1N0X1 Air Force
327 questions across 0 topics. Use the find bar or section chips to jump to what you need.
What is the requirement for becoming an Operations Intelligence Apprentice?
Completion of the Operations Intelligence Apprentice Course
For what skill level upgrade is the Career Development Course introduced?
Operations Intelligence Journeyman
List the training requirements for upgrade to the 5-skill level.
Certified on all core tasks identified in Career Field Education and Training Plan (CFETP), trained/signed off on all duty position tasks identified by supervisor, complete 1N051 Career Development Course, minimum 12 months of on-the-job training (OJT) or (9 months if retraining), receive upgrade recommendation from supervisor, receive upgrade approval from commander.
What is the minimum time required in upgrade training status for 7-level?
12 months of Upgrade Training (6 months if retraining)
What are the first two requirements for becoming an Operations Intelligence Superintendent?
Be at least a SMSgt; Graduate SNCO Academy
What AFI should you reference to determine trainee responsibilities?
AFI36-2201, Vol 3.
Who should the trainee request assistance from when having difficulty with any part of training?
Supervisor, trainer, or Unit Training Manager
In which enlisted tier do you become an expert, hands-on technician?
NCO Tier
What is the primary role of SNCOs in the final top enlisted tier?
To lead and manage teams as you translate direction from superiors into mission accomplishment
What is achieved by successfully completing your CCAF degree?
The "whole person" concept.
How many semester hours are required for an enlisted member to complete a CCAF degree?
64
How do you successfully complete the Leadership, Management, and Military Studies requirement for your CCAF degree?
Through Professional Military Education (Airman Leadership School) or civilian management courses
What is the definition of intelligence according to JP 1-02?
The product resulting from the collection, processing, integration, evaluation, analysis, and interpretation of available information concerning foreign nations, hostile or potentially hostile forces or elements, or areas of actual or potential operations.
Why is it important to understand how our career field supports the Air Force ISR mission?
Because of the reliance on intelligence has increased to such a degree that commanders in the field place as much importance on intelligence activities as they do on combat troops and weapons systems
How does JP 1-02 define all-source intelligence?
Intelligence products and/or organizations and activities that incorporate all sources of information, most frequently including human resources intelligence (HUMINT), imagery intelligence (GEOINT), measurement and signature intelligence (MASINT), signals intelligence (SIGINT), and open-source intelligence (OSINT) data in the production of finished intelligence.
Clarity is an important aspect to producing valid intelligence assessments; what helps an analyst maintain clarity?
Critical thinking
According to the Foundation for Critical Thinking, the purpose of asking yourself questions is to ensure your conclusions have what nine attributes?
Clarity, accuracy, precision, relevance, depth, breadth, logic, significance, and fairness.
Name the 8 attributes of intelligence excellence according to JP 2-0
Anticipatory, timely, accurate, usable, complete, relevant, objective, and available
What is the key to critical thinking?
Asking yourself questions.
IWS, Jabber, DCO, and mIRC are types of what?
Collaborative tools
What tool is designed to be a link analysis tool?
Analyst Notebook (ANB)
What is the DOD's authoritative database of general military intelligence including order of battle, installation, and facility intelligence?
Modernized Integrated Database (MIDB)
What is operated by the office of the Director of National Intelligence, and where does it reside? What does it provide?
Open Source Center (OSC) and it resides on classified networks and provides open source media from around the world.
What analysis methodology is most commonly associated with special operations forces?
Criticality, accessibility, recuperability, vulnerability, effect, recognizability (CARVER).
What does the acronym OODA mean?
Observe, Orient, Decide, and Act
What do commanders require to protect their forces and provide full-spectrum, integrated defense?
Timely and credible intelligence
What is the first step in force protection?
Risk management
Who operates the ORM process for commanders?
Integrated Defense Working Group
What is the primary function of the TWG?
To assess the threat for the commander and recommend COAs to mitigate or counter the threat
What fuses information and intelligence from multiple sources with other information into a cohesive threat picture helpful to FP decision makers?
Threat assessment
What does a tactical intelligence package support?
A mission dedicated to a high value target (HVT) or a high value individual (HVI)
What is the definition of integrated defense?
The application of active and passive defense measures, employed across the legally-defined ground dimension of the operation environment, to mitigate potential risks and defeat adversary threats to Air Force operations
What are the objectives of integrated defense?
see first, understand first, and act first
What does an intelligence analyst produce for the common operation picture, and what does it do for the commander?
The intelligence analyst helps produce a common, current, and relevant picture of the battle space that reduces uncertainty and shortens the commander's decision-making process by providing situational awareness
What is the BDOC?
Base Defense Operations Center - command and control center for integrated defense (ID) operations during routine and emergency operations
Who identifies the Base Security Zone (BSZ)?
Installation Commander
What is Force Protection intelligence?
Analyzed, all-source information concerning threats to DOD missions, people or resources arising from terrorists, criminal entities, foreign intelligence and security services and opposing military forces
How is the intelligence fusion cell different from the threat working group?
The IFC is a tactical-level action team that functions in tandem with the Defense Force Commander's (DFC) operations staff in the planning and execution of Integrated Defense (ID). A TWG is a multi-functional group established at the installation and self-supported separate facilities and higher that meets at least quarterly or more frequently depending upon level of threat activity, to develop and refine terrorism threat assessments and coordinate and disseminate threat warnings, reports, and summaries.
What is the minimal composition for the intelligence fusion cell?
Air Force Intelligence, AFOSI, and Security Forces Specialists
How does Counterintelligence (CI) support the foreign intelligence missions?
It supports the foreign intelligence disciplines through its contribution to the indications and warning (I&W) function, by its collection, analysis and production capabilities, and by maintenance of CI databases
What agency has the primary responsibility for Counterintelligence (CI) and counterterroism operations conducted in the United States?
FBI
Does the primary Counterintelligence (CI) agency for operations in the US share law enforcement and CI information? If so, with whom?
Yes, with appropriate DOD entities and combatant commanders
What is a conventional threat?
Regular military forces supported by a recognized government
To whom would an intelligence analyst confer with over criminal threats?
AFOSI and local law enforcement
Name three objectives of attacks
(1) Injure or kill personnel to create a tactical and/or strategic event (2) Destroy war-fighting or war-supporting capabilities (3) Deny use of war-fighting or war-supporting capabilities through damage or contamination (4) Deny or disrupt military operations through the threat of attack (5) Influence public opinion and/or governmental policies to comply with competing ideologies (6) Force nations deployed on foreign soil to end operations and depart the deployed location (7) Thrust a nation into civil unrest resulting in civil war (8) Force a government agency or corporation to alter its policies (9) Reduce military advantage through theft, destruction, or fraud involving military information or technology (10) Generate criminal activity such as kidnapping, robbery, and extortion likely used to finance terrorist operations
What is the goal of the CBRNE attack?
To deny or hinder the use of areas, facilities, or materials
Which attack is hard to determine if it was an actual attack or an accident and why is it hard to tell the difference?
Information operations attacks due to the insidious nature of these events
Name the six intelligence operations that make up the ISR process
(1) Planning and Direction (2) Collection (3) Processing and Exploitation (4) Analysis and Production (5) Dissemination and Integration (6) Evaluation and Feedback
Does the ISR process always follow a sequential order?
No. It's not a linear or cyclical operation but rather a network of interrelated, simultaneous operations that can, at any given time, be fed by and feed other intelligence operations.
What is the overall output of the ISR process?
The output of the overall process is actionable intelligence - timely, accurate, and complete - that provides intelligence on an adversary's dispositions, strategy, tactics, intent, objectives, strengths, weaknesses, values, capabilities, and critical vulnerabilities
What is the difference between information and intelligence?
Information is data that has been collected, but not further developed through analysis, interpretation, or correlation with other data and intelligence. Analysis transforms information into intelligence.
What are CCIRs and what do they accomplish?
Commander's Critical Information Requirements (CCIR) - are a comprehensive list of information requirements identified by the commander as being critical to facilitating timely information management and the decision-making process
Define standing requirements and spot requirements
Standing - provides information necessary for mid- and long-range planning. they are broad, continuing requirements that generally follow a fixed pattern. Some standing requirements may be equally valid in limited war or crisis situations involving US forces Spot - During military operations or crisis situations, a need for intelligence often arises that cannot be satisfied by a pre-established, standing requirement. In this case, a spot or ad hoc requirement is developed to answer very specific questions or problems. Spot requirements normally involve time-dominant information and are highly perishable
What are EEIs?
They define intelligence consumers' specific information requirements
When are OPLANS normally prepared?
(1) The contingency is critical to national security and requires detailed prior planning (2) The magnitude or timing of the contingency requires detailed planning (3) Detailed planning is required to support multinational planning (4) The feasibility of the plan's CONOPS cannot be determined without detailed planning
Define the collection process
The collection portion of the ISR process involves tasking appropriate collection assets to acquire the required data to accomplish collection tasking. Collection includes the identification, coordination, and positioning of assets to satisfy intelligence requirements.
Name the four collection management principles
(1) Early Identification of Requirements (2) Prioritization of Requirements (3) Multidiscipline Approach (4) Task Organic Assets First
When does dynamic re-tasking of ISR assets occur?
Dynamic re-tasking occurs when the requester identifies a time-sensitive need after the appropriate ISR asset has already been tasked
What is the covert method of collection?
Operation planned and executed to conceal the identity or to permit plausible denial of sponsorship
What is the discreet method of collection?
Conducted quietly and cautiously to avoid undue curiosity
What is the clandestine method of collection?
Planned and conducted to conceal the existence of the operation itself
What is the overt method of collection?
Conducted openly and may be acknowledged by and attributed to its sponsors and participants
What is the primary vehicle used to transmit collected information?
The Intelligence Information Report (IIR) - provide unevaluated, raw information gathered in response to intelligence collection requirements
What is accomplished through the processing and exploitation process?
The collected raw data is converted into information that can be readily disseminated, used, transmitted, and exploited by intelligence analysts to produce multidisciplinary intelligence products
How doers processing differ from analysis and production?
Processing remains distinct from analysis and production in that the resulting information receives only a cursory analysis for time-critical exploitation and has not yet been subjected to full analytical assessment
List the four phases of the analysis and production process and briefly describe each
(1) Integration - the process of forming an intelligence pattern through the selection and combination of evaluated information (2) Evaluation - assessment of information for pertinence, accuracy, and reliability of the source. Evaluation is closely associated with the entire ISR process, because you must critique the ability of the collected information to satisfy the original requirement (3) Analysis - the analyst continues to study and evaluate the facts and relate them to other sources of intelligence information (4) Interpretation - the final step in the production of intelligence from collected information. It is the process of causing items of intelligence information to make sense when placed in the proper relationship to a give situation
What is the overall objective of the integration phase?
To form a logical picture or hypothesis of enemy activity
What happens to collected information during the evaluation phase?
Collected information is appraised in terms of its source reliability, the accuracy of the individual, reported facts, and the overall credibility of the reported information
What is the "coherence theory of truth"?
Should be used to determine what information is most likely to be true. It is based on the premise that information confirmed most often by independent sources is more likely to be true, versus conflicting information confirmed by a lesser number of sources
What do collection agencies use to indicate the probable value of information?
An evaluation code to indicate the probable value of the information that they report
What are the results of the analysis phase?
Analysis results aid in identifying related materials, providing factual background information, and verifying new information, which are all necessary conditions for producing valid new intelligence.
How are intelligence analysts able to share information, discuss opinions, debate hypothesis and identify or resolve analytic disagreements?
Through collaboration
List the various forms of dissemination
Electronic transmission (soft copy) OR written reports/briefings (hard copy)
What dissemination method has become the predominant way of communicating finished intelligence products?
Soft copy dissemination
Why does hard copy dissemination still remain as a valid way to deliver intelligence?
Due to operations involving allied or coalition forces and because US intelligence equipment and system architectures are often not compatible or at the same security level
What is a Basic Intelligence Report?
Mainstay of the intelligence community, concentrates on description with a secondary focus on explanations and evalution
What is an Estimative Intelligence Report?
Deals with events of subjects that have not yet happened
What is a Current Intelligence Report?
Centers around ongoing dynamic events and attempts to describe events and predict their possible outcome
What is an intelligence summary?
Summaries of events where only the most significant information is included
What is the purpose of intelligence annexes and appendices?
The intelligence annex provides detailed information on what intelligence must be collected, produced, and disseminated to support an operations plan or operations order. Appendices are used to provide additional information to an annex. The intelligence annex is also used by commanders to inform their forces of the current enemy situation and are of operations
How do analysts and operational planners integrate intelligence and how is it portrayed?
Common Operating Picture (COP) - depicts friendly, adversary, and third-party (gray/unknown) force dispositions and contacts on tailored graphical backgrounds. It includes a variety of near-real time friendly and adversary air, ground, space, and maritime tracks, threat/warning data, and intelligence broadcasts.
When is an intelligence requirement satisfied an subsequently closed?
If the intelligence provided to the requester is complete, timely, and in a usable format
Who is responsible for evaluating how well intelligence is disseminated and integrated with operations?
Intelligence and operations personnel
On what should your unit training programs focus?
What you want the aircrews to report and the procedures they are to use
What could a good training session for collection and reporting include?
The use of head-up display (HUD) and weapons system videotapes or audio recordings that were made during actual or simulated combat missions
What is the most important aspect of intelligence reporting?
Content
Which message-writting component ensures that your message serves its purpose at its destination?
Accuracy
Who assigns the precedence or priority designator to a message?
Originator
On what are speed of service (SOS) objectives based?
The total time it takes to process a message, from the time it is filed at the originating communications center, to the time it is delivered to the addressee's communications center
What type of hits would be listed in target hit claims?
Vehicles, rail cuts, artillery, troops, radar sites, airfields, missile launching sites, etc.
Why is AAA reporting difficult for aircrews?
The weapons are small and easy to camoflauge
What message set of a MISREP would you fill in if your aircrew performed an armed over watch mission?
ISR
If you have an electromagnetic interference (EMI) input on a MISREP, what follow-on report do you submit?
Joint Spectrum Interference Report
What message set of a MISREP summarizesw the mission in chronological order?
Narrative
Which intelligence report provides timely information regarding events that could have an immediate and significant effect on current planning and operations, or information that may be of timely interest at the national level?
INTREP - Intelligence Report
Which intelligence report summarizes, amplifies, and clarifies information previously reported in MISREPs, INTREPs, and other intelligence reports, and is produced and disseminated every 12 hours?
INTSUM - Intelligence Summary
Which intelligence report is used to inform higher headquarters with a summary of the situation at the local base?
SITREP - Situation Report
RC-135U Combat Sent collects and minutely examines each system, providing what type of analysis for war fighters?
Strategic & Analysis
The RC-135S Cobra Ball has what type of intelligence discipline sensors?
SIGINT & MASINT
What is the MR-Mk1 Nimrod's mission?
A UK asset originally designed as a maritime patrol and anti-submarine aircraft, the Nimrod has become famous for its role in support of many air-sea rescues as well as its use in combined efforts with the US performing counter-narcotic activity in the Caribbean
What is the mission of the P-3 AIP?
Employed as an anti-submarine warfare (ASW) and surface warfare (SUW) platform, the P-3C AIP provides significant ISR capabilities in a wide range of tactical scenarios
Name two ways that the Predator can provide support to the AC-130
(1) Limited hard target kill capability and threat supression (2) Remote off-board video enhanced receiver (ROVER) modication
What type of collection is the TARS (Theater Air Reconnaissance System) sensor capable of producing?
Imagery
What type of imagery can the F/A-18D (RC) provide?
Electro-optical (EO), infrared (IR), and synthetic aperture radar (SAR) sensors for the gathering of image data
Name four factors that operators must fully understand to successfully employ their weapon systems
(1) The mission (2) The enemy (3) The threat (4) The weapon system
In what two roles can the U-2 be employed?
Stand off or penetration roles
Where does ISR tasking start in the TCPED model?
All ISR tasking starts with the commander's guidance
Define the multidiscipline approach
This approach is based on the principle that sensors can complement each other, and collection managers must resist favoring or becoming too reliant on a particular sensor, system, or technique
Define asset mix and/or redundancy approach
Uses a combination of assets of differing disciplines (asset mix) or similar disciplines (asset redundancy) against a high priority target. When the probability of success of one sensor to completely satisfy the requirement is lower than acceptable, the use of multiple capabilities of different systems or disciplines increases the likelihood of success
Define resources integration
A new collection requirement is integrated with current or planned missions to increase the efficiency of the overall collection effort. By tasking a mission already in progress, it may be possible to reduce timeliness, make collection more responsive to the request, and decrease cost risk.
Define persistent surveillance
Provide near-continuous surveillance over large portions of the battlespace to monitor, track, characterize, and report moving objects
Define dynamic retasking
Changes to preplanned ISR missions executed while the platform is airborne
Define NTISR
Employs a sensor not normally used for ISR as part of an integrated collection plan developed at the operation level for both prelanned and ad hoc collection
What type of planning should occur early in the joint operation planning process so planned redeployment operations reflect exit or transition strategy concerns developed during mission analysis?
Redeployment planning
What command and control center at the operation-level provides the commander Air Force forces (COMAFFOR) with the capability to direct and supervise the activities of assigned and attached forces and to monitor the actions of both enemy and friendly forces?
AOC
What is the mission of the ISRD?
To effectively and efficiently orient the JFACC and JAOC to current and emerging enemy capabilities, threats, COAs, and centers of gravity (COG) with predictive and actionable intelligence, and to provide the JFACC with ISR operations management and targeting intelligence support
Name the four teams of the ISRD
ACF team, Target/tactical assessment (TGT/TA) team, ISR Ops team, PED management
Name five of the 11 responsibilities of the ISR ops team
(1) Guidance and objectives refinement (2) Strategy-to-task development (3) Prioritizing requirements (4) Integrating ISR and combat operations (to include strike operations) (5) Developing the ISR platform schedule (6) Collection management (7) PED management (8) Building collection tasking (9) Tasking the sensors and PED nodes through development of the RSTA annex (10) Execution of the RSTA annex (11) Dynamically adjusting platform/sensor/PED tasking as required during execution, and ISR operations assessment
What is the RSTA annex?
The ISR supplement to the ATO. It contains detailed tasking of intelligence collection sensors and PED nodes, providing specific guidance to tasked ISR assets, including ISR assets, ISR platforms, sensors, and PED nodes/architecture
What is the ISR synch matrix?
A graphical representation of the ISR schedule integrated with combat operations
What part of the TCPED cycle refers to getting the data from the sensor to the exploiters and making that data useful?
Processing
In what phase is information collected, analyzed, and turned into useful, actionable intelligence to be disseminated?
Exploitation
What two methods are used to disseminate information that has been processed, analyzed, and exploited?
Push or pull method
What team is the ISRD focal point for implementing, coordinating, and maintaining PED support from units/agencies outside the AOC?
The PED management team
Who does the PED management team coordinate with in order to facilitate a robust PED program?
With joint, coalition, component, and national agency intelligence producers
What are the three major planning priorities in mission planning?
(1) Delivery of the weapons on the target (2) Survival of the aircrew (3) Recovery of the aircraft
Who has ultimate responsibility for the success or failure of all mission planning?
The unit commander
What is the first step in the mission planning cycle?
To receive the ATO
Who validates the pre-planned missions based on OPLAN operations?
The Mission Folder Review Board
What document must be completed after missions are flown and mission debriefings have been conducted?
MISREPS (Mission Reports)
What are the three key factors in the mission planning process?
(1) Mission tasking (2) Target identification (3) Mission route characteristics
From where does the target identification come?
Usually from higher headquarters via an ATO or operation plan (OPLAN)
What is the primary chart used to depict the entire combat mission route on one chart page?
A global navigation and planning chart (GNC), or a jet navigation chart (JNC)
What is the primary chart used to depict routes within the target area?
Join operations graphic (JOG)
What is the definition of the air tasking cycle?
A six phase process that provides for the effective and efficient employment of air capabilities and forces
What is the end product of the target development phase?
The draft joint integrated prioritized target list (JIPTL) that supports the objectives and conforms to guidance
What products are produced by combat plans after the master air attack plan (MAAP) is approved by the JFACC?
The ATO, special instructions (SPINS), and the airspace control order
Name the six steps in the air tasking cycle
(1) JFC and Component Coordination (2) Target development (3) Weaponeering and allocation (4) ATO Production (5) Force Execution (6) Combat assessment
In what phase of the air tasking cycle is the ATO executed?
Phase (5), Force Execution phase
During Phase 6 - combat assessment, what are some considerations the JFC may make? What are some questions he must consider?
Considerations may be battle damage, COAs, and objective areas. Must consider "are we doing things right" and "are we doing the right things?"
Define ATO
A method used to task and disseminate to components, subordinate units, and command and control agencies projected sorties, capabilities and/or forces to targets specific missions. Normally provides specific instructions to include call signs, targets, controlling agencies, as well as general instructions
In what format are ATOs written?
US Message Text Format 2000 (USMTF)
How are ATOs structured?
ATOs are made up of lines called "sets" using the MTF as opposed to plain english. Each set is made up of fields identified by a single slash. At the beginning of each set is the set identifier. The end of each set is identified by a double slash
Traditionally, what two formats are SPINS broken out into?
Within the ATO and web posting
Who is normally the OPR for Section 3 - Communications of the web based SPINS?
C2 Planning
ATO SPINS are normally written in what format?
Same MTF as the ATO (USMTF)
What are the four steps in the IPOE process?
(1) The operational environment (2) The operational environment effects (3) The adversary (4) Adversary courses of action
What is the desired end effect of Step 1 of the IPOE effort?
To focus the IPOE effort and areas and characteristics of the operational environment that most influence campaign or mission execution
What is the primary reason for mission analysis by the IPOE analyst?
To thoroughly understand the informational requirements of the commander being supported
The operational area is that portion of the battlespace for which _________ is conducted?
In which military operations are conducted to accomplish a specific mission
What increases when time constraints are put on the IPOE process?
The number of assumptions
When graphically representing an AOI, what should be included?
The adjacent countries that are allied with the adversary, allied and coalition forces, and neutral countries.
Outside the areospace environment and information operations, give examples of possible elements that would be relevant to a commander's mission
The electromagnetic spectrum, coalition political factors, and cultural differences
Identifying significant characteristics of the operational environment aids the IPOE process by doing what?
Identifies information gaps, focuses ISR tasking, and establishes a baseline analytical database
The areospace environment is divided into two sub dimensions, what are they?
Air and Space
When determining the dimensions of the operation environment, what is the most difficult to precisely define?
The information dimension
What factor will shape the way military operations are conducted?
The human factor
What are the eight aspects of the human dimension?
(1)Political factors, (2) international relationships, (3) Socio-cultural and psychological factors, (4) economic elements, (5) population demographics, (6) infrastructure, (7) rules of engagement and laws of armed conflict, (8) military forces and objectives
How does identifying intelligence gaps early in the IPOE process aid ISR operations?
Allows ISR operations to be tailored to meet specific needs
What is the purpose of Step 2 in the IPOE process?
To determine how the battlespace affects both adversary and friendly operations
What is the desired effect of Step 2?
To identify how the operational environment influences operations and COA of threat and friendly forces
Name the five dimensions in the physical environment
(1) Air (2) Space (3) Land (4) Sea (5) Information
Why are weather effects important when analyzing the battlespace effects?
Weather can interact with, and thereby modify the environmental characteristics of each battlespace dimension and can directly affect the military operations
What are three significant factors that influence the military use of the space environment?
(1) Absence of atmospheric conditions (2) Limitations dictated by the laws of physics on orbiting bodies (3) Cosmic effects of the sun
On what does analysis of the land portion of the operational environment focus?
Transportation systems, surface materials, ground water, natural obstacles, types and distribution of vegetation, and configuration of surface drainage
What restrictions do "green water" areas pose to forces in the operation environment?
Straits or choke points that restrict tactical maneuver or affect weapon or sensor effectiveness
The information domain of the operational environment is composed of what elements?
Information data, information systems, and information functions
Why is weather analysis performed for each mission within the IPOE process?
Analysis determines the weather's direct effects on aerospace and information operations
Define center of gravity (COG)
Those characteristics, capabilities, or localities from which a military force, nation, or alliance derives its freedom of action, physical strength, or will to fight.
How is a modified combined overlay (MCOO) used?
Used as a baseline for the situation template and to assess environmental impact on a broad enemy and friendly COA.
Describe the importance of an avenue of approach (AA) in an MCOO
Avenues of Approach (AA) are important because many COAs are based on the available AA or lack there of
What is the purpose of Step 3 in the IPOE process?
To determine the adversary's COG, capabilities, doctrinal principles, and applicable tactics, techniques, and procedures (TTP).
What is the desired end effect of Step 3? How is it achieved?
To understand the source from which the adversary gets their strength; achieved through COG analysis and the development of adversary models that accurately portray how adversary forces normally execute operations and how they have reacted in similar situations in the past.
What is the desired end state of center of gravity (COG) analysis?
Adversarial operational paralysis
What is the main objective of COG analysis?
To reduce the adversary's overall abilities to effectively field resistance to opposing forces
When conducting command, control, communications, computers, and intelligence (C4I) COG analysis, what is a major point to consider?
The ability of lower echelons of command to effectively operate autonomously
Why is COG analysis key at the infrastructure level?
To ensure that these elements are not key terrain required for subsequent friendly follow on operations.
Briefly describe what two different affects an adversarial country's population can have on its ability to wage war.
May be able to extend or intensify its level of war effort or serve to demoralize and defeat the will of the people to actively support a war effort
Within Warden's 5-ring model, which is the least effective target for air power to decisively destroy directly and for what four reasons?
Fielded forces: (1) the expanse of the operational environment (2) quantity and array of adversary forces (3) limited friendly resources (4) the element of time
Briefly describe the difference between a high-value target (HVT) and a high-payoff target (HPT)
HVTs are adversary assets important for adversary operations to succeed. HPTs are adversary assets important for friendly operations to succeed
Analyzing what seven political/military factors can provide the current adversary situation and their objectives?
(1) Composition (2) Disposition (3) Strength (4) Tactics (5) Training (6) Logistics (7) C2 (command and control)
What is the purpose of Step 4 in the IPOE process?
To identify likely adversary COAs that can be exploited to shape the operational environment and accomplish the friendly mission
What is the desired end-state for Step 4?
To estimate the set of specific COAs that the adversary commander and staff are considering
The adversary's objectives and desired end-state is identified by analyzing what five things?
(1) National goals (2) national security strategy (3) current military and political situation (4) strategic and operational capabilities (5) the characteristics of the adversary nation
If attempting "reverse IPOE" to discern the adversary's perception of the friendly COAs, what must be understood?
Understanding of the adversary's decision making process as well as an appreciation for how the adversary perceives the current situation
When attempting to identify the available adversary COAs, what "wildcards" may exist that could help to determine them?
Ignorance of the military arts and sciences; immature decision making; uncertainty as to friendly disposition or intent; unexpected objectives or desired end states; desperation; bureaucratic inefficency
Each COA should meet what criteria?
(1) Suitability (2) Feasibility (3) Acceptability (4) Uniqueness (5) Consistency with doctrine
To ensure completeness in the analysis, what eight questions should a COA answer, if possible?
Who, what, where, when, why, how, how often, and to what extent
What is the description of a named area of interest (NAI)?
The geographical area where information, that will satisfy a specific information requirement, can be collected
Analysts who focus on political/economic considerations and possible intervention by third-party countries are conducting what level of IPOE?
Strategic level IPOE
What level of IPOE provides key decision-makers with operation environment effects, limits the adversary's options, and identifies the elements of the adversary's HVTs?
Operational level IPOE
What is the role of the JFACC in the IPOE process?
Provide achievable and measurable guidance, objectives, and intent for IPOE
What do the operations and plans staffs develop for the IPOE process?
Develop CCIR for the commander's approval and identify essential elements of friendly information (EEFI) with the intelligence staff
What is the role of the A2 within the IPOE process?
Develops and recommends priority intelligence requirements (PIR), develops collection requirements (CR), production requirements (PR), and collection strategies to address CCIR and EEFI
What does the IPOE process provide intelligence and operations personnel during combat operations?
A constantly maintained combat intelligence baseline from which to plan operations
What is intelligence synchronization, and why is it important to create a synchronization matrix?
The coordination of ISR with operation decisions and the intelligence cycle; in order to collect and provide in a timely manner all the intelligence required to support friendly operations
What bands are within the electromagnetic spectrum?
Gamma rays, X-rays, Ultraviolet (UV), visible, infrared (IR), and radio (RF)
All EM energy behaves in what type of manner?
The same
Give an example of terrain masking
A mountain in between the radar and the target
What does radar stand for?
Radio detection and ranging
How fast does a radio frequency signal travel?
186,000 statute miles per second OR the speed of light
What is wavelength?
The measure of the physical distance between peaks of a sine wave propagated in space
What is the height of a target, and in what two ways is this measurement expressed?
Altitude and above ground level (AGL) or mean sea level (ASL)
What are the four main types of radar?
(1) Pulse (2) Doppler (3) Pulse Doppler (4) Mono pulse
Which type of radar provides accurate range information?
Pulse
What are the three main types of antennas?
(1) Parabolic (2) Cassegrain (3) Phased array
What type of scan shapes the radar beam electronically instead of mechanically?
Electronic scan (ESA)
What components generally make up a ground control intercept (GCI) site and why?
Height finder and early warning radar because they provide range, azimuth, and elevation needed to conduct fighter intercepts or hand offs to surface to air missile systems
Explain the differences between semiactive and active radar homing?
Semiactive radar homing missiles home in on reflected radar energy from an external radar illumination source. Active radar missiles use the radar within the missile nose to illuminate, track, and guide to target
What are the three major subdivisions of electronic warfare (EW)?
(1) Electronic attack (EA) (2) Electronic protection (EP) (3) Electronic warfare support (ES)
What is electronic attack?
A subdivision of electronic warfare (EW) involving the use of electromagnetic (EM) energy, directed energy (DE), or antiradiation weapons to attack personnel, facilities, or equipment with the intent to degrade, neutralize, or destroy enemy combat capability
What are the three types of noise jamming?
(1) Barrage (2) Spot (3) Swept spot
Self protection jamming is designed to counter what threats?
Surface to air missiles, airborne interceptor, antiaircraft artillery acquisition, and target tracking radars
What is Suppression of Enemy Air Defense?
SEAD is that activity in which neutralizes, destroys, or temporarily degrades enemy air defense weapon systems in a specific area through physical attack
What is estimation?
Estimation allows the radar to calculate where the target will be next if the radar loses its track or is in a high EA environment. It uses the direction, velocity, and altitude prior to the loss to estimate where the target will be to avoid interrupting the fire control solution
What is burn through?
Burn through occurs when the power in the reflected target signal exceeds the power in the jamming signal
What are the two types of decoys?
Saturation and towed
What is electronic warfare support?
ES refers to that division of EW involving actions tasked by, or under direct control of, an operational commander to search for, intercept, identify, and locate or localize sources of intentional and unintentional radiated EM energy for the purpose of immediate threat recognition, targeting, planning and conduct of future operations. ES data can be used to produce SIGINT, provide targeting for electronic or destructive attack
What is the joint restricted frequency list (JRFL)?
JRFL is a list that operational, intelligence, and support elements use to identify the level of protection desired for various networks and frequencies and is limited to the number of frequencies necessary for friendly forces to accomplish JTF objectives
How is IR subdivided?
(1) Near IR: .75 micron to 1.5 micron (2) Midwave IR: 1.5 micron to 5.5 micron (3) Far IR: 5.5 micron to 1,000 micron
What is emissivity?
The percentage of energy directed by each of the processes depends on the specific properties of the material that is struck. Emissivity is a measure of how well an object absorbs incident IR radiation and reradiates it. This property is determined primarily by the physical characteristics of the object to include its surface texture, color, and thermal capacity
What is thermal crossover?
Time during the day when the background and the target emit the same amount of IR energy
How is radiation attenuated?
Scattering and absorption
What is a thermal ghost?
This happens when an object like an aircraft shields the background from absorbing the IR energy emitted from the sun. The thermal ghost is the shadow that is created after the object is moved.
What are some limiting factors for IR energy?
Clouds and precipitation, sun's position, and wind.
What is transmission of visible light?
Transmission is the passing of light through either a transparent or translucent medium
What is diffraction?
When light passes over the edge of an opaque object becoming scattered slightly or diffracted. You can see diffraction as a shadow with a fuzzy edge when an opaque object is placed so that it partially blocks the path of the rays from a point source of light
Some of the strongest returns of an ISR radarscope are?
Man made objects
What are the factors that influence the strength of reflected radar energy?
Large flat surfaces, dense reflective materials, multiple reflections, and aircraft altitude
What is the most apparent radar feature of industrial facilities?
The most readily apparent feature of industrial facilities is the concentration of L-shaped returns
Railroad tracks do not necessarily show on radar. What reflection do we see that would indicate a railroad track?
It is not the railroad track that shows on real-beam radar, but the supporting earth works
Why do highway surfaces tend to reflect radar away from the aircraft?
Because of their smooth surface, highways tend to reflect radar energy away from the aircraft
Why do truss bridges show up well on radar?
Truss bridges usually shows very well on a radarscope due to the extent of external bracing
What is one important potential use of IR sensors?
One of the important potential uses of IR sensors is to identify heat sources used in industry
Name three categories of facilities/activities that IR is helpful in identifying
(1) Industrial facilities (2) Transportation networks (3) Order of battle activites
How can an IR sensor determine whether or not an aircraft has recently been flown?
It will image and show that the engines of a recently flown aircraft are much hotter that the rest of the aircraft
What is the main reconnaissance value of IR imagery?
Detecting activity
When completing the career development course, how much time is given to complete each volume?
30 days
What Air Force Instruction can you reference to determine trainee responsibilities?
AFI 36-2201, Vol 3
What Air Force Instruction is referred to as the "little brown book", and gives you information on the enlisted tier responsibilities?
AFI 36-2618
Commanders will not prosecute a target without ______.
Intelligence
The purpose of critical thinking is to ask yourself questions in order to ensure your conclusions have all of the following EXCEPT ________.
Substance
Name one of the most common methods for conducting intelligence analysis used for identifying connections of known information between objects.
Link analysis
Who is inherently responsible for base force protection (FP)?
Commanders
The application of active and passive defense measures, employed across the legally-defined ground dimension of the operational environment, to mitigate potential risks, and defeat adversary threats to Air Force operations is known as what?
Integrated Defense
What do the objectives of integrated defense provide for the conduct of integrated defense?
A central focus
What is the area outside the base perimeter from which the base may be vulnerable from standoff threats?
BSZ (Base Security Zone)
What agency is the Air Force's main focal point for CI activities?
AFOSI
Which threat comes from assigned personnel, host-country nationals, third country nationals, or other persons assigned to or transiting the AOR?
Insider
Which type of attack targets Air Force personnel and infrastructure through psychological operations, propaganda, electronic attacks, and network attacks?
Information operations
Which type of attack utilizes suicide bombers and civilian airliners as weapons?
Terrorist
Identification of needs for intelligence regarding all aspects of the operational environment start with which phase of the intelligence process?
Planning and direction
"What is the current locations of the adversary SA-20 battery" is an example of what?
Priority Intelligence Requirment
What is the intelligence annex of a CONPLAN or OPLAN?
Annex B
At what level of collection are the national agencies involved?
Strategic
What determines the success of retasking a mission for collection?
The capabilities of the asset
What collection method is conducted openly and may be acknowledged by and attributed to its sponsor?
Overt
What phase in the ISR process comes after the collection phase?
Processing and exploitation
What is the best guide to the reliability of a source of information?
Past performance
During ______ information is received, collated, and entered into appropriate databases by the analysis and production elements of intelligence community organizations.
Integration
Intelligence production must be _____ and ______ to provide non-duplicative, all-source intelligence products to the requester.
Coordinated and directed
What two steps in the analysis and production phase attempt to determine the truthfulness of the information?
Evaluation and analysis
In which step of the Analysis and Production Phase is information considered finished intelligence?
Interpretation
Why does the military still utilize hardcopy dissemination methods?
Allied and coalition forces often do not have the ability to utilize the same system architecture
What is the primary vehicle for integrating intelligence and operations?
Common Operational Picture (COP)
Who evaluates the quality of intelligence products?
Intelligence personnel and consumers at all levels
When performing your duties with intelligence collection and reporting, what is one reason you should perform training for aircrew?
Because aircrew are a valuable source of perishable intelligence and training the aircrew what to report can ensure they report important intelligence
Which prosign would be utilized when intelligence is received that our forces have made initial enemy contact?
ZZ
Which type of intelligence data includes information on the number of aircraft on a specific mission?
Operational data
What type of reporting is difficult for aircrew due to the small size of weapons utilized?
AAA engagements
How many steps are involved in mission reporting?
4
Which should be reported by aircrew for both AAA and SAM sightings?
Fire coordination
Where can you find the process for submitting a MISREP?
SPINS
What are the required administrative data sets for a MISREP?
TARWI
What initial report would be submitted if an aircrew passes an INFLTREP regarding a column of tanks advancing toward our forward line of troops?
INTREP
Identify the report that is similar to an INTSUM, but contains more refined analytical information.
DISUM
This traditional ISR asset was originally designed as a maritime patrol and anti-submarine aircraft.
MR Mk1P Nimrod
What non-traditional ISR asset was purchased to fill the void left behind from the retirement of the TARPS system?
SHARP
This model is a tool used to characterize the sort of processes that typically happen in a collection cycle for a given sensor.
Tasking, collection, processing, exploitation, and dissemination (TCPED)
This process of the TCPED model refers to the mission planning and execution of operations.
Collection
This weapon system is the operational-level command and control center that provides the Commander Air Force Forces with the capability to direct and supervise the activities of assigned forces.
Air and space operations center (AOC)
The primary products of this division include the air tasking order (ATO), airspace control order (ACO) and joint integrated prioritized target list (JIPTL).
Combat Plans Division
The ISRD team conducts dynamic intelligence preparation of the operational environment and provides the context for understanding the adversary's intentions.
Analysis, correlation and fusion team (ACF)
Which team within the air mobility division coordinates closely with the rescue coordination cell?
Aeromedical evacuation control team
What team is the focal point for the ISRD for implementing, coordinating and maintaining PED support from agencies outside the AOC?
The PED Management team
What are the phases of the mission planning cycle?
Receive the ATO, Pre-mission brief, mission planning, mission planning validation, execution, MPC Brief
Which charts will normally depict the target areas for mission planning?
JOG
In the third phase of the air tasking cycle, what provides the basis for weaponeering assessment activities?
JIPTL
What aircraft/callsign is assigned to the mission? MSNACFT/2/ACTYP:F-16C/TEXAN01/A1/111/22222/2222
F-16 C / TEXAN01
What is used to get an aircraft to specific areas for mission accomplishment, and do not have altitude restrictions?
ATR
Who is the office of primary responsibility for the section of the SPINS that provides guidance to subordinate and supporting commanders of the JFACCs overall C2 battle plan?
C2 Planning
What is the purpose of the first step of the IPOE process?
To define the intelligence problem by identifying the specific aspects of the environment, the activities within it, and the space where they exist
What does a thorough pre-conflict analysis alleviate when it can be accomplished?
Time constraint problems
Usually the aerospace environment is divided into two sub-dimensions. What are they?
Air and space
What is classified as the area of concern including the area of influence, areas adjacent thereto, and extending into enemy territory to the objectives of current or planned operations?
Area of interest (AOI)
What is the purpose of the second step in the IPOE process?
To determine how the battlespace affects adversary and friendly operations
Which dimension of the physical environment is not constrained by physical boundaries?
Space
Which of the following is probably the most important human dimension characteristic to consider?
Political
Give examples of broad COAs.
(1) Air COA - attack, defend, disperse, evade, harden (2) Space COA - attack, deny, launch additional assets (3) Information COA - attack, defend, gain, or exploit
What are the three elements that intelligence threat models consist of?
(1) Doctrinal templates (2) Description of preferred TTPs, options, and follow on activity (3) ID of high value targets (HVT) or high payoff targets (HPT)
In which step of the IPOE process will you determine the current adversary situation?
Evaluate the adversary
Step 4 of the IPOE process identifies and develops ______.
The adversary's likely COA that will influence accomplishment of the command's mission
What are considered "wildcard" tactics for adversary COAs?
Ignorance of the military arts and sciences, immature decision making, uncertainty as to friendly disposition or intent, unexpected objectives or desired end states, desperation, bureaucratic inefficiency
In what order should courses of action be developed?
In order of it's probability of adoption
What provides the updated intelligence baseline on which to make operational assessments?
IPOE process
What is the role of the intelligence staff?
Direct the IPOE process
What is the term that refers to energy that spreads out as it travels away from its source?
Radiation
What is the rate at which pulses or pulse groups are transmitted?
PRF
Beam width error increases with _______.
Range
The distance a target is from the radar site at the time of detection is called what?
Range
What is the most common type of radar design?
Pulse
Which type of radar was developed to overcome the limitations and jamming susceptibility of scanning radar systems?
Monopulse
Identify the method of scan that continuously scans 360 degrees in azimuth.
Conical
Identify the radar system that warns of an impending attack by hostile aircraft.
Early Warning
This type of jamming uses a wide-band noise transmitter designed to deny the use of frequencies over wide portions of the EM spectrum.
Barrage
Name SEAD assets
F-16CJ, HTS Pd and AGM-88
What samples the receiver noise content at the end of each PRF and sets the gain accordingly for the next pulse interval?
Automatic gain control
In the Rivet Joint's electronic support mission, it provides ______ to national and theater consumers.
SIGINT
What is the measure of how well an object absorbs incident IR radiation and reradiates it?
Emissivity
What occurs as radiation travels through the Earth's atmosphere and scatters and becomes absorbed?
Attenuation of radiation
Which visible light concept refers to the bending of a ray of light?
Refraction
When considering the radar significance of cultural features in suburban area, what will reflect less energy than the concrete and masonry used in urban areas?
Shingle roofs, wooden construction, glass and dirt
What provides the key to interpretation of railroad tracks?
The filling in of low areas and cutting through rolling terrains
When classifying the radar returns of military installations, what is the usual method of classification?
Classify the installation into broad category first
What type of radar returns are generally produced by ships on real-beam systems?
Small and bright returns
What will produce "hot" infrared signatures?
Boilers and furnaces
What factors will affect the thermal signature of equipment?
Painted equipment, netted equipment, aircraft, ground vehicles and activity and naval activity
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials