWISE DEGRADES OR LIMITS THE EFFECTIVE PERFORMANCE OF ELECTRONICS AND ELECTRICAL EQUIPMENT
|
|
DEFINE THE 4 TYPES OF ELECTROMAGNETIC INTERFERENCE
|
FUNCTION: ORIGINATES FROM ANY SOURCE DESIGNED TO GENERATE ELECTROMAGNETIC ENERGY.
INCIDENTAL: ORIGINATES FROM MAN-MADE SOURCES NATURAL: CAUSED BY NATURAL PHENOMENA SUCH AS STORMS. HULL-GENERATED: CAUSED BY THE INTERACTION OF RADIATED SIGNALS WITH ELEMENT OF THE HULL AND RIGGING OF A SHIP. |
|
DEFINE ORDER OF BATTLE AND THE FOLLOWING TYPE OF ELECTRONIC WARFARE
|
THE IDENTIFICATION, STRENGTH, COMMAND STRUCTURE, AND DISPOSITION OF THE PERSONNEL, UNIT AND EQUIPMENT OF ANY MILITARY FORCE.
ELECTRONIC ORDER OF BATTLE NAVAL ORDER OF BATTLE AIR ORDER OF BATTLE GROUND ORDER OF BATTLE |
|
DEFINE DECISIVE POINTS
|
A GEOGRAPHIC PLACE, SPECIFIC KEY EVENT, CRITICAL FACTOR OR FUNCTION THAT, WHEN ACTED UPON ALLOWS COMMANDERS TO GAIN A MARKED ADVANTAGE OVER AN ADVERSARY OR CONTRIBUTE MATERIALLY TO ACHIEVE.
|
|
United States Special Operations Command (USSOCOM)
|
USSOCOM mission is twofold:
Provide fully capable Special Operations Forces to defend the United States and its interests Synchronize planning of global operations against terrorist networks |
|
High Value Target vs. High Payoff Target
|
High Value Target (HVT) – a target the enemy commander requires for successful completion of the mission
Loss of HVTs would be expected to seriously degrade important enemy functions throughout the friendly commander’s area of interest High Payoff Target (HPT) – a target whose loss to the enemy will significantly contribute to the success of the friendly course of action HPTs are those high-valued targets that must be acquired and successfully attacked for the success of the friendly commander’s mission |
|
Intelligence Support to Expeditionary Warfare Terms
|
Direct Action (DA) - Short duration strikes and other small-scale offensive operations principally undertaken by SOF to seize, destroy, capture, recover, or inflict damage on designated personnel or material
May employ raid, ambush, or direct assault tactics Emplace mines and other munitions Conduct stand-off attacks by fire from air, ground, or maritime platforms Provide terminal conduct independent sabotage, and anti-ship operations Special Reconnaissance (SR) - SOF conducting a wide variety of information gathering activities of strategic or operational significance. Used to: Obtain or verify, by visual observation or other collection methods, information concerning the capabilities, intentions, and activities of an actual or potential enemy Secure data concerning the meteorological, hydrographic, or geographic characteristics of a particular area |
|
Intelligence Support to Expeditionary Warfare Terms
|
Foreign Internal Defense (FID) – SOF’s primary contribution in this interagency activity is to organize, train, advise, and assist host nation (HN) military and paramilitary forces. Many capabilities required for FID include:
Instructional and foreign language skills Advanced medical skills Familiarity with a wide variety of demolitions, weapons, weapon systems, and communications equipment Area and cultural orientation Unconventional Warfare (UW) – A broad spectrum of military and paramilitary operations, normally of long duration, predominantly conducted by indigenous or surrogate forces that are organized, trained, equipped, supported, and directed in varying degrees by an external source. UW includes: Guerrilla warfare and other direct offensive, low-visibility, clandestine, or covert operations Indirect activities of subversion, sabotage, intelligence activities Evasion and escape |
|
Intelligence Support to Expeditionary Warfare Terms
|
Counter Proliferation (CP) of Weapons of Mass Destruction (WMD) – Refers to the actions taken to seize, destroy, render safe, capture, or recover WMD. SOF provides unique capabilities to monitor and support compliance with arms control treaties.
Conduct or support SR and DA missions to locate and interdict sea, land, and air shipments of dangerous materials or weapons Organize, train, equip, and prepare for operations in support of US Government CP objectives Psychological Operations (PSYOPS) – planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals Planned operations conducted to convey selected information to foreign audiences to influence their emotions, motives, objective reasoning Ultimately influences behavior of foreign governments, organizations, groups, and individuals |
|
Information Operations (IO)
|
Involves actions taken to affect adversary information and information systems while defending one’s own information and information systems. The following SOF missions support IO:
Direct Action Special Reconnaissance Psychological Operations Civil Affairs Operations Foreign Internal Defense |
|
Types of Amphibious Operations
|
Amphibious Assault – Involves the establishment of a landing force (LF) on a hostile or potentially hostile shore. The organic capabilities of Amphibious Forces (AF), including air and fire support, logistics, and mobility, allow them to gain access to an area by forcible entry
Basic requirement is necessity for swift buildup of sufficient combat power ashore Initial zero capability to full coordinated striking power Amphibious Raid – Type of amphibious operation involving swift incursion into or temporary occupation of an objective followed by a planned withdrawal Amphibious Demonstration – Show of force conducted to deceive with the expectation of deluding the enemy into a course of action unfavorable to it Amphibious Withdrawal – Extraction of forces by sea in ships or craft from a hostile or potentially hostile shore. |
|
Define and Discuss Operational Intelligence (OPINTEL)
|
OPINTEL is the result of analyzing and combining multi-source intelligence information into a product used by Commanders to identify adversary critical vulnerabilities, Centers of Gravity (COGs), and critical nodes in-order to effectively employ assets.
OPINTEL is performed through: Watch Standing Threat Assessments Briefings IPOE Country Overview (Threat) Message Preparation and Reporting Fusion analysis |
|
Define and Discuss the steps of the Intelligence Cycle
|
1. Planning and Direction
Identify and prioritize information requirements 2. Collection Tasking organic, attached and supporting collection resources to gather information 3. Processing and Exploitation Conversion of collected information into a form suitable for producing usable intelligence 4. Analysis and Production Integration, analysis, evaluation and interpretation of information from all available sources 5. Dissemination Provide the right amount of appropriately classified intelligence when, where and how it is needed |
|
Explain the purpose of Intelligence Information Reports (IIR)
|
The purpose of Intelligence Information Reports is to convey raw, unbiased, objective data.
|
|
Discuss the 6 phases of the Joint Targeting Cycle.
|
1 Commanders Objective
2 Target Development 3 Capabilities Analysis 4 Commanders Decision 5 Mission Planning 6 Combat Assessment |
|
No-Strike List – List of objects protected from military action in accordance with international law or ROE
Restricted Target List - list of targets that require approval from a joint force commander or higher authority Joint Integrated Prioritized Target List – list of selected targets where there are no restrictions and are approved for military action |
No-Strike List – List of objects protected from military action in accordance with international law or ROE
Restricted Target List - list of targets that require approval from a joint force commander or higher authority Joint Integrated Prioritized Target List – list of selected targets where there are no restrictions and are approved for military action |
|
Discuss the Collateral Damage Methodology:
|
Unintentional or incidental injury or damage to persons or objects that would not be lawful military targets in the circumstances ruling at the time.
|
|
Collection Management is broken into two sections
|
Collections Requirements Management (CRM): Defines what intelligence systems must collect
Focuses on the requirements of the customer, is all-source oriented and advocates what information must be collected Collections Operations Management (COM: specifies how to satisfy the requirements It focuses on tasking specific systems within a discipline, or across multiple disciplines to collect information addressing the customer’s requirement |
|
DISCUSS the collection capabilities of the following Intelligence, Surveillance and Reconnaissance (ISR) sensors and platforms
|
F/A-18 SUPER HORNET with SHARP
EO/FMV MQ-1B Predator EO/FMV/SI MQ-8B Fire Scout EO/FMV RQ-4 BAMS EO/FMV SCAN EAGLE EO/FMV |
|
Define and discuss FORMICA:
|
Foreign Military Intelligence Collection Activities
|
|
HUMINT - A category of intelligence derived from information collected and provided by human sources.
2. Military Source Operations - The collection, by humans, of foreign military related intelligence. 3. Interrogation - The systematic effort to procure information to answer specific collection requirements. Achieved by direct and indirect questioning techniques of a person in custody. 4. Tactical Questioning/Debriefing - Direct questioning by any Department of Defense personnel of a captured or detained person. Conducted in order to obtain time-sensitive, tactical intelligence information. Occurs at or near the point of capture or detention and is consistent with applicable law. |
HUMINT - A category of intelligence derived from information collected and provided by human sources.
2. Military Source Operations - The collection, by humans, of foreign military related intelligence. 3. Interrogation - The systematic effort to procure information to answer specific collection requirements. Achieved by direct and indirect questioning techniques of a person in custody. 4. Tactical Questioning/Debriefing - Direct questioning by any Department of Defense personnel of a captured or detained person. Conducted in order to obtain time-sensitive, tactical intelligence information. Occurs at or near the point of capture or detention and is consistent with applicable law. |