1N4A Air Force
100 questions across 0 topics. Use the find bar or section chips to jump to what you need.
1N2X1A Electronic signals intelligence exploitation analyst
Personnel assigned to this specialty support SIGINT activities and operations by monitoring and collecting noncommunications electronic signal transmissions using passive receiving equipment.
Safety hazards to analysts?
Repetitive motion disorder, eye damage, electrical shock.
Who can you report safety hazards to?
Supervisor.
Four pillars
Mental, physical, social, spiritual.
Mental Pillar
Awareness, adaptability, decision making, positive thinking.
Physical Pillar
Endurance, recovery, nutrition, strength.
Social Pillar
Communication, connectedness, social support, teamwork.
Spiritual Pillar
Core values, perseverance, perspective, purpose.
Ability needed to guard against the stressors of service?
Resiliency.
Commanders
at all levels depend on timely, accurate information and intelligence on an adversary's disposition.
Collection management authority (CMA)
CMA is the authority to establish, prioritize, and validate theater collection requirements, establish sensor tasking guidance, and develop theater-wide collection policies. CMA usually includes authority to task GEOINT sensors and lower echelon SIGINT collection systems that have more localized collection capabilities.
Collection requirements management (CRM)
CRM is the authoritative development and control of collection, processing, exploitation, and reporting requirements that normally result in either the direct tasking of assets over which the collection manager has authority, or the generation of tasking requests to collection management authorities at a higher, lower, or lateral echelon to accomplish the collection mission.
Commander's critical information requirements (CCIR)
Planning and direction of globally integrated ISR operations start with the identification of needs for intelligence regarding all aspects of the operational environment. CCIRs are information requirements identified by the commander as beingcritical to facilitating timely decision making.
Priority Intelligence Requirements (PIR)
Those intelligence requirements deemed most important to mission accomplishment are identified as PIR and are general statements of intelligence need. PIRs provide the framework for prioritization of all globally integrated ISR operations. PIRs are driven by, and in turn drive, the intelligence preparation of the environment (IPOE) process to refine information requirements and support the commander's potential course of action (COA).
Essential elements of information (EEI)
EEIs further define the commander's priority intelligence requirements by outlining specific information requirements. As commander direction and guidance evolve, planners may develop new EEI requirements or modify existing requirements.
PCPAD
The PCPAD process of planning and conducting operations begins once the above requirements have been established, validated, and prioritized.
______________ are general statements of intelligence needs and define requirements deemed most important to mission accomplishment?
PIRs
Under analysis and production, which action involves receiving, collating and entering information from single or multiple sources into databases
Integration
____________ is the process of examining all sources of intelligence and information to derive a complete assessment of activity?
Fusion
. ______________ is the delivery of intelligence to users in a suitable form and the application of the intelligence to appropriate missions, tasks, and functions.
Dissemination
______________ and ____________ are critical at all levels of PCPAD because intelligence operations are interrelated, and the success or failure of one operation will impact the rest of the intelligence process.
Evaluation and feedback
Geospatial intelligence (GEOINT)
GEOINT is a unique intelligence discipline that integrates imagery, imagery intelligence (IMINT), and geospatial information.
Imagery
Imagery is a likeness or representation of any natural or manmade feature. Includes products produced by space-based national intelligence reconnaissance systems and likenesses or representations produced by satellites, airborne platforms, unmanned aerial vehicles, or other similar means.
Imagery intelligence (IMINT)
IMINT is the technical, geographic, and intelligence information derived through the interpretation or analysis of imagery and collateral materials. It includes exploitation of imagery data derived from electro-optical (EO), radar, infrared (IR), multispectral, and laser sensors.
Human intelligence (HUMINT)
HUMINT is a category of intelligence derived from information collected and provided by human sources. This includes all forms of information gathered by humans, from direct reconnaissance and observation to the use of recruited sources and other indirect means.
Signals intelligence (SIGINT)
Consists of COMINT (communications intelligence) and ELINT (electronic intelligence, or collection through electronic sensors). This is intelligence collection through the interception of signals as used in communication between people-by phone, radio, text, etc.-or non-nuclear/radioactive electromagnetic radiations. Foreign instrumentation signals intelligence (FISINT)-technical analysis of data intercepted from foreign equipment and control systems such as telemetry, electronic interrogators, tracking/fusing/arming/firing command systems, and video data links.
Measurement and signature intelligence (MASINT)
scientific and technical intelligence obtained by quantitative and qualitative analysis of data (metric, angle, spatial, wavelength, time dependence, modulation, plasma, and hydro-magnetic) derived from specific technical sensors for the purpose of identifying any distinctive features associated with the target, source, emitter, or sender.
Open-source intelligence (OSINT)
Information from media (newspapers, television), public government reports, professional and academic publications, and other openly available.
Technical intelligence (TECHINT)
TECHINT is derived from the exploitation of foreign materiel and scientific information. TECHINT begins with the acquisition of a foreign piece of equipment or foreign scientific/technological information. The item or information is then exploited by specialized, multiservice collection and analysis teams.
Counterintelligence (CI)
CI obtains information by or through the functions of CI operations, investigations, collection and reporting, analysis, production, dissemination, and functional services. CI is not solely a collection discipline, however, and also acts upon information for both offensive and defensive purposes, in coordination with other intelligence disciplines, law enforcement, and security elements.
14N - Intelligence officer
performs and manages intelligence functions and activities; conduct information operations to include analysis of information vulnerability
1N0X1 - Operations intelligence
personnel prepare, maintain and present intelligence displays, reports and briefings; they instruct aircrews on collecting and reporting requirements and procedures. analyze intelligence to support operations.
1N1X1A - Geospatial intelligence analyst
exploit and analyze multisensory imagery in conjunction with all-source intelligence information; determine type, function location and significance of military facilities and activities, industrial installations, and surface transportation routes of travel
1N1X1B - Geospatial intelligence targeteer
make recommendations on the appropriate form required to disable an adversary's targeting system; determine the specific aircraft and ammunition and anticipate the effect of the weapons to minimize the collateral damage while still accomplishing the mission
1N2X1C - Communication signals intelligence analyst
Personnel assigned to this specialty perform communication signals intelligence analysis to include acquiring signals through optimum antenna manipulation and receiver tuning. complex analysis hardware and software to process signals, including receivers, demodulators, printers, spectrum analyzers, and other associated computer equipment
1N3X1 - Cryptologic language analyst
operate and manage communications equipment; translate spoken or written foreign language material, recognize EEIs, analyze communications and report items of interest
1N4X1A - Digital network intelligence analyst
employ techniques to collect, identify and exploit appropriate communications to ensure accurate targeting; produces technical products and intelligence reports for consumers; provides studies used to shape the global network environment
1N4X1B - Analysis and production analyst
detailed analysis on target network communications for addition exploitation; author time sensitive intelligence reports in accordance with established guidelines to support decision makers. . These analysts produce, analyze, study, research, fuse, and correlate intelligence for strategic, operational, and tactical customers.
1A8X1 - Airborne cryptologic language analyst
operate, evaluate and manage airborne SIGINT information systems and operate activities; performs identification, acquisition, recording, translating, analyzing and reporting of assigned voice communications
(1A8X2) Airborne intelligence, surveillance, and reconnaissance (ISR) Operator
fly as primary aircrew onboard a wide variety of aircraft to operate, evaluate, and manage airborne ISR information and related ground processing systems. This AFSC performs identification, acquisition, recording, analysis, and reporting of assigned ISR tasking
(8D000) Strategic debriefer
special duty that collects and reports intelligence information obtained from human sources in response to requirements; screen documents and open source materials to identify potential source leads; does job in English.
9L000 - Interpreter/translator
reporting identifier that perform duties as foreign language interpreters or translators
9S100 - Scientific applications specialist
reporting identifier that applies leading edge physical sciences to perform data collection, analysis, observation, study, experimentation, acquisition, maintenance, research and development, fielding of prototype and operational active and passive sensors and systems; process and analyze scientific data and derive, develop, integrate and report information to customers
Which intelligence discipline provides unique intelligence information, complements intelligence derived from other sources, and is often used for cueing other sensors to potential targets of interest?
Signals intelligence (SIGINT
What are the three subcategories of SIGINT?
COMINT, ELINT, FISINT
What is ELINT?
Intelligence gathered by intercepting the non-communication signals of military and civilian radars.
What intelligence Air Force Specialties (AFS) are trained in translating and analyzing foreign languages
(1A8X1) Airborne cryptologic language analyst, (1N3X1) Cryptologic language analyst.
Which intelligence discipline is scientific and technical intelligence obtained by quantitative and qualitative analysis of data derived from specific technical sensors for the purpose of identifying any distinctive features associated with the target, source, emitter, or sender?
MASINT.
Which intelligence discipline uses people to gain information
HUMINT
What is the responsibility of the 1N2X1A career field?
Support SIGINT activities and operations by monitoring and collecting non-communications electronic signal transmissions using passive receiving equipment.
Personnel assigned to which intelligence specialty fly as primary aircrew onboard a wide variety of aircraft to operate, evaluate and manage airborne ISR information and related ground processing systems?
1A8X2, Airborne ISR Operator.
All intelligence professionals are considered to be ______________.
Analysts.
Personnel assigned to this special duty identifier, collect and report intelligence information obtained from human sources in response to requirements.
8D000, Strategic Debriefer.
Director of National Intelligence (DNI)
head of the IC (intel community) has overall responsibility for intelligence support to the President and the day-to-day management of the IC.
Central Intelligence Agency (CIA
A U.S. agency created to gather secret information about foreign governments. independent intelligence agency responsible to the President through the DNI
Department of State
Chief executive-branch department responsible for formulation and implementation of U.S. foreign policy. Bureau of Intelligence and Research provides the Secretary of State with timely, objective analysis of global developments as well as real-time insights from all-source intelligence.
Department of Energy (DOE)
oversees and protects vital national security capabilities ranging from nuclear weapons to energy research and developmental projects.
Department of Homeland Security (DHS)
reduce US vulnerability to terrorism and to detect, prevent, and respond to terrorist attacks. Additional responsibilities of the department include ensuring safe and secure borders, welcoming lawful immigrants and visitors, and promoting the free flow of commerce.
Department of the Treasury (DOT
analyzes foreign intelligence related to economic policy and participates with Department of State in the overt collection of general foreign economic information
Drug Enforcement Administration (DEA)
The DEA is responsible for enforcing the controlled substance laws and regulations of the US
Federal Bureau of Investigation(FBI)
responsible for understanding threats to our national security and penetrating national and transnational networks that have a desire and capability to harm the US. The National Security Branch was established in response to a presidential directive and a Weapons of Mass Destruction (WMD)
Coast Guard Intelligence
Coast Guard Intelligence can collect and report intelligence that not only supports Coast Guard missions, but also supports national objectives.
Department of Defense members of the Intelligence Community
federal department charged with coordinating and supervising all agencies and functions of the government relating directly to national security and the military. It is both a consumer and producer of intelligence. The SecDef serves as principal defense policy advisor to the President, and is responsible for the formulation of general defense policy and policy related to all matters of direct and primary concern to the DOD, and for the execution of approved policy. Defense Intelligence Agency (DIA), National GeospatialIntelligence Agency (NGA), National Security Agency (NSA), and Defense Information Systems Agency, and Defense Advanced Research Projects Agency.
Defense Intelligence Agency (DIA)
major producer and manager of foreign military intelligence and provides military intelligence to warfighters, defense policymakers, and force planners. provides intelligence support in areas such as all-source military analysis, human factors analysis, HUMINT, MASINT, CI, counterterrorism, CBRNE counterproliferation, counterdrug operations, information operation (IO), personnel recovery, peacekeeping and coalition support, noncombatant evacuation operations, indications & warning (I&W), targeting, battle damage assessment (BDA), current intelligence, systems analysis of the adversary, collection management, intelligence architecture and systems support, intelligence support to operation planning, defense critical infrastructure protection, and document and media exploitation
National Geospatial-Intelligence Agency (NGA
Department of Defense combat support agency and fields support teams worldwide. The NGA provides timely, relevant, and accurate GEOINT in all its forms in support of national security objectives. humanitarian efforts such as tracking floods and fires, and in peacekeeping.
National Reconnaissance Office(NRO
builds, and operates the nation's reconnaissance satellites. The NRO products, provided to an expanding list of customers like the Central Intelligence Agency(CIA) and the DOD, can warn of potential trouble spots around the world, help plan military operations, and monitor the environment
National Security Agency/Central Security Service(NSA/CSS)
The NSA/CSS is the IC's executive agent for all SIGINT activities. NSA's mission is to provide the ability to understand the secret communications of our foreign adversaries while protecting our own communications. The CSS was established to promote a full partnership between NSA and the cryptologic elements of the Armed Forces.
Service cryptologic components (SCC
Each service establishes a command to manage subordinate SIGINT units to ensure proper utilization of resources to accomplish assigned tasks.They also provide these SIGINT units an organizational structure, manning, and training.
Army's Intelligence and Security Command (INSCOM)
coordination between Army tactical units and NSA/CSS concerning SIGINT matters for Army resources and assets.
Navy's Fleet Cyber Command (FLTCYBERCOM
guidance to cryptologic activities tasked by both the Navy and NSA/CSS
Air Force's Intelligence, Surveillance, and Reconnaissance Agency (AFISRA
coordination of Air Force cryptologic activities, NSA/CSS, and Air Force or theater commanders on SIGINT matters.
Marine Corps' Intelligence Activity (MCIA)
Marine Corps' SCC.
Coast Guard Cryptologic Group (CGCG)
Coast Guard's SCC
Cryptologic service groups (CSG)
function is to facilitate timely SIGINT support to unified commands, joint task force commanders, or other operational commanders. CSGs are considered to be an extension of the NSA/CSS National Security Operations Center (NSOC) and are governed by United States Signals Intelligence Directives (USSID). The CSG enables the commanders to deal with the SIGINT system on a rapid, reliable basis.
United States Code (USC)
applies to both the activities of the Armed Forces, as well as, the activities of the IC. The USC is the codification by subject matter of the general and permanent laws of the United States
Title 10
outlines the role of the armed forces. It provides the legal basis for the roles, missions, and organizations of each of the services as well as the DOD. Subtitle A - General Military Law Subtitle B - Army Subtitle C - Navy and Marine Corps Subtitle D - Air Force Subtitle E - Reserve Components
Title 32
outlines the role of the US National Guard
Title 50
Outlines the role of war and national defense
Intelligence Preparation of the Operational Environment (IPOE)
IPOE is a valuable four-step analytical methodology focusing ISR for the commander and the commander's supporting command and control (C2) elements by getting "inside" the enemy's decisionmaking cycle.continuous process, enabling the commander and staff to visualize the full spectrumof adversarycapabilities, potential centers of gravity (COG), and possible courses of action (COA) across all dimensions of the battlespacecontinuous process, enabling the commander and staff to visualize the full spectrumof adversarycapabilities, potential centers of gravity (COG), and possible courses of action (COA) across all dimensions of the battlespace.
IPOE process
Step 1: Define the operational environment. Step 2: Describe the operational environment effects. The purpose of this step is to determine how the operational environment may affect both adversary and friendly operations. Step 3: Evaluate the adversary. The purpose of Step 3 is to determine the adversary's COG, capabilities, doctrine, and applicable tactics, techniques, and procedures (TTP). Step 4: Determine adversary COA. This step identifies likely adversary COA that can be exploited to shape the battlespace and accomplish the friendly mission.
Target development (TD)
systematic process of evaluating potential target systems and individual targets for their significance, vulnerabilities, and exploitable characteristics (both kinetic [physical] and nonkinetic).
ISR strategy and planning
ISR planners develop a strategy to focus ISR assets and sequence ISR operations in response to intelligence and targeting requirements. The goal is to anticipate the adversary's plan and continue to refine the predictive processes.
ISR employment
capabilityto dynamically control ISR sensors and platforms to satisfy commander's critical information requirements(CCIR). ISR employment must support targeting, dynamic maneuver, force insertions, base opening, force protection, and combat assessment while confirming previous predictions, and providing the raw data for continuous update of the predictive process.
Targeting
process for selecting and prioritizing targets and matching appropriate actions to those targets to create specific desired effects that achieve objectives, while taking account of operational requirements and capabilities. It applies to targets which are areas, complexes, installations, forces, equipment, capabilities, functions, individuals, groups, systems, or behaviors identified for possible action to support the commander's objectives, guidance, and intent.
Targeting process
6 phases. Commander's objectives, guidance, and intent TD, vetting, validation, nomination,and prioritization- targeteers determine how to achieve those objectives. They start by analyzing a potential target system to help determine a commander's best COA to achieve a given objective. Capabilities analysis (weaponeering)- what assets does the commander have on hand that can meet their objectives. Commander's decision and force assignment-fusion of target nominations with the optimumlethal and nonlethal force. In determining the force, targeteers work closely with planners and operators to match targets with available weapon systems, munitions, and force-level options. Mission planning and force execution- more detailed planning is conducted to actually fly the mission and employ weapons. At the air and space operations center (AOC), preparations for the execution of the ATO include a review of plans, weather, logistics, and current situation Assessment- evaluates the effectiveness of operations and feeds the development of future strategy, guidance, and adaptation to the adversary's actions.
Principles of targeting
Targeting is focused on achieving objectives. Targeting is the embodiment of strategy where courses of action, objectives, and effects are developed into detailed actions against targets. Targeting is interdisciplinary, requiring the efforts of personnel from many functional disciplines.
Types of targeting
deliberate and dynamic
Deliberate targeting
systematic analytical approach that focuses targeting efforts on supporting operational requirements and the commander's objectives. It helps focus the appropriate capabilities against adversary targets at the right time and place to impose specific desired effects that achieve joint force objectives.
Dynamic targeting
consists of six distinct phases: find, fix, track, target, engage, and assess. This targeting cycle is commonly referred to as F2T2EA.
Joint Doctrine
"Fundamental principles that guide the employment of US military forces in coordinated action toward a common objective."
Principles of joint intelligence
Perspective Think like the adversary. Synchronization Synchronize intelligence with plans and operations. Integrity Remain intellectually honest. Unity of effort Cooperate to achieve a common end state. Prioritization Prioritize requirements based on commander's guidance. Excellence Strive to achieve the highest standards of quality. Prediction Accept the risk of predicting adversary intentions. Agility Remain flexible and adapt to changing situations. Collaboration Leverage expertise of diverse analytic resources. Fusion Exploit all sources of information and intelligence.
Unified commands
organized on a geographical or functional basis (Figure 2-1). Combatant commanders (CCDR) have responsibility for a geographic area of responsibility (AOR) or a function geographic: USEUCOM, USAFRICOM, USPACOM, USNORTHCOM, USSOUTHCOM, USCENTCOM functional: USSOCOM, USTRANSCOM, USSOCOM
Subordinate unified commands
commanders of unified commands may establish subordinate unified commands (also called subunified commands) to conduct operations on a continuing basis in accordance with the criteria set forth for unified commands. An example of a subordinate unified command is US Cyber Command, which is subordinate to USSTRATCOM.
Joint task force (JTF
designated by the SecDef, a CCDR, a subordinate unified commander (CDR), or an existing JTF CDR. A JTF may be established on a geographical area or functional basis when the mission has a specific limited objective and does not require overall centralized control of logistics.
Joint Staff
J1 - The manpower and personnel directorate of a Joint Staff is charged with establishing and maintaining personnel accountability and personnel support of the force. J2 - The intelligence directorate of a Joint Staff has the primary function to support the commander and the staff by ensuring the availability of reliable intelligence and timely indications and warnings J3 - The operations directorate of a Joint Staff assists the commander in the discharge of assigned responsibility for the direction and control of operations, beginning with planning and follow through until specific operations are completed. J4 - The logistics directorate of a Joint Staff is charged with the formulation of logistic plans and coordination and supervision of supply, maintenance, repair, evacuation, transportation, engineering, salvage, procurement, health services, mortuary affairs, security assistance, host national support, and related logistic activities. J5 - The plans directorate of a Joint Staff assists the commander in long-range or future planning, preparation of campaign and joint operations plans (OPLAN) and associated estimates of the situation. J6 - The communications system directorate of a Joint Staff assists the commander in all responsibilities for communications infrastructure, communications computer networking, communications electronics, information assurance, tactical communications, and interoperability.
Types of plans
OPLAN, WARNORD, PLANORD, ALERTORD, OPORD, EXORD.
OPLAN
written description of the combatant commander's concept of operations to counter a perceived threat.
WARNORD
Warning Order. will be issued at the earliest possible time following recognition of a crisis.
PLANORD
Planning Order
Major Commands ( Airforce specific)
Air Combat Command (ACC) Air Education and TrainingCommand (AETC) Air Force Materiel Command (AFMC) Air Force Reserve Command (AFRC) Air Force Space Command (AFSPC) Air Force Special Operations Command (AFSOC) Air Force Global Strike Command (AFGSC) Air Mobility Command (AMC) US Air Forces in Europe (USAFE) Pacific Air Forces (PACAF).
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials