CMD
IEW
GEOINT
G2X
328
SSO
Civilians
G2 Ops
Fusion
SIGINT
100

This CM Tool comprehensively links requirements with collection assets and other key information. -ATP 2-01 CM

What is the Information Collection Matrix

100

This acronym is PMFWS, it stands for?

Portable Multi-functional Workstation

100

The tactical ground station is commonly referred as this in the intelligence war fighting function

What is the TGS

100

The meaning of the acronym TARP

What is Threat Awareness Reporting Program

100

The 328th MICO originates from this unit

What is the 103rd IEW BN from the 525 E-MIB?

100

Under the guidance of the NSC, oversees and manages the information security program

What is the Information Security Oversight Office (ISSO)?

100

This is used to carry classified documents within the 250 mile radius

What is courier card

100

The primary mission of G2 Ops

What is coordination and synchronization

100

The 3rd Step of IPOE

What is Evalute the threat

100

The range of UHF (Ultra High Frequency) 

Hint: in MHz or GHz

What is 300–3,000 MHz or 300MHz-3 GHz

200

The geospatial area or systems node or link against which information that will satisfy a specific information requirement can be collected, usually to capture indications of enemy and adversary courses of action

What is a NAI?

200

The only system by MTOE that the IEW section is signed for

What is the Trojan

200

The center point of this spatial data type’s gridded form is a common representation of relief around the world

What is Raster

200

DAILY DOUBLE!!!!!!!!

Illegally obtaining and transmitting classified information to an unauthorized source is known as

What is Espionage

200

The 328th MICO has this as it’s unit mascot

What is the Dire Wolf

200

Three levels of classification are designated by what Executive Order

What is Executive Order 13526

200

This person in 3 ID G2 is authorized to grant NATO (S)

Who is Ms. Judy Hobson

200

The number of vehicles that the G2 owns

What is 19

200

This daily report summarizes significant intelligence activities and events within the area of operations.

What is an Intelligence Summary (INTSUM)

200

The location of NSA Headquarters

What is Fort Meade, Maryland

300

The following steps are a part of what process: 

1) Develop requirements. 2) Develop the collection management plan. 3) Support tasking and directing. 4) Assess collection. 5) Update the collection management plan.

What are the five steps of the collection management process

300

The satellite that the trojan connects too

What is the SES1

300

This satellite imagery, often used in geospatial analysis, captures the Earth's surface in real-time and is essential for monitoring changes over time, particularly in military and disaster response applications

What is Hi Resolution

300

Espionage, sabotage, sedition, subversion, and terrorism are examples of this type of crime

What are National Security Crimes

300

This MOS did not make it to the 328th MICO when it activated

What are 35F/all source analysts

300

Information no longer requires protection in the interest of National Security.

What is declassification

300

This funding source can be used for Intel TRNG & readiness TDY’s ISO MITS certs, CTC, WFX, deployment, or operational mission

What is Foundry

300

The meaning of the acronym SAR

What is Synthetic Aperture Radar

300

These are assets or locations critical to an enemy's mission success that are identified during targeting analysis.

What are High-value targets (HVTs)

300

The current  appointed DIRNSA 

Who is Gen Timothy D. Haugh, USAF

400

Collection assets consisting of “those units and systems tasked to perform information collection while also performing another mission during the operation (Example: Logistics Convoys).”

What is an Ancillary (AKA Non-Traditional) Collection Asset

400

The color order for Cat5

What is White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown

400

This military sensor is capable of producing 3D models of the real world and land elevations. It is similar to General Robotic’s, 'SPOT', capable of measuring reflectivity from objects using laser pulses

What is LiDAR

400

A CI Agent must present these prior to conducting any investigative function

What are a Badge and Credentials

400

This platoon makes the 328th MICO unique from other MICOs in the Army

What is the Field Maintenance Platoon

400

This checklist is used to ensure no classified materials are left unsecured at the end of the day

What is an SF 701 Activity Security Checklist

400

USA, Great Britan, New Zealand, Canada, Australia

What is FVEY (five eye)

400

The type of intelligence that all source supports

What is Counterintelligence

400

This system is the primary tool used by Army intelligence analysts for processing and disseminating intelligence information.

What is the Distributed Common Ground System - Army (DCGS-A)?

400

The organization that is the highest echelon in the ARMY and serves as the single POC at NSA for Army Theater and tactical forces

What is the Army TCAE

500

DAILY DOUBLE!!!!!!

A control measure that establishes areas where each echelon is responsible for collecting information, deconflicting collection efforts between echelons, and reducing the likelihood of duplication

What is an Intelligence Handover Line

500

The MCN-AE uses this process to provide JWICS and NSANET

What is an encrypted line from the G6 which is unencrypted by Taclanes for each network

500

This landform is most commonly present when calculating the substrata on a brackish inlet in the Atlantic Ocean (3 answers)

What are Sound, Cove, channel

500

The primary method of intelligence collection for HUMINT during LSCO

What is interrogation

500

This impressive number of warrant officers makes the 328th MICO the smartest Company in all of Division

What are 5 x SIGINT Techs, 2 x IEW Techs, 1 x HUMINT Tech and 1 x GEOINT Tech – totaling 9 warrant officers

500

Occurs when any knowing, willful, and negligent actions could reasonably be expected to result in an unauthorized disclosure or classified information.

What is a security violation

500

This investigation gives you a Top Secret clearance

What is a Tier 5 or SSBI

500

The two main roles of the G2 in the Division

What are intel sharing and understanding and Physical and Personnel Security

500

METT-TC is an acronym used in mission analysis. METT-TC stands for
 

What is Mission, Enemy, Terrain, Troops, Time, Civilian Considerations

500

The United States' first peacetime cryptanalytic organization

What is Black Chamber