Combined COG ITA Intel SSE SOSA FC.txt

Card Set Information

Combined COG ITA Intel SSE SOSA FC.txt
2012-11-09 06:19:24
Combined COG ITA Intel SSE SOSA FC

Combined COG ITA Intel SSE SOSA FC
Show Answers:

  1. What are the parts of the Center of Gravity methodology?
    • Critical Capabilities
    • Critical Requirements
    • Critical Vulnerabilities
  2. What is Center of Gravity Analysis?
    A systematic tool to assist commanders and staffs in analyzing firendly and threat sources of strength as well as weaknesses and vulnerabilities.
  3. What is a Center of Gravity?
    The primary source of moral or physical strength, power and resistance.
  4. What are Critical capabilities?
    Primary abilities [that merit] a center of gravity to be identified as such in the context of a given scenario, situation, or mission.
  5. What are Critical requirements?
    Essential conditions, resources and means for a critical capability to be fully operative.
  6. What are Critical vulnerabilities?
    Critical requirements or components thereof which are deficient, or vulnerable to neutralization, interdiction, or attack (moral/physical harm) in a manner achieving decisive or significant results, disproportional to the military resources applied.
  7. What are the 6 steps of the Request Management Cycle?
    • Develop Requirements
    • Develop SR Synchronization Plan
    • Support SR Integration
    • Disseminate Intelligence
    • Assess SR Operations
    • Update SR Plan
  8. What is the goal of target acquisition?
    To provide timely and accurate information to enhance the attack of the specific targets.
  9. What are the differences between an Intelligence Requirement and an Information Requirement?
    • An Intelligence Requirement is required by the commander and his staff and it will have a collection asset assigned.
    • An Information Requirement can be serviced by other means.
  10. What are Specific Information Requests (SIRs)? What do they do?
    SIRs are individual questions that help answer a PIR. They allow assets to be tasked
  11. What are the 4 steps of the Intelligence process?
    • Plan
    • Prepare
    • Collect
    • Produce
  12. What are the 3 common Intelligence tasks?
    • Analyze
    • Disseminate
    • Assess
  13. What are the 7 Intelligence disciplines?
    • Counter Intelligence (CI)
    • Geospatial Intelligence (GEOINT)
    • Human Intelligence (HUMINT)
    • Measures and Signatures Intelligence (MASINT)
    • Open-Source Intelligence (OSINT)
    • Signals Intelligence (SIGINT)
    • Technical Intelligence (TECHINT)
  14. What are the missions of Counter Intelligence (CI)?
    • Counter espionage
    • Support to force protection
    • Support to research, development, and acquisition
    • Cyber counter-intelligence
  15. What are the core functions of Counter Intelligence (CI)?
    • Operations
    • Investigations
    • Collection
    • Technical Services and Support
    • Analysis and Production
  16. What are the methods of HUMINT?
    • Screening
    • Interrogation
    • Debriefing
    • HUMINT
    • Liaison
  17. What is MASINT?
    Scientific and technical intelligence obtained by quantitative and qualitative analysis of data. It results in intelligence that detects, tracks, identifies, or describes the signatures (distinctive characteristics) of fixed or dynamic target sources
  18. What does SIGINT track?
    • Communications Intelligence (COMINT) - Communications between people
    • Electronic Intelligence (ELINT) - Communications between machines
    • Foreign Instrumentation Signals Intelligence (FISINT) - Emissions from testing and operational deployment of foreign aerospace, surface, and subsurface systems
  19. What is Technical Intelligence (TECHINT)?
    Intelligence about weapons and equipment used by the armed forces of foreign nations. (Weapons Technical Intelligence - WTI)
  20. What are the complimentary intelligence capabilities?
    • Biometrics-enabled intelligence (BEI).
    • Cyber-enabled intelligence.
    • Document and media exploitation (DOMEX).
    • Forensic-enabled intelligence (FEI).
  21. What is a Sensitive Site?
    A geographically limited area with special diplomatic, information, military or economic sensitivity.
  22. What are the 7 tactical imperatives of Sensitive Site Exploitation?
    • Isolate, seize, and secure sensitive sites as soon as tactically feasible, and control them until they are neutralized or destroyed.
    • Plan for operations involving sensitive sites.
    • Report the discovery of suspected sensitive sites immediately.
    • Balance mission accomplishment with force protection.
    • Use trained and equipped experts for site exploitation.
    • Provide all feasible support to the site exploitation team.
    • Secure and safeguard captured personnel, materiel, documents, and electronic data for exploitation.
  23. What are the 2 types of Sensitive Site Exploitation?
    • Hasty - In the course of other operations.
    • Deliberate - Requires: surveillance & recon, rapid & controlled seizure & clearing, immediate and careful exploitation
  24. What are the 5 principle characterstics of systems?
    • Operational independence of the elements.
    • Managerial independence of the elements.
    • Evoolutionary development (able to change goals).
    • Emergent behavior (the whole behaves differently from the parts).
    • Geographic Distribution.
  25. What are the steps of PMESII-PT Systems Analysis?
    • Basic research
    • Analysis
    • Vulnerability identification
    • Node identification
    • Node analysis
    • Integrate PMESII-PT
    • Publish