• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/161

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

161 Cards in this Set

  • Front
  • Back
“Routine Use” disclosures for Privacy Act
1. Request made in writing
2. Signed Release Authority
3. DON retains a copy for records.
What does an Investigation look for?
Personal Security Investigation checks for suitability and eligibility
SAER
Security Access Eligibility Report. Initiated by Senior Enlisted, CFS or Officer. Submitted to DONCAF.
Appeals
To dispute findings of an unfavorable security access determination
LOI
Letter of Intent - Warning letter for addressing an issue.
LOD
Letter of Denial - Unfavorable Determination.
JCAVS
Joint Clearance Access Verification System - List of records of access and clearances.
Purpose of SF86
Permanent document for current and future security investigations.
DD Form 1847-1
Non Disclosure Statement for TS/SCI
What does the adjunct Faculty Program Provide
Trains SME's and certifies them to train on site to meet on site training needs more effectively.
State the minimum DLPT score standard
The current DLPT standards are 2/2 (Listening/Reading) or higher except for the following languages: Arabic, Persian-Farsi and Chinese which require at least 1+/2 or 2/1+.
Name the languages associated with Category One
French, Italian, Portuguese and Spanish
Name the languages associated with Category Two
German
Name the languages associated with Category Three
Hebrew, Persian-Farsi and Dari, Russian, Serb-Croatian, Tagalog, Thai, Urdu
Name the languages associated with Category Four
Arabic, Chinese, Korean, Pashto
emergency destruction priority assigned to cryptologic equipment
PRIORITY ONE
FLTCYBERCOM OPCON to?
USCYBERCOM
FLTCYBERCOM ADCON to?
CNO
USSTRATCOM
global deterrence capabilities concerning WMD
USCYBERCOM
All encompassing of cyberspace operations
JFCC-ISR - Joint Functional Component Command for Intelligence, Surveillance and Reconnaissance
Responsible for coordinating global intelligence surveillance, and Reconnaissance operations
JFCC-Space – Joint Functional Component Command for Space (JFCC-SPACE)
Coordinating, planning, and conducting space operations
JIOWC – Joint Information Operations Warfare Center (JIOWC)
Deploys information operations planning teams worldwide to support combatant commanders and joint task forces
3 Categories of CSG's?
Permanent, Expeditionary, Service Component
Customer relationship function of CSG's?
Facilitate INs, provide expertise, educate, reach back support, and stand
watch as needed
SIGINT Production Function of CSG's?
If granted – production chain, sanitize, and collateral level support
SIGINT Operational Relationship of CSG's?
SIGINT LNOs, 2nd and 3rd party LNOs, DNI LNOs, or site specific Needs.
Rules of Engagement
Justifies the circumstances and limitations under which United States forces will initiate and/or continue combat engagement with other forces encountered
Law of War
Regulates the conduct of armed hostilities, and encompasses all international law for the conduct of hostilities binding on the United States or its individual citizens, including treaties and international agreements to which the United States is a party, and applicable customary international law
No-Strike list
A list of geographic areas, complexes, or installations not planned for capture or destruction. Attacking these may violate the law of armed conflict or interfere with friendly relations with indigenous personnel or governments
Restricted Target List
A list of restricted targets nominated by elements of the joint force and approved by the joint force commander.
Battle damage assessment
The timely and accurate estimate of damage resulting from the application of military force, either lethal or nonlethal, against a predetermined objective.
Information Operations (IO)
Employment of electronic warfare, computer network operations, psychological
operations, military deception, and OPSEC
Target Development:
The net result of target development is to produce from the approved targets a target nomination list
(TNL) that identifies those elements within an adversary’s power base (e.g., forces, infrastructure, and political support) that
most closely support the JFC’s objectives, and that has been vetted through all joint force component and interagency
concerns.
Time Sensitive Targeting and its six phases
Those targets requiring immediate response because they pose
(or will soon pose) a danger to friendly forces or are highly lucrative,
fleeting targets of opportunity. Also called TST.
1. Detect 2. Locate 3. Identify 4. Decide 5. Strike 6. Assess
P-3C Orion
4-engine turbo prop, anti-submarine and maritime surveillance aircraft
EP-3E
Signals reconnaissance version of the P-3 Orion
MILDEC to include the some means of deception:
A. Physical – Inflatable's, decoys, etc.
B. Technical – Deceptive Comms
C. Administrative – Pictures, papers
Steps of the MILDEC planning process
1. Mission Analysis.
2. Planning Guidance.
3. Staff Deception Estimate.
4. Commander's Deception Estimate.
5. Plan development.
6. Plan Review and Approval.
PSYOP
Planned operations to influence foreign audiences and their emotions, motives, objective reasoning, and ultimately, the behavior of their governments, organizations, groups, and individuals
MILDEC
Described as being those actions executed to deliberately mislead adversary decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly forces' mission
Organizational Responsibilities of PSYOP
Information Operations (IO). The commanders of the combatant commands shall integrate, plan, execute, and assess IO when conducting campaigns across the range of military operations and shall identify and prioritize IO requirements.
Command and Control of PSYOP
STRATCOM remains overall C2 for any cross-boundary IO, and it is delegated through appropriate orders, OPORD, FRAGO, EXORD etc
Describe how intelligence supports PSYOP through target analysis.
PSYOP planners rely on the accuracy of the data to help formulate the current and expected Human Factors that PSYOP activity will affect.
Primary responsibilities of a Information Operations Officer
IO Cell Chief. The J-3 normally designates an IO cell chief to assist in executing joint IO responsibilities. The IO cell chief is the central point of contact on the combatant command staff for IO. The primary function of the IO cell chief is to ensure that IO are integrated and synchronized in all planning processes of the combatant command staff
Warfare Commander Relationships
Usually the Carrier CO. Responsible for all aspects of IO in the strike group
Reporting Requirements of the Strike Group IWC/IWO
Mardi Gras, SEI, SITREPs, etc
TACSIT – Tactical situation
TACSIT 1 – The exact location of strike group known to enemy.
TACSIT 2 – The general location of strike group known to enemy.
TACSIT 3 – The location of strike group unknown to enemy
IW Weapons Posture
Maintain cognizance and correct condition of all IW weapons (offensive and defensive) within the strike group
Cryptosecurity
The component of communications security that results from the provision of technically sound
cryptosystems and their proper use.
Transmission Security
The component of communications security that results from all measures designed to protect
transmissions from interception and exploitation by means other than crypto analysis
Emission Security
The component of communications security that results from all measures taken to deny unauthorized persons information of value that might be derived from intercept and analysis of compromising emanations from crypto-equipment and telecommunications systems
Physical Security
The component that results from all physical measures necessary to safeguard classified equipment,
material, and documents from access thereto or observation thereof by unauthorized persons
Advantages/disadvantages of EMCON –
Advantages – Harder to find, impose, Strike Group Commander.
Disadvantages – Harder to communicate, break, emergency
1. Radio Silence – per EMCON bill.
2. Hide from satellites.
3. Reduces ability of enemies to target.
4. Essential equipment is authorized
EEFI
Essential Elements of Friendly Information
BEADWINDOW reporting
BEADWINDOW is a simple, rapid procedure for use by circuit operators to police the security of insecure voice networks. Only response “Roger, out.”
7 Conditions of BEADWINDOW
1. – Position
2. – Capabilities
3. – Operations
4. – Electronic Warfare
5. – Personnel
6. – COMSEC
7. – Wrong Circuit.
JCMA
Joint COMSEC Monitoring Agency
Purpose, scope and applicability of the Intelligence Oversight Program
It is the process of ensuring that agencies within the Intelligence Community collect, retain and disseminate information concerning a US Person only in accordance with Federal law, Executive Orders, DoD directives, regulations and policies.
Scope & Applicability of the Intel Oversight Pgm.
According to SECNAVINST 3820.3E, IO applies to all DoN intel components and governs all intel activities undertaken by personnel assigned to those components.
Questionable Intelligence Activities
Intelligence activities that may be unlawful or contrary to Federal law, Executive Orders or applicable DoD policies governing said activity
Special Activities of Intel OV
– Activities conducted in support of national foreign policy objectives abroad which are planned and executed so the role of the US Government is not apparent or acknowledged publicly, and functions in support of such activities, but are not intended to influence US political processes, public opinion, policies or media – and do not include diplomatic activities or the collection and production of intelligence or related support functions
The definition
of a US Person is:
- US citizens
- Permanent resident aliens
- Unincorporated associations substantially composed of US citizens or permanent resident aliens
- Corporations incorporated in the US, except for corporations directed and controlled by foreign governments
Reporting & Training on Intel OV
All personnel who come in contact with collections data is required to take the OVSC1800 training on “Legal Compliance and Minimization Procedures” via e-Campus (NSANet training portal). A training refresher is required every two years.
Foreign Intelligence Surveillance Act (FISA)-
An Act of Congress which prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers" (which may include American citizens and permanent residents suspected of being engaged in espionage and violating US law on territory under United States control)
Items That Require Auditing
Any SIGINT system that offers a significant risk of violating the privacy rights of private citizens requires active auditing
Auditor Training
Future auditors receive scenario-based training and must pass the e-Campus OVSC3101 exam.
Who May Audit
– Auditors are selected because of these qualifications:
– Target knowledge
– Familiarity with the type of queries needed within their SIGINT production chain
– Ability to use their expertise to improve analyst query strategies
– Ability to mentor analysts
– Posses all appropriate credentials for their SIGINT production chain
– Are current on all required training
Research IN’s
Requests for limited SIGINT production efforts over a defined period of time using existing data
IN?
Information Need
Limited Duration IN’s
– Requests for SIGINT collection and production efforts over a defined period ranging from 0 – 89 days that begins at a designated time after the IN is originated.
Standing IN’s
Request for sustained SIGINT collection and production efforts over a defined period of time ranging
from 90 days to 2 years after the IN is originated
Time Critical IN’s
Requests that must be acted upon within 3 days or less of submission
Time Sensitive IN’s
Requests that must be acted upon within 4 – 29 calendar days after submission.
Routine IN’s
UCS action required in 30 or more calendar days from the date of submission
Level of Effort
1. A statement of the capability of the UCS to report on and answer the questions asked in an IN.
2. What the community has available and if the community has the assets available to fulfill the IN.
5 Steps of the SIGINT IN process
1. Originator
2. Review
3. Sponsor
4. Validation
5 Implement
NIPF?
National Intelligence Priorities Framework
NIPF Topic
Broad description of the collection requirement (i.e. Agriculture and Food Security, Cyber Threats to U.S.
Infrastructures.)
NIPF Subtopic
More detailed description of the topic of the collection requirement (i.e. Wheat Shortage Due to Draught in
Russia)
NIPF Geopolitical
Specific countries or political affiliations (Cuba, Iran, etc.
NIPF Non-state
Terrorism (Al-Qaeda, Moro Islamic Liberation Front, etc.)
USSID Policy (SP) Series –
Security procedures
USSID Customer Relationships (CR) Series
Support to the IC, military, and U.S. Government partners, Technical and Serialized SIGINT Reporting, Time-sensitive Non-serialized Reporting formats and dissemination
USSID SE 2000 Series
Provides direction and guidance to all shore (NIOC/NIOD) units, Direct Support, Navy Reserve and Marine units
USSID SE 5000 Series
Provides direction and guidance to all NSA/CSS elements (Maryland, Texas, Hawaii, and Georgia) and Cryptologic Services Groups
RADAR – Radio, Detection, and Ranging –
The radar dish, or antenna, transmits pulses of radio waves or microwaves which bounce off any object in their path. The object returns a tiny part of the wave's energy to a dish or antenna which is usually located at the same site as the transmitter.
Doppler Effect
Apparent change in frequency or pitch when a sound source moves either toward or away from the listener, or when the listener moves either toward or away from the sound source
Echo
The reflection of sound
Sea Return
Target echoes created from radar strikes when the energy is reflected off the waves at various angles away from the ship. i.e. Rougher the seas the more sea return received
Clutter
Term used for unwanted echoes in radar systems. Can be caused by ground, sea, rain, animals/insects, chaff and atmospheric turbulences
Ground Clutter
A form of radar signal contamination that occurs when fixed objects close to the transmitter such as
buildings, trees, or terrain (hills, ocean swells and waves) obstruct a radar beam and produce echoes
Sea Clutter
A form of radar signal contamination that occurs when events in the ocean such as ocean swells and waves obstruct a radar beam and produce echoes.
Range
The length of a straight line between a radar set and a target
Amplitude
The displacement from the undisturbed position of the medium to the top of a crest. i.e. the power or
strength of the signal
Wavelength
The distance from the crest of one wave to the crest of the next, or between any two similar points on adjacent waves
Cycle
One full wavelength of a wave represents one complete cycle
Frequency
The number of cycles that occur in one second. Usually expressed in hertz.
Sky Wave
Radio waves that are reflected back to Earth from the ionosphere
Space Wave
Two distinct paths going from the transmitting antenna to the receiving antenna – one is through the air
directly to the receiving antenna and the other is reflected from the ground to the receiving antenna
Natural Horizon
The line-of-sight horizon
Radio Horizon
ONE-THIRD further than the natural horizon
Refraction
Wave changes direction when passing from one medium into another medium such as a straw in a glass
Diffraction
Occurs when waves pass through a narrow opening. The waves will bend because of interference with the
side of the barrier and make a circular wave front on the other side.
Reflection
Waves that are neither transmitted nor absorbed, but are reflected from the surface of the medium they
encounter
Absorption
Does not allow any reflection or refraction of the electromagnetic wave
Attenuation
Reduction of signal strength during transmission.
Three basic characteristics of sound.

.
1. Pitch.
2. Intensity.
3. Quality
Reciprocity
An antenna that transmits and receives
Gain
Focuses the radiated RF into narrower patterns. The higher the gain of an antenna the smaller the effective angle of use
Polarization
The orientation of the electric field vector of the electromagnetic wave produced by the antenna. Polarization may be vertical, horizontal or elliptical
Radiation Resistance
The resistance that, if inserted in place of an antenna, would consume the same amount of power that is radiated by the antenna
Virus
A malicious program that modifies other host files or boot areas to replicate, enabling it to spread from one computer to another, leaving infections as it travels
Trojan Horse
A non-replicating program masquerading as one type of program with its real intent hidden from the user.
Known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised
Worm
A sophisticated piece of replicating code that uses its own program coding to spread, with minimal user intervention. The biggest danger with a worm is its capability to replicate itself on your system with no interaction needed from the user
Mixture
A more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and
malicious code into a single threat
ActiveX
An interactive technology used to run programs over the internet; for example, an ActiveX component can scan for viruses using a browser, rather than using an installed program
Dangers of ActiveX
ActiveX control can do almost anything it wants. If you allow a control to execute on your system, it has full access to your system
Macro Viruses
A virus that is written in a macro language (language built into a word processing documents. i.e.. Microsoft Word).
Dangers of Macro Viruses
According to Symantec, macro viruses are the most common type of virus, and have cost companies the most money
Hoax Viruses
A chain mail claiming gloom and doom
Dangers of hoax Viruses
No true danger. Only trust virus alerts from a valid source
Routine – R
6 hours
Priority – P
3 Hours
Immediate – O
30 Minutes
Flash – Z
10 Minutes
Flash Override – W
10 Minutes, overrides all others
Emergency – E
Not an accepted indicator, amateur use.
KLIEGLIGHT
Time-sensitive reporting consisting of Secret and COMINT portions
TACREP
Time Sensitive Report. (KL without the COMINT.)
Activation/Deactivation
Message that opens or closes a SIGINT site, either permanent or temporary
TACELINT
Derived from operational ELINT, report signal and location data.
IGRAM
Integrated Graphics and Multimedia Report, report that includes charts, tables, video, etc
STRUM
Standard Technical Report Using Modules, formatted technical and parametric report
STI
SIGINT Technical Information, disseminates technical information based on valid Information Needs
Minimize
Reduces the traffic volume on a message system, only allows high priority messages can be sent.
This will halt CRITIC communications exercises
DAG
DSSCS Address Group
AIG
Address Indicating Groups (NATO)
Producer Designator Digraph
PDDG, 2 character alphanumeric, ID’s producer in message
SIGAD
Activity Designator, Two parts Country Affiliation and Type, followed by an alphanumeric
DF Station ID
DF Site Identifier, identifies an HFDF within the CROSSHAIR net
GENSER Plain Language Address
Message address in, well, abbreviated plain language
Special Intelligence PLA
A message address in SI Comms that is, well abbreviated plain language
Routing Indicators DOI 102
identifies all authorized DSSCS routing indicators
DOI-101
DSSCS Address Groups
DOI-102
Routing indicators in DSSCS
DOI-103
Practices applicable to SI Comms
JDISS
Joint Deployable Intelligence Support System, COTS/GOTS mobile JWICS
GCCS-M
Global Command and Control System – Maritime, Common Operating Picture
NRTD
Near Real Time Data, replaced by IBS-N
S-TRED
Standard Tactical Receive Equipment Display, Low cost graphic display that parses intelligence and I&W
IBS – Integrated Broadcast Service, dissemination system of systems
1. Simplex – Formerly TRAP TDDS, distributes a broadcast of intelligence data2. Interactive – Formerly TIBS, can support multiple users LOS or SATCOM
3. Network – NRTI SIGINT data display
INTELINK
Comes in all classification flavors…it is the internet for the IC
ANCHORY
Multi-database search and retrieval by keywords, MAUI
CARILLON
General processing computing facility, 4 HUGE computers
WRANGLER
Replaced MATCHLITE, SIGINT database
VINTAGE HARVEST
A www based analytic tool about signals for the IC
SEALINK
Global, persistent vessel tracking and awareness.
OILSTOCK
Unsupported mapping tool developed by NSA
ARCGIS
A powerful mapping tool that has many iterations and is used both in and out of the Government for various reasons.
GALE Lite
Generic Area Limitation Environment, analysis suite that allows NTR data fusion, SA, and operational planning