The flashcards below were created by user
on FreezingBlue Flashcards.
What are the parts of the Center of Gravity methodology?
- Critical Capabilities
- Critical Requirements
- Critical Vulnerabilities
What is Center of Gravity Analysis?
A systematic tool to assist commanders and staffs in analyzing firendly and threat sources of strength as well as weaknesses and vulnerabilities.
What is a Center of Gravity?
The primary source of moral or physical strength, power and resistance.
What are Critical capabilities?
Primary abilities [that merit] a center of gravity to be identified as such in the context of a given scenario, situation, or mission.
What are Critical requirements?
Essential conditions, resources and means for a critical capability to be fully operative.
What are Critical vulnerabilities?
Critical requirements or components thereof which are deficient, or vulnerable to neutralization, interdiction, or attack (moral/physical harm) in a manner achieving decisive or significant results, disproportional to the military resources applied.
What are the 6 steps of the Request Management Cycle?
- Develop Requirements
- Develop SR Synchronization Plan
- Support SR Integration
- Disseminate Intelligence
- Assess SR Operations
- Update SR Plan
What is the goal of target acquisition?
To provide timely and accurate information to enhance the attack of the specific targets.
What are the differences between an Intelligence Requirement and an Information Requirement?
- An Intelligence Requirement is required by the commander and his staff and it will have a collection asset assigned.
- An Information Requirement can be serviced by other means.
What are Specific Information Requests (SIRs)? What do they do?
SIRs are individual questions that help answer a PIR. They allow assets to be tasked
What are the 4 steps of the Intelligence process?
What are the 3 common Intelligence tasks?
What are the 7 Intelligence disciplines?
- Counter Intelligence (CI)
- Geospatial Intelligence (GEOINT)
- Human Intelligence (HUMINT)
- Measures and Signatures Intelligence (MASINT)
- Open-Source Intelligence (OSINT)
- Signals Intelligence (SIGINT)
- Technical Intelligence (TECHINT)
What are the missions of Counter Intelligence (CI)?
- Counter espionage
- Support to force protection
- Support to research, development, and acquisition
- Cyber counter-intelligence
What are the core functions of Counter Intelligence (CI)?
- Technical Services and Support
- Analysis and Production
What are the methods of HUMINT?
What is MASINT?
Scientific and technical intelligence obtained by quantitative and qualitative analysis of data. It results in intelligence that detects, tracks, identifies, or describes the signatures (distinctive characteristics) of fixed or dynamic target sources
What does SIGINT track?
- Communications Intelligence (COMINT) - Communications between people
- Electronic Intelligence (ELINT) - Communications between machines
- Foreign Instrumentation Signals Intelligence (FISINT) - Emissions from testing and operational deployment of foreign aerospace, surface, and subsurface systems
What is Technical Intelligence (TECHINT)?
Intelligence about weapons and equipment used by the armed forces of foreign nations. (Weapons Technical Intelligence - WTI)
What are the complimentary intelligence capabilities?
- Biometrics-enabled intelligence (BEI).
- Cyber-enabled intelligence.
- Document and media exploitation (DOMEX).
- Forensic-enabled intelligence (FEI).
What is a Sensitive Site?
A geographically limited area with special diplomatic, information, military or economic sensitivity.
What are the 7 tactical imperatives of Sensitive Site Exploitation?
- Isolate, seize, and secure sensitive sites as soon as tactically feasible, and control them until they are neutralized or destroyed.
- Plan for operations involving sensitive sites.
- Report the discovery of suspected sensitive sites immediately.
- Balance mission accomplishment with force protection.
- Use trained and equipped experts for site exploitation.
- Provide all feasible support to the site exploitation team.
- Secure and safeguard captured personnel, materiel, documents, and electronic data for exploitation.
What are the 2 types of Sensitive Site Exploitation?
- Hasty - In the course of other operations.
- Deliberate - Requires: surveillance & recon, rapid & controlled seizure & clearing, immediate and careful exploitation
What are the 5 principle characterstics of systems?
- Operational independence of the elements.
- Managerial independence of the elements.
- Evoolutionary development (able to change goals).
- Emergent behavior (the whole behaves differently from the parts).
- Geographic Distribution.
What are the steps of PMESII-PT Systems Analysis?
- Basic research
- Vulnerability identification
- Node identification
- Node analysis
- Integrate PMESII-PT