Military Intelligence Procedures Quiz
22 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What determines access to classified material?

  • Biometric authentication and password
  • Level of education and social status
  • Country of origin and job title
  • Security clearance and background check (correct)
  • Which category of classified material is considered the highest level?

  • Top Secret (correct)
  • Sensitive Compartmented Information (SCI)
  • Confidential
  • Restricted
  • What is the purpose of tactical intelligence?

  • Battlefield decision-making (correct)
  • Formulating national policy
  • Planning international operations
  • Strategic planning
  • Which elements are included in the intelligence formula?

    <p>Information + analysis = intelligence</p> Signup and view all the answers

    Why is the authorization to receive or possess classified material important?

    <p>To prevent unauthorized disclosure</p> Signup and view all the answers

    What distinguishes strategic intelligence from tactical intelligence?

    <p>Operational timeframe</p> Signup and view all the answers

    What are the three general purposes for which CI measures are employed?

    <p>Denial</p> Signup and view all the answers

    For what reason are denial measures employed?

    <p>To protect personnel from subversion</p> Signup and view all the answers

    What are the major limitations of CI assets?

    <p>Personnel strength</p> Signup and view all the answers

    What are the three types of CI operations that occur in a forward operating area?

    <p>Retrograde operations</p> Signup and view all the answers

    What is the definition of a walk-in source?

    <p>An individual who voluntarily comes forward to provide information to CI personnel</p> Signup and view all the answers

    What is the definition of security?

    <p>Measures taken to protect against impairing effectiveness</p> Signup and view all the answers

    What do commander continuing intelligence requirements (CCIRs) relate to?

    <p>Mission accomplishment</p> Signup and view all the answers

    Which executive order governs intelligence activities?

    <p>E.O. 12333</p> Signup and view all the answers

    What is the primary mission of CI assets in garrison?

    <p>Accomplish tactical CI functions</p> Signup and view all the answers

    What do active CI measures involve?

    <p>Neutralizing hostile threats</p> Signup and view all the answers

    What is the definition of espionage?

    <p>Acquisition of information through clandestine operations</p> Signup and view all the answers

    What are the five steps of the intelligence cycle?

    <p>Direction, Collection, Processing, Production, Dissemination</p> Signup and view all the answers

    What does a basic intelligence requirement (BIR) focus on?

    <p>Relatively unchanging aspects of the enemy and military geography</p> Signup and view all the answers

    What is included in the five phases of interrogation according to the text?

    <p>(A) Planning and preparation, (B) Approach, (C) Questioning, (D) Termination, (E) Reporting</p> Signup and view all the answers

    What is the focus of commander continuing intelligence requirements (CCIRs)?

    <p>Mission accomplishment</p> Signup and view all the answers

    What is the definition of an indicator according to the text?

    <p>Item of information reflecting enemy intentions or capabilities</p> Signup and view all the answers

    Study Notes

    POW/Detainee Handling Procedures

    • The acronym used to identify POW/detainee handling procedures is 5 S’s & a T: Search, Silence, Segregate, Safeguard, Speed, and Tag.

    Classified Material

    • There are three categories of classified material: Confidential, Secret, and Top Secret.

    Access and Information

    • Access is defined as the authorization to receive or possess classified material.
    • Two factors that determine access are Security Clearance and Need to Know.
    • Information is defined as unevaluated material of every description, including that derived from observations, communications, reports, imagery, and other sources, which when processed may produce intelligence.

    Intelligence

    • Intelligence is defined as the product resulting from the collection, evaluation, analysis, integration, and interpretation of all available information which concerns one or more aspects of foreign nations or areas of operations, and which is immediately or potentially significant to military planning and operations.
    • The intelligence formula is: Information + Analysis = Intelligence.

    Types of Intelligence

    • Strategic intelligence is required for the formulation of policy and plans at international, national, and tactical levels.
    • Tactical intelligence is used for the battle in progress and is required for the planning and conduct of tactical operations.
    • Target intelligence is a specific intelligence effort to support effective targeting, portraying and locating the components of a target or complex and indicating its vulnerability and relative importance.

    Intelligence Cycle

    • The three forms of intelligence are: Basic, Current, and Estimative.
    • A basic intelligence requirement (BIR) is directed at relatively unchanging aspects of the enemy and military geography.
    • Commander continuing intelligence requirements (CCIRs) are critical or high priority elements of information required by the Commander which relate directly to mission accomplishment.
    • The five steps of the intelligence cycle are: Direction, Collection, Processing, Production, and Dissemination.

    Counterintelligence

    • The four threats that counterintelligence focuses on are: Terrorism, Espionage, Sabotage, and Subversion.
    • Executive Order 12333 governs intelligence activities.
    • Executive Order 12334 governs intelligence oversight.
    • Marine Corps Order (MCO) 3870.2 governs intelligence oversight.
    • Marine Corps Reference Publication (MCRP) 2-10A2 covers counterintelligence.
    • Marine Corps Warfighting Publication (MCWP) 2-14 covers counterintelligence.
    • MCO 3850.1j gives policy and guidance for Counterintelligence (CI) and human source intelligence (HUMINT) activities.

    Counterintelligence Definitions

    • An indicator is an item of information which reflects the intention or capability of a potential enemy to adopt or reject a course of action.
    • Terrorism is the unlawful use or threatened use of force or violence against individuals or property to coerce or intimidate governments or societies, often to achieve political, religious, or ideological objectives.
    • Espionage is actions directed toward the acquisition of information through clandestine operations.
    • Sabotage is an act or acts with the intent to injure, interfere with, or obstruct the national defense of a country by willingly injuring or destroying, or attempting to injure or destroy, any national defense or war material, premises, or utilities, to include human and natural resources.
    • Subversion is action designed to weaken or undermine the military, economic, psychological, political strength of a nation, or morale of a regime.

    Interrogation

    • The five phases of interrogation are: Planning and Preparation, Approach, Questioning, Termination, and Reporting.

    Counterintelligence Missions

    • CI assets in garrison have two primary missions: to plan, prepare, and train to accomplish tactical CI functions, and to advise and assist the commander in planning, coordinating, and implementing command initiated measures, programs, and efforts.
    • CI assets in a tactical environment have two missions: to conduct CI offensive operations designed to identify, locate, and neutralize hostile attempts of intelligence collection/espionage, sabotage, subversion, and terrorism, and to conduct tactical HUMINT collection in support of intelligence collection requirements.

    Active and Passive CI Measures

    • Active CI measures are aggressive offensive actions taken to neutralize the hostile threat and hostile efforts toward espionage, sabotage, subversion, and terrorism.
    • Passive CI measures are defensive actions designed to conceal and deny information to the enemy, protect personnel from subversion and terrorism, and protect installations and material from sabotage.

    Counterintelligence Purposes

    • CI measures are employed for three general purposes: Denial, Detection, and Deception.
    • Denial measures are applied to prevent the enemy from gaining access to classified and sensitive information, subverting personnel, and penetrating the physical security barriers established at installations.
    • Deception measures are used to mislead or otherwise confuse the enemy concerning our capabilities, actions, and intentions.

    CI Planning Documents

    • There are eight MAGTF CI planning documents: CI Estimate, CI Appendix, HUMINT Appendix, CI Measures Worksheet, Personality, Organization and Installation files (PO&I), Detainable, of Interest, Protectable list (DoIP), Automatic Apprehension List, and CI Target Reduction Plan.

    CI Limitations and Operations

    • The three major limitations of CI assets are: Personnel strength, Foreign language capability, and Jurisdictional constraints.
    • The three types of CI operations that occur in a forward operating area are: Offensive, Defensive, and Retrograde operations.
    • The four primary objectives of defensive CI operations are: to guard against enemy intelligence collection efforts, to guard against the infiltration of enemy intelligence agents, to guard against sabotage agents, and to guard against terrorists.

    Walk-in Sources

    • A walk-in source is an individual who voluntarily comes forward to provide information to CI personnel.
    • There are six types of walk-in sources: Legitimate informant, Paper mill, Multiple reporter, Asset recruited by others, Disinformation agent, and Dangle.
    • The five most common motivations of walk-in sources are: National pride, Fear, Favorable opinion of the U.S., Hate/revenge, and Reward.

    Order of Battle

    • The 10 Order of Battle factors are: Mission, Composition, Strength, Disposition, Tactics, Training, Combat effectiveness, Logistics, Electronic technical data, and Miscellaneous.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge of military intelligence by answering questions on POW/detainee handling procedures, classified material categories, definitions of access and information.

    More Like This

    Use Quizgecko on...
    Browser
    Browser