Podcast
Questions and Answers
What determines access to classified material?
What determines access to classified material?
Which category of classified material is considered the highest level?
Which category of classified material is considered the highest level?
What is the purpose of tactical intelligence?
What is the purpose of tactical intelligence?
Which elements are included in the intelligence formula?
Which elements are included in the intelligence formula?
Signup and view all the answers
Why is the authorization to receive or possess classified material important?
Why is the authorization to receive or possess classified material important?
Signup and view all the answers
What distinguishes strategic intelligence from tactical intelligence?
What distinguishes strategic intelligence from tactical intelligence?
Signup and view all the answers
What are the three general purposes for which CI measures are employed?
What are the three general purposes for which CI measures are employed?
Signup and view all the answers
For what reason are denial measures employed?
For what reason are denial measures employed?
Signup and view all the answers
What are the major limitations of CI assets?
What are the major limitations of CI assets?
Signup and view all the answers
What are the three types of CI operations that occur in a forward operating area?
What are the three types of CI operations that occur in a forward operating area?
Signup and view all the answers
What is the definition of a walk-in source?
What is the definition of a walk-in source?
Signup and view all the answers
What is the definition of security?
What is the definition of security?
Signup and view all the answers
What do commander continuing intelligence requirements (CCIRs) relate to?
What do commander continuing intelligence requirements (CCIRs) relate to?
Signup and view all the answers
Which executive order governs intelligence activities?
Which executive order governs intelligence activities?
Signup and view all the answers
What is the primary mission of CI assets in garrison?
What is the primary mission of CI assets in garrison?
Signup and view all the answers
What do active CI measures involve?
What do active CI measures involve?
Signup and view all the answers
What is the definition of espionage?
What is the definition of espionage?
Signup and view all the answers
What are the five steps of the intelligence cycle?
What are the five steps of the intelligence cycle?
Signup and view all the answers
What does a basic intelligence requirement (BIR) focus on?
What does a basic intelligence requirement (BIR) focus on?
Signup and view all the answers
What is included in the five phases of interrogation according to the text?
What is included in the five phases of interrogation according to the text?
Signup and view all the answers
What is the focus of commander continuing intelligence requirements (CCIRs)?
What is the focus of commander continuing intelligence requirements (CCIRs)?
Signup and view all the answers
What is the definition of an indicator according to the text?
What is the definition of an indicator according to the text?
Signup and view all the answers
Study Notes
POW/Detainee Handling Procedures
- The acronym used to identify POW/detainee handling procedures is 5 S’s & a T: Search, Silence, Segregate, Safeguard, Speed, and Tag.
Classified Material
- There are three categories of classified material: Confidential, Secret, and Top Secret.
Access and Information
- Access is defined as the authorization to receive or possess classified material.
- Two factors that determine access are Security Clearance and Need to Know.
- Information is defined as unevaluated material of every description, including that derived from observations, communications, reports, imagery, and other sources, which when processed may produce intelligence.
Intelligence
- Intelligence is defined as the product resulting from the collection, evaluation, analysis, integration, and interpretation of all available information which concerns one or more aspects of foreign nations or areas of operations, and which is immediately or potentially significant to military planning and operations.
- The intelligence formula is: Information + Analysis = Intelligence.
Types of Intelligence
- Strategic intelligence is required for the formulation of policy and plans at international, national, and tactical levels.
- Tactical intelligence is used for the battle in progress and is required for the planning and conduct of tactical operations.
- Target intelligence is a specific intelligence effort to support effective targeting, portraying and locating the components of a target or complex and indicating its vulnerability and relative importance.
Intelligence Cycle
- The three forms of intelligence are: Basic, Current, and Estimative.
- A basic intelligence requirement (BIR) is directed at relatively unchanging aspects of the enemy and military geography.
- Commander continuing intelligence requirements (CCIRs) are critical or high priority elements of information required by the Commander which relate directly to mission accomplishment.
- The five steps of the intelligence cycle are: Direction, Collection, Processing, Production, and Dissemination.
Counterintelligence
- The four threats that counterintelligence focuses on are: Terrorism, Espionage, Sabotage, and Subversion.
- Executive Order 12333 governs intelligence activities.
- Executive Order 12334 governs intelligence oversight.
- Marine Corps Order (MCO) 3870.2 governs intelligence oversight.
- Marine Corps Reference Publication (MCRP) 2-10A2 covers counterintelligence.
- Marine Corps Warfighting Publication (MCWP) 2-14 covers counterintelligence.
- MCO 3850.1j gives policy and guidance for Counterintelligence (CI) and human source intelligence (HUMINT) activities.
Counterintelligence Definitions
- An indicator is an item of information which reflects the intention or capability of a potential enemy to adopt or reject a course of action.
- Terrorism is the unlawful use or threatened use of force or violence against individuals or property to coerce or intimidate governments or societies, often to achieve political, religious, or ideological objectives.
- Espionage is actions directed toward the acquisition of information through clandestine operations.
- Sabotage is an act or acts with the intent to injure, interfere with, or obstruct the national defense of a country by willingly injuring or destroying, or attempting to injure or destroy, any national defense or war material, premises, or utilities, to include human and natural resources.
- Subversion is action designed to weaken or undermine the military, economic, psychological, political strength of a nation, or morale of a regime.
Interrogation
- The five phases of interrogation are: Planning and Preparation, Approach, Questioning, Termination, and Reporting.
Counterintelligence Missions
- CI assets in garrison have two primary missions: to plan, prepare, and train to accomplish tactical CI functions, and to advise and assist the commander in planning, coordinating, and implementing command initiated measures, programs, and efforts.
- CI assets in a tactical environment have two missions: to conduct CI offensive operations designed to identify, locate, and neutralize hostile attempts of intelligence collection/espionage, sabotage, subversion, and terrorism, and to conduct tactical HUMINT collection in support of intelligence collection requirements.
Active and Passive CI Measures
- Active CI measures are aggressive offensive actions taken to neutralize the hostile threat and hostile efforts toward espionage, sabotage, subversion, and terrorism.
- Passive CI measures are defensive actions designed to conceal and deny information to the enemy, protect personnel from subversion and terrorism, and protect installations and material from sabotage.
Counterintelligence Purposes
- CI measures are employed for three general purposes: Denial, Detection, and Deception.
- Denial measures are applied to prevent the enemy from gaining access to classified and sensitive information, subverting personnel, and penetrating the physical security barriers established at installations.
- Deception measures are used to mislead or otherwise confuse the enemy concerning our capabilities, actions, and intentions.
CI Planning Documents
- There are eight MAGTF CI planning documents: CI Estimate, CI Appendix, HUMINT Appendix, CI Measures Worksheet, Personality, Organization and Installation files (PO&I), Detainable, of Interest, Protectable list (DoIP), Automatic Apprehension List, and CI Target Reduction Plan.
CI Limitations and Operations
- The three major limitations of CI assets are: Personnel strength, Foreign language capability, and Jurisdictional constraints.
- The three types of CI operations that occur in a forward operating area are: Offensive, Defensive, and Retrograde operations.
- The four primary objectives of defensive CI operations are: to guard against enemy intelligence collection efforts, to guard against the infiltration of enemy intelligence agents, to guard against sabotage agents, and to guard against terrorists.
Walk-in Sources
- A walk-in source is an individual who voluntarily comes forward to provide information to CI personnel.
- There are six types of walk-in sources: Legitimate informant, Paper mill, Multiple reporter, Asset recruited by others, Disinformation agent, and Dangle.
- The five most common motivations of walk-in sources are: National pride, Fear, Favorable opinion of the U.S., Hate/revenge, and Reward.
Order of Battle
- The 10 Order of Battle factors are: Mission, Composition, Strength, Disposition, Tactics, Training, Combat effectiveness, Logistics, Electronic technical data, and Miscellaneous.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge of military intelligence by answering questions on POW/detainee handling procedures, classified material categories, definitions of access and information.