Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
144 Cards in this Set
- Front
- Back
Signals Analysis |
is a cutting-edge technical discipline that seeks to recover, understand, and derive intelligence from foreign signals |
|
Cryptanalysis |
is the analytic investigation of an information system with the goal of illuminating hidden aspects of that system. It encompasses any systematic analysis aimed at discovering features in, understanding aspects of, or recovering hidden parameters from an information system |
|
Traffic Analysis |
branch of Cryptology which deals with the study of the external characteristics of signals communications and related materials for the purpose of obtaining information concerning the organization and operation of a communication system |
|
Fusion Analysis |
the process of examining all sources of intelligence and information to derive a complete assessment of activity |
|
RASIN manual |
the RAdio SIgnals Notation manual is used by the United States SIGINT System (USSS) as a guide to the Communications Intelligence (COMINT) signal classification system |
|
USSID |
United States Signals Intelligence Directives, designed to contain the planning, doctrinal, tasking, and control material governing U.S. Signals Intelligence (SIGINT) operations throughout the world |
|
Describe Line of Sight (LOS) communication |
-LOS communication is a signal that is simply transmitted directly from the transmitting antenna to the receiving antenna.
-Also, known as direct wave communications that follows the curvature of the earth limiting LOS to approximately 25 to 40 miles. |
|
Define the Doppler Effect |
DOPPLER EFFECT is refraction due to motion. The apparent change in frequency or pitch when a sound source moves either toward or away from a listener.
|
|
Define and discuss Morse Code |
Morse Code is a method of transmitting textual information as a series of on-off tones, lights, or clicks that can be directly understood by a skilled listener or observer without special equipment |
|
Define sampling and how it relates to signals collection. |
-Electric switches used to sample an analog signal numerous times in one second, creating a series of pulses representing the instantaneous amplitude of the analog wave at various moments.
Sampling is a step in the Analog to Digital Conversion process. By using sampling the collector cuts down the amount of data recorded without losing any of the actual information in the signal. |
|
Direction Finding |
is the method of locating radio transmitters through the use of specially constructed receiving antennas and equipment |
|
GeoLocation |
the identification of the real-world geographic location of an object, such as a cell phone or an Internet-connected computer terminal. Geolocation may refer to the practice of assessing the location, or to the actual assessed location. |
|
Define an Information Environment |
the aggregate of individuals, organizations, and systems that collect process and disseminate or act on information |
|
Discuss the Physical dimension that make up an Information Environment |
The real world environments of land, sea, air, and space. It is where individuals, organizations, information systems, and the physical networks that support them reside. |
|
Discuss the Informational dimension that make up an Information Environment |
Consists of information and is where the functions of information systems (i.e., information collection, processing, and dissemination) create information content and flow |
|
Discuss the Cognitive dimension that make up an Information Environment |
Where information is used to form perceptions and attitudes and make decisions |
|
Define Command and Control (C2) |
the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission |
|
Discuss how Information Operations (IO) supports operations at the Strategic level of war |
influence or affect all elements (political, military, economic, or informational) of an adversary’s or potential adversary’s national power while protecting similar friendly elements. |
|
Discuss how Information Operations (IO) supports operations at the Operational level of war |
focus of IO at this level is on affecting adversary line of communication, logistics, command and control and related capabilities and activities while protecting similar friendly capabilities and activities |
|
Discuss how Information Operations (IO) supports operations at the Tactical level of war |
primary focus of IO at this level is affecting adversary information and information systems relating to C2, intelligence and other information-based processes directly relating to the conduct of military operations while protecting similar friendly capabilities |
|
Offensive IO |
Involves the integrated use of assigned and supporting capabilities and activities, mutually supported by intelligence, to affect adversary decision makers and achieve or promote specific objectives |
|
Defensive IO |
ensure timely, accurate, and relevant information access while denying adversaries the opportunity to exploit friendly information and information systems for their own purposes |
|
Crisis Action Planning (CAP) |
- provides the CJCS and CCDRs a process for getting vital decision-making information up the chain of command to the President and SecDef. - process involving the time-sensitive development of joint operation plans and operation orders for the deployment, employment, and sustainment of assigned, attached, and allocated forces and capabilities in response to a situation that may result in actual military operations (crisis). |
|
Deliberate Planning |
-encompasses the preparation of plans that occur in non-crisis situations -used to develop campaign and contingency plans for a broad range of activities based on requirements identified in Guidance for Employment of the Force, Joint Strategic Capabilities Plan or other planning directives. |
|
Centers of Gravity (COG) |
The source of power that provides moral or physical strength, freedom of action, or will to act.
That characteristic, capability, or location from which enemy and friendly forces derive their freedom of action, physical strength, or will to fight. |
|
Discuss how IO plays a role in the targeting cycle |
IO affects adversary decision makers, their information and information systems, and achieves or promotes specific objective |
|
Describe how IO affects target development |
Successful integration of IO considerations into the targeting process is fundamental to the success of the campaign. IO may call for “targeting” adversary human decision processes (human factors), information, and information systems used to support decision making or adversary morale with a variety of lethal and nonlethal means. |
|
Hardkill (kinetic) |
- Physical attack/destruction by delivery of munitions/ordinance to destroy or degrade a target. - The use of “hard kill” weapons against designated targets is an element of an integrated IO effort. |
|
Softkill (non-kinetic) |
- The temporary elimination, degradation, or interruption of a node, link, or system. |
|
Measures of Effectiveness (MOE) |
assess changes in system behavior, capability, or the operational environment |
|
Measures of Performance (MOP) |
criteria for measuring task performance or accomplishment |
|
Tactical Report (TACREP): |
Principal reporting tool that supports tactical warning, targeting, indications and warning, and maneuvering. |
|
Tactical Electronic Intelligence (TACELINT) Report |
Time-critical Operational ELINT (OPELINT) and parametric information that may be used for indications and warning, data base maintenance, order of battle information, and strike planning. |
|
Maritime Report (MAREP) |
Primary formal U.S. Navy system for tasking and message reporting of maritime operational, intelligence, and management information. |
|
MAREP RED |
Command and Control purposes on contacts with enemy or special interest forces. |
|
MAREP WHITE |
Movement or locations of friendly Naval and routine merchant shipping. |
|
MAREP BLACK |
A periodic summary of the activity of enemy or special interest forces. |
|
Electronic Intelligence (ELINT) Notation (ELNOT) |
A five position group of characters assigned to each non-communication emission for collection and reporting purposes. |
|
Arbitrary ELINT Notation (AEN) |
Assigned to designate otherwise not fully identifiable radar activity. |
|
Parametrically Ordered ELINT Notation (PEN) |
Specific ELNOTs grouped into two radio frequency ranges. |
|
Communications Emitter Notation (CENOT) |
A five character designator used to identify a communications emitter. |
|
Automatic Identification System (AIS) |
An information and communications VHF system |
|
Mobile Maritime Service Identifier (MMSI) |
unique 9 digit # assigned to a specific vessel |
|
List four items that assist the analyst in tracking a contact using AIS |
- Next Port Of Call destination - Ships at anchor or underway - Speed of vessel - Ships current position and time |
|
List the five Collection Management tools |
- Request For Information (RFI) - Product Verification Report (PVR) - Enhanced User Interface (EUI) - Consolidated Exercise Support Request (CESR) COLISEUM |
|
Explain what the Joint Tactical Terminal (JTT) provides to the OPELINT watch. |
JTT is a near-real time UHF tactical intelligence terminal that provides the capability to disseminate time sensitive C4I and battlefield targeting information to tactical commanders-and intelligence nodes. |
|
State the purpose of Electronic Warfare |
Military action involving the use of electro-magnetic energy to determine, exploit, reduce, or prevent hostile use of the electro-magnetic spectrum (EMS). |
|
Describe the mission and function of the CTT Electronic Warfare Operator |
Maintain the watch with the expertise to monitor the radar electromagnetic spectrum for indications and warning of threats to unit safety in a networked Electronic Support (ES) environment. |
|
Electronic Support (ES) |
The actions taken to search for, detect, localize, and identify sources of radiated electromagnetic energy for tactical purposes. |
|
Electronic Attack (EA) |
Involves the use of equipment, devices, and tactics to prevent or reduce the enemies effective use of the EMS. |
|
Electronic Protect (EP) |
Actions taken to ensure friendly effective use of the EMS, despite an enemies use of EA |
|
ASMD- Anti-Ship Missile Defense |
Encompasses all aspects of defending a ship against missile attack. |
|
BDA-Battle Damage Assessment |
The estimate of damage resulting from the application of lethal or nonlethal military force. Battle damage assessment is composed of physical damage assessment, functional damage assessment, and target system assessment. |
|
CTTG-Counter Targeting |
Employed during Pre-hostilities consistent with ROE to deny, reduce, or confuse and adversaries targeting process RCS-Radar Cross Section. |
|
RCS-Radar Cross Section |
A measure in Square Meters of a ships reflected Electro-magnetic energy |
|
MILDEC- Military Deception |
Deliberately mislead advisory military decision makers as to friendly military capabilities, intentions and operations, thereby causing the advisory to take specific action or inactions which will contribute to the accomplishment of the friendly mission. |
|
AN/SLQ-32 (V) |
Surface Navy’s primary EW suite designed as an ASMD system for surface combatants. Secondary mission is to conduct limited ELINT collection |
|
AN/ULQ-16 |
Provides the capability to perform detailed analysis of SLQ-32 collected emitter data. |
|
MK-36 Decoy Launching System |
Provides passive decoy launch capabilities. |
|
MK-53 Decoy Launching System |
Provides active/passive decoy launch capabilities. |
|
AN/SLA-10B |
Protects the SLQ-32 receivers from saturation by onboard radar signals. |
|
AN/SSX-1 |
Enables precise measurement of selective emitter parameters and characteristics. |
|
AN/USQ-151 JTT Joint Tactical Terminal |
Provides improved interoperability and dissemination of critical intelligence and targeting information. |
|
Electronic Coutermeasure |
The deliberate radiation, re-radiation, alteration, suppression, denial, enhancement, or reflection of electromagnetic energy in a manner intended to convey misleading information to an enemy of enemy electromagnetic-dependent weapons. |
|
Mechanical Countermeasure |
The deliberate absorption and reflection of electromagnetic energy using mechanical decoys in a manner intended to convey misleading information to enemy radar operators.
MK216 (Distraction) |
|
SATVUL- Satellite Vulnerability |
Designed to mitigate vulnerability of ships emissions to space based sensors. SATVUL is set using EMCON procedures. |
|
PCMS Passive Countermeasures System |
Reduces RCS through the application of RADAR absorbent material to the superstructure, RADAR absorbent blankets to areas that cannot be coated, modified EW expendable launchers and AN/SLQ-32(V) software, and modified RADAR antennas. |
|
Deceptive Jamming |
Designed to inject false information into a victim RADAR to deny critical information on target azimuth, range, velocity, or a combination of these parameters. |
|
EMCON - Emission Control |
The selective and controlled use of electromagnetic, acoustic, or other emitters to optimize command and control capabilities while minimizing, for operations security: a. detection by enemy sensors; b. mutual interference among friendly systems; and/or c. enemy interference with the ability to execute a military deception plan. |
|
Electromagnetic interference |
Any electromagnetic disturbance that interrupts, obstructs, or otherwise degrades or limits the effective performance of electronics and electrical equipment. It can be induced intentionally, as in some forms of electronic warfare, or unintentionally, as a result of spurious emissions and responses, intermodulation products, and the like. |
|
Functional Interference |
Originates from any source designed to generate electromagnetic energy and which may create interference as a normal part of its operation. |
|
Incidental Interference |
Originates from man-made sources. These are sources not designed specifically to generate electromagnetic energy but which do in fact cause interference. Examples of incidental EMI sources include power lines, motors, and switches. |
|
Natural Interference |
Caused by natural phenomena, such as electrical storms, rain particles, and solar and interstellar radiation. |
|
Hull-generated Interference |
Caused by the interaction of radiated signals with elements of the hull and rigging of a ship. |
|
Order of Battle |
The identification, strength, command structure, and disposition of the personnel, units, and equipment of any military force. |
|
Electronic Warfare Operators utilize the following Orders of Battle |
EOB – Electronic Order of Battle NOB – Naval Order of Battle AOB – Air Order of Battle GOB – Ground Order of Battle |
|
State the two rates and the year they merged to create the IS rate. |
1975
|
|
Mission of United States Special Operations Command (USSOCOM) |
- Provide fully capable Special Operations Forces to defend the United States and its interests |
|
High Value Target vs. High Payoff Target |
HVT – a target the enemy commander requires for successful completion of the mission.
HPT – a target whose loss to the enemy will significantly contribute to the success of the friendly course of action |
|
Naval Special Warfare Group ONE (NSWG-1) |
Coronado, California
Pacific and Central Commands areas of responsibility |
|
Naval Special Warfare Group TWO (NSWG-2) |
Little Creek, Virginia
European and Southern Command areas of responsibility |
|
Naval Special Warfare Group THREE (NSWG-3) |
Coronado, California
Worldwide NSW undersea mobility responsibility |
|
Naval Special Warfare Group FOUR (NSWG-4) |
Little Creek, Virginia
Worldwide NSW surface mobility responsibility |
|
Naval Special Warfare Group TEN (NSWG-10) |
Worldwide NSW technological capability responsibility |
|
Naval Special Warfare Development Group (NSWDG) |
Dam Neck, Virginia
Provides training, equipment and augmentation for Naval Special Warfare combat operations as required |
|
Direct Action (DA) |
Short duration strikes and other small-scale offensive operations principally undertaken by SOF to seize, destroy, capture, recover, or inflict damage on designated personnel or material. |
|
Special Reconnaissance (SR) |
Obtain or verify, by visual observation or other collection methods, information concerning the capabilities, intentions, and activities of an actual or potential enemy |
|
Foreign Internal Defense (FID) |
SOF’s primary contribution in this interagency activity is to organize, train, advise, and assist host nation (HN) military and paramilitary forces. |
|
Unconventional Warfare (UW) |
Guerrilla warfare and other direct offensive, low-visibility, clandestine, or covert operations
|
|
Counter Proliferation (CP) of Weapons of Mass Destruction (WMD) |
The actions taken to seize, destroy, render safe, capture, or recover WMD. |
|
Psychological Operations (PSYOPS) |
influences behavior of foreign governments, organizations, groups, and individuals |
|
Information Operations (IO) |
Involves actions taken to affect adversary information and information systems while defending one’s own information and information systems. |
|
Types of Amphibious Operations |
Amphibious Assault Amphibious Raid Amphibious Demonstration Amphibious Withdrawal |
|
National Geospatial-Intelligence Agency |
Lead Agency in charge of Geospatial Analysis and products at NATIONAL level Combat support agency |
|
National Reconnaissance Office |
Lead Agency charged to design, build, and operation of National Reconnaissance satellites |
|
National System for Geospatial Intelligence |
Governing body over Geospatial programs |
|
IPL |
Image Product Library - Storage device for raw imagery, part of DCGS-N suite |
|
Web-based Access Retrieval Portal |
SIPR and JWICS based website for accessing and retrieving DoD airborne, commercial, and national Imagery. |
|
ARC-Geospatial Information System |
Geospatial analysis tool |
|
SOCET GXP |
Soft Copy Exploitation Tool- Geospatial Exploitation Information System |
|
OPINTEL |
the result of analyzing and combining multi-source intelligence information into a product used by Commanders to identify adversary critical vulnerabilities, Centers of Gravity (COGs), and critical nodes in-order to effectively employ assets. |
|
The steps of the Intelligence Cycle |
1. Planning and Direction 5. Dissemination |
|
The role of GCCS in performing OPINTEL |
- Viewing Common Operational and Tactical Picture |
|
Purpose of Intelligence Information Reports |
to convey raw, unbiased, objective data. |
|
Discuss the 6 phases of the Joint Targeting Cycle. |
1 Commanders Objective |
|
No-Strike List |
List of objects protected from military action in accordance with international law or ROE |
|
Restricted Target List |
list of targets that require approval from a joint force commander or higher authority |
|
Joint Integrated Prioritized Target List |
list of selected targets where there are no restrictions and are approved for military action |
|
Discuss the Collateral Damage Methodology |
Unintentional or incidental injury or damage to persons or objects that would not be lawful military targets in the circumstances ruling at the time. |
|
Define Geo-positioning |
Methods that facilitate the location of one point relative to the surface of the earth. |
|
Collateral Damage Methodology |
Unintentional or incidental injury or damage to persons or objects that would not be lawful military targets in the circumstances ruling at the time |
|
Define Geo-positioning |
Methods that facilitate the location of one point relative to the surface of the earth. |
|
Collections Requirements Management (CRM) |
Defines what intelligence systems must collect.
Focuses on the requirements of the customer, is all-source oriented and advocates what information must be collected |
|
Priority Intelligence Requirements (PIR) |
are critical items of information or intelligence related to the enemy or battle space that is required in a timely manner to support a decision |
|
Importance of Providing feedback to Collection Managers |
Feedback is key and critical in ensuring that the customer’s needs are being met. |
|
F/A-18 SUPER HORNET with SHARP |
EO/FMV EO/FMV/SI EO/FMV EO/FMV EO/FMV
|
|
Terrorism |
The unlawful use of violence or threat of violence to instill fear and coerce governments or societies. Terrorism is often motivated/committed based on religious, political, or ideological beliefs |
|
Counter Intelligence |
Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, sabotage, or assassinations |
|
State Sponsored Terrorism |
Terrorist group that receives substantial support (money, training and weapons) from a state but the actions of the group are autonomous |
|
State Directed Terrorism |
Terrorists who operate as an agent of a host government and receive substantial intelligence, logistics and operational support from the sponsoring government |
|
Insurgency |
The organized use of subversion and violence by a group or movement that seeks to overthrow, or force change of, a governing authority |
|
direct questioning |
Ask questions directly related to information |
|
DoD Terrorism Threat Levels |
1. High - Exceptional terrorist threat of mass casualty attack 2. Significant - Direct terrorist threat to individuals or small groups of DoD personnel. 3. Moderate - Potential collateral threat to DoD personal 4. Loss - No credible indications detected of terrorist threat to DoD. |
|
HUMINT |
A category of intelligence derived from information collected and provided by human sources. |
|
Military Source Operations |
The collection, by humans, of foreign military related intelligence. |
|
Interrogation |
The systematic effort to procure information to answer specific collection requirements. Achieved by direct and indirect questioning techniques of a person in custody. |
|
Tactical Questioning/Debriefing |
Direct questioning by any Department of Defense personnel of a captured or detained person. Occurs at or near the point of capture or detention and is consistent with applicable law |
|
FORMICA |
Foreign Military Intelligence Collection Activities |
|
Prisoner of War |
A detained person who, while engaged in combat under orders of his or her government, is captured by the armed forces of the enemy. |
|
Detainee |
A term used to refer to any person captured or otherwise detained by an armed force. |
|
Double Agent |
Agent in contact with two opposing intelligence services, only one of which is aware of the double contact or quasi-intelligence services. |
|
Espionage |
The act of obtaining, delivering, transmitting, communicating, or receiving information about the national defense of a country. |
|
Four steps of the counter intelligence process |
1. Prepare CI estimate |
|
Minimum language proficiency standards for:
Arabic, Chinese (Mandarin), Persian Farsi, Hebrew, Korean, Russian, Spanish |
Arabic = L1+/R2 or L2/R1+ |
|
following levels of language proficiency as defined by the Inter-Agency Language Roundtable (ILR) 0-2+ |
0+ Memorized proficiency 1 Elementary proficiency 1+ Elementary proficiency, plus 2 Limited working proficiency 2+ Limited working proficiency, plus
|
|
following levels of language proficiency as defined by the Inter-Agency Language Roundtable (ILR) 3-5 |
3 General professional proficiency (goal in DoD) 3+ General professional proficiency, plus 4 Advanced professional proficiency 4+ Advanced professional proficiency, plus 5 Functionally native proficiency |
|
Center for Language, Regional Expertise and Culture (CLREC) |
CID is the executive agent for CLREC
|
|
Navy Language Foreign Language Testing Office (NFLTO) |
NFLTO is a component of CLREC
|
|
CID Unit Monterey (CIDUM) |
Develops Fleet-ready Sailors and Navy linguists |
|
Identify the foreign languages associated with the Cryptologic Language Programs at the following CID Learning Sites:
CID LS Ft Meade, CID LS Ft Gordon, CID LS Kunia, CID LS Medina |
a. CID LS Ft Meade - Russian |
|
Command Language Program Manager (CLPM) |
Manage command language program (training & testing) |
|
Technical Language Advisor (TLA) |
At NIOCs; must meet language standards; and have completed two operational tours |
|
Technical Language Mentor (TLM) |
CTIC or senior CTI1 at NIOCs; must meet DLPT standards; no less than two operational tours |
|
foreign languages associated with the following Navy Enlisted Classifications:
9ARB, 9CMN, 9HEB, 9KOR, 9PES, 9SPA, 9RUS
|
a. 9ARB - Modern Standard Arabic (MSA) |