100% CORRECT SOLUTIONS!!
Operations security indicators Answer - Process of collecting, processing, analyzing
and disseminating intelligence.
4 critical sources: Human, signals, image, and open source intelligence
Human Intelligence (HUMINT) Answer - Any information that can be gathered from
human sources
Signals Intelligence (SIGINT) Answer - Intelligence derived from electronic signals
and systems used by foreign targets, such as communications systems, radars, and
weapons systems.
Imagery Intelligence (IMINT) Answer - Intelligence that includes representations of
objects reproduced electronically or by optical means on film, electronic display
devices, or other media. Can be derived from visual photography, radar sensors,
infrared sensors, lasers, and electro-optics.
Open-Source Intelligence (OSINT) Answer - Information that is readily available to
the public and doesn't require any type of malicious activity to obtain.
4 Steps of OSINT Answer - Discovery- collecting info
Discrimination- filtering collected info
Distillation - refining and filtering info again
Dissemination - final product of info collected
Integrated Defense Answer - Application of active and passive defense measures.
Bridges the gap between peacetime and wartime actions
Goal of Integrated Defense Answer - Employed to mitigate potential risks to DAF,
joint and coalition operations within base boundary and base security zone to ensure
mission accomplishment
Who is the defense force commander on AF bases? Answer - The SF squadron
commander
THREAT LEVEL 1 Answer - Threats include enemy agents and terrorists whose
missions are espionage, sabotage, and subversion
, threat LEVEL 2 Answer - Small scale
Irregular forces conducting unconventional warfare that can pose serious threats to
military forces and civis
Ex; AL QUEDA
THREAT LEVEL 3 Answer - Capability of projecting combat power by air, land, or
sea
EX: China Russia
ID coordination w other programs Answer - Protection and defense of air bases
requires efforts from:
Integrated defense
Emergency Management (EM)
Anti-Terrorism (AT)
Critical Asset Risk Management (CARM)
Continuity of Operations (COOP)
Force health protection
Cyber security
Terrorism Answer - Acts of violence designed to promote a specific ideology or
agenda by creating panic among an enemy population
lone terrorist Answer - Tactics conceived entirely by themselves w/o any direction
from a terrorist commander.
Terrorism Organizational Structure Answer - Hierarchical Structure - specialization of
functions in their subordinate cells (support, operations, intelligence)
Networked Structure- distribution of authority and responsibility throughout an
organization. To be effective, needs a unifying idea, concern, goal, or ideology
Ethnocentric Answer - believing in the superiority of one's own ethnic and cultural
group, and having a corresponding disdain for all other groups
nationalistic Answer - Placing one nations culture and interests above other nations
Revolutionary Answer - Dedicated to the overthrow of an established order and
replacing it with a new political or social structure
Separatists Answer - Goal of separating through independence, political autonomy,
or religious freedom or domination
Political Answer - Ideologies concerned with the structure and organization of the
forms of gov and communities
Religious Answer - Terrorists see their objectives as divinely sanctioned, infallible
and non-negotiable