• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/228

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

228 Cards in this Set

  • Front
  • Back
ORM
Decision Making tool used by personnel at all levels to identify, assess and manage risk.
Steps of ORM
Identify Hazards
Assess Hazards
Make Risk Decisions
Implement Controls
Supervise
Severity-
4 Categories
I- Loss of ability to accomplish the mission
IV- Little or no adverse impact on mission
Probability
4 Categories
A- Likely to Occure
B- Probably will occure in time
C- May occure in time
D- Unlikely to occur
RAC
Risk Assessment Code
Combines the severity with probability
Describe the mission of CID
The Mission: To deliver full spectrum Cyber Information Warfare, and Intelligence Training to achieve decision superiority
CID Organizational Structure
CID (Correy Station)
NMITC (Damneck)
FITC (San Diego)
CID UNITs- Correy Station/ Montery
CID Dets- Goodfellow AFB/ Fort Gordon

CID Learing Sites
Yokosuka, Hawaii, San Diego, Medina, Keesler AFB, Meade, Mayport, Jacksonville, Kings Bay, Norfolk, Groton,
CRC
Cryptologic Resource Coordinator
Manages Direct support (DIRSUP)
Coordinates Coverage Plans
CND
Computer Network Defense
actions taken to protect, monitor, analyze, detect, and respond to unaurtorized activity
CNA
Computer Network Attack
disrupt, deny, degrade, or destroy information in computers and computer networks
CNE
Computer Network Exploitation
enabling operations and intelligence collection capabilities
GIG
Global Information Grid
The globally interconnected, end-to-end set of information
Information Security
Protection of information and information systems against unauthorized access
Defense In Depth
DON-preferred security strategy where by layers of protection establish and adequate security posture for a system
Incident
An assessed event of attempted entry, attempted entry on an automated information system.
Tier One
Provides DOD-wide CND operational direction or support
Tier Two
Regional/ Theater
Provides DOD componet-wide direction or support
Tier Three
Local
Provides local operational direction or support
Three Services Provided by CND
1) Protect
2) Monitor, Analyze, Detect
3) Respond
Navy Computer Netowrk Defense Service Provider
Navy Cyber Defense Operations Command (NCDOC)
List the three firewall types
Packet Filtering- examins traffic based on the packet header

Stateful Packet- Filtering- similar to packet filtering but allows for rules to be more concise

Application Proxies- most sophisticated, contains both server and client process for each protocol
IDS
Intrusion Detection System
a device that attempts to detect intrusion into a computer or network by observation or audit
IPS
Intrusion Prevention System
detects attacks and trys to prevent them
RC-4
Rivest Cipher 4
streaming symmetric- key algorithm
RSA
Rivest Shamir Adleman
(usually seen on lanyards or key rings)
improved public-key cryptogragraphy that enables secure digital signatures
Blowfish
derivitive of Data Encryption Standard (DES) addresses susceptability to brute-force attacks
DES
Data Encryption Standard
a symetric key algorithm developed in the 1970's
EKMS
Electronic Key Managment System (manager)

Responsible for the proper managment of all COMSEC Held at the command

Written appointment by the CO (must have an alternate)
Account Cleark
individual who is designated by the CO to assist EKMS manager
EKMS CF
EKMS Central Facility
high volume key generation and distribution center
DON
Responsibility to COMSEC
Department of the Navy
adminisers its own CMCS, impliments national policy, publishes procedures, and establishes its own EKMS accoutns
CNO
Responsibility to COMSEC
Overall responsibility and authority for implementation of National COMSEC policy with in the DON
COMNAVNETWARCOM
Responsiblity to COMSEC
Commander, Naval Network Warfare Command (WARCOM)
Implements the DON COMSEC program
DCMS
Responsiblity to COMSEC
Director, Communications, Security Material System
Adminsters the DON COMSEC program and is the SERVAUTH for DON
Three types of COMSEC incidents
Cryptographic – Use of keying material that is compromised, superseded, defective, previously used and not meant for reuse.

Personnel – Known and suspected defection, known and suspected espionage

Physical – The physical loss of COMSEC material
TPI
Two-Person Integrity
Prevents single person access
Define Electronic Spillage
Electronic spillage is defined as data placed on an IT system possessing insufficient information security controls to protect the data at the required classification
What is a private IP address
a reserved certian IP address for use with internal websites or intranets (not routable to the public)
Three types of connection Media
Copper cabling – Uses electrical signals to transmit data between devices

Fiber-optic cabling – Uses glass or plastic wire, also called fiber, to carry information as light pulses

Wireless connection – Uses radio signals, infrared technology (laser) or satellite transmissions
DHCP
Dynamic Host Configuration Protocol (DHCP):
-a software utility that automatically assigns IP addresses to client devices in a network
DNS
Domain Name Service (DNS):
- a system that provides a way to map friendly hostnames or uniform resource locater (URL) to IP address
Active Directory
A more flexible, directory service-based approach to network design allows for large distributed network environments that have a common centralized authority for network security
Exchange Server
Microsoft Exchange server is the server side of a client-server, collaborative application with major features to include: electronic mail, calendaring, contacts, and tasks. Exchange server is integrated with Active Directory and uses Active Directory as the storage mechanism for its data.
OWA
Outlook Web Access (OWA):
-used to access email, calendars, contacts, tasks and other mailbox content when access to Microsoft Outlook desktop is unavailable.
CISCO
Commerical and Industrial Secruity company
CISCO Command Modes
User Mode- Allows basic commands, such as those that show the system's status

Privleged Mode- allows users to view the system configuration, restart the system, and enter configuration mode

Configuration mode- allows user to modify the running system configuration
Name the servers that reside on our server
What is their functionality?
Print Server
-allow multiple computers in the network to access a single printer through a Network Interface Card (NIC).

File Server
-is a server located on the network that provides a centralized storage area for shared disk access.

Web Server
-is a computer program that delivers (serves) content, such as Web pages, using the Hypertext Transfer Protocol (HTTP), over the World Wide Web.
Ports and uses
53 - Domain Name Service (DNS)– Address Translation

80 - Hypertext Transfer Protocol daemon (HTTP) – Web Browsing

110 - Post Office Protocol - used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection

443 – HTTP over Transport Layer Security/Secure Sockets Layer (HTTPS) Secure Web Browsing
Ping
is a computer network administration utility used to test the reach ability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. The name comes from active sonar terminology.
Traceroute
is a computer network tool for measuring the route path and transit times of packets across an Internet Protocol (IP) network.
TELNET
is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection.
Name the two types of nets
Direct Net: When operating requirements dictate that net stations obtain Net Control Station (NECOS) permission prior to transmitting, NECOS will control the net as a directed net.

Free Net: When operating conditions permit, the NECOS may direct that the net be operated as a free net
CTM
Cryptologic Technician (Maintenance)
Preform Preventitive and corrective maintenance on electrical or electronic cryptologic and acillary systems
CTM mission areas
Technicians provide technical and operational support to cryptologic systems in all operational theaters.
CTM afloat billets
CVN
LHD/LPD
CG
DDG
CTM Serving Subfleet work on what systems?
AN/USQ-149(V)2 CLUSTER SNOOP System (ELINT)

AN/ULR-21A(V)2 Integrated Submarine Communication Receiving System (ISCRS) (COMINT)
CTM C school teaches maintenance on what systems
AN/SSQ-137 Ships Signals Exploitation Equipment Maintenance (INC ‘E’) ***(taught at CIDU Corry Station, CIDLS San Diego/Norfolk)

AN/SSQ-124(V)X Tactical Exploitation System (TES) Maintenance
***(taught at CIDU Corry Station)

AN/SRS-1A (V) series Combat Direction Finding (CDF) System Maintenance
***(taught at CIDU Corry Station)

AN/USQ-149(V)2 CLUSTER SNOOP System Maintenance
***(taught at CIDU Corry Station)

AN/ULR-21A(V)2 Integrated Submarine Communication Receiving System (ISCRS) Maintenance ***(taught at CIDD FT Gordon, CID LS Hawaii)
CTM NEC's
9224 (Tactical Exploitation System Maintenance) - performs organizational level maintenance on the AN/SQQ-124 (V)

9225 (AN/SSQ-137 Ship’s Signal Exploitation Equipment- SSEE Maint. Tech)
9229 (Submarine Carry-On Equipment Technician) perform organizational level maintenance on submarine cryptologic carry-on
9289 (Combat Direction Finding System- SRS-1 Maint. Tech)
PM
Preventive Maintenance
PMS
Planned Maintenance System
Provide organizational level with tools to plan, schedule, and control planned maintenance effectively
Signals Analysis
is a cutting-edge technical discipline that seeks to recover, understand, and derive intelligence from foreign signals.
Cryptanalysis
is the analytic investigation of an information system with the goal of illuminating hidden aspects of that system. It encompasses any systematic analysis aimed at discovering features in, understanding aspects of, or recovering hidden parameters from an information system.
Traffic Analysis
branch of Cryptology which deals with the study of the external characteristics of signals communications and related materials for the purpose of obtaining information concerning the organization and operation of a communication system
Fusion Analysis
the process of examining all sources of intelligence and information to derive a complete assessment of activity
RASIN
RAdio SIgnals Notation Manual is used by the US SIGINT system (USSS) as a guide to the COMINT Signal Classification System
USSID
United States Signals Intelligence Directives
LOS
LINE OF SIGT-LOS communication is a signal that is simply transmitted directly from the transmitting antenna to the receiving antenna.
Doppler effect
Refraction due to motion. The apparant change in frequency or pitch ehwne a sound source moves either toward or away from a listener
Morse Code
Method of transmitting textual information as a serious of on-off tones/lights/clicks
Sampling
Electric switches used to sample an analog signal numerous times in one second, creating a series of pulses representing the instantaneous amplitude of the analog wave at various moments.
Direction Finding
Method of locating radio transmitters through the use of specially constructed receiving atennas and equipment
GeoLocation
Identification of the real-world geographic location of an object, such as a cell phone or internet connection
Information Environment
defined as the aggregate of individuals, organizations, and systems that collect process and disseminate or act on information.
Physical
Real world environments Land/Sea/Air/Space. Where individuals/organizations/info systems/ and physical networks reside
Informational
consistes of information and where the functions of information systems create information content and flow
Cognitive
Where information is used to form perceptions and attitudes and make decisions
C2
Command and control- Exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission
How does IO support the 3 levels of war
Strategic:
-influence or affect all elements (political, military, economic, or informational) of an adversary’s or
potential adversary’s national power while protecting similar friendly elements.

Operational:
-focus of IO at this level is on affecting adversary line of communication, logistics, command and control
and related capabilities and activities while protecting similar friendly capabilities and activities

Tactical:
-primary focus of IO at this level is affecting adversary information and information systems relating to
C2, intelligence and other information-based processes directly relating to the conduct of military operations while protecting similar friendly capabilities
Offensive IO
Involves the integrated use of assigned and supporting capabilities and activities, mutually supported by intelligence, to affect adversary decision makers and achieve or promote specific objectives.
Defensive IO
Defensive IO ensure timely, accurate, and relevant information access while denying adversaries the opportunity to exploit friendly information and information systems for their own purposes.
CAP
Crisis Action Planning
Time sensitive development of joint operation plans and operation orders for the deployment, employment and sustainment for assigned, attached, and allocated forces
Deliberated Planning
Plans that occur in non-crisis situation
COG
Centers of Gravity- Source of power that provides moral, physical strength, freadom of action or the will to act
Decisive Points
A Geographic place, Specific Key event, critical factor or function that when acted upon commanders gain a marked advantage
How does IO play in the Targeting Cycle
IO is an important discipline bringing new targeting options which should be integrated and de-conflicted with traditional targeting efforts.

IO are conducted across the range of military operations at every level of war to achieve mission objectives.

IO affects adversary decision makers, their information and information systems, and achieves or promotes specific objective
How does IO affect target developemnt
Successful integration of IO considerations into the targeting process is fundamental to the success of the campaign. IO may call for “targeting” adversary human decision processes (human factors), information, and information systems used to support decision making or adversary morale with a variety of lethal and nonlethal means
Hard Kill
Kinetic (physical attack/destruction by delivery of munitions/ordinance)
Soft Kill
Non Kinetic (temporary elimination, degradation, interuption of a node, link, system)
MEO
Measures of Effectiveness
Assesses changes in system behavior, capability, or the operational environment
MOP
Measures of Performance
Criteria for measring task performance or accomplishment
TACREP
Tactical Report- Principal reporting tool that supports tactical warning, targeting, indications and warning, and maneuvering.
TACELINT
Tactical Electronic Intelligence- Time-critical Operational ELINT (OPELINT) and parametric information that may be used for indications and warning, data base maintenance, order of battle information, and strike planning.
MAREP
Maritime Report-Primary formal U.S. Navy system for tasking and message reporting of maritime operational, intelligence, and management information.
MAREP RED
Command and Control purposes on contacts with enemy or special interest forces.
MAREP WHITE
-Movement or locations of friendly Naval and routine merchant shipping.
MAREP BLACK
A periodic summary of the activity of enemy or special interest forces.
ELINT
Electronic Intelligence (Notation ELNOT) -
A five position group of characters assigned to each non-communication emission for collection and reporting purposes
AEN
Arbitrary ELINT Notation (AEN):
-Assigned to designate otherwise not fully identifiable radar activity.
PEN
Parametrically Ordered ELINT Notation (PEN):
-Specific ELNOTs grouped into two radio frequency ranges.
CENOT
Communications Emitter Notation (CENOT):
-A five character designator used to identify a communications emitter.
AIS
Automatic Identification System VHF System used by vessels for identification of vessels at sea
MMSI
Mobile Maritiem Service Identifier
Unique 9 digit # assigned to a specific Vessel
List 4 items that an analyst can track using AIS
Next Port Of Call destination

Ships at anchor or underway

Speed of vessel

Ships current position and time
List 5 Collection Managment tools
Request For Information (RFI)
Informal
Formal

Product Verification Report (PVR)

Enhanced User Interface (EUI)

Consolidated Exercise Support Request (CESR)

COLISEUM
JTT
Joint Tactical Terminal
Provides the capability to disseminate time sensitive C4I and battlefield targeting information to tactical commanders-and intelligence nodes. The intelligence information that is provided to the analyst is received in near-real-time.
State the purpose of EW
Electronic Warfare -Military action involving the use of electro-magnetic energy to determine, exploit, reduce, or prevent hostile use of the electro-magnetic spectrum (EMS
EW Operator
EW's maintain the watch with the expertise to monitor the radar electromagnetic spectrum for indications and warning of threats to unit safety in a networked Electronic Support (ES) environment. Duties include collection, tactical analysis, reporting, and fusion of organic EW information with national data, as well as performing maintenance on EW systems
ES
Electronic Support
actions taken to search, detect, localize, and identify sources of radiated elctromagnetic energy for tactical purposes
EA
Electronic Attack
invloves the use of equipment, devices, and tactics to prevent or reduce the enemeies effective use of the EMS
EP
Eletronic Protect
Actions taken to ensure friendly effective use of the EMS, despite an ememies use of EA
EMS
Electro-Magnetic spectrum
ASMD
Anti-Ship Missile Defense
BDA
Battle Damage Assessment
CTTG
Counter Targeting used to deny, reduce, or confuse an adversaries targeting process
RCS
Radar Cross Section
a measure in square meters of a ships reflected Electro- Magnetic energy
MILDEC
Military Deception
deliberately mislead advisary military decision makers as to friendly capabilities
Own force monitoring
is the process of monitoring the electromagnetic emissions from one’s own unit
AN/SLQ-32
Surface Navy’s primary EW suite designed as an ASMD system for surface combatants. Secondary mission is to conduct limited ELINT collection
AN/ULQ-16
Provides the capability to perform detailed analysis of SLQ-32 collected emitter data
MK-36 Decoy Launching System
Provides passive decoy launch capabilities
MK-53 Decoy Launching System
Provides active/passive decoy launch capabilities.
AN/SLA-10B
Protects the SLQ-32 receivers from saturation by onboard radar signals.
AN/SSX-1
Enables precise measurement of selective emitter parameters and characteristics.
AN/USQ-151 JTT Joint Tactical Terminal
Provides improved interoperability and dissemination of critical intelligence and targeting information.
Types of Deceptive Counter Measures
Electronic: The deliberate radiation, re-radiation, alteration, suppression, denial, enhancement, or reflection of electromagnetic energy in a manner intended to convey misleading information to an enemy of enemy electromagnetic-dependent weapons.

Mechanical: The deliberate absorption and reflection of electromagnetic energy using mechanical decoys in a manner intended to convey misleading information to enemy radar operators
Mechanical
Mechanical:
There are four surface launched expendable ASMD decoys. These decoys are used in CTTG, Distraction and Seduction roles, and can be launched at the SLQ-32.

MK 216 (Distraction)
MK214 (Seduction)
MK245 Giant (Infrared IR)
MK234 Nulka (Combined Active/Passive/IR)
SATVUL
Satelite Vulnerability
designed to mitigate vulnerability of ships emissions to space based sensors
Set using EMCON
PCMS
Passive Countermeasures System
Reduces RCS through the application of RADAR absorbent material to the superstructure, RADAR absorbent blankets to areas that cannot be coated, modified EW expendable launchers and AN/SLQ-32(V) software, and modified RADAR antennas
Deceptive Jamming
Designed to inject false information into a victim RADAR to deny critical information on target azimuth, range, velocity, or a combination of these parameters.
EMCON
Emissions control
The selective and controlled use of electromagnetic, acoustic, or other emitters to optimize command and control capabilities while minimizing, for operations security
Electromagnetic Interference
Any electromagnetic disturbance that interrupts, obstructs, or otherwise degrades or limits the effective performance of electronics and electrical equipment
Four types of Electromagnetic interference
Functional - Originates from any source designed to generate electromagnetic energy and which may create interference as a normal part of its operation.

 Incidental - Originates from man-made sources. These are sources not designed specifically to generate electromagnetic energy but which do in fact cause interference. Examples of incidental EMI sources include power lines, motors, and switches.

Natural - Caused by natural phenomena, such as electrical storms, rain particles, and solar and interstellar radiation.

Hull-generated - Caused by the interaction of radiated signals with elements of the hull and rigging of a ship. (The functional signals themselves do not cause interference.)
OOB
Order of Battle The identification, strength, command structure, and disposition of the personnel, units, and equipment of any military force
What are the 5 OOB's
EOB – Electronic Order of Battle

NOB – Naval Order of Battle

AOB – Air Order of Battle

GOB – Ground Order of Battle
USSOCOM
United States Special Operations Command
Provide fully capable SOF to defend the US and its interestes
HVT
High Value Target- a Target the enemy commander requries for successful completion of the mission

(Financer/ Leader)
HPT
High Payoff Target a target whose loss to the enemy will significantly contribute to the success of the friendly course of action

(Bomb Maker/ Courrier)
NSWG-1
Naval Special Warfare Group ONE
Coronado
SEAL Teams- 1,3,5,7
ADCON for NSWU-1/3 Guam/Bahrain
NSWG-2
Little Creek, Virginia
OPCON/ADCON SEAL Team 2,4,8,10
ADCON NSWU-2
NSWG-3
Cornado California
SDVT-1, SDVT-2
NSWG-4
Little Creek
Special Boat teams 12,20,22
NSWG-10
Fort Story Virginia
Support Activity 1/2
NSWGDG
Naval Special Warfare Development Group
Dam Neck, Virginia
Direct Action
Short duration strikes and other small-scale offensive operations principally undertaken by SOF to seize, destroy, capture, recover, or inflict damage on designated personnel or material


(Raid, Ambush, Direct Assults)
SR
Special Reconnaissance- SOF conducting a wide variety of information gathering activities of strategic or operational significance.
FID
Foreign Internal Defense- SOF's Primary contribution in this interagency activity to organize, train, advise, and assist host nation military
UW
Unconventional Warfare
Broad spectrum of military paramilitary operations, normally of long durration
(Guerrilla Warfare/ Low-vis)
Counter Proliferation
WMD
Actions takent to seize and destroy, render safe, capture or recover WMD
PSYOPS (MISO)
Psycological Operations (MISO Military Informationto Support Operations) Planned operations to convey selected information and indicatiors to foreign audences to influence emotions, motives, objective reasonings
IO for Expeditionary Warfare
Involves actions taken to affect adversary information and information systems while defending one’s own information and information systems.
Types of Amphibious Operations
Amphibous Assult
Establishment of a Landing Force on a hostile.potentially hostile shore

Raid
Temporary occupation with a planned with draw (swift in and out)

Demonstration
Show of Force conducted to deceive the expectation of deluding the enemy into a course of action (inviasion of IZ was put on the media)

Withdrawl extraction of forces by sea in ships or craft from a potential hostile shore (NEO)
NGA
Lead Agency in charge of Geospatial Analysis and products at NATIONAL level
NRO
Lead Agency charged to design, build, and operation of National Reconnaissance satellites
National System for Geospatial Intelligence-Direct Action
Governing body over Geospatial programs
IPL
Image Product Library
Storage of raw Imagery
WARP
Web-based Acces Retrieval Portal
ARC-GIS
ARC-Geospatial Information System
SOCET GXP
Soft Copy Exploitation Tool -- Geospatial Expolotation Information System
(DCGS-N system)
OPINTEL
Operational Intelligence
the result of analyzing and combining multi-source intelligence information into a product used by Commanders to identify adversary critical vulnerabilities, Centers of Gravity (COGs), and critical nodes in-order to effectively employ assets.

Intel Bread and Butter!!
Steps of Intel Cycle
PCPAD
Planning and Direction
Collection
Processing and Exploitation
Analysis and Production
Dissemination
Role of GCCS in OPINTEL
Common Operational and Tactical Picture
Red Database management
Threat area plotting
IIR
Intelligence Information Reports
The purpose of Intelligence Information Reports is to convey raw, unbiased, objective data.
6 Phases of Joint Targeting Cycle
1 Commanders Objective
2 Target Development
3 Capabilities Analysis
4 Commanders Decision
5 Mission Planning
6 Combat Assessment
No-Strike List
Objects protected from military action (schools, churches, grave yards)
Restricted Target List
Require approval from a joint force commander
Joint Integrated Prioritized Target List
Selected targets where there are no restrictions and are approved for military action
Collateral Damage Methodology
Unintentional or incidental injury or damage to persons or objects that would not be lawful military targets in the circumstances ruling at the time.

(Target a car that is close to a school)
Geo-positioning
- Methods that facilitate the location of one point relative to the surface of the earth.
CRM
Collections Requirements Management

Focuses on the requirements of the customer, is all-source oriented and advocates what information must be collected
COM
Collections Operations Managment

focuses on tasking specific systems within a discipline, or across multiple disciplines to collect information addressing the customer’s requirement
PIR
Priority Intelligence Requirements
are critical items of information or intelligence related to the enemy or battle space that is required in a timely manner to support a decision
RFI
Request for Information
is a request by a consumer for information or products that is not necessarily related to standing requirements or scheduled intelligence production
What is the most important part of intel collections
Feedback is key and critical in ensuring that the customer’s needs are being met. Without it the collection manager does not know what is still priority, whether or not needs have been met, and whether or not tweaks and adjustments are necessary to the overall collections strategy
Collection Capabilities of current systems
F/A-18 SUPER HORNET with SHARP
EO/FMV
MQ-1B Predator
EO/FMV/SI
MQ-8B Fire Scout
EO/FMV
RQ-4 BAMS
EO/FMV
SCAN EAGLE
EO/FMV
Terrorism
The unlawful use of violence or threat of violence to instill fear and coerce governments or societies. Terrorism is often motivated/committed based on religious, political, or ideological beliefs.
Counter Intelligence
Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, sabotage, or assassinations. CI is conducted for or on behalf of foreign powers, organizations, persons, their agents, international terrorist organizations, or activities.
State Sponsored Terrorism
Terrorist group that receives substantial support (money, training and weapons) from a state but the actions of the group are autonomous.
State Directed Terrorism
Terrorists who operate as an agent of a host government and receive substantial intelligence, logistics and operational support from the sponsoring government.
Insurgency
The organized use of subversion and violence by a group or movement that seeks to overthrow, or force change of, a governing authority.
Direct Questioning
Ask questions directly related to information
Make no efforts to conceal purpose
Use questions to rapidly debrief individuals
Establish a baseline to detect deception
Questioning by designated personnel
DOD Terrorism Threat Levels
1. High - Exceptional terrorist threat of mass casualty attack against substantial DoD presence.

2. Significant - Direct terrorist threat to individuals or small groups of DoD personnel.

3. Moderate - Potential collateral threat to DoD personal from indiscriminate terrorist activity.

4. Loss - No credible indications detected of terrorist threat to DoD personnel.
HUMINT
Human Intelligence
A category of intelligence derived from information collected and provided by human sources
MSO
Military Source Operations
The collection, by humans, of foreign military related intelligence
Interrogation
The systematic effort to procure information to answer specific collection requirements. Achieved by direct and indirect questioning techniques of a person in custody.
Tactical Questioning/Debriefing
Direct questioning by any Department of Defense personnel of a captured or detained person. Conducted in order to obtain time-sensitive, tactical intelligence information. Occurs at or near the point of capture or detention and is consistent with applicable law.
FORMICA
Foreign Military Intelligence Collection Activities
POW
Prisoner of War
A detained person (as defined in Articles 4 and 5 of the Geneva Convention Relative to the Treatment of Prisoners of War of August 12, 1949) who, while engaged in combat under orders of his or her government, is captured by the armed forces of the enemy
Detainee
A term used to refer to any person captured or otherwise detained by an armed force.
Double Agent
- Agent in contact with two opposing intelligence services, only one of which is aware of the double contact or quasi-intelligence services.
Espionage
The act of obtaining, delivering, transmitting, communicating, or receiving information about the national defense of a country. The information is obtained with the intent, or reason to believe, that the information may either be used to injure of the United States, or be advantageous to a foreign nation
4 Steps of Counter Intelligence Process
1. Prepare CI estimate - known factors on location, disposition, composition, strength, activities, capabilities, weaknesses, and other pertinent information.

2. Conduct CI Survey - assesses a unit’s security posture against the threats detailed in the CI estimate.

3. Develop CI Plan - details the activities and operations that the command uses to counter hostile intelligence, sabotage, subversion, and terrorist threats.

4. Implement CI Measures - both active and passive encompass a range of activities designed to protect against hostile intelligence, espionage, sabotage, subversion, and terrorism threats.
DLPT
Defense Language Proficiency Test
Arabic
L1+/R2 or L2/R1+
Cjomese (Mandarin)
L1+/R2 or L2/R1+
Persian (farsi)
L1+/R2 or L2/R1+
Hebrew
L2/R2
Korean
L2/R2
Russian
L2/R2
Spanish
L2/R2
Levels of Language Proficiency
a. 0+ Memorized proficiency – comprehends memorized utterances
b. 1 Elementary proficiency – minimum survival needs, courtesies, travel; simple Q&A. Slow speech understood, repetition needed.
c. 1+ Elementary proficiency, plus – comprehends simple conversations about survival or social situations; beyond immediate survival needs. Faster speech may be understood
d. 2 Limited working proficiency – comprehends limited conversations on routine social demands and limited job reqs
e. 2+ Limited working proficiency, plus – understands most routine social demands and most work reqs and discussions on concrete topics; understands some implications
f. 3 General professional proficiency (goal in DoD) – able to understand essentials of all speech; understands opinions; rarely asks for paraphrasing or explanations; can follow news/phone calls; cannot understand slang or dialect
g. 3+ General professional proficiency, plus - Comprehends most content of various forms and styles of speech pertinent to professional needs, & general topics and social conversation. comprehends many cultural references; Increased ability to understand native speakers talking quickly, using nonstandard dialect or slang
h. 4 Advanced professional proficiency - Understands all forms and styles of speech for professional needs. Understands fully all speech with extensive and precise vocabulary in all standard dialects on any subject relevant to professional needs within his/her experience, including social conversations; all intelligible broadcasts and telephone calls; and many kinds of technical discussions and discourse.
i. 4+ Advanced professional proficiency, plus – Understands extremely difficult and abstract speech & understands all forms and styles of speech pertinent to professional needs & social conversations. Comprehends native speakers using extreme nonstandard dialects and slang, as well as to understand speech in unfavorable conditions. Accuracy is close to that of the well-educated native listener but still not equivalent

j. 5 Functionally native proficiency - Comprehension equivalent to that of the well-educated native listener
CLREC
Center for Language, Regional Expertise and Culture
Learning Sites that teach Languages
a. CID LS Ft Meade - Russian
b. CID LS Ft Gordon - Arabic/Persian-Farsi/Hebrew
c. CID LS Kunia – Chinese/Korean
d. CID LS Medina – Spanish
CLPM
Command Language Program Manager
CIT NEC
a. 9ARB - Modern Standard Arabic (MSA)
b. 9CMN – Chinese Mandarin
c. 9HEB - Hebrew
d. 9KOR - Korean
e. 9PES – Persian-Farsi (Iranian)
f. 9SPA - Spanish
g. 9RUS - Russian
How does METOC support Information Dominance
The Naval Meteorology and Oceanography Command provides Meteorology and Oceanography (METOC), Bathymetry and Hydrography (Bathy/Hydro), Precise Time and Astrometry (PTA), products and services that enable effective decision-making for operational safety, warfighting success by Naval and Joint forces, and security cooperation.
NMOC mission
Navy Meterology and Oceanography Command
The Naval Meteorology and Oceanography Command provides Meteorology and Oceanography (METOC), Bathymetry and Hydrography (Bathy/Hydro), Precise Time and Astrometry (PTA), products and services that enable effective decision-making for operational safety, warfighting success by Naval and Joint forces, and security cooperation.
Decision Layers
3 (Decision) COA, Asset Allocation, Quantified Risk
2 (Performance) How the predicted environment affects the fleet
1 (Environment) The predicted environment
0 (Data) Observations, Measurments (systems)

Build from 0-3
OTSR
Optimum Track Ship Routing
A weather advisory service for safety and damange avoidance, spanning long-range planning to enrout serveillance

(like Katrina, when we were advised to pull out our ship)
OTSR Divert recommendation
issued when conditions are forcast to exceed wind or sea limits (determined by supported unit)
Special Weather Advisory
Issued for prolonged periods of Heavy weather in High Traffic areas 72 hours in advance
WEAX
Enrout Weather Forcast tailored to units points of inteneded movemnt
OPAREA Forcast
Once a day for major operating areas (fleet areas)
Thunderstorm Watch
with in 25 NM or expected with in 6 hours
Thunderstorm Warning
With in 10 NM or expected in 1 hour
Sever Thunderstorm watch
greater tha n 50kts, hail with a diameter greater than 3/4" and/or tornadoes

25NM or with in 6 hours
Sever Thunderstorm Warning
Gusts of wind greater than 50kts, hail greater than 3/4" and/or tornadoes

Within 10 NM, or expected within 1 hour
Small Craft Warning
sustained wind of 18-33 KTS
Gail Warning
34-47 KTS
Freezing precipitation advisory
up to 1/4"
Condition V
Destructive winds possible within 96 hours
Condition IV
Possible threat of destructive winds with in 72 Hours
Condition III
Destructive winds possibly with in 48 hours
Condition II
Destructive winds anticipated within 24 Hours
Condition 1
Destructive winds anticipated with in 12 hours
Tsunami Warning
Issued when a tsunami with significant widespread inudation is imminent or expected
Tsunami Advisory
When threat of a potential tsunami exists
Tsunami watch
May be upgraded to warning or advisory or even cancled
Tsunami Information Statement
inform emergency managment and public that an earthquake has occured and or a tsunami warning,watch,advisory has been issued