• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/140

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

140 Cards in this Set

  • Front
  • Back
A process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and activities
OPSEC
How is operational effectiveness enhanced?
When CCs and other senior decision makers apply OPSEC pronciples at the earliest stages of planning.
Name 5 steps in the OPSEC process
1 Identification of Critical Information
2 Threat Assessment
3 Vulnerablility Analysis
4 Risk Assessment
5 Apply OPSEC Measures
What is the goal of OPSEC?
Identify information and observable activities related to mission capabilities, limitations, and intentions in order to prevent exploitation by our adversaries
How does a survey differ from an inspection?
A survey attempts to produce an adversaries view of the operation or activity being surveyed.
An inspection seeks to determine if an organization is in compliance with the appropriate security directives and regulations.
Name 4 General sources of OPSEC indicators
1 Operational
2 Administrative
3 communications
4 Logistics and Maintenance

What are data and information aggregation?
Collection of loosely associated data and or information. Placeing simple units of data together can generate more information.
What are considered to be most problematic OPSEC vulnerabilities?
Telephones and Cell Phones
Who established the INFOSEC program?
Established by order of the president, assists in the protection of the United States by preventing the release of certain official information that would affect national defense
What is the goal of the INFOSEC program
Efficiently and effectively protect Air Force informtion by delgating authority to the lowest possible level; encouraging and advocating the use of risk management principles; focusing on identifying and protecting only that information that requires protection; integrating security procedures into our business processes so that they become transparent; and ensuring everyone understands their security roles and responsibilities.
What does the provacy act of 1974 protect?
individuals from unwarrented invasion of thier personal privacy
What AFI contains information on the PA?
1AFI 33-332 Air Force Provacy Act Program
Name the 4 parts of the PA statement
1 Authority
2 Purpose
3 Routine Uses
4 Disclosure
How are PA records disposed?
According to the records retention schedule in the file plan. The method of destruction depends on the composition of the material.
What are the categories of classified information?
Top Secret
Secret
Confidential
What document covers FOUO and FOIA?
5400.7-R DoD Freedom of Information Act
What authority does the DAA have?
impose restrictions upon, prhibit the use of, government owned removable information systems storage media for classified systems or networks.
When is someone allowed access to classified material?
Required for Mission
Appropriate Clearance Eligability according to AFI 31-501
Has a completed AF Form 312
calid Need-to-know
When must a Top Secret Control Account (TSCA) be established?
When units routinely originate, store, receive or disbatch Top Secret Material
When must INFOSEC insecurites be established and for whom?
Must be immediately reported to CC or equivilent, supervisor, or security manager who will in turn report the incident to the servicing Information Security Program Manager (ISPM) by the end of the first duty day.
What is the definition of COMSEC?
protection resulting from the proper execution of cryptography, EMSEC, physical security, and TRANSEC measure relating to COMSEC material.
How does TRANSEC relate to COMSEC?
component of COMSEC resulting in the application of measure taken to protect informations systems traffic from the interception and exploitation by means other than crypto-analysis
What is critical information?
information about friendly activities, intentions, capabilities, or limitations, that an adversary seeks in order to gain a military, political, diplomatic, economic, or technological advantage.
Explain the two-person integrity system
storage and handling system that prohibits access to COMSEC keying material to lone or unaccompanied individuals.
What is an AF Form 16 used for?
Account Daily Shift Inventory used to account for COMSEC material using both Defence Courier Service and the Air Force Electronic Key management System.
What should you look for before you open a COMSEC package?
Ensure tehre is no evidence of tampering or forced entry. If tampering suspected, do not open the package unless requested to do so by appropriate COMSEC authority or CRO
What is an AF Form 1109 used for?
document visitor access to restricted areas where classified is being processed.
What is a COMSEC deviation?
occurance involving failure to follow established COMSEC instructions, procedures, or standards.
What is a COMSEC incident?
an uninvestigated or unevaluated occurance that potentially jeapordizes the security of the COMSEC material or the secure transmission of government information

An investigated occurance determined NOT to jeapordize the security of the COMSEC material. Classified Confidential until guidance from higher agencies
What is a COMSEC insecurity?
an investigated or evaluated incident that has been determined to jeapordize the security of COMSEC material or the secure transmission of government information
Name the three incidents
Physical
Personnel
Cryptographic
How does a practice dangerous to security differ from a COMSEC incident?
Practive that could potentially jeapordize the security of COMSEC if allowed to continue. It is not an incident and is not assigned an AF COMSEC Incident case number (by AFCA)
What document is used to label unsecured phones?
DD Form 2056
When are COMSEC final reports due?
30 days after the inital reports are submitted
What equipment does an AF-GiG encompass?
Any AF provisioned system, equipment, software, mor service residing on the NIPRNet SIPRNet or Constallation Net
What is the GIG?
all encompassing communications project of the DoD. Globally interconnected, end-to-end set of information capabilities, associated processes, and personnel for collecting, processing, storing, disseminating, and managing information on demand for warfighters, policy makers, and support personnel.
What is the goal of NETOPS?
provide effictive, efficient, secure, and reliable information, network services used in critical DoD and AF communications and information processes.
What are the three NETOPS levels?
Global
Regional
Local
What is the GNOSC used for?
responsible for the worldwide management and operational oversight of the Defense Information Infrastructure
What are the Functional Awareness Cells (FACs) and what are their purposes?
regional level entities that exists at the same NETOPS management tier as the Base NCC. They report to and take direction from the Base and supporting NOSC. FACs require smaller amounts of equipment and performs situational awareness for a functional system or mission.
What does accredidation and certification constitute?
constitutes a set of procedures and judgements which lead to a determination of the suitability of an AIS to operate in a target operational environment
Who makes accredidation decisions and what types can be made?
DAA
full or interim
All physical measures taken to safegaurd COMSEC from access by unauthorized personnel
physical security
list the markings required for classified material
overall classification of the document
agency or office of origin
date of document
the office or source document that classified the document
What items can't be placed in a security container and what is the reason?
Funds, weapons, medical items, controlled drugs, precious metals, money, or other non-mission items susceptible to theft.
What is the purpose of the SF 700
list contact personnel when the security of the container is compromised
On what days are security packages usually shipped?
Monday-Thursday (so it will not be left unattended on weekend)
When should hand carrying classified material during a TDY assignment be allowed?
only as a last resort
How do you properly dispose of classified material?
Records during the destruction of classified material must be maintained. The AF accounts for TS material and disposes of such adminitrative records according to WebRims Disposition Schedule
What are the three secured facility deviations?
Temporary
Permanent
Technical
Explain what an AEF is composed of
Organizational structure comprised of AF capabilities that can provide the warfighting CC with rapid and responsive air and space power assets
How has the AEF concept changed the AF operations?
retooling the "stay at home" fixed base mentality to an expeditionary/deployable one. Developing a means to spread taskings across the force and provide predictablility and stablility
How are the total forces postured?
a rotational structure of 10 AEF force packages to ensure availablility of a fill range of air and space capabilities for combatant commander requirements
In a surge/crisis state, how does force predictability and stability relate to flexibility?
they take second place because the security environment is no longer predictable. People may be frozen in place.
Where would you research information on 365 deployments?
AEF Center websites (HTTPS://aefcenter/afpc/randolph.af.mil)
What is the main mission for QRPs?
to deploy ahead of sustaining communications packages, set up comm for deployed CCs, then turn over the comm networks to sustaining inbound units.
What is the primary mission for the AOC?
provide the JFACC with the tools necessary to fight and win a MTW within the scope of land, air, and sea forces.
What is a UTC?
basic building block used in joint force planning and deployments of AEFs.
Define UTC posturing
process of identifying and making available a unit's trained and ready UTCs
How would you best describe TDCs and its composition
state of the art ground-to-ground communications infrastructure designed to exchange secure and non-secure voice, data, and video comm via line of sight (LOS), satellie, or hard wired resources. TDC is composed of highly transportable COTS comm equipment, housed in transit cases, and is fully scaleable
What does the AF reporting tool enable?
enables CCs to report the ability of a standard UTC to perform its mission capability statement (MISCAP) anywhere in the world, and identify that capability through the AEF bucket.
Explain what MEFPAK is and the purpose it serves
AF system used for UTC package management. Purpose is to provide standard descriptions of the force packages to be used to support contingency planning at all levels
What is JOPES and what is it designed to facilitate?
DoD directed integrated joint C2 system for conventional operation planning and execution (to include theater level nuclear and chemical plans). JOPES was designed to facilitate rapiid building and timely maintenance of plans and rapid developement of effected options through adaptation of approved operation plans during a crisis.
Name three standard reference files
GEOFILE
TUCHA
TUDET
What does TUCHA file contain?
deployment data for all approved DOD UTCs, including the number of passengers and the cargo increments, weights, and demensions
Describe MANFOR
database containing UTC title, MISCAP, and manpower detail for each applicable UTC
How does LOGDET relate to LOGFOR?
LOGFOR is a subsystem of MEFPAK and COMPES which contains logistics detail for standard AF packages. LOGFOR is used to collect and store the material requirements. The LOGDET defines the standard equipment requirements for each.
Name two types of UTCs
Standard/Non-Standard
What document should you refer to for additional guidance on UTCs?
AFI 10-401 Air Force Operations Planning and Execution
Define Theater Deployable Communications (TDC)
state of the art ground-to-ground communications infrastructure designed to exchange secure and non-secure voice, data, and video communications via line of sight, satellite, or hard wired resources
What does the nature of the AEF concept require us to do reguarding TDC equipment?
reduce the size, increase the flexibility, and capacity of the deployable communications system
What characteristics should proposed TDC equipment have?
functionality, modularity/scaleability, open systems standards, interoperability, mobility, survivability, security, and operability
What asre three major components of TDC?
Ground satellite terminals, Integrated Communications, Access Package, and NCC-D
Describe the Integrated Communications Access Package
Integrated Communications Access Package (ICAP) is a suite of modules and accessory kits providing the communications backbone for deployed units. The ICAP is comprised of COTS circuit switches, hubs, and routers, multiplexers, and on base transmission (radio and laser) and encryption devices
What does the Network Control Center Deployed (NCC-D) provide and what is it comprised of?
provides network management, information protection, and network core services for deployed operations. NCC-D is comprised of COTS servers and sofware packaged in transit cases for deployed operations.
Why did the DOD need a common approach for architectural developement to improve the ise of warfighting assets?
Traditionally DOD agencies developed their own C4ISR archetectures using techniquis, vocabularies, and presentation schemes that suited their unique needs and purposes. This created excessive and redundant terminology thus complexing communications among military service branches.
What resulted when the DOD needed its own version of the internet for war-fighting purposes?
The DOD created its own version of the internet for warfighting purposes and created teh GIG which uses all DOD information technology infrastructure; and provides the timely and accurate information warfighters need to assure victory.
What is the AOC?
the senior agency of teh AF component commander that provides C2 of AF air and space operations anc coordinates with other components of miltary services.
How do joint missions usually begin?
Joint missions normally begin with the dropping of an Air Tasking Order (ATO) which is the lead planning document that commanders follow. ATOs provide specific instructions, call signs, targets, sorties, controlling agencies, etc. as well as general instructions.
Who provides the senior management function for the AOC communications support?
CFP
What type of support does 3C and 2E personnel provide the AOC?
C4I systems support to the AOC, which facilitates ATO production, dissemination, execution, and combat operation assessment.
What role does BCS-F serve?
AF Homeland Defense Battle Management, C2 hubs and integrators for data from radar sensors, data links, and supporting communications archetecture.
What will networks C4ISP capabilities of future combat systems (FCS) enable?
larger, more powerful, flexible, and more rapidly deployable modern force to fight in an extremely rapid, noncontiguous decentralized manner.
Who refines tactics, techniques, procedures, and measuring concepts for infusion into current and next generation operational systems?
Joint DOD agencies
What was the significance of the prototype that was delivered to the C2 Transformation Center at Langley AF Base in January 2004?
it was designed to integrate GPS with satellite overflight information enabling the AOC to conduct more cohesive planning between air and space command centers
What is the primary function of the Air Support Operations Squadron?
to coordinate and direct the tactical tactical air effort in the support of land forces and provide fast reaction to satisfy the immediate requests from the Army for close air support
What is the mission of the Air Support Operations Center?
provide fast reaction to immediate requests from land forces for close air support
How are specialized communications equipment configured in the ASOC?
Speciallized comm equipment are configured into mobile comm centers which provide tactical radio commuinications on: High Frequency (HF) single sideband (SSB) data and continuous wave; very high frequency/frequency modificaiton (VHF/FM); VHF/amplitude modulation (AM) and UHF
Who normally forwards "scramble and control" authority to ASOC for allocated sorties to facilitate authorized diversions of preplanned mission?
AOC
Describe Airborne Warning And Control System (AWACS)
E-3 Sentry provides all weather surveillance, C2, and comm to both US and NATO
What does AWACS and teh RC-135/W Rivet Joint reconnaissance aircraft support?
support thater and national level CCs in near real time with both on scene intellegence collection; and the analysis and dissemination capabilities
What is the E-8C Joint Surveillance Target Attack Radar System? (JSTARS)
airborne battle management, C2, intellegence surveilace and recon platform. Its primary mission is to provde theater ground and air CCs with ground surveilance to support attack operations and targeting to delay , disrupt, or destruct enemy forces.
How does the antenna tilt on the E-8C JSTARS aircraft?
tilts to either side of the aircraft to give a 120 degree field of view
What are UAVs and how are they used?
Remote or self-piloted aircraft that can carry cameras sensors, comm, or other payloads. Used in intell/recon.
What are tactical UAVs designed to do?
designed as a ground manuever CCs primary night/day recon, target aquisition, and battle damage assessment.
What do High Altitude endurance and Medium Altitude Endurance UAVs provide?
provide a significant, new capability by providing exploitable digital imagery to teh warfighter in near real time
What altitude can the RQ-4 Global Hawk reach?
65,000 ft
Name three components of the Preditor system
The UAV, ground control station (GCS) and the product data or dissemination data
What components are included in the HAE ground control station (GCS)?
Lanch and recovery element (LRE) mission control elemtn, associated comm, support segment spaces, maintenance and support elements.
How does the HAE GCS disseminate data?
through Trojan Spirit II, a sensative compartmented information SATCOM system that allows transmission and receipt of secure voice and National Imagery Transmission Format (NITF)
Define Electric Change
the space surrounding an electric charge
name two types of electric current and give two examples of items that produce them
DC (flashlight) and AC (car alternator)
How do electric and magnetic feilds relate?
A time varying electric field creates a magnetic field and visa versa
At approximatel what frequency will a magnetic field no longer completely collapse?
10,000 cps
How can the movement of radio waves be simplified
by comparing them to waves in a pond
How are wavelengths measured?
teh distance between two corresponding points on two consecutive sycles of a sine wave
Name three actions which can affect radio waves which travel through free space at the speed of light
defleced, refracted, or diffracted
Which wave transmission is very effective in the HF range (3-30 MHz)
Sky
What gives us the ability to communicate via radio waves beyond the optical line of sight?
Refraction
Give a rule of thunb to remember for radio wave propagation
as frequency increases from HF to VHF, propagation takes more of the characteristics of line of sight
Provide a few reasons why VHF/UHF communication is best for Air-to-ground purposes
they include the need for short range vs long range communications less power is required, and reception is clear because it doesn't travel through the ionisphere
What is reflection?
the 180 degree phase shift of a wave or reversal in direction
What is diffraction?
the downward bending of radiowaves as they graze the surface of the earth or the top of an obstruction in a propagation path
How does absorbsion affect radio signals?
it causes severe fading of a radio signal and results from a loss of energy (attenuation) in a signal due to the presense of moisture particles in the transmission path
What are the two primary concerning factors of radio wave propagation?
the type of wave and the transmission path
Which frequency wave can transmit signals the distance of 5000 miles or more and produce high power sounds that can penatrate ocean depths to several hundred ft?
ELF
Which frequency range uses the troposhperic scatter, satellite, air/ground, and LOS for it's main propagation paths?
UHF
Which frequency range uses satellite cross linking capability for global transmissions using EHF ranges for uplinks and SHF ranges for downlinks?
EHF
What is a visible spectrum or optical spectrum?
portion of the electromagnetic spectrum taht is visible to the naked eye
Which frequency range can span distances of 1000 to 5000 miles and is used for medium distance comm. particularly with submarines and surface ships?
LF
What security programs does OPSEC encompass?
All AF Security programs
Define COMPUSEC
applied discipline that results from measures and controls that protect data in a computer against unathorized disclosure, modification, or destruction.
What are the objectives of COMPUSEC?
protect and maintain confidentiality, integrity, availability, authentication, and nonrepudiation of information system resources and information processed throughout a systems life cycle
What are the three sources that threaten information systems
Natural
environmental
human
viruses
Name the COMSEC and IA vulnerabilities
Physical, environmental, personnel, hardware, software, media, network comm, procedural
How can you protect an unattended computer system?
Remove your CAC
What type of network is used to process unclassified information?
NIPRNet
What type of network is used to process classified information?
SIPRNet
What is spyware?
computer software designed to collect personal information about the users without their informed consent
Define EMSEC
protection resulting from all measures taken to deny unauthorized personnel information of value that might be derrived from comm sustems and cryptorraphic equipment intercepts and the interception and analysis of compromising emenationns from cryptographic equipment, informatino systems, and telecommunications systems
What is the objective of EMSEC?
to deny access to classified and in some cases unclassified information and contain compromising emenations within an inpectable space.
What are compromising emanations?
Unintentional signal that, if intercepted and analyzed, would disclose the information transferred, recieved, handled, or otherwise processed by an information-processing equipment
What does an EMSEC assessment determine?
A desktop analysis to determine if an EMSEC countermeasures review is required. There are separate EMSEC assessments for information systems, communications systems, and cryptographic equipment
What does an EMSEC countermeasure review provide?
a technical evaluation of a facility where classified information will be processed that identifies the EMSMEC vulnerabilities and threats, specifies the required inspectable space, determines the required EMSEC countermeasures, and ascertains the most cost-effective way to apply required countermeasures
What does the user identify before applying OPSEC countermeasures?
information systems that will process classified information; the volume, relative sensativity, and perishability of the information system; the physical control measures in effect around the area that will process classified information; and applies identified IA and EMSEC countermeasures
What do INFOCONS help us with?
take the proper protective measures to protect against threats
What measures are in place when there is an increased risk of attack in INFOCON 4?
Increased monitoring of all network activities is mandated, and all DOD end users must make sure their systems are secure. Internet usage may be restricted to Gov sites only, and backing up files to removable media is ideal
Describe ations taken in INFOCON 2
non-essential networks may be taken offline, and alternate methods of comm may be implemented.
What disciplines does IA integrate?
COMSEC, COMPUSEC, EMSEC
What actions must personnel take to meet the goals of the IA program?
understand the necessity and practice of safegaurding information processed, stored, or transmitted on information systems and the various concepts of IA countermeasures to protect systems and information from sabatage, tampering, denial of service, espionage, fraud, missappropriation, misuse, or access by unauthorized persons