Military Midterm

0.0(0)
studied byStudied by 7 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/70

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

71 Terms

1
New cards

. What is the main purpose of military intelligence?

b. To avoid surprise.

2
New cards

During the 1800s, U.S. military intelligence was primarily focused on westward expansion and wars with various Indian tribes. TF

t

3
New cards

. The Posse Comitatus Act of 1878 is what provides the U.S. military with the ability to engage in domestic law enforcement activities. TF

F

4
New cards

What are the five battlespace domains?

land, air, sea, space, cyber

5
New cards

In wartime, a country’s critical infrastructure is a legitimate military target. TF

T

6
New cards

The sole responsibility of the Department of Defense is to plan for, and engage in, major combat operations TF

F

7
New cards

Which country’s military was the first to have designated staff officers?

a. Prussia

8
New cards

At the brigade level, the staff officer responsible for intelligence is referred to as the:

b. S-2

9
New cards

Multiple elements of the Department of Defense are currently involved in counter-drug operations TF

T

10
New cards

The U.S. military has no history of fighting irregular warfare. TF

F

11
New cards

What was the name of the strategist who came up with the concept of “trinitarian warfare”?

C. Carl von Clausewitz

12
New cards

What are the names of the six phases in the DoD’s Planning Construct?

0 Shape

1 Deter

2 Seize the initiative

3 dominate

4 stabilize 

5 enable civil authority

13
New cards

During which phase of the 1991 Gulf War did the Bush Administration form a 34-nation coalition and deploy U.S. forces to Saudi Arabia under Operation Desert Shield?

1 Deter

14
New cards

Lessons learned from the Vietnam War, the failed attempt to rescue hostages from Iran, and the 1983 invasion of Grenada resulted in legislation in 1986 that strengthened the position of the Chairman of the Joint Chiefs of Staff (CJCS). What was the name of that legislation?

Goldwater-Nichols Department of Defense Reorganization Act of 1986

15
New cards

What are the five core intelligence disciplines?

HUMINT, OSINT, IMINT, MASINT, SIGINT

16
New cards

Under the Office of the Director of National Intelligence (ODNI), the Foreign Malign Influence Center (FMIC) serves as the primary U.S. government organization for integrating intelligence pertaining to foreign malign influence TF

T

17
New cards

. In a combat operation, which level of intelligence is most concerned with what is going on in the next town or over the next hill?

tactical

18
New cards

How many combatant commands are there altogether?

d. 11

19
New cards

Within a combatant command, what is the name of the organization responsible for planning, coordinating, and integrating the full range of intelligence operations in that combatant command’s area of responsibility (AOR)?

d. Joint Intelligence Operations Center (JIOC)

20
New cards

_____________ is the name of the U.S. combatant command headquartered at Peterson Air Force Base, Colorado. The commander of this combatant command is also the Commander of the North American Aerospace Defense Command (NORAD), which became famous some years ago for “tracking” Santa Claus’ inbound flight trajectory from the North Pole.

c. NORTHCOM

21
New cards

There are 18 members of the U.S. intelligence community. Of the 18, how many are Department of Defense entities involved in conducting and/or analyzing military intelligence?

c. 9

22
New cards

According to U.S. law, captured terrorists (such as those who perpetrated the 9/11 attacks) are considered:

c. detainees

23
New cards

Counterterrorism and anti-terrorism are synonyms. TF

F

24
New cards

Terror Financing Analysts collect and analyze intelligence on how terrorists:

e. all of the above

25
New cards

Rooted in sociocultural intelligence, the U.S. Army’s ________________ program was developed in 2005 in response to a violent, widespread, and growing insurgency in Iraq. This program was developed because commanders realized they needed a better understanding of the social and cultural dimensions of the human terrain they were up against.

Human Terrain System (HTS)

26
New cards

What does the acronym F3EAD stand for?

Find, Fix, Finish, Exploit, Analyze, and Disseminate

27
New cards

The goal of the operations/intelligence fusion and rapid pace of the F3EAD process is to enable commanders at all levels to plan and execute operations against the enemy faster than the enemy can react. TF

T

28
New cards

An example of an SSE is where military (or law enforcement) personnel capture prisoners of war or terrorist detainees, and have to go through their personal effects, electronic equipment, papers, computers, cameras, and other equipment searching for intelligence information. The acronym SSE stands for:

Sensitive Site Exploration

29
New cards

. Technology is sometimes referred to as a “dual-edged sword” because one the one hand it provides capabilities while on the other hand simultaneously creating exploitable vulnerabilities that put its user at risk. TF

T

30
New cards

Thanks to the proliferation of the internet, mobile telephony, and social media, the Director of National Intelligence recognized open-source intelligence (OSINT) as its own collection discipline in 2006. OSINT currently provides over 80% of the intelligence information used in military intelligence. OSINT collectors obtain publicly available information (PAI) from such sources as websites, newspapers, radio broadcasts, and speeches in public venues. TF

T

31
New cards

One of the main functions of military intelligence has traditionally been Intelligence Preparation of the Battlefield or Battlespace (IPB). The current term for these activities, however, is Intelligence Preparation of the Operational Environment (IPOE). TF

T

32
New cards

Which of the following is of interest when conducting IPB? a. Enemy forces b. Enemy capabilities c. Enemy intentions d. Terrain e. Weather f. Civil considerations g. All of the above h. None of the above

G. ALL of the above

33
New cards

Within the military, the acronym MDMP stands for a seven-step planning process that begins when a unit receives a mission and the commander’s staff then develops and proposes alternative courses of action (COA) to the unit commander. What does the acronym MDMP stand for?

Military Decision-Making Process

34
New cards

Military intelligence and special forces use CARVER is used for target analysis. Name the six elements of the CARVER model

criticality, accessibility, recuperability, vulnerability, effect, recognizability

35
New cards

One of the reasons indicator analysis became popular was due to Roberta Wohlstetter’s “surprise theory” (1962), which argued that intercepting and distinguishing signals (or indicators) of incoming threats could help friendly forces anticipate threats and surprises.

T

36
New cards

CIA analyst Cynthia Grabo wrote the Handbook of Warning Intelligence. Grabo had spent years monitoring the Soviets, looking for indicators of coming attacks. She developed a structured methodology for warning intelligence that leveraged a number of structured analytic techniques. However, Grabo’s most significant contribution to military intelligence was her development of an indicators list, which enabled structured collection and analysis of what Roberta Wohlstetter described as “signals.” TF

T

37
New cards

Mission variables determine the items on an indicator list. What is the acronym used by the military when creating an indicator list that takes into account mission, enemy, terrain and weather, troops and support available, time available, civil considerations, and informational considerations?

METT-TC-I

38
New cards

During the Cold War, one of the primary functions of an I&W checklist was to assess whether the possibility of the U.S. starting a nuclear conflict with the Soviet Union was increasing, decreasing, or remaining the same. TF

F

39
New cards

Which of the following are core functions of a military intelligence analyst? a. Strategic warning b. Basic research (or strategic intelligence) c. Current intelligence d. Estimative intelligence e. Warning intelligence f. All of the above g. None of the above

F. ALL OF THE ABOVE

40
New cards

Strategic warning should not only warn of threats, but also of opportunities. TF

T

41
New cards

The politicization of intelligence analysis refers to a situation where analysts skew their analytic findings to align them with the preconceived notions and beliefs of the decision-maker. Two historical examples where the politicization of intelligence analysis allegedly occurred were after the 9/11 attacks (2001) and during the CENTCOM analyst scandal of 2015. TF

T

42
New cards

One of the main reasons strategic warning can fail is because an adversary conducts a successful strategic deception campaign. In a sentence, briefly identify one strategic deception campaign conducted during the 20th century. 

Operation Fortitude was a deception campaignin which the Allies misled Nazi Germany about the location of the D--Day invasion by convincing them they would land at Pas de Calais instead of Normandy.

43
New cards

In the context of strategic warning, what does the acronym D&D stand for? (Please don’t say “Dungeons and Dragons!”)

Deception and Denial

44
New cards

At the 1755 Battle of the Monongahela, British General Edward Braddock successfully defeated the French at Fort Duquesne (in what is now Pittsburgh). Braddock was able to do so because he accepted the advice of a young George Washington to adapt to the style of warfare the French and their Indian allies were known to use. TF

F

45
New cards

Military intelligence played a crucial role in the Revolutionary War in the United States. While military strategy, leadership, and other factors were significant, intelligence collection and analysis provided valuable information that influenced decision-making and outcomes during the conflict. TF

T

46
New cards

In late 1776, morale in the Continental Army was low. The British had driven Washington’s forces out of New York; soldiers were demoralized and reaching the end of their enlistments. Washington needed a victory to convince his men to stay in the army with him. Across the Delaware River was a British and Hessian encampment near Trenton. Washington received intelligence indicating his enemy was vulnerable, so he planned an attack. Military intelligence played a key role in George Washington successfully winning the Battle of Trenton, when he led his troops across the Delaware River at night to attack British and Hessian troops, many of whom were drunk and celebrating Christmas. TF

T

47
New cards

During the Revolutionary War, George Washington sought foreign intelligence to gain insights into European politics, military capabilities, and potential alliances. He maintained a network of agents abroad, including individuals like Benjamin Franklin, who gathered intelligence, facilitated diplomatic efforts to secure foreign aid from France, and conducted covert action against the British. TF

T

48
New cards

George Washington’s Culper Spy Ring used which of the following techniques to conduct clandestine human intelligence against the British?

a. Clandestine tradecraft b. Impersonal communication (such as colored linen used to send signals) c. Secret writing (such as invisible ink) d. Numerical codes to identify members (rather than their names) e. Secure radio communications using Morse Code f. All of the above except for “e” g. All of the above

f. all of the above except for “e”

49
New cards

One of the most successful U.S. employments of military intelligence was in 1812, when the military learned of a British Army advance on Washington, and managed to secretly deploy U.S. Marines to Bladensburg, Maryland – where they ambushed and defeated the advancing British forces.TF

F

50
New cards

During the Civil War, both the Union and the Confederacy ultimately developed large, unified, and centralized intelligence agencies that played a major role in determining strategy on each side. TF

F

51
New cards

One of the reasons for the Union’s successes at both the Battles of Chickamauga and Gettysburg was the first-ever use of observation balloons that were used for imagery photography and equipped with telegraph systems that enabled aerial observers to report on Confederate forces’ deployments and movements.TF

F

52
New cards

Once the Civil War ended in 1865, military intelligence became predominantly focused on the Indians during the period of westward expansion. TF

T

53
New cards

During World War I, U.S. military intelligence activities were largely ad-hoc and carried out by various departments and agencies without a clear system of coordination. One U.S. military intelligence success during that conflict, however, was the Cipher Bureau (also known as MI-8), which was established in 1917 under Herbert O. Yardley and succeeded in breaking German codes and ciphers. MI-8’s work enabled the U.S. and its allies to anticipate German plans, movements, and strategies. TF

T

54
New cards

U.S. military intelligence was not directly responsible for intercepting and decrypting the Zimmerman Telegram – that credit goes to British intelligence, specifically Room 40. However, U.S. government entities played a key role in verifying the authenticity of the message and handling its public release. In the telegram, Germany promised to help Mexico regain territory lost to the U.S. if Mexico declared war on the U.S. The Zimmermann Telegram provided to be a significant factor in shifting American public opinion towards entering the war.TF

T

55
New cards

During World War I, the Office of Naval Intelligence (ONI) was instrumental in gathering maritime intelligence, especially about submarine warfare, which was a key aspect of World War I. ONI provided strategic information about German U-boats, maritime routes, and the naval capabilities of enemy forces. TF

T

56
New cards

In 1940, Japan was a militaristic, expansionistic power. It had occupied most populated areas of China in the late 1930s, and in 1941 Japan invaded Indochina. In response, the U.S., British, and Dutch colonial government in the East Indies imposed a strategic embargo on any exports of oil or steel to Japan. Rather than force Japan to the negotiating table, the so-called “oil embargo” set Japan on a course for war with the United States. TF

T

57
New cards

In the days before the Japanese attack on Pearl Harbor, the Army’s Signal Intelligence Service (SIS) and its Navy counterpart, OP-20-G, had headquarters in Washington, DC that were only one block apart from one another. Army focused on breaking Purple, which was Japan’s diplomatic code, while Navy focused on breaking Orange, which was the Japanese Navy’s code. Thanks to effective intelligence sharing between SIS and OP-20-G, military intelligence was able to warn the Roosevelt administration that a Japanese attack was imminent. TF

T

58
New cards

In addition to the Army and the Navy, the Federal Bureau of Investigation (FBI) was the third organization that played an intelligence role prior to the U.S.’ entry into World War II. President Roosevelt liked and admired FBI Director J. Edgar Hoover, and supported Hoover’s efforts to expand the FBI’s counterintelligence purview from the 48 states to the entire western hemisphereTF

T

59
New cards

Prior to the Japanese air attack on Pearl Harbor, both the Army and the FBI were concerned that ethnic Japanese living on Hawaii might attempt to attack U.S. aircraft parked on Hawaiian military airfields. To provide better protection, aircraft at Hickam Field were parked wingtip-towingtip (to make it easier to defend them against possible attackers on the ground). Parking military aircraft in this way proved beneficial to U.S. defenders when Japanese aircraft attacked on 7 December 1941. TF

F

60
New cards

One of the reasons Japan was able to successfully attack Pearl Harbor in 1941 was because U.S. leaders (and most Americans) looked down on the Japanese and underestimated their abilities. TF

T

61
New cards

On 3 Dec 41 – just four days before the Japanese air attack – the Washington Navy Bureau informed Admiral Kimmel in Hawaii that Japanese diplomatic missions in Hong Kong, Singapore, Batavia, Manila, Washington and London had all been told to destroy their codes and ciphers and to burn their classified documents. This was an example of what later became known as an indicator of imminent hostilities.TF

T

62
New cards

No U.S. intelligence entity had an integrated indications and warnings (I&W) checklist prior to the Japanese attack on Pearl Harbor. TF

T

63
New cards

On 11 November 1940 – 13 months before the Japanese attack on Pearl Harbor – British torpedo bombers used specially-modified, shallow water torpedoes to conduct a sneak attack on the Italian naval base at Taranto, Italy. The attack sank or disabled three battleships and two heavy cruisers. While Japanese naval intelligence took note of this attack in preparing for their own attack on Pearl Harbor, U.S. naval intelligence failed to appreciate its significance for U.S. vessels docked in the shallow waters of Pearl Harbor. TF

T

64
New cards

Four of the eight U.S. battleships docked at Pearl Harbor were sunk. So, why weren’t any U.S. aircraft carriers sunk at Pearl Harbor?

a. Aircraft carriers were known to have far more powerful anti-aircraft systems than battleships, so the Japanese did not vigorously attempt to attack them. b. The Japanese did attack the aircraft carriers with photon torpedoes, yet damage to U.S. aircraft carriers was surprisingly light. c. The U.S. aircraft carriers based at Pearl Harbor were all out to sea when Japanese aircraft attacked Pearl Harbor. d. All of the above e. None of the above

C. The U.S. aircraft carriers based at Pearl Harbor were all out to sea when Japanese aircraft attacked Pearl Harbor.

65
New cards

Soviet military intelligence failed to warn Josef Stalin that Nazi Germany was planning to attack the Soviet Union. TF

T

66
New cards

Prior to invading the Soviet Union, Nazi Germany developed and used an elaborate deception plan to mislead the Soviets as to the reason for the large number of German troops deployed near the Soviet border. Only the Allied deception plan for the Normandy invasion was more elaborate. TF

T

67
New cards

Paranoia was one of the reasons Stalin failed to accept warnings that the Nazis were going to attack the Soviet Union. In the late 1930s, Josef Stalin instituted the so-called “Great Terror” to eliminate potential threats to his rule: He eliminated many senior officers from military service and had most of them shot. By 1939, Stalin had succeeded in decapitating the military forces he would later need to defend the Soviet Union from invasion. TF

T

68
New cards

What are the three levels of military intelligence?

tactical, operational, strategic

69
New cards

What does the acronym SCIF stand for?

Sensitive Compartmented Information Facility

70
New cards

What are the six military intelligence functions, according to FM 34-8, Combat Commander’s Handbook on Intelligence (1992)?

(6 step intel cycle) planning/direction, collection, P&E, Analysis & production, dissemination, feedback

71
New cards

According to Executive Order 13526, what are the three requirements for a person to gain access to classified information?

  1. security clearance

  2. need-to-know

  3. signed NDAs

Explore top flashcards