Military Intelligence Procedures Quiz

CelebratedRomanArt avatar
CelebratedRomanArt
·
·
Download

Start Quiz

Study Flashcards

22 Questions

What determines access to classified material?

Security clearance and background check

Which category of classified material is considered the highest level?

Top Secret

What is the purpose of tactical intelligence?

Battlefield decision-making

Which elements are included in the intelligence formula?

Information + analysis = intelligence

Why is the authorization to receive or possess classified material important?

To prevent unauthorized disclosure

What distinguishes strategic intelligence from tactical intelligence?

Operational timeframe

What are the three general purposes for which CI measures are employed?

Denial

For what reason are denial measures employed?

To protect personnel from subversion

What are the major limitations of CI assets?

Personnel strength

What are the three types of CI operations that occur in a forward operating area?

Retrograde operations

What is the definition of a walk-in source?

An individual who voluntarily comes forward to provide information to CI personnel

What is the definition of security?

Measures taken to protect against impairing effectiveness

What do commander continuing intelligence requirements (CCIRs) relate to?

Mission accomplishment

Which executive order governs intelligence activities?

E.O. 12333

What is the primary mission of CI assets in garrison?

Accomplish tactical CI functions

What do active CI measures involve?

Neutralizing hostile threats

What is the definition of espionage?

Acquisition of information through clandestine operations

What are the five steps of the intelligence cycle?

Direction, Collection, Processing, Production, Dissemination

What does a basic intelligence requirement (BIR) focus on?

Relatively unchanging aspects of the enemy and military geography

What is included in the five phases of interrogation according to the text?

(A) Planning and preparation, (B) Approach, (C) Questioning, (D) Termination, (E) Reporting

What is the focus of commander continuing intelligence requirements (CCIRs)?

Mission accomplishment

What is the definition of an indicator according to the text?

Item of information reflecting enemy intentions or capabilities

Study Notes

POW/Detainee Handling Procedures

  • The acronym used to identify POW/detainee handling procedures is 5 S’s & a T: Search, Silence, Segregate, Safeguard, Speed, and Tag.

Classified Material

  • There are three categories of classified material: Confidential, Secret, and Top Secret.

Access and Information

  • Access is defined as the authorization to receive or possess classified material.
  • Two factors that determine access are Security Clearance and Need to Know.
  • Information is defined as unevaluated material of every description, including that derived from observations, communications, reports, imagery, and other sources, which when processed may produce intelligence.

Intelligence

  • Intelligence is defined as the product resulting from the collection, evaluation, analysis, integration, and interpretation of all available information which concerns one or more aspects of foreign nations or areas of operations, and which is immediately or potentially significant to military planning and operations.
  • The intelligence formula is: Information + Analysis = Intelligence.

Types of Intelligence

  • Strategic intelligence is required for the formulation of policy and plans at international, national, and tactical levels.
  • Tactical intelligence is used for the battle in progress and is required for the planning and conduct of tactical operations.
  • Target intelligence is a specific intelligence effort to support effective targeting, portraying and locating the components of a target or complex and indicating its vulnerability and relative importance.

Intelligence Cycle

  • The three forms of intelligence are: Basic, Current, and Estimative.
  • A basic intelligence requirement (BIR) is directed at relatively unchanging aspects of the enemy and military geography.
  • Commander continuing intelligence requirements (CCIRs) are critical or high priority elements of information required by the Commander which relate directly to mission accomplishment.
  • The five steps of the intelligence cycle are: Direction, Collection, Processing, Production, and Dissemination.

Counterintelligence

  • The four threats that counterintelligence focuses on are: Terrorism, Espionage, Sabotage, and Subversion.
  • Executive Order 12333 governs intelligence activities.
  • Executive Order 12334 governs intelligence oversight.
  • Marine Corps Order (MCO) 3870.2 governs intelligence oversight.
  • Marine Corps Reference Publication (MCRP) 2-10A2 covers counterintelligence.
  • Marine Corps Warfighting Publication (MCWP) 2-14 covers counterintelligence.
  • MCO 3850.1j gives policy and guidance for Counterintelligence (CI) and human source intelligence (HUMINT) activities.

Counterintelligence Definitions

  • An indicator is an item of information which reflects the intention or capability of a potential enemy to adopt or reject a course of action.
  • Terrorism is the unlawful use or threatened use of force or violence against individuals or property to coerce or intimidate governments or societies, often to achieve political, religious, or ideological objectives.
  • Espionage is actions directed toward the acquisition of information through clandestine operations.
  • Sabotage is an act or acts with the intent to injure, interfere with, or obstruct the national defense of a country by willingly injuring or destroying, or attempting to injure or destroy, any national defense or war material, premises, or utilities, to include human and natural resources.
  • Subversion is action designed to weaken or undermine the military, economic, psychological, political strength of a nation, or morale of a regime.

Interrogation

  • The five phases of interrogation are: Planning and Preparation, Approach, Questioning, Termination, and Reporting.

Counterintelligence Missions

  • CI assets in garrison have two primary missions: to plan, prepare, and train to accomplish tactical CI functions, and to advise and assist the commander in planning, coordinating, and implementing command initiated measures, programs, and efforts.
  • CI assets in a tactical environment have two missions: to conduct CI offensive operations designed to identify, locate, and neutralize hostile attempts of intelligence collection/espionage, sabotage, subversion, and terrorism, and to conduct tactical HUMINT collection in support of intelligence collection requirements.

Active and Passive CI Measures

  • Active CI measures are aggressive offensive actions taken to neutralize the hostile threat and hostile efforts toward espionage, sabotage, subversion, and terrorism.
  • Passive CI measures are defensive actions designed to conceal and deny information to the enemy, protect personnel from subversion and terrorism, and protect installations and material from sabotage.

Counterintelligence Purposes

  • CI measures are employed for three general purposes: Denial, Detection, and Deception.
  • Denial measures are applied to prevent the enemy from gaining access to classified and sensitive information, subverting personnel, and penetrating the physical security barriers established at installations.
  • Deception measures are used to mislead or otherwise confuse the enemy concerning our capabilities, actions, and intentions.

CI Planning Documents

  • There are eight MAGTF CI planning documents: CI Estimate, CI Appendix, HUMINT Appendix, CI Measures Worksheet, Personality, Organization and Installation files (PO&I), Detainable, of Interest, Protectable list (DoIP), Automatic Apprehension List, and CI Target Reduction Plan.

CI Limitations and Operations

  • The three major limitations of CI assets are: Personnel strength, Foreign language capability, and Jurisdictional constraints.
  • The three types of CI operations that occur in a forward operating area are: Offensive, Defensive, and Retrograde operations.
  • The four primary objectives of defensive CI operations are: to guard against enemy intelligence collection efforts, to guard against the infiltration of enemy intelligence agents, to guard against sabotage agents, and to guard against terrorists.

Walk-in Sources

  • A walk-in source is an individual who voluntarily comes forward to provide information to CI personnel.
  • There are six types of walk-in sources: Legitimate informant, Paper mill, Multiple reporter, Asset recruited by others, Disinformation agent, and Dangle.
  • The five most common motivations of walk-in sources are: National pride, Fear, Favorable opinion of the U.S., Hate/revenge, and Reward.

Order of Battle

  • The 10 Order of Battle factors are: Mission, Composition, Strength, Disposition, Tactics, Training, Combat effectiveness, Logistics, Electronic technical data, and Miscellaneous.

Test your knowledge of military intelligence by answering questions on POW/detainee handling procedures, classified material categories, definitions of access and information.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser