• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/144

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

144 Cards in this Set

  • Front
  • Back

Signals Analysis

is a cutting-edge technical discipline that seeks to recover, understand, and derive intelligence from foreign signals

Cryptanalysis

is the analytic investigation of an information system with the goal of illuminating hidden aspects of that system. It encompasses any systematic analysis aimed at discovering features in, understanding aspects of, or recovering hidden parameters from an information system

Traffic Analysis

branch of Cryptology which deals with the study of the external characteristics of signals communications and related materials for the purpose of obtaining information concerning the organization and operation of a communication system

Fusion Analysis

the process of examining all sources of intelligence and information to derive a complete assessment of activity

RASIN manual

the RAdio SIgnals Notation manual is used by the United States SIGINT System (USSS) as a guide to the Communications Intelligence (COMINT) signal classification system

USSID

United States Signals Intelligence Directives, designed to contain the planning, doctrinal, tasking, and control material governing U.S. Signals Intelligence (SIGINT) operations throughout the world

Describe Line of Sight (LOS) communication

-LOS communication is a signal that is simply transmitted directly from the transmitting antenna to the receiving antenna.



-Also, known as direct wave communications that follows the curvature of the earth limiting LOS to approximately 25 to 40 miles.

Define the Doppler Effect

DOPPLER EFFECT is refraction due to motion. The apparent change in frequency or pitch when a sound source moves either toward or away from a listener.



Example: A trains whistle changes pitch as it gets closer.

Define and discuss Morse Code

Morse Code is a method of transmitting textual information as a series of on-off tones, lights, or clicks that can be directly understood by a skilled listener or observer without special equipment

Define sampling and how it relates to signals collection.

-Electric switches used to sample an analog signal numerous times in one second, creating a series of pulses representing the instantaneous amplitude of the analog wave at various moments.



Sampling is a step in the Analog to Digital Conversion process.


By using sampling the collector cuts down the amount of data recorded without losing any of the actual information in the signal.

Direction Finding

is the method of locating radio transmitters through the use of specially constructed receiving antennas and equipment

GeoLocation

the identification of the real-world geographic location of an object, such as a cell phone or an Internet-connected computer terminal. Geolocation may refer to the practice of assessing the location, or to the actual assessed location.

Define an Information Environment

the aggregate of individuals, organizations, and systems that collect process and disseminate or act on information

Discuss the Physical dimension that make up an Information Environment

The real world environments of land, sea, air, and space. It is where individuals, organizations, information systems, and the physical networks that support them reside.

Discuss the Informational dimension that make up an Information Environment

Consists of information and is where the functions of information systems (i.e., information collection, processing, and dissemination) create information content and flow

Discuss the Cognitive dimension that make up an Information Environment

Where information is used to form perceptions and attitudes and make decisions

Define Command and Control (C2)

the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission

Discuss how Information Operations (IO) supports operations at the Strategic level of war

influence or affect all elements (political, military, economic, or informational) of an adversary’s or potential adversary’s national power while protecting similar friendly elements.

Discuss how Information Operations (IO) supports operations at the Operational level of war

focus of IO at this level is on affecting adversary line of communication, logistics, command and control and related capabilities and activities while protecting similar friendly capabilities and activities

Discuss how Information Operations (IO) supports operations at the Tactical level of war

primary focus of IO at this level is affecting adversary information and information systems relating to C2, intelligence and other information-based processes directly relating to the conduct of military operations while protecting similar friendly capabilities

Offensive IO

Involves the integrated use of assigned and supporting capabilities and activities, mutually supported by intelligence, to affect adversary decision makers and achieve or promote specific objectives

Defensive IO

ensure timely, accurate, and relevant information access while denying adversaries the opportunity to exploit friendly information and information systems for their own purposes

Crisis Action Planning (CAP)

- provides the CJCS and CCDRs a process for getting vital decision-making information up the chain of command to the President and SecDef.


- process involving the time-sensitive development of joint operation plans and operation orders for the deployment, employment, and sustainment of assigned, attached, and allocated forces and capabilities in response to a situation that may result in actual military operations (crisis).

Deliberate Planning

-encompasses the preparation of plans that occur in non-crisis situations


-used to develop campaign and contingency plans for a broad range of activities based on requirements identified in Guidance for Employment of the Force, Joint Strategic Capabilities Plan or other planning directives.

Centers of Gravity (COG)

The source of power that provides moral or physical strength, freedom of action, or will to act.



That characteristic, capability, or location from which enemy and friendly forces derive their freedom of action, physical strength, or will to fight.

Discuss how IO plays a role in the targeting cycle

IO affects adversary decision makers, their information and information systems, and achieves or promotes specific objective

Describe how IO affects target development

Successful integration of IO considerations into the targeting process is fundamental to the success of the campaign. IO may call for “targeting” adversary human decision processes (human factors), information, and information systems used to support decision making or adversary morale with a variety of lethal and nonlethal means.

Hardkill (kinetic)

- Physical attack/destruction by delivery of munitions/ordinance to destroy or degrade a target.


- The use of “hard kill” weapons against designated targets is an element of an integrated IO effort.

Softkill (non-kinetic)

- The temporary elimination, degradation, or interruption of a node, link, or system.

Measures of Effectiveness (MOE)

assess changes in system behavior, capability, or the operational environment

Measures of Performance (MOP)

criteria for measuring task performance or accomplishment

Tactical Report (TACREP):

Principal reporting tool that supports tactical warning, targeting, indications and warning, and maneuvering.

Tactical Electronic Intelligence (TACELINT) Report

Time-critical Operational ELINT (OPELINT) and parametric information that may be used for indications and warning, data base maintenance, order of battle information, and strike planning.

Maritime Report (MAREP)

Primary formal U.S. Navy system for tasking and message reporting of maritime operational, intelligence, and management information.

MAREP RED

Command and Control purposes on contacts with enemy or special interest forces.

MAREP WHITE

Movement or locations of friendly Naval and routine merchant shipping.

MAREP BLACK

A periodic summary of the activity of enemy or special interest forces.

Electronic Intelligence (ELINT) Notation (ELNOT)

A five position group of characters assigned to each non-communication emission for collection and reporting purposes.

Arbitrary ELINT Notation (AEN)

Assigned to designate otherwise not fully identifiable radar activity.

Parametrically Ordered ELINT Notation (PEN)

Specific ELNOTs grouped into two radio frequency ranges.

Communications Emitter Notation (CENOT)

A five character designator used to identify a communications emitter.

Automatic Identification System (AIS)

An information and communications VHF system
used by vessels and vessel traffic systems (VTS)
principally for the identification of vessels at sea.

Mobile Maritime Service Identifier (MMSI)

unique 9 digit # assigned to a specific vessel

List four items that assist the analyst in tracking a contact using AIS

- Next Port Of Call destination


- Ships at anchor or underway


- Speed of vessel


- Ships current position and time

List the five Collection Management tools

- Request For Information (RFI)
Informal
Formal


- Product Verification Report (PVR)


- Enhanced User Interface (EUI)


- Consolidated Exercise Support Request (CESR)


COLISEUM

Explain what the Joint Tactical Terminal (JTT) provides to the OPELINT watch.

JTT is a near-real time UHF tactical intelligence terminal that provides the capability to disseminate time sensitive C4I and battlefield targeting information to tactical commanders-and intelligence nodes.

State the purpose of Electronic Warfare

Military action involving the use of electro-magnetic energy to determine, exploit, reduce, or prevent hostile use of the electro-magnetic spectrum (EMS).

Describe the mission and function of the CTT Electronic Warfare Operator

Maintain the watch with the expertise to monitor the radar electromagnetic spectrum for indications and warning of threats to unit safety in a networked Electronic Support (ES) environment.

Electronic Support (ES)

The actions taken to search for, detect, localize, and identify sources of radiated electromagnetic energy for tactical purposes.

Electronic Attack (EA)

Involves the use of equipment, devices, and tactics to prevent or reduce the enemies effective use of the EMS.

Electronic Protect (EP)

Actions taken to ensure friendly effective use of the EMS, despite an enemies use of EA

ASMD- Anti-Ship Missile Defense

Encompasses all aspects of defending a ship against missile attack.

BDA-Battle Damage Assessment

The estimate of damage resulting from the application of lethal or nonlethal military force. Battle damage assessment is composed of physical damage assessment, functional damage assessment, and target system assessment.

CTTG-Counter Targeting

Employed during Pre-hostilities consistent with ROE to deny, reduce, or confuse and adversaries targeting process RCS-Radar Cross Section.

RCS-Radar Cross Section

A measure in Square Meters of a ships reflected Electro-magnetic energy

MILDEC- Military Deception

Deliberately mislead advisory military decision makers as to friendly military capabilities, intentions and operations, thereby causing the advisory to take specific action or inactions which will contribute to the accomplishment of the friendly mission.

AN/SLQ-32 (V)

Surface Navy’s primary EW suite designed as an ASMD system for surface combatants. Secondary mission is to conduct limited ELINT collection

AN/ULQ-16

Provides the capability to perform detailed analysis of SLQ-32 collected emitter data.

MK-36 Decoy Launching System

Provides passive decoy launch capabilities.

MK-53 Decoy Launching System

Provides active/passive decoy launch capabilities.

AN/SLA-10B

Protects the SLQ-32 receivers from saturation by onboard radar signals.

AN/SSX-1

Enables precise measurement of selective emitter parameters and characteristics.

AN/USQ-151 JTT Joint Tactical Terminal

Provides improved interoperability and dissemination of critical intelligence and targeting information.

Electronic Coutermeasure

The deliberate radiation, re-radiation, alteration, suppression, denial, enhancement, or reflection of electromagnetic energy in a manner intended to convey misleading information to an enemy of enemy electromagnetic-dependent weapons.

Mechanical Countermeasure

The deliberate absorption and reflection of electromagnetic energy using mechanical decoys in a manner intended to convey misleading information to enemy radar operators.



MK216 (Distraction)
MK214 (Seduction)
MK245 Giant (Infrared IR)
MK234 Nulka (Combined Active/Passive/IR)

SATVUL- Satellite Vulnerability

Designed to mitigate vulnerability of ships emissions to space based sensors. SATVUL is set using EMCON procedures.

PCMS Passive Countermeasures System

Reduces RCS through the application of RADAR absorbent material to the superstructure, RADAR absorbent blankets to areas that cannot be coated, modified EW expendable launchers and AN/SLQ-32(V) software, and modified RADAR antennas.

Deceptive Jamming

Designed to inject false information into a victim RADAR to deny critical information on target azimuth, range, velocity, or a combination of these parameters.

EMCON - Emission Control

The selective and controlled use of electromagnetic, acoustic, or other emitters to optimize command and control capabilities while minimizing, for operations security:


a. detection by enemy sensors;


b. mutual interference among friendly systems; and/or


c. enemy interference with the ability to execute a military deception plan.

Electromagnetic interference

Any electromagnetic disturbance that interrupts, obstructs, or otherwise degrades or limits the effective performance of electronics and electrical equipment. It can be induced intentionally, as in some forms of electronic warfare, or unintentionally, as a result of spurious emissions and responses, intermodulation products, and the like.

Functional Interference

Originates from any source designed to generate electromagnetic energy and which may create interference as a normal part of its operation.

Incidental Interference

Originates from man-made sources. These are sources not designed specifically to generate electromagnetic energy but which do in fact cause interference. Examples of incidental EMI sources include power lines, motors, and switches.

Natural Interference

Caused by natural phenomena, such as electrical storms, rain particles, and solar and interstellar radiation.

Hull-generated Interference

Caused by the interaction of radiated signals with elements of the hull and rigging of a ship.

Order of Battle

The identification, strength, command structure, and disposition of the personnel, units, and equipment of any military force.

Electronic Warfare Operators utilize the following Orders of Battle

EOB – Electronic Order of Battle


NOB – Naval Order of Battle


AOB – Air Order of Battle


GOB – Ground Order of Battle

State the two rates and the year they merged to create the IS rate.

1975



Photo Intelligence man



Yeoman

Mission of United States Special Operations Command (USSOCOM)

- Provide fully capable Special Operations Forces to defend the United States and its interests
- Synchronize planning of global operations against terrorist networks

High Value Target vs. High Payoff Target

HVT – a target the enemy commander requires for successful completion of the mission.



HPT – a target whose loss to the enemy will significantly contribute to the success of the friendly course of action

Naval Special Warfare Group ONE (NSWG-1)

Coronado, California



Pacific and Central Commands areas of responsibility

Naval Special Warfare Group TWO (NSWG-2)

Little Creek, Virginia



European and Southern Command areas of responsibility

Naval Special Warfare Group THREE (NSWG-3)

Coronado, California



Worldwide NSW undersea mobility responsibility

Naval Special Warfare Group FOUR (NSWG-4)

Little Creek, Virginia



Worldwide NSW surface mobility responsibility

Naval Special Warfare Group TEN (NSWG-10)

Worldwide NSW technological capability responsibility

Naval Special Warfare Development Group (NSWDG)

Dam Neck, Virginia



Provides training, equipment and augmentation for Naval Special Warfare combat operations as required

Direct Action (DA)

Short duration strikes and other small-scale offensive operations principally undertaken by SOF to seize, destroy, capture, recover, or inflict damage on designated personnel or material.

Special Reconnaissance (SR)

Obtain or verify, by visual observation or other collection methods, information concerning the capabilities, intentions, and activities of an actual or potential enemy

Foreign Internal Defense (FID)

SOF’s primary contribution in this interagency activity is to organize, train, advise, and assist host nation (HN) military and paramilitary forces.

Unconventional Warfare (UW)

Guerrilla warfare and other direct offensive, low-visibility, clandestine, or covert operations



Indirect activities of subversion, sabotage, intelligence activities



Evasion and escape

Counter Proliferation (CP) of Weapons of Mass Destruction (WMD)

The actions taken to seize, destroy, render safe, capture, or recover WMD.

Psychological Operations (PSYOPS)

influences behavior of foreign governments, organizations, groups, and individuals

Information Operations (IO)

Involves actions taken to affect adversary information and information systems while defending one’s own information and information systems.

Types of Amphibious Operations

Amphibious Assault


Amphibious Raid


Amphibious Demonstration


Amphibious Withdrawal

National Geospatial-Intelligence Agency

Lead Agency in charge of Geospatial Analysis and products at NATIONAL level Combat support agency

National Reconnaissance Office

Lead Agency charged to design, build, and operation of National Reconnaissance satellites
Collects, processes and stores raw images, where NGA takes over for analysis

National System for Geospatial Intelligence

Governing body over Geospatial programs

IPL

Image Product Library - Storage device for raw imagery, part of DCGS-N suite

Web-based Access Retrieval Portal

SIPR and JWICS based website for accessing and retrieving DoD airborne, commercial, and national Imagery.

ARC-Geospatial Information System

Geospatial analysis tool

SOCET GXP

Soft Copy Exploitation Tool- Geospatial Exploitation Information System

OPINTEL

the result of analyzing and combining multi-source intelligence information into a product used by Commanders to identify adversary critical vulnerabilities, Centers of Gravity (COGs), and critical nodes in-order to effectively employ assets.

The steps of the Intelligence Cycle

1. Planning and Direction
2. Collection
3. Processing and Exploitation
4. Analysis and Production


5. Dissemination

The role of GCCS in performing OPINTEL

- Viewing Common Operational and Tactical Picture
- Disseminate Common Intelligence Picture
- Red Database Management
- Threat area plotting
- Access and Update Modernized Integrated Database

Purpose of Intelligence Information Reports

to convey raw, unbiased, objective data.

Discuss the 6 phases of the Joint Targeting Cycle.

1 Commanders Objective
2 Target Development
3 Capabilities Analysis
4 Commanders Decision
5 Mission Planning
6 Combat Assessment

No-Strike List

List of objects protected from military action in accordance with international law or ROE

Restricted Target List

list of targets that require approval from a joint force commander or higher authority

Joint Integrated Prioritized Target List

list of selected targets where there are no restrictions and are approved for military action

Discuss the Collateral Damage Methodology

Unintentional or incidental injury or damage to persons or objects that would not be lawful military targets in the circumstances ruling at the time.

Define Geo-positioning

Methods that facilitate the location of one point relative to the surface of the earth.

Collateral Damage Methodology

Unintentional or incidental injury or damage to persons or objects that would not be lawful military targets in the circumstances ruling at the time

Define Geo-positioning

Methods that facilitate the location of one point relative to the surface of the earth.

Collections Requirements Management (CRM)

Defines what intelligence systems must collect.



Focuses on the requirements of the customer, is all-source oriented and advocates what information must be collected

Priority Intelligence Requirements (PIR)

are critical items of information or intelligence related to the enemy or battle space that is required in a timely manner to support a decision

Importance of Providing feedback to Collection Managers

Feedback is key and critical in ensuring that the customer’s needs are being met.

F/A-18 SUPER HORNET with SHARP
MQ-1B Predator
MQ-8B Fire Scout
RQ-4 BAMS
SCAN EAGLE

EO/FMV


EO/FMV/SI


EO/FMV


EO/FMV


EO/FMV


Terrorism

The unlawful use of violence or threat of violence to instill fear and coerce governments or societies. Terrorism is often motivated/committed based on religious, political, or ideological beliefs

Counter Intelligence

Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, sabotage, or assassinations

State Sponsored Terrorism

Terrorist group that receives substantial support (money, training and weapons) from a state but the actions of the group are autonomous

State Directed Terrorism

Terrorists who operate as an agent of a host government and receive substantial intelligence, logistics and operational support from the sponsoring government

Insurgency

The organized use of subversion and violence by a group or movement that seeks to overthrow, or force change of, a governing authority

direct questioning

Ask questions directly related to information
Make no efforts to conceal purpose
Use questions to rapidly debrief individuals
Establish a baseline to detect deception
Questioning by designated personnel

DoD Terrorism Threat Levels

1. High - Exceptional terrorist threat of mass casualty attack


2. Significant - Direct terrorist threat to individuals or small groups of DoD personnel.


3. Moderate - Potential collateral threat to DoD personal


4. Loss - No credible indications detected of terrorist threat to DoD.

HUMINT

A category of intelligence derived from information collected and provided by human sources.

Military Source Operations

The collection, by humans, of foreign military related intelligence.

Interrogation

The systematic effort to procure information to answer specific collection requirements. Achieved by direct and indirect questioning techniques of a person in custody.

Tactical Questioning/Debriefing

Direct questioning by any Department of Defense personnel of a captured or detained person. Occurs at or near the point of capture or detention and is consistent with applicable law

FORMICA

Foreign Military Intelligence Collection Activities

Prisoner of War

A detained person who, while engaged in combat under orders of his or her government, is captured by the armed forces of the enemy.

Detainee

A term used to refer to any person captured or otherwise detained by an armed force.

Double Agent

Agent in contact with two opposing intelligence services, only one of which is aware of the double contact or quasi-intelligence services.

Espionage

The act of obtaining, delivering, transmitting, communicating, or receiving information about the national defense of a country.

Four steps of the counter intelligence process

1. Prepare CI estimate
2. Conduct CI Survey
3. Develop CI Plan
4. Implement CI Measures

Minimum language proficiency standards for:



Arabic, Chinese (Mandarin), Persian Farsi, Hebrew, Korean, Russian, Spanish

Arabic = L1+/R2 or L2/R1+
Chinese (Mandarin) = L1+/R2 or L2/R1+
Persian Farsi= L1+/R2 or L2/R1+
Hebrew = L2/R2
Korean = L2/R2
Russian = L2/R2
Spanish = L2/R2

following levels of language proficiency as defined by the Inter-Agency Language Roundtable (ILR) 0-2+

0+ Memorized proficiency


1 Elementary proficiency


1+ Elementary proficiency, plus


2 Limited working proficiency


2+ Limited working proficiency, plus


following levels of language proficiency as defined by the Inter-Agency Language Roundtable (ILR) 3-5

3 General professional proficiency (goal in DoD)


3+ General professional proficiency, plus


4 Advanced professional proficiency


4+ Advanced professional proficiency, plus


5 Functionally native proficiency

Center for Language, Regional Expertise and Culture (CLREC)

CID is the executive agent for CLREC



Receives language training requirements determined by NAVCYBERFOR (CID)

Navy Language Foreign Language Testing Office (NFLTO)

NFLTO is a component of CLREC



Manages admin of language testing



Responsible for testing program under NETC’s ADCON

CID Unit Monterey (CIDUM)

Develops Fleet-ready Sailors and Navy linguists
Provides guidance, training, and support to all Navy students receiving language training at DLIFLC, Monterey, CA

Identify the foreign languages associated with the Cryptologic Language Programs at the following CID Learning Sites:



CID LS Ft Meade, CID LS Ft Gordon, CID LS Kunia, CID LS Medina

a. CID LS Ft Meade - Russian
b. CID LS Ft Gordon - Arabic/Persian-Farsi/Hebrew
c. CID LS Kunia – Chinese/Korean
d. CID LS Medina – Spanish

Command Language Program Manager (CLPM)

Manage command language program (training & testing)
Develop & maintain Individual Language Training Plans (ILTP) for every linguist
Maintain language database with DLPT scores/training

Technical Language Advisor (TLA)

At NIOCs; must meet language standards; and have completed two operational tours
Annually reviews language training materials
Develop, maintain, and grade evals, exams, and assessments of technical language materials

Technical Language Mentor (TLM)

CTIC or senior CTI1 at NIOCs; must meet DLPT standards; no less than two operational tours
Enrolls CTIs in MCCEP, monitors progression and reports progress to NIOC N7 and CO via TLA

foreign languages associated with the following Navy Enlisted Classifications:



9ARB, 9CMN, 9HEB, 9KOR, 9PES, 9SPA, 9RUS



a. 9ARB - Modern Standard Arabic (MSA)
b. 9CMN – Chinese Mandarin
c. 9HEB - Hebrew
d. 9KOR - Korean
e. 9PES – Persian-Farsi (Iranian)
f. 9SPA - Spanish
g. 9RUS - Russian