1N4 Air Force
185 questions across 0 topics. Use the find bar or section chips to jump to what you need.
National Security Strategy
provides a broad strategic context for employing military capabilities in concert with other instruments of national power
National Defense Strategy
DODs enduring mission to provide combat credible forces needed to deter war and protect the security of our nation. plans for next 20 years. foundation for all other defense plans
National Military Strategy
addresses the need to counter revisionist states that are challenging international norms as well as violent extremist organizations. defines how the us military as a whole joint force will support/contribute to National Security and the National Security Strategy
USAF Strategic Master Plan
translates the USAFs 30 year strategy into comprehensive guidance, goals, and objectives.
Air Force Operating Concept (FOC)
Air Forces over arching force development concept. it describes how future AF forces will provide responsive and effective Global Vigilance
National Intelligence Priority Framework
primary source for establishing, disestablishing, managing, and communicating national Intelligence priorities and reflects customers priorities for support and ensures the IC continues to meet enduring and emerging issues.
National Intelligence Strategy
provides the IC with the mission direction of the Director of National Intelligence for the next four to five years. Provides the organizational framework for the IC, overall picture
National Defense Authorization Act
US Law that governs defense budget and spending
Air Force Doctrine Document
AFs keystone doctrinal publication in global integrated ISR and defines how the Service plans and conducts these operations to enable Joint Operstions. dictates how the USAF will conduct ISR in order to accomplish both individual AF missions and support the Joint environment.
National Security Space Policy
outlines the environment, ibjectives, approaches, and challenged in the Space domain with a specific focus on National Security.
Unified Combatant Command (CCMD)
a command with a broad continuing mission under a single commander
USAFRICOM
responsible for military relations with African Nations, African Union, and African National security organizations
USCENTCOM
responsible for operations in twenty countries that fall in the Central Area of the globe. coop amongst nations, respond to crisis, support development and stability to region
USEUCOM
works with NATO and other partner nations to address the security and defense needs of nations in Europe and parts of the middle East and Eurasia. provide humanitarian assistance
USNORTHCOM
primarily responsible for civil support and Homeland security and also oversees the north American aerospace defense command (NORAD)
USPACOM
promote the development of the region while cooperating to enhance secueity, deter aggression, respond with force when necessary and to provide humanitarian assistance
USSOUTHCOM
works to increase the security of the United states by engaging it's partners to enhance peacekeeping capabilities in the region, promote human rights, deter illegal trafficking
USCYBERCOM
direct, synchronize, and coordinate cyberspace planning, and operations to defend and advance national interests
USSOCOM
responsible for planning for and conducting special operations
USSTRATCOM
conducts global operations in partnership with other Combatant commands, services, and us govt agencies. in command of us nuclear capabilities
USTRANSCOM
provides the department of defense with an aggregate of transportation capabilities and assets
MAJCOMS
represents a major Air Force subdivisions having a specific portion of the Air Force mission. 10 total
Air Combat Command
operates fighter, bomber, reconnaissance, battle management and electronic combat aircraft. provides command, control, communications, and intelligence systems.
Air Educational and Training Command
recruits, trains, and educates quality people for the aerospace force and the nation.
Air Force Global Strike Command
mission is nuclear and conventional global strike, a key component of strategic deterrence.
Air Force Materiel Command
develops, acquires, and sustains aerospace power needed to defend the United States and its interests today and tomorrow
Air Force Reserve Command
mission of the Air Force Reserve Command is to provide combat ready forces to fly, fight, and win.
Air Force Space Command
provide resilient and affordable space and cyberspace capabilities for the joint force and the nation.
AFSOC
Provide our nation's specialized airpower, capable across the spectrum of conflict, anytime, anywhere, any place
Air Mobility Command
Execute Rapid Global Mobility and enable Global Reach - the ability to respond anywhere in the world in a matter of hours. Airlift, Air Refueling, Air Mobility Support, and Aeromedical Evacuation.
Air Forces Central Command
delivers decisiver air and space, and cyberspace capabilities for United States Central command, ally nations, and America
Pacific Air Forces
Delivers rapid and precise air, space and cyberspace capabillites
United States Air Force in Europe
executes the USEUCOM, and USAFRICOM missions with forward based Airpower and infrastructure to conduct and enable theater and global operations.
Numbered/ Named Air Force (NAF)
command echelon that resides directly under a MAJCOM; provides operational leadership, supervision, and prepare forces for deployment and employment
Joint Staff
is composed of personnel from each of the five armed services that assists the CJCS and the Vice-CJCS in discharging their responsibilities and is managed by the Director of the Joint Staff.
Air Staff
primarily composed of uniformed US Air Force officials who assist the CSAF in carrying out his role as the principal military advisor to the SECAF.
AF/A1
Deputy Chief Staff, Manpower, Personnel & Services
AF/A2
Deputy Chief of Staff, Intelligence, Surveillance, and Reconnaissance
AF/A2C
Capabilities
AF/A2D
Strategy, Plans, Doctrine, Force Development
AF/A2E
Executive Services
AF/A2R
Resources
AF/A2Z
Special Programs
AF/A3
OPERATIONS
AF/A4
logistics, engineering, & Force Protection
AF/A5/8
Deputy Chief of Staff for Strategic Plans, Programs, and Requirements
AF/A9
Studies, Analyses, Assessments, and Lessons Learned
AF/A10
Deputy Chief of Staff Strategic Deterrence & Nuclear Program
Intelligence Community
serves as the head of the US Intelligence Community, overseeing and directing the implementation of the National Intelligence Program (NIP). acts as the principal advisor to the president, the National Security Council, and Homeland Security Council.
Director of National Intelligence (DNI)
Twenty-Fifth Air Force provides multisource intelligence, surveillance, and reconnaissance products, applications, capabilities, and resources, to include cyber and geospatial forces and expertise.
Air Force Intelligence
executes mission command of operational intelligence and security forces
Army Intelligence and Security Command (INSCOM)
created with the signing of the National Security Act. Collecting intelligence through human sources and by other other appropriate means. Providing overall direction for and coordination of the collection of national intelligence outside the US through human sources.
Central Intelligence Agency
provides military intelligence to warfighters, defense policymakers and force planners in DoD and the Intel Community in support of the US military planning and operations and weapons systems acquisition.
Defense Intelligence Agency
responsible for all intelligence and counterintelligence activities throughout the DOE complex, including nearly 30 offices nationwide. Protects vital national security info and technologies, representing intellectual property of incalculable value.
Dept of Energy Office of Intelligence and CounterIntelligence
IC element charged with delivering intelligence to our state, local, tribal, territorial, and private-sector partners, and developing intelligence from those partners for the Department and the IC
Dept. of Homeland Security Office of Intelligence and Analysis
primary mission is to harness intelligence to serve US diplomacy.
Dept. of State Bureau of Intelligence and Research
advances national security and protects financial integrity by informing Treasury decisions with timely, relevant, and accurate intelligence and analysis.
Dept. of Treasury Office of Intelligence and Analysis
responsible for enforcing the controlled substance laws and regulations of the US.
Drug Enforcement Administration Intelligence Program (DEA)
intelligence-driven and threat-focused national security organization with both intelligence and law enforcement responsibilities.
Federal Bureau of Investigation
to provide commanders at every level seamless, tailored, timely, and mission-essential intelligence and to ensure this intelligence is integrated into the operational planning process.
Marine Corps Intelligence
delivers world-class geospatial intelligence that provides a decisive advantage to policymakers, warfighters, intelligence professionals, and first responders.
National Geospatial-Intelligence Agency
US Govt Agency in charge of designing, building, launching, and maintaining America's Intelligence Satellites
National Reconnaissance Office
leads the US govt in cryptology that encompasses both SIGINT and Information Assurance products and services, and enables Computer Network Operations in order to gain a decision advantage for the Nation
National Security Agency
office of the director of national intelligence is staffed from officers from across the IC and is organized into component offices.
Office of Naval Intelligence
exploitation and analysis of imagery and geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the Earth.
GEOINT
likeness or presentation of any natural or man-made feature or related object or activity, used extensively to update GEOINT foundation data.
Imagery
Technical, geographic, and intelligence information derived through the interpretation or analysis of imagery and collateral materials.
IMINT
provide digital imagery data in the IR, visible, and/or ultraviolet regions of the electromagnetic spectrum
EO Sensors
provide a pictorial representation of the contrasts in thermal IR emissions between objects and their surroundings, and are effective during periods of limited visibility
IR imaging sensors
useful for characterizing the environment or detecting and locating objects with known material signatures.
Spectral Imagery Sensors
provide all weather imaging capabilities and the primary night capability
Radar Imaging Sensors
can be used to measure shoreline, and beach volume changes, conduct flood analysis, and identify water flow issues, and augment transportation mapping applications
Lidar Sensors
identifies the geographic location and characteristics of natural or constructed features and boundaries on the Earth.
Geospatial Information
A category of intelligence derived from information collected and provided by human sources and multiple media sources to identify adversary elements.
HUMINT
systematic process of using interrogation approaches to question a captured or detained person to obtain reliable information to satisfy intelligence collection requirements
Intelligence Interrogation
unsolicited personnel who volunteer information
Walk-In Sources
met over a period of time and provide information based on operation requirements
Developed Sources
with access to sensitive information
Unwitting Persons
process of questioning cooperative human sources to satisfy intelligence requirements, consistent with applicable law.
Debriefing
systematic extraction of information from all media formats in response to collection requirements
Document Exploitation DOMEX
intelligence produced by exploiting foreign communications systems and noncommunications emitters
SIGINT
intelligence and technical information derived from collecting and processing intercepted foreign communications passed by radio, wire, or other electromagnetic means
COMINT
intelligence derived from the interception and analysis of non communications emitters.
ELINT
Concerned with operationally relevant information -Location, Movement, Employment, Tactics
OPELINT
concerned with the tech aspects of foreign non-communications emitters such as signal characteristics, modes, functions, associations, capabilities, limitations, vulnerabilities, and tech levels
TECHELINT
involves the technical analysis of data intercepted from foreign equipment and control systems such as telemetry, electronic interrogators, tracking/fusing/arming/firing command systems, and video data links
FISINT
information produced by quantitative and qualitative analysis of physical attributes of targets and events to characterize, locate, and identify them.
MASINT
intelligence based on open source information that any member of the public can lawfully obtain by request, purchase, or observation.
OSINT
non-doctrinal term used by various professions, a subset of open source information usually produced by research establishments that is neither published commercially nor universally accessible.
Gray Literature
community protected medium for sharing of sensitive unclassified and commercially obtained information
Intelink Sensitive but Unclassified (SBU)
act of gaining possession of, or access to, open-source information synonymous with "open-source collection"
Open-Source Acquisition
IC collection management "program of record" for OSINT collection requirements
Open-Source Collection Acquisition Requirement Management System
intelligence derived from the collection, processing, analysis, and exploitation of data and information pertaining to foreign equipment and materiel for the purposes of preventing technological surprise, assessing foreign scientific and technical capabilities.
TECHINT
CI encompasses five functions conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations
Counterintelligence
opereates, evaluates, and manages airborne signals intelligence information systems and operations activities and related ground processing activities.
1A8X1 Airborne Cryptologic Language Analyst
primary aircrew onboard a wide variety of aircraft to operate, evaluate, and manage airborne ISR information and related ground processing systems. performs identification, acquisition, recording, analysis, and reporting of assigned ISR tasks.
1A8X2 Airborne ISR Operator
performs, manages intelligence activities/ functions including discovering, developing, evaluating, and providing intelligence information.
1N0 All Source Intelligence Analyst
manages, supervises, and performs intelligence activities and functions including planning, collection, analysis, exploitation, development, and dissemination of multi-sensor geospatial and target intelligence products to support war fighting operations and other activities.
1N1 Geospatial Intelligence
Acquires, processes, identifies, analyzes, and reports on electromagnetic emissions. Operates electronic equipment and computer systems to exploit signals intelligence production efforts.
1N2 Signals Intelligence Analyst
employs foreign language skills to collect, transcribe, translate, analyze, and report intelligence information.
1N3 Cryptologic Language Analyst
exploits global communications to support Computer Network Operations (CNO)
1N4A Digital Network Analyst
non-communication intelligence matters
1N2A
communication intelligence matters
1N2C
performs and manages intelligence analysis activities/functions in all domains. Analyzes and exploits intelligence information.
1N4B Fusion Analyst
collects and reports intelligence information obtained from human sources in response to requirements
1N7 Human Intelligence Specialist
performs targeting intelligence activities and functions analyzing targets. develops targeting solutions and evaluates effects in support of planning and execution of an effects based approach to operations that achieves the commander's objectives.
1N8 Targeting Analyst
the atmosphere, beginning at the Earth's surface, extending to the altitude where its effects upon operations become negligible.
air
the area of the Earth's surface ending at the high water mark and overlapping with the maritime domain in the landward segment of the littorals
land
the oceans, seas, bays, estuaries, islands, coastal areas, and the airspace above these, including the litorrals
maritime
the area above the altitude where the atmospheric effects on airborne objects become negligible.
space
an AF ISR professional who is skilled and certified in tradecraft to perform the core competency of intelligence analysis across the air, space, or cyberspace domains.
Analyst Airman
translates the commander's concepts into executable activities, operations, and campaigns, within resource, policy, and national limitations to achieve objectives.
Operations Planning
the deliberate process of balancing ways, means, and risks to achieve directed objectives and attain desired end states by synchronizing and integrating the employment of armed forces.
Planning
Theater Campaign Plans- Functional Campaign Plans- implement the military portion of national security policy and defense strategy by identifying those actions the CCMDs will conduct on a daily basis.
CCMD Campaign Plans
branches of campaign plans that are planned for potential threats, catastrophic events, and contingent missions without a crisis at hand. identify how the command might respond in the event of a crisis or the inability to achieve objectives.
Contingency Plans
1. Commander's Estimate. 2. Base Plan (BPLan). 3. CONPLAN 4. OPLAN.
Four Levels of Planning detail for Contingency Plans
level of planning involving the least amount of detail and focuses on producing multiple COAs to address a contingency
Commanders' Estimate
level of planning that describes the CONOPS, major forces, concepts of support, and anticipated timelines for completing the mission
Base Plan (BPLAN)
level of planning that is an OPLAN in an abbreviated format that may require considerable expansion or alteration to convert it into a complete and detailed level 4 OPLAN
CONPLAN
a complete and detailed plan containing a full description of the CONOPS, all applicable annexes to the plan including a time-phased force and deployment list (TPFDL).
OPLAN
enterprise provides a framework for iterative dialogue and collaborative planning to discuss the merits and risks of various military options employing joint forces.
Adaptive Planning and Execution (APEX)
supports the achievement of JFC objectives by developing, refining, disseminating, and assessing the JFACC's air, space, and cyberspace operations strategy for all phases of a campaign.
Air Operation Center (AOC) Strategy Divisioin
conducted when an emergent situation arises, and will analyze approved contingency plans with like scenarios to determine if an existing plan applies.
Crisis Planning
encompasses the exercise of authority and direction by a commander over assigned and attached forces in the accomplishment of the mission. Command includes both the authority and responsibility for effectively using available resources to accomplish assigned missions.
Command Authority (C2)
is a nontransferable command authority, exercised only by commanders of unified or specified COCOMs unless otherwise directed. involves organizing and employing commands and forces, assigning tasks, designating objectives, and giving authoritative direction over all aspects of military operations.
Combatant Command
is the transferable command authority that may be used by commanders at any echelon at or below the level of COCOM. the authority to perform functions of command over subordinate forces involving organizing and employing commands and forces, assigning tasks, designating objectives, and giving authoritative direction necessary to accomplish the missions.
Operational Control (OPCON)
the detailed and local direction and control of movements or maneuvers necessary to accomplish missions or tasks assigned. allows commanders below COCOM level to apply force and direct tactical use of logistics assets but does not provide authority to change organizational structure.
Tactical Control (TACON)
synonymous with responsibilities identified in Title 10, US Code, establishing authority to fulfill statutory service administration and support requirements. direction or exercise of authority over subordinate or other organizations in respect to administration and support.
Administrative Control (ADCON)
an Ad Hoc arrangement between two or more nations for common action. temporary
Coalition
the result of formal agreements between two or more nations for broad, long-term objectives that further the common interests of the members.
Alliance
the analytical process joint intelligence organizations use to produce intelligence assessments, estimates, and other intelligence products in support of the joint force commander's decision-making process.
JIPOE (Joint Intelligence Preparation of the Operational Environment)
1. Define the Operational Environment 2. Describe the Impact of the Operation Environment 3. Evaluate the Adversary and other Relevant Factors. 4. Determine Adversary and other Relevant Factors.
Four Steps of the JIPOE process
joint force staff assists the Joint JFC and component commanders in defining the OE by identifying those aspects and significant characteristics that may be relevant to the joint force's mission.
JIPOE 1. Define the OE
1. identify the joint forces OE 2. analyze the mission and JFCs 3. determine the significant characteristics of the oe 4. identify the limits of the joint force's areas of interest 5. determine the level of detail required and feasible within the time available 6. determine the intelligence and information priorities, gaps, and shortfalls 7. collect material and submit requests for information to support further analysis.
7 steps in Defining the OE
evaluates and describes broad courses of actions (COAs) and the impact of the OE on the adversary, friendly, and neutral military capabilities. all relevant physical and nonphysical aspects of the OE are analyzed by JIPOE analysts. Review sociocultural factors and systems nodes and links.
JIPOE 2. Describe the Impact of the OE
1. Develop a geospatial perspective of the OE 2. Develop a systems perspective of the OE 3. Describe the impact of the OE on the adversary and friendly capabilities and broad COAs.
3 steps in Describing the Impact of the OE
identifies and evaluates the adversary's capabilities, current situation, COGs, and doctrine, patterns of operation, and TTP employed by adversary forces, absent those constraints identified in step 2
JIPOE 3. Evaluate the Adversary and other Relevant Factors.
1. Update or create adversary and other relevant actor models. 2. Determine the current adversary and other relevant actor situation. 3. Identify adversary and other relevant actor COGs and decisive points 4. Identify adversary and other relevant actor capabilities and vulnerabilities.
4 steps in Evaluating the Adversary and other Relevant Factors
develop a detailed understanding of the adversary's and other relevant actors' probable intent and future strategy. identify the COA the adversary is most likely to adopt, and the COA that would be most dangerous to friendly force or to mission accomplishment.
JIPOE 4. Determine Adversary and other Relevant Actor COAs.
1. Identify the adversary's and other relevant actors' likely objectives and desired end state. 2. Identify the full set of adversary and other relevant actor COAs 3. Evaluate and prioritize each course of action 4. Develop each COA in the amount of detail time allows 5. Identify initial collection requirements.
5 steps in Determining Adversary and other Relevant Actor COAs.
1. Strategic 2. Operational 3. Tactical
Relationships to Levels of War
establish national and multinational military objectives; develop global or theater campaign plans to achieve those objectives
Strategic Level
analysis of the OE can include considerations such as sociocultural factors, the location of adversary political and economic support structures, military support units, force generation capabilities.
Operational Level
analysis of the OE is focused on adversary land, air, maritime, space, and other forces as well as other relevant aspects of the OE that could pose a direct threat to the security of friendly forces or the success of its mission.
Tactical Level
supports the joint force commander's joint operation planning and execution with a comprehensive, iterative and logical methodology for employing ways and means to create desired effects that support achievement of objectives. 6 step process.
Joint Targeting Cycle
1. End State and Commander's Objectives 2. Target Development and Prioritization 3. Capabilities Analysis 4. Commander's Decision and Force Assignment 5. Mission Planning and Force Execution 6. Assessment
6 Steps of Joint Targeting Cycle
the set of required conditions that defines achievement of all military objectives for the operation. Clear and concise expression of the purpose of the operation and the military end state.
JTC. 1. End State and Commander's Objectives
the analysis, assessment, and documentation processes to identify and characterize potential targets that, when successfully engaged, support the achievement of the Commander's objectives. The Target's real importance lies in its relationship to other targets within an operational system.
JTC 2. Target Development and Prioritization
the foundational process of system-level development. process which enables additional, more detailed stages of target development.
Target System Analysis (TSA)
measures a target's contribution to a target system's larger function and its relative importance within the target system .
Critically
measures the target's importance to the adversary's target system and to friendly forces ability to accomplish a mission or achieve an objective.
Value
the measure of the time between the disruption of a target's activity and its measurable impact on system output.
Depth
measurement of the time and cost required for a target to regain its functional capability after being disrupted.
Recuperation
current output and maximum output
Capacity
refers to the physical susceptibility to damage, disruption, intrusion, interference, or other desired effect.
Vulnerability
the measure of the extent to which a single target can absorb a disruptive influence and continue to function
Cushion
provide a quantity of stored resources that may be used when the normal supply of the resource is disrupted
Reserves
the geographic distribution of the targets in a target system and or target elements within a target
Dispersion
the measure of the time required to shift a target's function from one location to another
Mobility
the ability to counteract the potential disruptive activity of the friendly system through active and passive means
Countermeasures
analyzed to determine the target's susceptibility to damage, disruption, or other effect
Physical Characteristics
builds on TSA and generally occurs in three stages; basic, intermediate, and advanced.
Entity-Level Target Development
when a target is nominated for target development and ends with the creation and maintenance of a prioritized target list. includes; target vetting, validation, listing nomination, and prioritization
Target List Management
assesses the accuracy of the supporting intelligence. verifying the candidate target's functional characterization, expectation statement, and target significance.
Target Vetting
A part of target development that insures all vetted targets meet the objectives and criteria outlined in the commanders guidance and ensures compliance with the laws of war and rules of engagement. VALIDATION IS AN OPTIONAL FUNCTION
Target Validation
involves evaluating available capabilities against desired effects to determine the appropriate options available to the commander. evaluating all available capabilities against targets' critical elements to determine the appropriate options available to the commander. ENOUGH FORCE TO CREATE THE DESIRED EFFECTS WHILE MINIMIZING THE COLLATERAL DAMAGE AND WASTE OF RESOURCES
JTC 3. Capabilities Analysis
Target Vulnerability Analysis, Capabilities Assignment, Feasibility Assessment, Effects Estimate
4 steps of Capabilities Analysis
conducted during the third phase, during which appropriate weapons or other capabilities are matched with target elements to create the desired effects on the target.
Weaponeering
integrates previous phases of joint targeting and fuses capabilities analysis with available forces, sensors, and weapons systems.
JTC 4. Commander's Decision and Force Assignment
detailed planning should be performed for the execution of operations upon receipt of tasking orders. supported by providing tactical level planners with direct access to detailed information on the targets.
JTC 5. Mission Planning and Force Execution
an identification derived from observation and analysis of target characteristics. acquired during step 2 during F2T2EA.
PID
the process of attaining an accurate characterization of detected objects in the operational environment sufficient to support an engagement decision.
CID
kill chain" used for specifically engaging TSTs.
Dynamic Targeting aka F2T2EA
measures whether desired effects are being created, objectives are achieved, and next steps are evaluated. Continuous Process
JTC 6. Assessment
in intelligence usage, the acquisition of information and the provision of this information to processing elements.
Collection
within the DoD, constitutes the authority to establish, prioritize, and validate theater collection requirements, establish sensor tasking guidance, and develop theater-wide collection policies.
Collection Management Authority (CMA)
acts as the collection management authority on behalf of the J-2 and exercises collection requirements for certain assets and all national resources.
Joint Intelligence Operations Center (JIOC)
subordinate joint forces tactical units develop in support of current and future operations and commander's priorities.
Collection Requirements Management (CRM)
organizes, directs, and monitors the equipment and personnel that collect the data to satisfy requirements, personnel develop collection plans against requirements in cooperation with CRM personnel.
Collection Operations Management (COM)
CRM, which determines what intelligence systems must collect COM, which determines how to satisfy those requirements
COM vs CRM
an individual with responsibility for the timely and efficient tasking of organic collection resources and the development of requirements for theater and national assets that could satisfy specific information needs in support of the mission
Collection Manager (CM)
any individual, organization, or unit that has access to sources of information and the capability of collecting information from them.
Collection Agency
limited number of information requirements that enable the staff to focus limited resources on those aspects of the operation the commander is interested in closely monitoring and upon which a decision may be based.
Commander's Critical Information Requirement (CCIR)
an intelligence requirement that the commander and staff need to understand the threat and other aspects of the operational environment
Priority Intelligence Requirements (PIR)
information requirements that are also critical or that would answer PIRs are known as ....
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials