Intel PQS Study Guide

101.1 Operational Risk Management

  • ORM is a decision making tool.
  • ORM Process:
    1. Identify hazards
    2. Assess hazards (probability vs severity)
    3. Develop risk controls
    4. Implement controls
    5. Supervise

101.6 3 Classes of Mishaps

  • Class A - $1M in damage, aircraft destroyed, injury resulting in death/disability
  • Class B - $200K-$1M in damage, injury with partial disability or 3 or more people hospitalized
  • Class C - $20K-$200K in damage, injury causing loss of work beyond shift it occurred, illness resulting in loss of work

102.3 Maintenance Material Management

  • PMS is Planned Maintenance Schedule
  • Occurs quarterly, weekly, etc.

102.7 Command Maintenance Program

  • CO is overall in charge
  • DIVO or Dept Head implements the program

103.2 Security Classification Levels

  • TOP SECRET: exceptionally grave damage to National Security
  • SECRET: serious damage to National Security
  • CONFIDENTIAL: damage to National Security
  • FOUO: For Official Use Only
  • SCI/SI: Sensitive Compartmented Information
    • Derived from or concerning intel sources and methods
  • SAP: Special Access Program
    • May require additional safeguarding
  • SPECAT: Special Category

103.3 Command Emergency Action/Destruction Plan

  • Purpose is to destroy classified material during disaster, hostile action, civil disturbance
  • Primary means is by burning, shredding or mutilating

103.6 Compromise

  • Or 'spillage' occurs when classified information is disclosed to a person who does not have a valid security clearance, authorized access, or a need-to-know
  • Notify the security manager and CO immediately
  • When compromise hapens, a Preliminary Inquiry (PI) is launched and if it determines that spillage occurred, then NCIS will be notified

104.1 Intelligence Oversight

  • Purpose of intel oversight is to prevent DoD intel agencies from collecting on US persons/entities

105.2 Original vs Derivative Classification

  • Original: SECNAV, CNO
  • Derivative: classification based on Security Classification Guides (SCGs); previously classified information

105.5 Classified Destruction Procedures

  • Methods: crosscut shredding, burn bag, wet pulp
  • Must record TS destruction

105.6 Classified Transportation Modes

  • TS: direct contact, Defense Courier Service, cleared electronic systems
  • S: same as TS plus USPS registered mail within the US
  • C: same as S plus USPS regular and 1st class mail

105.8 SSO Responsibilities

  • Indoc/debriefs
  • Read people in/out of programs
  • Understand what's clsasified as well as disclosure policies
  • JPAS
  • Physical Security

105.9 ISSM

  • Information Systems Security Manger
  • Responsible for the INFOSEC program

105.10 SCIF

  • Sensitive Compartemnted Information Facility
  • Requires special lock, sound attenuation, SF 700/701 on every safe

106 Navy Intelligence Leadership

  • Director of Naval Intelligence heads ONI and serves as intel advisor to SECNAV

106.2 Combatant Commands

  • Combatant Commands
    • EUCOM, Stuttgart, Germany
    • SOUTHCOM, Miami, FL
    • NORTHCOM, Colorado Springs, CO
    • PACOM, Pearl Harbor, HI
    • CENTCOM, Tampa, FL
    • AFRICOM, Stuttgart, Germany
    • SOCOM, Tampa, FL
    • STRATCOM, Omaha, NE
    • TRANSCOM, Scott Air Force Base, IL
  • Naval Component Commanders
    • Fleet Forces Command (TF20), Norfolk, VA
    • NAVEUR (6th Fleet), Naples, IT
    • PACFLT (3rd Fleet), Pearl Harbor, HI
    • NAVCENT (5th Fleet), Bahrain
    • NAVSOUTH (4th Fleet), Jacksonville, FL
    • CYBERCOM (10th Fleet), Ft. Meade, MD
    • NSW, San Diego, CA
  • Joint Force Component Commanders
    • Joint Force Maritime Component Command (JFMCC)
    • Joint Force Land Component Command (JFLCC)
    • Joint Force Air Component Command (JFACC)

106.4 & 113.1 Information Operations

  • Electronic Warfare (EW): use of electromagnetic and/or directed energy to control electromagnetic specturm
  • Computer Network Operations (CNO): hack enemy networks
  • Psychological Operations (PSYOPS): convey selected information to foreign audiences to influence their emotions, motive, reasoning and foreign govt behavior
  • Military Deception (MILDEC): mislead adversary as to friendly capabilities, intentions and operations
  • Operations Security (OPSEC)

106.5 Command & Control

  • Exercise of authority and direction by designated commander to accomplish the mission

106.6 Organizational & Command Relationships

  • OPCON: Operational Control - authoritative direction over all aspects of military operations necessary to accomplish the mission
  • TACON: Tactical Control - command authority over assigned forces made available for tasking that is limited to the detailed direction and control necessary to acocomplish assigned mission or tasks.
  • ADCON: Administrative Control - authority to provide adminsitration and support
  • DIRLAUTH: Direct Liaison Authorized - authority granted by a commander to a subordinate to directly consult or coordinate an action

106.11 Joint Warfare Commanders and Coordinators

  • Joint Special Operations Task Force (JSOTF): joint task force (JTF) composed of SO units from more than one service, formed to carry out a specific special operation

107.1 National/Theater Level Support Entities

  • JCS: Joint Chiefs of Staff - principal military advisor to the President, the NSC and the SecDef
  • NSC: National Security Council - supports the President with the integration of domestic, foreign and military policies on National security
  • DIA: Defense Intelligence Agency - first in all-source defense intelligence to prevent strategic surprise and deliver a decision advantage to warfighters, defense planners and policymakers
  • DEFSMAC: Defense Special Missile and Astronautics Center - joint activity involving NSA and DIA that watches foreign space and missile activity
  • NNWC: Naval Network Warfare Command (NETWARCOM) - Navy's IO, intel, networks, and space unit (cyber)
  • INSCOM: US Army Intelligence and Security Command - conducts intel, security and IO for US Army
  • DNI: Director of National Intelligence - overall responsibilty for intel support to the President and day-to-day management of the IC
  • CIA: Central Intelligence Agency - responsible for providing national security intelligence to senior US policymakers
  • NRO: National Reconnaissance Office - designs, builds, and operates the nation's recon satellites
  • NGA: National Geospatial-Intelligence Agency - provides geospatial intel (IMINT primarily)
  • ONI: Office of Naval Intelligence - provider of maritime intel to the Navy


  • TYCOMS: Type Commands perform vital admin, personnel, and operational training functions for a type of weapon system
    • Naval Air Force Command
    • Naval Surface Force Command
    • Submarine Force Command
    • Naval Network Warfare Command
    • Navy Expeditionary Combat Command
  • SYSCOMS: System Commands
    • Space Warfare Systems Command
    • Naval Sea Systems Command
    • Naval Undersea Warfare Command
    • Naval Air Warfare Command

109.1 Types of Information/Intelligence Requirements

  • CCIR: Commander's Critical Information Requirements - critical pieces of information the commander must know by a particular time to plan and execute a successful mission
  • PIR: Priority Intelligence Requirement - intelligence requirements deemed most important to mission accomplishment
  • EEI: Essential Elements of Information - information requirements that would answer a PIR

110.2 AORs for Field Sites

  • Hawaii - PACOM, suface/submarine
  • Maryland - NAVEUR, Russia, fleet ops
  • Georgia - IO/cryptologic reachback; staff support to 5th fleet (NAVCENT) and 6th fleet (NAVEUR)
  • UK - joint US/UK naval command provides specialist Communication Information Systems (CIS) support to coalition navies

111.1 Composite Warfare Commander (CWC) Concept

  • CWC is an officer to whom the officer in tactical command (OTC) of a naval task org may delegate authority to conduct some or all offensive/defensive functions of the force
  • Information Warfare Commander - commands assets used to influence, disrupt, corrupt or usurp the decision making of adversaries while protecting our own

112.3 HUMINT and CI Organization and Operations (J2X)

  • J2X tasks, coordinates, synchronizes, manages and deconflicts all HUMINT and CI operations in the AOR
  • J2X will coordinate with CIA

112.9 Five HUMINT Methodologies

  1. Source Administration Program: systematic management of all HUMINT/CI elements
  2. Debriefing: questioning cooperating sources
  3. Interrogation: questioning captured persons
  4. Clandestine Agent Operations: acquire or exploit assets who have or can obtain placement and access necessary to satisfy IRs
  5. Enabling: process by which one intel discipline initiates, supports or enhances the collection efforts of another

112.10 FORMICA

  • Foreign Military Intelligence Collection Activity: overt collection of information acquired by DoD personnel who have access to foreign personnel, organizations and facilities in the conduct of their normal duties

112.12 HUMINT Operations Terms

  • IIR: Intelligence Information Report - primary vehicle to provide HUMINT info to the consumer by using a message format structure
  • KB: Knowledgeability Briefing - notify customers of refugee, defector or emigre debriefings
  • SDR: Source Directed Requirement - requirements tailored to exploit a specific source or collection opportunity; consumers submit them in response to notification of unique opportunities
  • HCR: HUMINT Collection Requirement - provide collectors details that enable them to focus and target collection efforts effectively
  • AHCR: Adhoc HUMINT Collection Requirement - customers ID short and medium term requirements on emerging critical issues
  • TSCR: Time-Sensitive Collection Requirement - obtain high priority, time-critical information in crisis periods

112.18 Asset Validation

  • Way to verify the veracity of a HUMINT source
  • Use other intel disciplines to determine reliability of source information

113.5 OPSEC Phases

  1. Identification of Critical Information
  2. Analysis of Threats
  3. Analysis of Vulnerabilities
  4. Assessment of Risk
  5. Application of OPSEC Measures

113.6 Strike Group Information Warfare Commander Duties

  • IWC must coordinate with other warfare area counterparts to ensure IO input is included in mission plans.
  • Must monitor the IO environment and assess friendly vulnerabilities and capabilities
  • Ensure strike group uses all emitters to accomplish the mission
  • Direct the employment of IW weapons, systems and sensors

113.8 River City

  • Protect against outgoing information from ship or installation
  • Can detract from intel staff's ability to push info up to C2 nodes
  • Condition level 1-4, 1 being most restrictive

113.17 MILDEC Planning Process

  1. Deception mission analysis
  2. Deception planning guidance
  3. Staff deception estimate
  4. Commander's deception estimate
  5. Deception planning

114.1 Maritime Domain Awareness and Maritime Security Operations

  • MDA: effective understanding of anything associated with the global maritime domain that could impact security, safety of the US
  • MSO: actions of navy to combat sea-based terrorism and piracy

114.4 How Intel Supports Maritime Interdiction Operations (MIO)

  • Detection and surveillance
  • Query, approach & stopping
  • Board & search
  • Debarkation
  • Post-boarding

115.7 Six Steps of the Joint Targeting Cycle (JTC)

  1. Commander's Objectives, Guidance and Intent
  2. Target Development, Validation, Nomination, and Prioritization
  3. Capabilities Analysis
  4. Commander's Decision and Force Assignment
  5. Mission Planning and Force Execution
  6. Combat Assessment

115.8 Deliberate vs Dynamic Targets

  • Deliberate Targeting: targets known to exist in operational environment
    • Scheduled Targets: prosecuted at a specific time
    • On-Call Targets: actions planned, but not for a specific time
  • Dynamic Targeting: prosecutes targets of opportunity and changes to planned targets or objectives
    • Unplanned Targets: known to exist
    • Unanticipated Targets: unknown or unexpected to exist in AOR

115.9 Types of Target Lists

  • Joint Integrated Prioritized Target List (JIPTL): prioritized list of targets approved by commander
  • Restricted Targets List: list of targets which are restricted from effects planning
  • No-Strike List: list of targets that cannot be attacked

117.1 Naval Expeditionary Combat Command Forces

  • Riverine Force
  • Explosive Ordnance Disposal (EOD)
  • Navy Expeditionary Logistics Support Group
  • Navy Expeditionary Intelligence Command
  • Naval Construction Force
  • Navy Expeditionary Guard Battalion
  • Maritime Expeditionary Security Force
  • Military Civil Affairs Group
  • Expeditionary Training Command
  • Expeditionary Combat Readiness Center
  • Combat Camera

117.2 Navy Expeditionary Combat Command (NECC) Mission

  • Provides water-borne and shore-based ATFP, theater security cooperation and engagement, and HA/DR

118 Naval Special Warfare Fundamentals

  • USSOCOM: leads, plans, synchronizes and executes global operations; train, organize, equip and deploy combat ready SOF teams to combatant commands
  • Theater Special Operations Commands (TSOCS)
    • SOCACOM: Special Operations Command Atlantic Command
    • SOCCENT: Special Operations Command Central
    • SOCEUR: Special Operations Command Europe
    • SOCPAC: Special Operations Command Pacific
    • SOCKOR: Special Operations Command Korea
    • SOCSOUTH: Special Operations Command South

118.3 Nine Core SOR Mission Sets

  1. Special Reconnaissance
  2. Direct Action
  3. Unconventional Warfare
  4. Foreign Internal Defense
  5. Counterterorrism
  6. Counter-proliferation of WMD
  7. Information Operations
  9. Civilian Affairs

118.4 Find, Fix, Finish, Exploit, Analyze, Disseminate (F3EAD)

  1. Find: Locate targets
  2. Fix: Keep target in specific location, or constantly track
  3. Finish: Conduct desired actions on target
  4. Exploit: Take advantage of information gathered
  5. Analyze: Fuse all exploited information into a product
  6. Disseminate: Push products to audiences that can use it

118.5 NSW Commands

  • NSWG1: focus on PACOM and CENTCOM (Teams 1, 3, 5, 7)
    • Unit 1: PACOM
    • Unit 3: CENTCOM
  • NSWG2: focus on EUCOM, SOUTHCOM, and Atlantic (2, 4, 8, 10)
    • Unit 2: EUCOM
    • Unit 4: SOUTHCOM
  • NSWG3: deploy NSW assets from subs
  • NSWG4: Special Boat Teams (Teams 12, 20, 22)
  • NSG10: Special Reconnaissance (SRT 1, 2)
  • NSWCEN: training
  • NSWDEVGRU: national mission force

118.6 SOF/NSW Operational Commands

  • JSOTF/CJSOTF: Joint Special Operations Task Force comprised of SOF elements from multiple services; Combined JSOTF has SOF from multiple nations
  • SOTF
  • NSW Squadron: SEAL team plus support attachments
  • NSW Task Group: C2, admin and logistics
  • NSW Task Unit: as Task Group, but smaller
  • NSW Platoon: 2-3 officers, 12-14 enlisted SEALS

118.11 Military Aspects of Terrain

  • Soil
  • Surface topography
  • Vegetation
  • Lines of communication
  • Drainage and hydrology
  • Slow/No-go criteria

118.12 Target Intel Package (TIP) for High Value Individual (HVI)

  • Bio: habits, locations, COAs
  • Target significance: impact of kill/capture
  • Reporting highlights: recent information about target
  • Data and imagery of known or historical locations: BDLs, meeting, worship, routes
  • Analysis to determine likely COAs
  • Identification of intelligence indicators and observables: pattern of life, associates
  • Collection plan: resources, personnel and timelines needed for target interrogation, site exploitation, BDA, etc
  • Latest Time of Intelligence Value (LTOIV): how long will the TIP be useful


  • 109.4 BDA: Battle Damage Assessment Report - produced when analysts determine the degree of damage and resulting operability of a target struck by a weapon
  • 109.9 CCOP: Cryptologic Carry-On Program - provides a variety of quick reaction ISR capabilities to select fleet units
  • 109.16 Collection capabilities of an ESG or CSG (Expeditionary/Carrier Strike Group) have deployable aircraft with sensors as well as intel fusion centers (CVIC); capable of IMINT and SIGINT with onboard antennas and radar
  • 115.6 Target: an entity or object considered for possible engagement or action; can be an area, complex, installation, force, equipment, capability, function, individual, group, system or behavior
    • Strategic Target: hits enemy at the highest level
    • Tactical Target: operational asset