Module 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Difference Between Collection Management Authority (CMA) and Collection Requirements Management (CRM)

1: Within the DoD, this constitutes the authority to establish, prioritize, and validate theater collection requirements, establish sensor tasking guidance, and develop theater-wide collection policies. 2: Subordinate joint force tactical units develop collection requirements in support of current and future operations and commander's priorities and objectives and send those requirements to the subordinate joint force J-2 for validation and tasking to tactical collection assets.

Difference Between Collection Operations Management (COM) and Collection Requirements Management (CRM)

2. Focuses on the requirements of the customer, is multidiscipline oriented, and advocates what information is necessary for collection. 1. Focuses on the selection of the specific systems within a discipline to collect information to satisfy the customer's request. Conducted by organizations to determine which collection assets can best satisfy the customers' requests.

Office of Naval Intelligence (ONI)

A core element of the Navy's Information Warfare Community whose goal is to gain and hold a decisive information advantage over America's potential adversaries.

Commander's Critical Information Requirement (CCIR)

A limited number of information requirements that enable the staff to focus limited resources on those aspects of the operation the commander is interested in closely monitoring and upon which a decision may be based. Consists of Priority Intelligence Requirements (PIRs) and friendly force information requirements (FFIRs).

What components make up Air Staff?

AF/A1 - Deputy Chief of Staff, Manpower, Personnel & Services - Personnel programs & AF Policies AF/A2 - Deputy Chief of Staff, Intelligence, Surveillance and Reconnaissance - Global ISR capabilities. Professional development, training, education, readiness, and deployment AF/A3 - (USAF) Operations AF/A4 - Logistics, Engineering & Force Protection - Build Strategy, Write Best Policy, Advocate for Resources, Develop our Work Forces AF/A5/8 - Deputy Chief of Staff for Strategic Plans, Programs, and Requirements - Leads the Air Force's strategic planning and programming effort to develop and sustain unmatched capabilities AF/A9 - Studies, Analyses, Assessments and Lessons Learned - Leading, carrying out, reviewing, and ensuring the analytic integrity of studies and analyses, assessments, and the lessons learned program AF/A10 - Deputy Chief of Staff Strategic Deterrence & Nuclear Integration - Provide guidance, advocacy, and oversight of the Air Force nuclear enterprise and countering weapons of mass destruction mission

Department of Treasury Office of Intelligence and Analysis (OIA)

Advances national security and protects financial integrity by informing Treasury decisions with timely, relevant, and accurate intelligence and analysis.

1A8X1

Airborne cryptologic language analyst Operates, evaluates, and manages airborne signals intelligence information systems and operations activities and related ground processing activities.

1A8X2

Airborne intelligence, surveillance, and reconnaissance (ISR) Operator Flies as primary aircrew onboard a wide variety of aircraft to operate, evaluate and manage airborne ISR information and related ground processing systems.

1N0

All Source Intelligence Analyst Performs/manages intelligence activities/functions including discovering, developing, evaluating, and providing intelligence information

CCMD Campaign Plans

Also known as theater campaign plans (TCPs) and functional campaign plans (FCPs) Implement the military portion of national policy and defense strategy by identifying those actions that will conduct on a daily basis.

Priority Intelligence Requirements (PIRs)

An intelligence requirement that the commander and staff need to understand the threat and other aspects of the operational environment.

Request for Information (RFI)

Asks for information that is unavailable or represents an intelligence collection gap. This request is sent up the Collection Management chain to managers that will determine the best solution to support the request.

Phase Six of Joint Targeting Cycle

Assessment Assessment measures whether desired effects are being created, objectives are achieved, and next steps are evaluated. Effective planning and execution require continuing evaluation of the effectiveness of friendly and enemy action.

Contingency Plans

Branches of campaign plans that are planned for potential threats, catastrophic events, and contingent missions without a crisis at-hand. a) Level 1 Planning Detail - Commander's Estimate. This level of planning involves the least amount of detail and focuses on producing multiple COAs to address a contingency. b) Level 2 Planning Detail - Base Plan (BPLAN). A BPLAN describes the CONOPS, major forces, concepts of support, and anticipated timelines for completing the mission. c) Level 3 Planning Detail - CONPLAN - A CONPLAN is an OPLAN in an abbreviated format that may require considerable expansion or alteration to convert it into a complete and detailed Level 4 OPLAN or an OPORD. d) Level 4 Planning Detail - OPLAN - An OPLAN is a complete and detailed plan containing a full description of the CONOPS,

Entity-Level Target Development

Builds on TSA and generally occurs in three stages: basic, intermediate, and advanced. Each stage is defined by a minimum set of essential data required to progress a target from initial identification and functional characterization to execution-level detail. A target is considered fully developed when the three stages are complete (i.e., when the target is characterized enough to be engaged effectively).

Phase Three of Joint Targeting Cycle

Capabilities Analysis Involves evaluating available capabilities against desired effects to determine the appropriate options available to the commander. Inputs to this stage include target characteristics, desired damage criteria or probability of damage (Pd) calculations, and delivery parameters. Involves 4 Steps: Target Vulnurability Analysis, Capabilities Assignment, Feasiblity Assessment, and Effects Estimate

Phase Four of Joint Targeting Cycle

Commander's Decision and Force Assignment The process of resourcing joint integrated prioritized target list (JIPTL) targets with available forces or systems and ISR assets lies at the heart of force assignment.

Weaponeering

Conducted in the third phase of the joint targeting cycle during which appropriate weapons or other capabilities are matched with target elements to create the desired effects on the target(s).

1N3

Cryptologic Language Analyst Employs foreign language skills to collect, transcribe, translate, analyze, and report intelligence information.

National Geospatial-Intelligence Agency (NGA)

Delivers world-class geospatial intelligence (GEOINT) that provides a decisive advantage to policymakers, warfighters, intelligence professionals, and first responders.

ELINT (Electronic Intelligence)

ELINT consists of two subcategories; operational electronic intelligence (OPELINT) and technical electronic intelligence (TECHELINT).

Difference between electro-optical (EO), radar, infrared (IR), multi-spectral, and laser sensors.

EO sensors provide digital imagery data in the IR, visible, and/or ultraviolet regions of the electromagnetic spectrum. IR imaging sensors provide a pictorial representation of the contrasts in thermal IR emissions between objects and their surroundings, and are effective during periods of limited visibility such as at night or in inclement weather. Spectral imagery sensors operate in discrete spectral bands, typically in the IR and visible regions of the electromagnetic spectrum. Spectral imagery is useful for characterizing the environment or detecting and locating objects with known material signatures.

Command and Control (C2)

Encompasses the exercise of authority and direction by a commander over assigned and attached forces in the accomplishment of the mission.

Phase One of Joint Targeting Cycle

End State and Commander's Objectives

Army Intelligence and Security Command (INSCOM)

Executes mission command of operational intelligence and security forces; conducts and synchronizes worldwide multi-discipline and all-source intelligence and security operations; and delivers linguist support and intelligence-related advanced skills training, acquisition support, logistics, communications, and other specialized capabilities in support of Army, Joint, and Coalition Commands and the U.S. Intelligence Community.

1N4

Fusion Analyst Performs and manages intelligence analysis activities/functions in all domains. Analyzes and exploits intelligence information, develops targets, and provides situational awareness for operations personnel and key leadership. Conducts research and develops assessments of adversarial actions and intentions. Drafts and disseminates long-term and time-sensitive intelligence reports to consumers worldwide Two Types: - Digital Network Analyst - Analysis & Production

1N1

Geospatial Intelligence Manages, supervises, and performs intelligence activities and functions including planning, collection, analysis, exploitation, development, and dissemination of multi-sensor geospatial and target intelligence products to support war fighting operations and other activities.

Department of State Bureau of Intelligence and Research's (INR)

Harness intelligence to serve U.S. diplomacy

Air Staff

Headed by the Chief of Staff of the Air Force (CSAF), the organizational structure is patterned on the JS structure to improve communication with other DoD organizations. Primarily composed of uniformed U.S. Air Force officials who assist the CSAF in carrying out his role as the principal military advisor to the SECAF and as a member of the Joint Chiefs of Staff.

1N7

Human Intelligence Specialist Collects and reports intelligence information obtained from human sources in response to requirements. Screens documents and open source materials to identify potential source leads. Assesses, debriefs, and interrogates sources in English. Provides oversight of and supervises interview, debriefings and interrogations conducted in foreign languages. Performs controlled operations officer duties.

National Reconnaissance Office (NRO)

In charge of designing, building, launching, and maintaining America's intelligence satellites.

MASINT (Measurement and Signature Intelligence)

Information produced by quantitative and qualitative analysis of physical attributes of targets and events to characterize, locate, and identify them. Exploits a variety of phenomenologies to support signature development and analysis, to perform technical analysis, and to detect, characterize, locate, and identify targets and events.

Essential Elements of Information (EEIs)

Information requirements that are also critical or that would answer PIRs . May require answering numerous specific questions regarding the collected area/target, such as threat OB, operational status and readiness of troops and equipment, or identification of unique signature information as well as human factor analysis and information operations intelligence integrations (IOII).

Difference Between Integration, Evaluation, Analysis & Interpretation

Integration - Information from single or multiple sources is received, collated, and entered into appropriate databases by the analysis and production elements of IC organizations, the theater JIOCs or equivalents, or subordinate joint force JISE. 2) Evaluation - Each new item of information is evaluated by the appropriate analysis and production element with respect to the reliability of the source and the credibility of the information. 3) Analysis - During analysis, deductions are made by comparing integrated and evaluated information with known facts and predetermined assumptions. These deductions are combined and assessed to discern patterns or recognize events. 4) Interpretation - Interpretation is an objective mental process of comparison and deduction based on common sense, life experience, military knowledge covering both adversary and friendly forces, and existing information and intelligence.

HUMINT Collection Methods and Operations

Intelligence Interrogation, Source Operations (Walk-In, Developed Sources, Unwitting Persons), Debriefing (questioning friendly sources), & Document Exploitation (DOMEX)

COMINT (Communications Intelligence)

Intelligence and technical information derived from collecting and processing intercepted foreign communications passed by radio, wire, or other electromagnetic means. May include imagery, when pictures or diagrams

TECHINT (technical intelligence)

Intelligence derived from the collection, processing, analysis, and exploitation of data and information pertaining to foreign equipment and materiel for the purposes of preventing technological surprise, assessing foreign scientific and technical capabilities, and developing countermeasures designed to neutralize an adversary's technological advantages.

FISINT (Foreign Instrumentation Signals Intelligence)

Involves the technical analysis of data intercepted from foreign equipment and control systems such as telemetry, electronic interrogators, tracking/fusing/arming/firing command systems, and video data links

IMINT

Is the technical, geographic, and intelligence information derived through the interpretation or analysis of imagery and collateral materials. It includes exploitation of imagery data derived from electro-optical (EO), radar, infrared (IR), multi-spectral, and laser sensors.

Federal Bureau of Investigation (FBI)

It is the principal investigative arm of the U.S. Department of Justice and a full member of the U.S. Intelligence Community. Has the authority and responsibility to investigate specific crimes assigned to it and to provide other law enforcement agencies with cooperative services, such as fingerprint identification, laboratory examinations, and training.

Collection Management

Joint Pub 2-01 In intelligence usage, the acquisition of information and the provision of this information to processing elements.

National Security Agency (NSA)

Leads the U.S. Government in cryptology that encompasses both Signals Intelligence (SIGINT) and Information Assurance (IA) products and services, and enables Computer Network Operations in order to gain a decision advantage for the nation and our allies under all circumstances.

TSA: Criticality

Measures a target's contribution to a target system's larger function and its relative importance within the target system. Four Factors: Value, Depth, Recuperation & Capacity

Phase Five of Joint Targeting Cycle

Mission Planning and Force Execution

Collection Operations Management (COM)

Organizes, directs, and monitors the equipment and personnel that collect the data to satisfy requirements. Personnel develop collection plans against requirements in cooperation with CRM personnel.

Marine Corps Intelligence

Provide commanders at every level seamless, tailored, timely, and mission-essential intelligence and to ensure this intelligence is integrated into the operational planning process. Since activities are oriented toward the operational and tactical levels, two-thirds serve in the operating forces, with the majority assigned to the staffs and units of tactical commands.

Defense Intelligence Agency (DIA)

Provides military intelligence to warfighters, defense policymakers and force planners in the Department of Defense and the Intelligence Community in support of U.S. military planning and operations, and weapon systems acquisition.

Air Force Intelligence: The Twenty-Fifth Air Force (25 AF)

Provides multisource intelligence, surveillance, and reconnaissance (ISR) products, applications, capabilities and resources, to include cyber and geospatial forces and expertise. Additionally, it is the Service Cryptologic Component responsible to the National Security Agency/Central Security Service for Air Force matters involving the conduct of cryptologic activities, including the full spectrum of missions directly related to both tactical warfighting and national-level operations.

Central Intelligence Agency (CIA)

Providing overall direction for and coordination of the collection of national intelligence outside the United States through human sources by elements of the Intelligence Community. The Director of the Central Intelligence Agency (DCIA) serves as the head and reports to the Director of National Intelligence.

National Intelligence Priorities Framework (NIPF)

Published annually and reviewed quarterly, this is the primary mechanism to establish, manage, and communicate national intelligence priorities.

Difference between Radar Imaging & Lidar Sensors

Radar imaging sensors provide all weather imaging capabilities and the primary night capability. Radar imagery is formed from reflected energy in the radio frequency portion of the electromagnetic spectrum. Some radar sensors provide moving target indicator capability to detect and locate moving targets such as armor and other vehicles. Lidar sensors are similar to radar, transmitting laser pulses to a target and recording the time required for the pulses to return to the sensor receiver. Lidar can be used to measure shoreline and beach volume changes, conduct flood risk analysis, identify waterflow issues, and augment transportation mapping applications.

TSA: Vulnerability

Refers to the physical susceptibility to damage, disruption, intrusion, interference, or other desired effect. Six Factors: Cushion, Reserves, Dispersion, Mobility, Countermeasures, Physical Characteristics

Department of Energy (DOE) Office of Intelligence and Counterintelligence

Responsible for all intelligence and counterintelligence activities throughout the complex, including nearly 30 offices nationwide. The Office protects vital national security information and technologies, representing intellectual property of incalculable value.

Drug Enforcement Administration (DEA)

Responsible for enforcing the controlled substance laws and regulations of the United States. Their Intelligence Program helps initiate new investigations of major drug organizations, strengthens ongoing investigations and subsequent prosecutions, develops information that leads to seizures and arrests, and provides policy-makers with drug trend information upon which programmatic decisions can be based.

Joint Targeting Cycle (JTC)

Selects and prioritizes targets and matches the appropriate means to engage them, considering operational requirements and capabilities. This is an iterative, non-linear process that provides a framework for successfully conducting joint targeting.

1N2

Signals Intelligence Analyst Acquires, processes, identifies, analyzes, and reports on electromagnetic emissions. Operates electronic equipment and computer systems to exploit signals intelligence production efforts.

Phase Two of Joint Targeting Cycle

Target Development and Prioritization The analysis, assessment, and documentation processes to identify and characterize potential targets that, when successfully engaged, support the achievement of the commander's objectives

1N8

Targeting Analyst Manages, supervises, and performs targeting intelligence activities and functions including analyzing targets. In addition, develops targeting solutions and evaluates effects in support of planning and execution of an effects based approach to operations that achieves the commander's objectives.

Programs of Analysis (POAs)

The DNI has directed each IC organization to annually publish to provide comprehensive intelligence analysis and production focus for their organization. Collectively, these offer a framework for collaboration with customers, stakeholders, and IC partners.

Office of the Director of National Intelligence (ODNI)

The Director of National Intelligence (DNI) serves as the head of the U.S. Intelligence Community, overseeing and directing the implementation of the National Intelligence Program (NIP). Staffed by officers from across the IC and is organized into component offices. These offices fall under three main areas of focus: Core Mission, Enablers, and Oversight. Internal staff offices execute the administrative functions.

Commander's Objectives

The basis for developing the desired effects and the scope of target development. Attainment of objectives is essential to the successful realization of the desired end state. Effective targeting is distinguished by the ability to generate the type and extent of effect necessary for achievement.

SIGINT (Signals Intelligence)

The discipline is subdivided into three subcategories: communications intelligence (COMINT), ELINT, and foreign instrumentation signals intelligence (FISINT).

GEOINT (Geospatial Intelligence)

The exploitation and analysis of imagery to describe, assess, and visually depict physical features and geographically referenced activities on the Earth.

Target System Analysis (TSA).

The foundational process of system-level target development. It is equally applicable to systems and capabilities associated with both nation-state and non-state actors. The purpose is to identify targeting strategies that enable a JFC to use targeting to accomplish objectives and to identify high value and high payoff targets that underpin those strategies. Examples of target systems are an adversary's C2 structure, ground forces and facilities, and the petroleum, oils, and lubricants (POL) industry.

Military End State

The set of required conditions that defines achievement of all military objectives for the operation, to resolve the situation or conflict on satisfactory terms, as defined by appropriate authority.

Target List Management (TLM)

The third step of the joint targeting cycle phase 2 and begins when a target is nominated for target development and ends with the creation and maintenance of a prior. Includes target vetting, validation, listing, nomination, and prioritization.

PCPAD

This is the Intelligence Process that describes how the various types of intelligence operations interact to meet the commander's intelligence needs. Planning & Direction Collection Processing & Exploitation Analysis & Production Dissemination & Integration

Key Intelligence Questions

This is when intelligence analysis and production are driven by leading questions or requirements for intelligence to fill a gap in knowledge or understanding of the environment, adversary capabilities, centers of gravity, or intentions

Joint Intelligence Preparation of the Operational Environment (JIPOE)

This process is a fundamental step in the planning process and is important to target development.... because it provides a disciplined methodology that provides an understanding of the relationship between adversary COGs.

Mission Planning and Force Execution

Upon receipt of tasking orders, detailed planning should be performed for the execution of operations. The joint targeting process supports this planning by providing tactical-level planners with direct access to detailed information on the targets, supported by the nominating component's analytical reasoning that linked the target with the desired effect (conducted in Phase 2 of the joint targeting cycle).

OSINT (Open Source Intelligence)

data collected from publicly available sources to be used in an intelligence context.

Three Steps of Phase Two of JTC

i) Target system analysis (TSA); ii) Entity-level target development; and iii) Target list management (TLM).


Set pelajaran terkait

College Board Unit 2 Progress Check

View Set

Algorithms: Design and Analysis, Part 1 - Divide & Conquer Algorithms

View Set

PSYB10 CHAPTER 14 | Altruism and Cooperation

View Set

prepU - perfusion & oxygenation Q's

View Set