1/70
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
. What is the main purpose of military intelligence?
b. To avoid surprise.
During the 1800s, U.S. military intelligence was primarily focused on westward expansion and wars with various Indian tribes. TF
t
. The Posse Comitatus Act of 1878 is what provides the U.S. military with the ability to engage in domestic law enforcement activities. TF
F
What are the five battlespace domains?
land, air, sea, space, cyber
In wartime, a countryâs critical infrastructure is a legitimate military target. TF
T
The sole responsibility of the Department of Defense is to plan for, and engage in, major combat operations TF
F
Which countryâs military was the first to have designated staff officers?
a. Prussia
At the brigade level, the staff officer responsible for intelligence is referred to as the:
b. S-2
Multiple elements of the Department of Defense are currently involved in counter-drug operations TF
T
The U.S. military has no history of fighting irregular warfare. TF
F
What was the name of the strategist who came up with the concept of âtrinitarian warfareâ?
C. Carl von Clausewitz
What are the names of the six phases in the DoDâs Planning Construct?
0 Shape
1 Deter
2 Seize the initiative
3 dominate
4 stabilizeÂ
5 enable civil authority
During which phase of the 1991 Gulf War did the Bush Administration form a 34-nation coalition and deploy U.S. forces to Saudi Arabia under Operation Desert Shield?
1 Deter
Lessons learned from the Vietnam War, the failed attempt to rescue hostages from Iran, and the 1983 invasion of Grenada resulted in legislation in 1986 that strengthened the position of the Chairman of the Joint Chiefs of Staff (CJCS). What was the name of that legislation?
Goldwater-Nichols Department of Defense Reorganization Act of 1986
What are the five core intelligence disciplines?
HUMINT, OSINT, IMINT, MASINT, SIGINT
Under the Office of the Director of National Intelligence (ODNI), the Foreign Malign Influence Center (FMIC) serves as the primary U.S. government organization for integrating intelligence pertaining to foreign malign influence TF
T
. In a combat operation, which level of intelligence is most concerned with what is going on in the next town or over the next hill?
tactical
How many combatant commands are there altogether?
d. 11
Within a combatant command, what is the name of the organization responsible for planning, coordinating, and integrating the full range of intelligence operations in that combatant commandâs area of responsibility (AOR)?
d. Joint Intelligence Operations Center (JIOC)
_____________ is the name of the U.S. combatant command headquartered at Peterson Air Force Base, Colorado. The commander of this combatant command is also the Commander of the North American Aerospace Defense Command (NORAD), which became famous some years ago for âtrackingâ Santa Clausâ inbound flight trajectory from the North Pole.
c. NORTHCOM
There are 18 members of the U.S. intelligence community. Of the 18, how many are Department of Defense entities involved in conducting and/or analyzing military intelligence?
c. 9
According to U.S. law, captured terrorists (such as those who perpetrated the 9/11 attacks) are considered:
c. detainees
Counterterrorism and anti-terrorism are synonyms. TF
F
Terror Financing Analysts collect and analyze intelligence on how terrorists:
e. all of the above
Rooted in sociocultural intelligence, the U.S. Armyâs ________________ program was developed in 2005 in response to a violent, widespread, and growing insurgency in Iraq. This program was developed because commanders realized they needed a better understanding of the social and cultural dimensions of the human terrain they were up against.
Human Terrain System (HTS)
What does the acronym F3EAD stand for?
Find, Fix, Finish, Exploit, Analyze, and Disseminate
The goal of the operations/intelligence fusion and rapid pace of the F3EAD process is to enable commanders at all levels to plan and execute operations against the enemy faster than the enemy can react. TF
T
An example of an SSE is where military (or law enforcement) personnel capture prisoners of war or terrorist detainees, and have to go through their personal effects, electronic equipment, papers, computers, cameras, and other equipment searching for intelligence information. The acronym SSE stands for:
Sensitive Site Exploration
. Technology is sometimes referred to as a âdual-edged swordâ because one the one hand it provides capabilities while on the other hand simultaneously creating exploitable vulnerabilities that put its user at risk. TF
T
Thanks to the proliferation of the internet, mobile telephony, and social media, the Director of National Intelligence recognized open-source intelligence (OSINT) as its own collection discipline in 2006. OSINT currently provides over 80% of the intelligence information used in military intelligence. OSINT collectors obtain publicly available information (PAI) from such sources as websites, newspapers, radio broadcasts, and speeches in public venues. TF
T
One of the main functions of military intelligence has traditionally been Intelligence Preparation of the Battlefield or Battlespace (IPB). The current term for these activities, however, is Intelligence Preparation of the Operational Environment (IPOE). TF
T
Which of the following is of interest when conducting IPB? a. Enemy forces b. Enemy capabilities c. Enemy intentions d. Terrain e. Weather f. Civil considerations g. All of the above h. None of the above
G. ALL of the above
Within the military, the acronym MDMP stands for a seven-step planning process that begins when a unit receives a mission and the commanderâs staff then develops and proposes alternative courses of action (COA) to the unit commander. What does the acronym MDMP stand for?
Military Decision-Making Process
Military intelligence and special forces use CARVER is used for target analysis. Name the six elements of the CARVER model
criticality, accessibility, recuperability, vulnerability, effect, recognizability
One of the reasons indicator analysis became popular was due to Roberta Wohlstetterâs âsurprise theoryâ (1962), which argued that intercepting and distinguishing signals (or indicators) of incoming threats could help friendly forces anticipate threats and surprises.
T
CIA analyst Cynthia Grabo wrote the Handbook of Warning Intelligence. Grabo had spent years monitoring the Soviets, looking for indicators of coming attacks. She developed a structured methodology for warning intelligence that leveraged a number of structured analytic techniques. However, Graboâs most significant contribution to military intelligence was her development of an indicators list, which enabled structured collection and analysis of what Roberta Wohlstetter described as âsignals.â TF
T
Mission variables determine the items on an indicator list. What is the acronym used by the military when creating an indicator list that takes into account mission, enemy, terrain and weather, troops and support available, time available, civil considerations, and informational considerations?
METT-TC-I
During the Cold War, one of the primary functions of an I&W checklist was to assess whether the possibility of the U.S. starting a nuclear conflict with the Soviet Union was increasing, decreasing, or remaining the same. TF
F
Which of the following are core functions of a military intelligence analyst? a. Strategic warning b. Basic research (or strategic intelligence) c. Current intelligence d. Estimative intelligence e. Warning intelligence f. All of the above g. None of the above
F. ALL OF THE ABOVE
Strategic warning should not only warn of threats, but also of opportunities. TF
T
The politicization of intelligence analysis refers to a situation where analysts skew their analytic findings to align them with the preconceived notions and beliefs of the decision-maker. Two historical examples where the politicization of intelligence analysis allegedly occurred were after the 9/11 attacks (2001) and during the CENTCOM analyst scandal of 2015. TF
T
One of the main reasons strategic warning can fail is because an adversary conducts a successful strategic deception campaign. In a sentence, briefly identify one strategic deception campaign conducted during the 20th century.Â
Operation Fortitude was a deception campaignin which the Allies misled Nazi Germany about the location of the D--Day invasion by convincing them they would land at Pas de Calais instead of Normandy.
In the context of strategic warning, what does the acronym D&D stand for? (Please donât say âDungeons and Dragons!â)
Deception and Denial
At the 1755 Battle of the Monongahela, British General Edward Braddock successfully defeated the French at Fort Duquesne (in what is now Pittsburgh). Braddock was able to do so because he accepted the advice of a young George Washington to adapt to the style of warfare the French and their Indian allies were known to use. TF
F
Military intelligence played a crucial role in the Revolutionary War in the United States. While military strategy, leadership, and other factors were significant, intelligence collection and analysis provided valuable information that influenced decision-making and outcomes during the conflict. TF
T
In late 1776, morale in the Continental Army was low. The British had driven Washingtonâs forces out of New York; soldiers were demoralized and reaching the end of their enlistments. Washington needed a victory to convince his men to stay in the army with him. Across the Delaware River was a British and Hessian encampment near Trenton. Washington received intelligence indicating his enemy was vulnerable, so he planned an attack. Military intelligence played a key role in George Washington successfully winning the Battle of Trenton, when he led his troops across the Delaware River at night to attack British and Hessian troops, many of whom were drunk and celebrating Christmas. TF
T
During the Revolutionary War, George Washington sought foreign intelligence to gain insights into European politics, military capabilities, and potential alliances. He maintained a network of agents abroad, including individuals like Benjamin Franklin, who gathered intelligence, facilitated diplomatic efforts to secure foreign aid from France, and conducted covert action against the British. TF
T
George Washingtonâs Culper Spy Ring used which of the following techniques to conduct clandestine human intelligence against the British?
a. Clandestine tradecraft b. Impersonal communication (such as colored linen used to send signals) c. Secret writing (such as invisible ink) d. Numerical codes to identify members (rather than their names) e. Secure radio communications using Morse Code f. All of the above except for âeâ g. All of the above
f. all of the above except for âeâ
One of the most successful U.S. employments of military intelligence was in 1812, when the military learned of a British Army advance on Washington, and managed to secretly deploy U.S. Marines to Bladensburg, Maryland â where they ambushed and defeated the advancing British forces.TF
F
During the Civil War, both the Union and the Confederacy ultimately developed large, unified, and centralized intelligence agencies that played a major role in determining strategy on each side. TF
F
One of the reasons for the Unionâs successes at both the Battles of Chickamauga and Gettysburg was the first-ever use of observation balloons that were used for imagery photography and equipped with telegraph systems that enabled aerial observers to report on Confederate forcesâ deployments and movements.TF
F
Once the Civil War ended in 1865, military intelligence became predominantly focused on the Indians during the period of westward expansion. TF
T
During World War I, U.S. military intelligence activities were largely ad-hoc and carried out by various departments and agencies without a clear system of coordination. One U.S. military intelligence success during that conflict, however, was the Cipher Bureau (also known as MI-8), which was established in 1917 under Herbert O. Yardley and succeeded in breaking German codes and ciphers. MI-8âs work enabled the U.S. and its allies to anticipate German plans, movements, and strategies. TF
T
U.S. military intelligence was not directly responsible for intercepting and decrypting the Zimmerman Telegram â that credit goes to British intelligence, specifically Room 40. However, U.S. government entities played a key role in verifying the authenticity of the message and handling its public release. In the telegram, Germany promised to help Mexico regain territory lost to the U.S. if Mexico declared war on the U.S. The Zimmermann Telegram provided to be a significant factor in shifting American public opinion towards entering the war.TF
T
During World War I, the Office of Naval Intelligence (ONI) was instrumental in gathering maritime intelligence, especially about submarine warfare, which was a key aspect of World War I. ONI provided strategic information about German U-boats, maritime routes, and the naval capabilities of enemy forces. TF
T
In 1940, Japan was a militaristic, expansionistic power. It had occupied most populated areas of China in the late 1930s, and in 1941 Japan invaded Indochina. In response, the U.S., British, and Dutch colonial government in the East Indies imposed a strategic embargo on any exports of oil or steel to Japan. Rather than force Japan to the negotiating table, the so-called âoil embargoâ set Japan on a course for war with the United States. TF
T
In the days before the Japanese attack on Pearl Harbor, the Armyâs Signal Intelligence Service (SIS) and its Navy counterpart, OP-20-G, had headquarters in Washington, DC that were only one block apart from one another. Army focused on breaking Purple, which was Japanâs diplomatic code, while Navy focused on breaking Orange, which was the Japanese Navyâs code. Thanks to effective intelligence sharing between SIS and OP-20-G, military intelligence was able to warn the Roosevelt administration that a Japanese attack was imminent. TF
T
In addition to the Army and the Navy, the Federal Bureau of Investigation (FBI) was the third organization that played an intelligence role prior to the U.S.â entry into World War II. President Roosevelt liked and admired FBI Director J. Edgar Hoover, and supported Hooverâs efforts to expand the FBIâs counterintelligence purview from the 48 states to the entire western hemisphereTF
T
Prior to the Japanese air attack on Pearl Harbor, both the Army and the FBI were concerned that ethnic Japanese living on Hawaii might attempt to attack U.S. aircraft parked on Hawaiian military airfields. To provide better protection, aircraft at Hickam Field were parked wingtip-towingtip (to make it easier to defend them against possible attackers on the ground). Parking military aircraft in this way proved beneficial to U.S. defenders when Japanese aircraft attacked on 7 December 1941. TF
F
One of the reasons Japan was able to successfully attack Pearl Harbor in 1941 was because U.S. leaders (and most Americans) looked down on the Japanese and underestimated their abilities. TF
T
On 3 Dec 41 â just four days before the Japanese air attack â the Washington Navy Bureau informed Admiral Kimmel in Hawaii that Japanese diplomatic missions in Hong Kong, Singapore, Batavia, Manila, Washington and London had all been told to destroy their codes and ciphers and to burn their classified documents. This was an example of what later became known as an indicator of imminent hostilities.TF
T
No U.S. intelligence entity had an integrated indications and warnings (I&W) checklist prior to the Japanese attack on Pearl Harbor. TF
T
On 11 November 1940 â 13 months before the Japanese attack on Pearl Harbor â British torpedo bombers used specially-modified, shallow water torpedoes to conduct a sneak attack on the Italian naval base at Taranto, Italy. The attack sank or disabled three battleships and two heavy cruisers. While Japanese naval intelligence took note of this attack in preparing for their own attack on Pearl Harbor, U.S. naval intelligence failed to appreciate its significance for U.S. vessels docked in the shallow waters of Pearl Harbor. TF
T
Four of the eight U.S. battleships docked at Pearl Harbor were sunk. So, why werenât any U.S. aircraft carriers sunk at Pearl Harbor?
a. Aircraft carriers were known to have far more powerful anti-aircraft systems than battleships, so the Japanese did not vigorously attempt to attack them. b. The Japanese did attack the aircraft carriers with photon torpedoes, yet damage to U.S. aircraft carriers was surprisingly light. c. The U.S. aircraft carriers based at Pearl Harbor were all out to sea when Japanese aircraft attacked Pearl Harbor. d. All of the above e. None of the above
C. The U.S. aircraft carriers based at Pearl Harbor were all out to sea when Japanese aircraft attacked Pearl Harbor.
Soviet military intelligence failed to warn Josef Stalin that Nazi Germany was planning to attack the Soviet Union. TF
T
Prior to invading the Soviet Union, Nazi Germany developed and used an elaborate deception plan to mislead the Soviets as to the reason for the large number of German troops deployed near the Soviet border. Only the Allied deception plan for the Normandy invasion was more elaborate. TF
T
Paranoia was one of the reasons Stalin failed to accept warnings that the Nazis were going to attack the Soviet Union. In the late 1930s, Josef Stalin instituted the so-called âGreat Terrorâ to eliminate potential threats to his rule: He eliminated many senior officers from military service and had most of them shot. By 1939, Stalin had succeeded in decapitating the military forces he would later need to defend the Soviet Union from invasion. TF
T
What are the three levels of military intelligence?
tactical, operational, strategic
What does the acronym SCIF stand for?
Sensitive Compartmented Information Facility
What are the six military intelligence functions, according to FM 34-8, Combat Commanderâs Handbook on Intelligence (1992)?
(6 step intel cycle)Â planning/direction, collection, P&E, Analysis & production, dissemination, feedback
According to Executive Order 13526, what are the three requirements for a person to gain access to classified information?
security clearance
need-to-know
signed NDAs