• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back
217.1 Define and discuss the function of SSES.
Where enlisted cryptologic personnel monitor COMINT. Exploited COMINT is passed along to pertinent users in the battle group for use in support of operations.
217.1 Define and discuss the function of EXPLOT.
Located inside JIC, EXPLOT coordinates with SSES and JIC to gather indications and warning (I&W) information and pass it quickly to the pertinent warfare commander(s).
217.1 Define and discuss the function of SUPPLOT.
The function of SUPPLOT is to gather indications and warning (I&W) information and pass it quickly to the pertinent warfare commander(s). It is not physically located within CVIC. SUPPLOT can be thought of as an afloat information correlation center. SUPPLOT provides tactical indications and warning, intelligence support to the ship, air wing, embarked CARGRU/CRUDESGRU staff, and to the composite warfare commanders. SUPPLOT serves as a focal point and fusion center for all-source operational intelligence information.
217.1 Define and discuss the function of JIC.
The Joint Intelligence Center provides and produces the intelligence required to support the joint force commander and staff, component, task forces and elements, and the intelligence community.
217.1 Define and discuss the function of CVIC.
CVIC is only one part of the total intelligence effort on board the carrier. It is considered to have two major functional groups; Mission Planning (MP) and
Multi Sensor Interpretation (MSI). Overall, the CVIC must be responsive to the air wing, ship, and embarked staff(s). This involves a great deal of coordination with other functional areas including Operations, Weapons, Strike Operations, EW, SSES,
and many other non-organic sources to be effective. The flow of information between CVIC and other intelligence work centers on the carrier is the key to success.
217.2 Explain the binary numbering system.
Is the base 2 numbering system, only two symbols, 0 and 1, are used.
217.2 Explain the decimal numbering system.
Base 10 numbering system.
217.2 Explain the octal numbering system.
Base 8 numbering system is a common system used with computers. Because of its relationship with the binary system, it is useful in programming some types of computers.
217.2 Explain the hexidecimal numbering system.
The hex number system is a more complex system in use with computers. The name is derived from the fact the system uses 16 symbols. It is beneficial in computer programming because of its relationship to the binary system.
217.3 Explain Signals Analysis.
Analysis of foreign signals to recover parameters and/or intelligence from said signals.
217.3 Explain Cryptanalysis.
Analysis of foreign ciphers to recover intelligence from the ciphered information.
217.3 Explain Traffic Analysis.
Analysis of foreign communications frequency usage and sent traffic to determine operational trends and recover network construction.
217.3 Explain Fusion Analysis.
Multi-source, multi-intelligence analysis to provide operational commanders and decision makers accurate Indications and Warning (I&W) information, tailored product reports, and to help refine further analysis in response to customer demands.
217.4 Discuss the RASIN Manual.
Radio SIgnals Notation (RASIN) Manual - A technical document used in the exploitation of signals of interest. Contains external and internal parameter information and standardizes the classification of signals.
217.4 Discuss the USSID.
United States Signals Intelligence Directives (USSID) - Directive documents for conducting and reporting on the performance of Signals Intelligence.
217.5 Describe LOS communication.
-NATURAL HORIZON is the line-of-sight horizon
-RADIO HORIZON is one-third farther than the natural horizon
-Line Of Sight (LOS) Communications require that the transmitter and receiver must be within the Radio Horizon of one another for effective communication.
217.6 Define the Doppler Effect.
The Change in frequency (phase shift) of a signal based on the movement of the transmitter as compared to the receiver.
217.7 Discuss how the D Layer of the Ionosphere affect collection operations.
The D layer ranges from about 30 to 55 miles. Ionization in the D layer is low because it is the lowest region of the ionosphere. This layer has the ability to refract signals of low frequencies. High frequencies pass right through it and are attenuated. After sunset, the D layer disappears because of the rapid recombination of ions.
217.7 Discuss how the E Layer of the Ionosphere affect collection operations.
The E layer limits are from about 55 to 90 miles. This layer is also known as the Kennelly-Heaviside layer, because these two men were the first to propose its existence. The rate of ionic recombination in this layer is rather rapid after sunset and the layer is almost gone by midnight. This layer has the ability to refract signals as high as 20 megahertz. For this reason, it is valuable for communications in ranges up to about 1500 miles.
217.7 Discuss how the F Layer of the Ionosphere affect collection operations.
The F layer exists from about 90 to 240 miles. During the daylight hours, the F layer separates into two layers, the F1 and F2 layers. The ionization level in these layers is quite high and varies widely during the day. At noon, this portion of the atmosphere is closest to the sun and the degree of ionization is maximum. Since the atmosphere is rarefied at these heights, recombination occurs slowly after sunset. Therefore, a fairly constant ionized layer is always present. The F layers are
responsible for high-frequency, long distance transmission.
217.8 Define Morse Code.
A telegraph code formerly used internationally for transmitting messages; it was superseded by satellite technology (the Global Marine Distress and Safety System) in 1999. Letters, numbers, etc., are represented by groups of shorter dots and longer
dashes, or by groups of the corresponding sounds, dits and dahs, the groups being separated by spaces Also called International Morse code. Named after Samuel Finley Breese Morse (1791-1872), US inventor of the first electric telegraph.
217.9 Define Sampling and how it relates to Signals Collection.
Based on Nyquist Theory, developed by Richard Nyquist, in which a signal which is analog (continuous time) in nature can be converted to a digital (discrete time) signal. (Known as ADC - Analog to Digital Conversion).
217.10 Explain Direction Finding and Geo-Location.
DF - Provides a LOB from a fixed point, Two Lobs provides a two bearing cross and three will give the operator a fix.
Geo location - Providing the rough location for a signal transmitter by calculating the Time Difference Of Arrival (TDOA) or the Frequency Difference Of Arrival (FDOA) at multiple receivers at different geographic locations to triangulate the emitter’s position.
217.11 Define Wireless Communication.
Wireless Communication consists of a number of technologies and services that provided services that were previously only able to be achieved through legacy landline infrastructure or wired equipment. Examples of these services and technologies include such things as: Cellular Telephony. WLAN (Wireless LAN), Bluetooth, HPCP (High Powered Cordless Phones), VSAT (Very Small Aperture Terminal), Trunk Radio, etc.
217.12 Discuss the Unix Operating System.
Unix is a multi-user, multi-tasking computer Operating System (OS). Unix originated as a research project at AT&T Bell Laboratories in 1969 for scientific and professional users who wanted a very powerful and flexible OS.
217.12 Discuss the Linux Operating System.
Linux is a Unix-like computer operating system based on POSIX standards, but containing no Unix code. It is one of the most prominent examples of open source development and free software, its underlying source code is available for anyone to use, modify and redistribute. 8 of the 10 most reliable internet hosting companies now run Linux on their web servers.
217.13 Define an Information Environment.
The aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information.
217.14 Discuss the physical dimension that makes up an Information Environment.
C2 systems and supporting infrastructures that enable individuals and organizations to conduct operations across air, land, sea, and space domains.
217.14 Discuss the informational dimension that makes up an Information Environment.
Where information is collected, processed, stored, disseminated, displayed, and protected. Consist of the content and flow of information.
217.14 Discuss the cognitive dimension that makes up an Information Environment.
Encompasses the mind of the decision maker and the target audience. The dimension in which people think, perceive, visualize, and decide.
217.15 Define Command and Control (C2).
Command and Control - The exercise of authority and direction by a properly
designated a commander over assigned and attached forces in the accomplishment of
the mission. Command and control functions are performed through an arrangement of personnel, equipment, communications, facilities, and procedures
employed by a commander in planning,directing, coordinating, and controlling forces and operations in the accomplishment of the mission.
217.16 Discuss how IO supports operations at all levels of war.
Information operations (IO) involve actions taken to affect adversary information and information systems while defending one’s own information and information systems. They apply across all phases of an operation, the range of military operations, and at every level of war.
217.16 Discuss how IO supports operations at the strategic level of war.
-War Detterence
-Affect Infrastructures
-Disrupt WMD R&D Programs
-Support Peace Operations
-Protect Global Command and Control Systems
217.16 Discuss how IO supports operations at the operational level of war.
-Expose Adversary Deception
-Isolate Enemy NCA and/or MIL
commanders from Forces
217.16 Discuss how IO supports operations at the tactical level of war.
-Disintegrate IADS - integrated air defense system
-Degrade and/or Destroy
-Tactical C2
-Support PSYOP Requirements
217.17 Discuss Offensive IO.
Offensive IO involve the integrated use of assigned and supporting capabilities and activities, mutually supported by intelligence, to affect adversary decision makers and achieve or promote specific objectives.
217.17 Discuss Defensive IO.
Defensive IO integrate and coordinate policies and
procedures, operations, personnel, and technology to
protect and defend information and information systems.
217.18 Define warfare planning.
When military action is one of the potential responses to a situation threatening U.S. interests, a plan is prepared using either the joint deliberate-planning process or crisis-action procedures.
217.18 Discuss deliberate-planning process.
The Adaptive Planning and Execution system process involving the development of joint operation plans for contingencies identified in joint strategic planning documents. A planning process for the deployment and employment of
apportioned forces and resources that occurs in response to a hypothetical situation.
217.18 Discuss crisis-action procedures.
The Adaptive Planning and Execution system process involving the time-sensitive development of joint operation plans and operation orders for the deployment, employment, and sustainment of assigned and allocated forces and resources in response to an imminent crisis. Also called CAP.
217.19 Discuss COG.
Center of Gravity (COG) - The source of power that provides moral or physical strength, freedom of action, or will to act.
217.19 Discuss DP.
Decisive Point (DP) - A geographic place, specific key event, critical factor, or function that,
when acted upon, allows commanders to gain a marked advantage over an adversary or
contribute materially to achieving success.
217.20 When does IO have it’s greatest impact?
Information Operations may have their greatest impact as a deterrent in peace and during the initial stages of crisis.
217.21 Define the six phases of the Joint targeting cycle.
1. End State and Commander's Objectives
2. Target Development and Prioritization
3. Capabilities Analysis
4. Commander's Decision and Force Assignment
5. Mission Planning and Force Execution
6. Assessment
217.23 Define HARDKILL.
Is making a target non-capable physically, typically through whole or partial destruction. An example would a 500 pound bomb strike from an FA-18E.
217.23 Define SOFTKILL.
Is making a target non-capable through mean that leave no physical damage. An example would be a Denial of Service attack versus a computer.
217.24 Discuss MOE.
Measures of Effectiveness (MOE) - are used to assess changes in system behavior, capability, or the operational environment. They are tied to measuring the attainment of an end state, achievement of an objective, or creation of an effect.
217.24 Discuss MOP.
Measures of Performance (MOP) - are criteria for measuring task performance or accomplishment. MOPs are generally quantitative, but also can apply qualitative attributes to task accomplishment.
217.25 State the position with overall authority of a NEO and how are they conducted?
The Department of State is responsible for the protection or evacuation of US citizens and nationals abroad and for safeguarding their overseas property abroad. NEOs usually involve swift insertion of a force, temporary occupation of an objective, and a planned withdrawal upon completion of the mission.
217.26 Discuss how PSYOPS supports a NEO.
PSYOP efforts can facilitate the passage of pertinent information to noncombatant evacuees. Means could be loudspeaker over-flights from aircraft, air dropped pamphlets, etc.