Podcast
Questions and Answers
What determines access to classified material?
What determines access to classified material?
- Biometric authentication and password
- Level of education and social status
- Country of origin and job title
- Security clearance and background check (correct)
Which category of classified material is considered the highest level?
Which category of classified material is considered the highest level?
- Top Secret (correct)
- Sensitive Compartmented Information (SCI)
- Confidential
- Restricted
What is the purpose of tactical intelligence?
What is the purpose of tactical intelligence?
- Battlefield decision-making (correct)
- Formulating national policy
- Planning international operations
- Strategic planning
Which elements are included in the intelligence formula?
Which elements are included in the intelligence formula?
Why is the authorization to receive or possess classified material important?
Why is the authorization to receive or possess classified material important?
What distinguishes strategic intelligence from tactical intelligence?
What distinguishes strategic intelligence from tactical intelligence?
What are the three general purposes for which CI measures are employed?
What are the three general purposes for which CI measures are employed?
For what reason are denial measures employed?
For what reason are denial measures employed?
What are the major limitations of CI assets?
What are the major limitations of CI assets?
What are the three types of CI operations that occur in a forward operating area?
What are the three types of CI operations that occur in a forward operating area?
What is the definition of a walk-in source?
What is the definition of a walk-in source?
What is the definition of security?
What is the definition of security?
What do commander continuing intelligence requirements (CCIRs) relate to?
What do commander continuing intelligence requirements (CCIRs) relate to?
Which executive order governs intelligence activities?
Which executive order governs intelligence activities?
What is the primary mission of CI assets in garrison?
What is the primary mission of CI assets in garrison?
What do active CI measures involve?
What do active CI measures involve?
What is the definition of espionage?
What is the definition of espionage?
What are the five steps of the intelligence cycle?
What are the five steps of the intelligence cycle?
What does a basic intelligence requirement (BIR) focus on?
What does a basic intelligence requirement (BIR) focus on?
What is included in the five phases of interrogation according to the text?
What is included in the five phases of interrogation according to the text?
What is the focus of commander continuing intelligence requirements (CCIRs)?
What is the focus of commander continuing intelligence requirements (CCIRs)?
What is the definition of an indicator according to the text?
What is the definition of an indicator according to the text?
Flashcards
POW/Detainee Handling
POW/Detainee Handling
Search, Silence, Segregate, Safeguard, Speed, and Tag.
Access (Classified Material)
Access (Classified Material)
Authorization to receive or possess classified material.
Two factors for access
Two factors for access
Security Clearance and Need to Know.
Information (Intelligence)
Information (Intelligence)
Signup and view all the flashcards
Intelligence formula
Intelligence formula
Signup and view all the flashcards
Strategic Intelligence
Strategic Intelligence
Signup and view all the flashcards
Tactical Intelligence
Tactical Intelligence
Signup and view all the flashcards
Target Intelligence
Target Intelligence
Signup and view all the flashcards
Basic Intelligence Requirement (BIR)
Basic Intelligence Requirement (BIR)
Signup and view all the flashcards
Commander's Critical Intelligence Requirements (CCIR)
Commander's Critical Intelligence Requirements (CCIR)
Signup and view all the flashcards
Five Steps of the Intelligence Cycle
Five Steps of the Intelligence Cycle
Signup and view all the flashcards
Four Counterintelligence (CI) threats
Four Counterintelligence (CI) threats
Signup and view all the flashcards
Indicator (CI)
Indicator (CI)
Signup and view all the flashcards
Terrorism
Terrorism
Signup and view all the flashcards
Espionage
Espionage
Signup and view all the flashcards
Sabotage
Sabotage
Signup and view all the flashcards
Subversion
Subversion
Signup and view all the flashcards
Five Phases of Interrogation
Five Phases of Interrogation
Signup and view all the flashcards
CI operation types in forward area
CI operation types in forward area
Signup and view all the flashcards
Three Major Limitations of CI assets
Three Major Limitations of CI assets
Signup and view all the flashcards
Walk-in Source
Walk-in Source
Signup and view all the flashcards
Six Types of Walk-in Sources
Six Types of Walk-in Sources
Signup and view all the flashcards
Study Notes
POW/Detainee Handling Procedures
- The acronym used to identify POW/detainee handling procedures is 5 S’s & a T: Search, Silence, Segregate, Safeguard, Speed, and Tag.
Classified Material
- There are three categories of classified material: Confidential, Secret, and Top Secret.
Access and Information
- Access is defined as the authorization to receive or possess classified material.
- Two factors that determine access are Security Clearance and Need to Know.
- Information is defined as unevaluated material of every description, including that derived from observations, communications, reports, imagery, and other sources, which when processed may produce intelligence.
Intelligence
- Intelligence is defined as the product resulting from the collection, evaluation, analysis, integration, and interpretation of all available information which concerns one or more aspects of foreign nations or areas of operations, and which is immediately or potentially significant to military planning and operations.
- The intelligence formula is: Information + Analysis = Intelligence.
Types of Intelligence
- Strategic intelligence is required for the formulation of policy and plans at international, national, and tactical levels.
- Tactical intelligence is used for the battle in progress and is required for the planning and conduct of tactical operations.
- Target intelligence is a specific intelligence effort to support effective targeting, portraying and locating the components of a target or complex and indicating its vulnerability and relative importance.
Intelligence Cycle
- The three forms of intelligence are: Basic, Current, and Estimative.
- A basic intelligence requirement (BIR) is directed at relatively unchanging aspects of the enemy and military geography.
- Commander continuing intelligence requirements (CCIRs) are critical or high priority elements of information required by the Commander which relate directly to mission accomplishment.
- The five steps of the intelligence cycle are: Direction, Collection, Processing, Production, and Dissemination.
Counterintelligence
- The four threats that counterintelligence focuses on are: Terrorism, Espionage, Sabotage, and Subversion.
- Executive Order 12333 governs intelligence activities.
- Executive Order 12334 governs intelligence oversight.
- Marine Corps Order (MCO) 3870.2 governs intelligence oversight.
- Marine Corps Reference Publication (MCRP) 2-10A2 covers counterintelligence.
- Marine Corps Warfighting Publication (MCWP) 2-14 covers counterintelligence.
- MCO 3850.1j gives policy and guidance for Counterintelligence (CI) and human source intelligence (HUMINT) activities.
Counterintelligence Definitions
- An indicator is an item of information which reflects the intention or capability of a potential enemy to adopt or reject a course of action.
- Terrorism is the unlawful use or threatened use of force or violence against individuals or property to coerce or intimidate governments or societies, often to achieve political, religious, or ideological objectives.
- Espionage is actions directed toward the acquisition of information through clandestine operations.
- Sabotage is an act or acts with the intent to injure, interfere with, or obstruct the national defense of a country by willingly injuring or destroying, or attempting to injure or destroy, any national defense or war material, premises, or utilities, to include human and natural resources.
- Subversion is action designed to weaken or undermine the military, economic, psychological, political strength of a nation, or morale of a regime.
Interrogation
- The five phases of interrogation are: Planning and Preparation, Approach, Questioning, Termination, and Reporting.
Counterintelligence Missions
- CI assets in garrison have two primary missions: to plan, prepare, and train to accomplish tactical CI functions, and to advise and assist the commander in planning, coordinating, and implementing command initiated measures, programs, and efforts.
- CI assets in a tactical environment have two missions: to conduct CI offensive operations designed to identify, locate, and neutralize hostile attempts of intelligence collection/espionage, sabotage, subversion, and terrorism, and to conduct tactical HUMINT collection in support of intelligence collection requirements.
Active and Passive CI Measures
- Active CI measures are aggressive offensive actions taken to neutralize the hostile threat and hostile efforts toward espionage, sabotage, subversion, and terrorism.
- Passive CI measures are defensive actions designed to conceal and deny information to the enemy, protect personnel from subversion and terrorism, and protect installations and material from sabotage.
Counterintelligence Purposes
- CI measures are employed for three general purposes: Denial, Detection, and Deception.
- Denial measures are applied to prevent the enemy from gaining access to classified and sensitive information, subverting personnel, and penetrating the physical security barriers established at installations.
- Deception measures are used to mislead or otherwise confuse the enemy concerning our capabilities, actions, and intentions.
CI Planning Documents
- There are eight MAGTF CI planning documents: CI Estimate, CI Appendix, HUMINT Appendix, CI Measures Worksheet, Personality, Organization and Installation files (PO&I), Detainable, of Interest, Protectable list (DoIP), Automatic Apprehension List, and CI Target Reduction Plan.
CI Limitations and Operations
- The three major limitations of CI assets are: Personnel strength, Foreign language capability, and Jurisdictional constraints.
- The three types of CI operations that occur in a forward operating area are: Offensive, Defensive, and Retrograde operations.
- The four primary objectives of defensive CI operations are: to guard against enemy intelligence collection efforts, to guard against the infiltration of enemy intelligence agents, to guard against sabotage agents, and to guard against terrorists.
Walk-in Sources
- A walk-in source is an individual who voluntarily comes forward to provide information to CI personnel.
- There are six types of walk-in sources: Legitimate informant, Paper mill, Multiple reporter, Asset recruited by others, Disinformation agent, and Dangle.
- The five most common motivations of walk-in sources are: National pride, Fear, Favorable opinion of the U.S., Hate/revenge, and Reward.
Order of Battle
- The 10 Order of Battle factors are: Mission, Composition, Strength, Disposition, Tactics, Training, Combat effectiveness, Logistics, Electronic technical data, and Miscellaneous.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.