EXW - COMMAND, CONTROL, COMMUNICATIONS AND INTELLIGENCE FUNDAMENTALS 2023 verified to pass
EXW - COMMAND, CONTROL, COMMUNICATIONS AND INTELLIGENCE FUNDAMENTALS105.1 Discuss the proper use of: [Ref. a, Pg. 3-32 thru 3-34] a. Phonetic alphabet and numerals A Alpha N November 0 ZE-RO B Bravo O Oscar 1 WUN C Charlie P Papa 2 TOO D Delta Q Kay-beck 3 TREE E Echo R Romeo 4 FOW-er F Foxtrot S Sierra 5 FIFE G Golf T Tango 6 SIX H Hotel U Uniform 7 SEV-en I India V Victor 8 ATE J Juliet W Whiskey 9 NIN-er K Kilo X Xray L Lima Y Yankee M Mike Z Zulu b. Prowrords - Pronounceable words or phases that have been assigned meaning to expedite message handling on R/T circuits. Prowords are not to be substituted for texts. .2 Discuss the three methods of communications in areas where oral communications is not reliable. [Ref. a, Ch. 3, Pg. 3-38 thru 3-41] 1. Arm and hand signals- Signals are used to transmit command of information when voice communication is difficult or impossible or when silence must be maintained. 2. Whistle signals - As a rule, only three whistle signals are used, since a large variety could cause confusion. The following three are commonly used whistle signals: ATTENTION TO ORDERS - One short blast on the whistle. It is used to fix the attention of unit members on the unit leader CEASE FIRING - Indicated by one long blast on the whistle HOSTILE AIRCRAFT or MECHANIZED VEHICLE - Indicated by three long blasts repeated several times. 3. Special signals - Certain special signals are standard for all branches of the armed forces to indicate the approach or presence of hostile aircraft or mechanized vehicles Three long blasts of a whistle, vehicular horn, siren, or Klaxon repeated several times Three equally spaced shots with rifle or pistol Three short bursts of fire from automatic small arms .3 Discuss the communications plans. [Ref. b, Ch. 1, Pg. 1-25 thru 1-27] The primary purpose of tactical communication is to enable and support C2 Communications planning must be detailed enough to provide clarity, but also flexible enough to respond to the chaos inherent in the battlespace and during the conduct of military operations. The relationship between C2 and communication is inseparable. The commander must recognize that C2 is the means to identify what needs to be done and then see to it that appropriate actions are taken. Information is essential to the commander's situational awareness and ability to make a decision and to subordinates as they carry out the decision and provide feedback to the commander. Despite continued technological advances, uncertainty—the fog of war—remains and will always be the defining problem of C2. Enabling commanders and staffs to better deal with uncertainty is the goal of a C2 system, and communications plays a pivotal role in supporting this goal. .4 Discuss the following terms as they relate to Command and Control: [Ref. c, Pg. 44 thru 45] a. Nature and Purpose - Command and control enables the Naval Commander to understand the situation in his battle space. As defined in Joint Publication 142, command and control is "the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission." b. Process - The process of command and control includes the c. "planning, directing, coordinating, and controlling of forces and operations," whereas the system of command and control includes the "personnel, equipment, communications, facilities, and procedures employed by a commander. 105.5 Discuss the following terms as they relate to Naval intelligence: [Ref. d] a. Nature and Purpose [Ch. 1, Pg. 3 thru 10] Nature- Intelligence is "the product resulting from the collection, exploitation, processing, integration, analysis, evaluation, and interpretation of available information concerning foreign countries or areas." 1. Strategic Intelligence 2. Operational Intelligence 3. Tactical Intelligence Purpose- Supporting the Commander. Identifying Centers of Gravity and Critical Vulnerabilities. Supporting Planning and Execution of Operations. Protecting the Force. Supporting Combat Assessment. Support to Operating Forces [Ch. 1, Pg. 10 thru 11] Support to operating forces is the cornerstone of naval intelligence. Naval intelligence is designed to support operations at sea, from the sea, and ashore—through an organization closely linked with joint and national intelligence centers. Naval forces engaged in operations are supported by theater Joint Intelligence Centers (JICs). The theater JIC serves as a focal point to ensure that operating forces receive intelligence support from national and service intelligence centers such as DIA, CIA, NSA and the National Maritime Intelligence Center. Naval forces also maintain such organic intelligence capabilities as photographic interpretation, communications intelligence analysis, and finished intelligence production, which support not only the commander and embarked forces, but theater and national decision makers as well. Fundamentals of Naval Intelligence [Ch. 2, Pg. 3 thru 23] The fundamentals of naval intelligence, distilled from years of operational experience, guide both the commander and the intelligence officer. The commander who understands these fundamentals can employ intelligence to his best advantage; the intelligence officer who understands these fundamentals can support the commanders' requirements better. The fundamentals of naval intelligence include principles, key attributes, intelligence sources and the process of the intelligence cycle. They apply across the spectrum of military operations from peacetime, to operations other than war, to combat. - Principles Know the Adversary. The Commander's Needs are Paramount. Ensure Unity of Intelligence Effort. Plan for Combat. Use an All-Source Approach. - Key Attributes Timeliness. Objectivity. Usability. Availability Thoroughness. Accuracy. Relevance. 4. Intelligence Cycle [Ch. 2, Pg. 24 thru 27] Intelligence Cycle Intelligence products result from a series of interrelated activities Five steps to the cycle: Planning and Direction - During this phase, the commander must identify and prioritize his information requirements. This phase is instrumental to the cycle's success. Collection - Involves tasking organic, attached, and supporting collection resources to gather information. The collection process determines what will be—and what will not be—available to support decision making. Support for Expeditionary Forces [Ch. 4, Pg. 48 thru 49]- Intelligence requirements in littoral regions are significantly different from those of open-ocean operations. Our proximity to littoral threats will mean less warning and reaction time for friendly forces. Any potential adversary's acquisition of advanced technology is a significant concern as well. Nontraditional intelligence sources, collection means, and dissemination methods must be explored and employed. Open-source intelligence may be especially important. In addition, forces deploying to areas known for infectious diseases must have advance information about local medical conditions. Forward deployed expeditionary forces must incorporate medical intelligence as a force protection measure. .6 Describe the following types of orders: [Ref. g] OPLAN [PG 63] - Any plan, except for the Single Integrated Operation Plan, for the conduct of military operations. Plans are prepared by combatant commanders in response to requirements established by the Chairman of the Joint Chiefs of Staff and by commanders of subordinate commands in response to requirements a. tasked by the establishing unified commander. OPORD [PG 63] - A directive issued by a commander to subordinate commanders for the purpose of affecting the coordinated execution of an operation. WARNORD [PG 67] - 1. A preliminary notice of an order or action which is to follow. 2. A crisis action planning directive issued by the Chairman of the Joint Chiefs of Staff that initiates the development and evaluation of courses of action by a supported commander and requests that a commander's estimate be submitted. 3. A planning directive that describes the situation, allocates forces and resources, establishes command relationships, provides other initial planning guidance, and initiates subordinate unit mission planning. FRAGO [PG 47] - An abbreviated form of an operation order, usually issued on a day-today basis, that eliminates the need for restating information contained in a basic operation order. b. EXORD [ITNTERNET]- An order issued by the Chairman of the Joint Chiefs of Staff, by the authority and at the direction of the Secretary of Defense, to implement a National Command Authorities decision to initiate military operations. c. DEPORD [Annex P, Pg. P-5] d. CONOPS [Glossary-5] .7 Discuss the speed of service objectives for the following message precedence: [Ref. b, Pg. 1 thru 15; Ref. h, Pg. 5-2 thru 5-5] Routine: Up to 6 hours. a. Priority: Up to 3 hours. b. Immediate: Up to 30 min. c. Flash: As fast as humanly possible; objective is less than 10 minutes 105.8 What is meant by the term Two-Person Integrity (TPI)? [Ref. f, Ch. 3, Pg. 3-9 thru 3- 10] Two-person integrity (TPI) is the security measure taken to prevent single-person access to COMSEC keying material and cryptographic maintenance manuals. TPI is accomplished as follows: - The constant presence of two authorized persons when COMSEC material is being handled; - The use of two combination locks on security containers used to store COMSEC material. - The use of two locking devices and a physical barrier for the equipment. At no time can one person have in his or her possession the combinations or keys to gain lone access to a security container or cryptographic equipment containing COMSEC material. Neither can one person have sole possession of COMSEC material that requires TPI security. .9 Discuss the following terms: [Ref. h, Pg. 3-13, 4-5 thru 4-11, 7-13, 1-21] a. Access- The ability and opportunity to obtain knowledge of classified information. b. Classification- The determination that official information requires, in the interest of National security, a specific degree of protection against unauthorized disclosure, coupled with a designation signifying that such a determination has been made c. Compromise- A security violation which has resulted in confirmed exposure of classified information or material to an person. d. Need to know- A determination made by an authorized holder of classified information that a prospective recipient requires access to specific classified information. e. Clearance- A formal determination that a person meets the personnel security standards and is thus eligible for access to classified information other than that protected in a special access program. .10 Define the following terms: [Ref. h, Pg. 3-4, 4-8 thru 4-9] a. Minimize- Drastically reducing normal message and telephone traffic so that vital messages connected with the situation indicated will not be delayed. Similar to "Silence on the net" for Urgent/emergency traffic. Not to be confused with Emissions Control (EMCON). b. EEFI- Standardized EEFI are established to identify specific items of information which, if acquired by an adversary, would degrade the security of military operations, special projects, etc. As a means to rapidly identify an EEFI violation on an uncovered radio telephone circuit, the BEADWINDOW code was developed to provide a means for immediate notification of insecure practices. The following standardized EEFI listing and associated BEADWINDOW code is promulgated for Navy wide implementation. The EEFI list will be posted in clear sight of operators at all insecure voice positions for rapid reference. c. BEADWINDOW- BEADWINDOW is a real-time procedure which brings to the immediate attention of circuit operators the fact that an EEFI (Essential Elements of Friendly Information) disclosure has (or may have) occurred. The BEADWINDOW technique uses a code word and a number combination which is transmitted immediately by any net member to the unit disclosing the EEFI. At no time will the validity of the BEADWINDOW be discussed on the net. Proper response for a net member receiving a BEADWINDOW will be "ROGER OUT" using proper net call signs.
École, étude et sujet
- Établissement
- Ref-B
- Cours
- Ref-B
Infos sur le Document
- Publié le
- 7 octobre 2023
- Nombre de pages
- 15
- Écrit en
- 2023/2024
- Type
- Examen
- Contient
- Questions et réponses
Sujets
-
exw command control communications and intelli
Document également disponible en groupe