Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
161 Cards in this Set
- Front
- Back
“Routine Use” disclosures for Privacy Act
|
1. Request made in writing
2. Signed Release Authority 3. DON retains a copy for records. |
|
What does an Investigation look for?
|
Personal Security Investigation checks for suitability and eligibility
|
|
SAER
|
Security Access Eligibility Report. Initiated by Senior Enlisted, CFS or Officer. Submitted to DONCAF.
|
|
Appeals
|
To dispute findings of an unfavorable security access determination
|
|
LOI
|
Letter of Intent - Warning letter for addressing an issue.
|
|
LOD
|
Letter of Denial - Unfavorable Determination.
|
|
JCAVS
|
Joint Clearance Access Verification System - List of records of access and clearances.
|
|
Purpose of SF86
|
Permanent document for current and future security investigations.
|
|
DD Form 1847-1
|
Non Disclosure Statement for TS/SCI
|
|
What does the adjunct Faculty Program Provide
|
Trains SME's and certifies them to train on site to meet on site training needs more effectively.
|
|
State the minimum DLPT score standard
|
The current DLPT standards are 2/2 (Listening/Reading) or higher except for the following languages: Arabic, Persian-Farsi and Chinese which require at least 1+/2 or 2/1+.
|
|
Name the languages associated with Category One
|
French, Italian, Portuguese and Spanish
|
|
Name the languages associated with Category Two
|
German
|
|
Name the languages associated with Category Three
|
Hebrew, Persian-Farsi and Dari, Russian, Serb-Croatian, Tagalog, Thai, Urdu
|
|
Name the languages associated with Category Four
|
Arabic, Chinese, Korean, Pashto
|
|
emergency destruction priority assigned to cryptologic equipment
|
PRIORITY ONE
|
|
FLTCYBERCOM OPCON to?
|
USCYBERCOM
|
|
FLTCYBERCOM ADCON to?
|
CNO
|
|
USSTRATCOM
|
global deterrence capabilities concerning WMD
|
|
USCYBERCOM
|
All encompassing of cyberspace operations
|
|
JFCC-ISR - Joint Functional Component Command for Intelligence, Surveillance and Reconnaissance
|
Responsible for coordinating global intelligence surveillance, and Reconnaissance operations
|
|
JFCC-Space – Joint Functional Component Command for Space (JFCC-SPACE)
|
Coordinating, planning, and conducting space operations
|
|
JIOWC – Joint Information Operations Warfare Center (JIOWC)
|
Deploys information operations planning teams worldwide to support combatant commanders and joint task forces
|
|
3 Categories of CSG's?
|
Permanent, Expeditionary, Service Component
|
|
Customer relationship function of CSG's?
|
Facilitate INs, provide expertise, educate, reach back support, and stand
watch as needed |
|
SIGINT Production Function of CSG's?
|
If granted – production chain, sanitize, and collateral level support
|
|
SIGINT Operational Relationship of CSG's?
|
SIGINT LNOs, 2nd and 3rd party LNOs, DNI LNOs, or site specific Needs.
|
|
Rules of Engagement
|
Justifies the circumstances and limitations under which United States forces will initiate and/or continue combat engagement with other forces encountered
|
|
Law of War
|
Regulates the conduct of armed hostilities, and encompasses all international law for the conduct of hostilities binding on the United States or its individual citizens, including treaties and international agreements to which the United States is a party, and applicable customary international law
|
|
No-Strike list
|
A list of geographic areas, complexes, or installations not planned for capture or destruction. Attacking these may violate the law of armed conflict or interfere with friendly relations with indigenous personnel or governments
|
|
Restricted Target List
|
A list of restricted targets nominated by elements of the joint force and approved by the joint force commander.
|
|
Battle damage assessment
|
The timely and accurate estimate of damage resulting from the application of military force, either lethal or nonlethal, against a predetermined objective.
|
|
Information Operations (IO)
|
Employment of electronic warfare, computer network operations, psychological
operations, military deception, and OPSEC |
|
Target Development:
|
The net result of target development is to produce from the approved targets a target nomination list
(TNL) that identifies those elements within an adversary’s power base (e.g., forces, infrastructure, and political support) that most closely support the JFC’s objectives, and that has been vetted through all joint force component and interagency concerns. |
|
Time Sensitive Targeting and its six phases
|
Those targets requiring immediate response because they pose
(or will soon pose) a danger to friendly forces or are highly lucrative, fleeting targets of opportunity. Also called TST. 1. Detect 2. Locate 3. Identify 4. Decide 5. Strike 6. Assess |
|
P-3C Orion
|
4-engine turbo prop, anti-submarine and maritime surveillance aircraft
|
|
EP-3E
|
Signals reconnaissance version of the P-3 Orion
|
|
MILDEC to include the some means of deception:
|
A. Physical – Inflatable's, decoys, etc.
B. Technical – Deceptive Comms C. Administrative – Pictures, papers |
|
Steps of the MILDEC planning process
|
1. Mission Analysis.
2. Planning Guidance. 3. Staff Deception Estimate. 4. Commander's Deception Estimate. 5. Plan development. 6. Plan Review and Approval. |
|
PSYOP
|
Planned operations to influence foreign audiences and their emotions, motives, objective reasoning, and ultimately, the behavior of their governments, organizations, groups, and individuals
|
|
MILDEC
|
Described as being those actions executed to deliberately mislead adversary decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly forces' mission
|
|
Organizational Responsibilities of PSYOP
|
Information Operations (IO). The commanders of the combatant commands shall integrate, plan, execute, and assess IO when conducting campaigns across the range of military operations and shall identify and prioritize IO requirements.
|
|
Command and Control of PSYOP
|
STRATCOM remains overall C2 for any cross-boundary IO, and it is delegated through appropriate orders, OPORD, FRAGO, EXORD etc
|
|
Describe how intelligence supports PSYOP through target analysis.
|
PSYOP planners rely on the accuracy of the data to help formulate the current and expected Human Factors that PSYOP activity will affect.
|
|
Primary responsibilities of a Information Operations Officer
|
IO Cell Chief. The J-3 normally designates an IO cell chief to assist in executing joint IO responsibilities. The IO cell chief is the central point of contact on the combatant command staff for IO. The primary function of the IO cell chief is to ensure that IO are integrated and synchronized in all planning processes of the combatant command staff
|
|
Warfare Commander Relationships
|
Usually the Carrier CO. Responsible for all aspects of IO in the strike group
|
|
Reporting Requirements of the Strike Group IWC/IWO
|
Mardi Gras, SEI, SITREPs, etc
|
|
TACSIT – Tactical situation
|
TACSIT 1 – The exact location of strike group known to enemy.
TACSIT 2 – The general location of strike group known to enemy. TACSIT 3 – The location of strike group unknown to enemy |
|
IW Weapons Posture
|
Maintain cognizance and correct condition of all IW weapons (offensive and defensive) within the strike group
|
|
Cryptosecurity
|
The component of communications security that results from the provision of technically sound
cryptosystems and their proper use. |
|
Transmission Security
|
The component of communications security that results from all measures designed to protect
transmissions from interception and exploitation by means other than crypto analysis |
|
Emission Security
|
The component of communications security that results from all measures taken to deny unauthorized persons information of value that might be derived from intercept and analysis of compromising emanations from crypto-equipment and telecommunications systems
|
|
Physical Security
|
The component that results from all physical measures necessary to safeguard classified equipment,
material, and documents from access thereto or observation thereof by unauthorized persons |
|
Advantages/disadvantages of EMCON –
|
Advantages – Harder to find, impose, Strike Group Commander.
Disadvantages – Harder to communicate, break, emergency 1. Radio Silence – per EMCON bill. 2. Hide from satellites. 3. Reduces ability of enemies to target. 4. Essential equipment is authorized |
|
EEFI
|
Essential Elements of Friendly Information
|
|
BEADWINDOW reporting
|
BEADWINDOW is a simple, rapid procedure for use by circuit operators to police the security of insecure voice networks. Only response “Roger, out.”
|
|
7 Conditions of BEADWINDOW
|
1. – Position
2. – Capabilities 3. – Operations 4. – Electronic Warfare 5. – Personnel 6. – COMSEC 7. – Wrong Circuit. |
|
JCMA
|
Joint COMSEC Monitoring Agency
|
|
Purpose, scope and applicability of the Intelligence Oversight Program
|
It is the process of ensuring that agencies within the Intelligence Community collect, retain and disseminate information concerning a US Person only in accordance with Federal law, Executive Orders, DoD directives, regulations and policies.
|
|
Scope & Applicability of the Intel Oversight Pgm.
|
According to SECNAVINST 3820.3E, IO applies to all DoN intel components and governs all intel activities undertaken by personnel assigned to those components.
|
|
Questionable Intelligence Activities
|
Intelligence activities that may be unlawful or contrary to Federal law, Executive Orders or applicable DoD policies governing said activity
|
|
Special Activities of Intel OV
|
– Activities conducted in support of national foreign policy objectives abroad which are planned and executed so the role of the US Government is not apparent or acknowledged publicly, and functions in support of such activities, but are not intended to influence US political processes, public opinion, policies or media – and do not include diplomatic activities or the collection and production of intelligence or related support functions
|
|
The definition
of a US Person is: |
- US citizens
- Permanent resident aliens - Unincorporated associations substantially composed of US citizens or permanent resident aliens - Corporations incorporated in the US, except for corporations directed and controlled by foreign governments |
|
Reporting & Training on Intel OV
|
All personnel who come in contact with collections data is required to take the OVSC1800 training on “Legal Compliance and Minimization Procedures” via e-Campus (NSANet training portal). A training refresher is required every two years.
|
|
Foreign Intelligence Surveillance Act (FISA)-
|
An Act of Congress which prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers" (which may include American citizens and permanent residents suspected of being engaged in espionage and violating US law on territory under United States control)
|
|
Items That Require Auditing
|
Any SIGINT system that offers a significant risk of violating the privacy rights of private citizens requires active auditing
|
|
Auditor Training
|
Future auditors receive scenario-based training and must pass the e-Campus OVSC3101 exam.
|
|
Who May Audit
|
– Auditors are selected because of these qualifications:
– Target knowledge – Familiarity with the type of queries needed within their SIGINT production chain – Ability to use their expertise to improve analyst query strategies – Ability to mentor analysts – Posses all appropriate credentials for their SIGINT production chain – Are current on all required training |
|
Research IN’s
|
Requests for limited SIGINT production efforts over a defined period of time using existing data
|
|
IN?
|
Information Need
|
|
Limited Duration IN’s
|
– Requests for SIGINT collection and production efforts over a defined period ranging from 0 – 89 days that begins at a designated time after the IN is originated.
|
|
Standing IN’s
|
Request for sustained SIGINT collection and production efforts over a defined period of time ranging
from 90 days to 2 years after the IN is originated |
|
Time Critical IN’s
|
Requests that must be acted upon within 3 days or less of submission
|
|
Time Sensitive IN’s
|
Requests that must be acted upon within 4 – 29 calendar days after submission.
|
|
Routine IN’s
|
UCS action required in 30 or more calendar days from the date of submission
|
|
Level of Effort
|
1. A statement of the capability of the UCS to report on and answer the questions asked in an IN.
2. What the community has available and if the community has the assets available to fulfill the IN. |
|
5 Steps of the SIGINT IN process
|
1. Originator
2. Review 3. Sponsor 4. Validation 5 Implement |
|
NIPF?
|
National Intelligence Priorities Framework
|
|
NIPF Topic
|
Broad description of the collection requirement (i.e. Agriculture and Food Security, Cyber Threats to U.S.
Infrastructures.) |
|
NIPF Subtopic
|
More detailed description of the topic of the collection requirement (i.e. Wheat Shortage Due to Draught in
Russia) |
|
NIPF Geopolitical
|
Specific countries or political affiliations (Cuba, Iran, etc.
|
|
NIPF Non-state
|
Terrorism (Al-Qaeda, Moro Islamic Liberation Front, etc.)
|
|
USSID Policy (SP) Series –
|
Security procedures
|
|
USSID Customer Relationships (CR) Series
|
Support to the IC, military, and U.S. Government partners, Technical and Serialized SIGINT Reporting, Time-sensitive Non-serialized Reporting formats and dissemination
|
|
USSID SE 2000 Series
|
Provides direction and guidance to all shore (NIOC/NIOD) units, Direct Support, Navy Reserve and Marine units
|
|
USSID SE 5000 Series
|
Provides direction and guidance to all NSA/CSS elements (Maryland, Texas, Hawaii, and Georgia) and Cryptologic Services Groups
|
|
RADAR – Radio, Detection, and Ranging –
|
The radar dish, or antenna, transmits pulses of radio waves or microwaves which bounce off any object in their path. The object returns a tiny part of the wave's energy to a dish or antenna which is usually located at the same site as the transmitter.
|
|
Doppler Effect
|
Apparent change in frequency or pitch when a sound source moves either toward or away from the listener, or when the listener moves either toward or away from the sound source
|
|
Echo
|
The reflection of sound
|
|
Sea Return
|
Target echoes created from radar strikes when the energy is reflected off the waves at various angles away from the ship. i.e. Rougher the seas the more sea return received
|
|
Clutter
|
Term used for unwanted echoes in radar systems. Can be caused by ground, sea, rain, animals/insects, chaff and atmospheric turbulences
|
|
Ground Clutter
|
A form of radar signal contamination that occurs when fixed objects close to the transmitter such as
buildings, trees, or terrain (hills, ocean swells and waves) obstruct a radar beam and produce echoes |
|
Sea Clutter
|
A form of radar signal contamination that occurs when events in the ocean such as ocean swells and waves obstruct a radar beam and produce echoes.
|
|
Range
|
The length of a straight line between a radar set and a target
|
|
Amplitude
|
The displacement from the undisturbed position of the medium to the top of a crest. i.e. the power or
strength of the signal |
|
Wavelength
|
The distance from the crest of one wave to the crest of the next, or between any two similar points on adjacent waves
|
|
Cycle
|
One full wavelength of a wave represents one complete cycle
|
|
Frequency
|
The number of cycles that occur in one second. Usually expressed in hertz.
|
|
Sky Wave
|
Radio waves that are reflected back to Earth from the ionosphere
|
|
Space Wave
|
Two distinct paths going from the transmitting antenna to the receiving antenna – one is through the air
directly to the receiving antenna and the other is reflected from the ground to the receiving antenna |
|
Natural Horizon
|
The line-of-sight horizon
|
|
Radio Horizon
|
ONE-THIRD further than the natural horizon
|
|
Refraction
|
Wave changes direction when passing from one medium into another medium such as a straw in a glass
|
|
Diffraction
|
Occurs when waves pass through a narrow opening. The waves will bend because of interference with the
side of the barrier and make a circular wave front on the other side. |
|
Reflection
|
Waves that are neither transmitted nor absorbed, but are reflected from the surface of the medium they
encounter |
|
Absorption
|
Does not allow any reflection or refraction of the electromagnetic wave
|
|
Attenuation
|
Reduction of signal strength during transmission.
|
|
Three basic characteristics of sound.
. |
1. Pitch.
2. Intensity. 3. Quality |
|
Reciprocity
|
An antenna that transmits and receives
|
|
Gain
|
Focuses the radiated RF into narrower patterns. The higher the gain of an antenna the smaller the effective angle of use
|
|
Polarization
|
The orientation of the electric field vector of the electromagnetic wave produced by the antenna. Polarization may be vertical, horizontal or elliptical
|
|
Radiation Resistance
|
The resistance that, if inserted in place of an antenna, would consume the same amount of power that is radiated by the antenna
|
|
Virus
|
A malicious program that modifies other host files or boot areas to replicate, enabling it to spread from one computer to another, leaving infections as it travels
|
|
Trojan Horse
|
A non-replicating program masquerading as one type of program with its real intent hidden from the user.
Known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised |
|
Worm
|
A sophisticated piece of replicating code that uses its own program coding to spread, with minimal user intervention. The biggest danger with a worm is its capability to replicate itself on your system with no interaction needed from the user
|
|
Mixture
|
A more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and
malicious code into a single threat |
|
ActiveX
|
An interactive technology used to run programs over the internet; for example, an ActiveX component can scan for viruses using a browser, rather than using an installed program
|
|
Dangers of ActiveX
|
ActiveX control can do almost anything it wants. If you allow a control to execute on your system, it has full access to your system
|
|
Macro Viruses
|
A virus that is written in a macro language (language built into a word processing documents. i.e.. Microsoft Word).
|
|
Dangers of Macro Viruses
|
According to Symantec, macro viruses are the most common type of virus, and have cost companies the most money
|
|
Hoax Viruses
|
A chain mail claiming gloom and doom
|
|
Dangers of hoax Viruses
|
No true danger. Only trust virus alerts from a valid source
|
|
Routine – R
|
6 hours
|
|
Priority – P
|
3 Hours
|
|
Immediate – O
|
30 Minutes
|
|
Flash – Z
|
10 Minutes
|
|
Flash Override – W
|
10 Minutes, overrides all others
|
|
Emergency – E
|
Not an accepted indicator, amateur use.
|
|
KLIEGLIGHT
|
Time-sensitive reporting consisting of Secret and COMINT portions
|
|
TACREP
|
Time Sensitive Report. (KL without the COMINT.)
|
|
Activation/Deactivation
|
Message that opens or closes a SIGINT site, either permanent or temporary
|
|
TACELINT
|
Derived from operational ELINT, report signal and location data.
|
|
IGRAM
|
Integrated Graphics and Multimedia Report, report that includes charts, tables, video, etc
|
|
STRUM
|
Standard Technical Report Using Modules, formatted technical and parametric report
|
|
STI
|
SIGINT Technical Information, disseminates technical information based on valid Information Needs
|
|
Minimize
|
Reduces the traffic volume on a message system, only allows high priority messages can be sent.
This will halt CRITIC communications exercises |
|
DAG
|
DSSCS Address Group
|
|
AIG
|
Address Indicating Groups (NATO)
|
|
Producer Designator Digraph
|
PDDG, 2 character alphanumeric, ID’s producer in message
|
|
SIGAD
|
Activity Designator, Two parts Country Affiliation and Type, followed by an alphanumeric
|
|
DF Station ID
|
DF Site Identifier, identifies an HFDF within the CROSSHAIR net
|
|
GENSER Plain Language Address
|
Message address in, well, abbreviated plain language
|
|
Special Intelligence PLA
|
A message address in SI Comms that is, well abbreviated plain language
|
|
Routing Indicators DOI 102
|
identifies all authorized DSSCS routing indicators
|
|
DOI-101
|
DSSCS Address Groups
|
|
DOI-102
|
Routing indicators in DSSCS
|
|
DOI-103
|
Practices applicable to SI Comms
|
|
JDISS
|
Joint Deployable Intelligence Support System, COTS/GOTS mobile JWICS
|
|
GCCS-M
|
Global Command and Control System – Maritime, Common Operating Picture
|
|
NRTD
|
Near Real Time Data, replaced by IBS-N
|
|
S-TRED
|
Standard Tactical Receive Equipment Display, Low cost graphic display that parses intelligence and I&W
|
|
IBS – Integrated Broadcast Service, dissemination system of systems
|
1. Simplex – Formerly TRAP TDDS, distributes a broadcast of intelligence data2. Interactive – Formerly TIBS, can support multiple users LOS or SATCOM
3. Network – NRTI SIGINT data display |
|
INTELINK
|
Comes in all classification flavors…it is the internet for the IC
|
|
ANCHORY
|
Multi-database search and retrieval by keywords, MAUI
|
|
CARILLON
|
General processing computing facility, 4 HUGE computers
|
|
WRANGLER
|
Replaced MATCHLITE, SIGINT database
|
|
VINTAGE HARVEST
|
A www based analytic tool about signals for the IC
|
|
SEALINK
|
Global, persistent vessel tracking and awareness.
|
|
OILSTOCK
|
Unsupported mapping tool developed by NSA
|
|
ARCGIS
|
A powerful mapping tool that has many iterations and is used both in and out of the Government for various reasons.
|
|
GALE Lite
|
Generic Area Limitation Environment, analysis suite that allows NTR data fusion, SA, and operational planning
|