• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/35

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

35 Cards in this Set

  • Front
  • Back
COMTENTHFLT
Subordinate commands are organized by missions and functions in accordance with Annex A

Annex J outlines command relationships and responsibilities.
USSTRATCOM
Mission to deter attacks on US vital interests, to ensure US freedom of action in space and cyberspace

Deliver integrated kinetic and non-kinetic effects to include nuclear and info ops in ISO US Joint Force Commander ops

Synchronize global missile defense plans and operations

Synchronize regional combating of WMD's

Provide integrated surveillance and reconnaissance allocation recommendations to the SECDEF

Advocate for capabilities as assigned
CYBERCOM
Plans, coordinates, integrates, synchronizes, and conducts activities to:
-Direct the operations and defense of specified DoD info networks
-Prepare to, and when directed, conduct full-spectrum military cyberspace operations in order to enable actions in all domains
-Ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries
JFCC-ISR
Joint Functional Component Command for ISR

As directed by CDR USSTRATCOM, recommends allocation of ISR capabilities to satisfy strategic/high-priority combatant command and national operational and intel requirements

Advocates for ISR capabilities

Provides functional support for USSTRATCOM'S other missions
JFCC-Space
Joint Functional Component Command for Space
Vandenber AFB

Responsible for executing continuous, integrated space operations to deliver theater and global effects in support of national and combatant commander objectives

Coordinates space operational-level planning, integration, and coordination to ensure unity of effort in support of military and national security ops, and support to civil authorities
JIOWC
Joint Information Operations Warfare Center

Enable IO and other missions for CDR USSTRATCOM and other Joint Force Commanders as directed

Coordinates and synchronizes regional and global IO efforts and enhances IO support across the DoD
Rules of Engagement
Directives issued by competent military authority that delineate the circumstances and limitations under which US forces will initiate and/or continue combat engagement with other forces encountered
Law of War
International law that regulates the conduct of armed hostilities. Often called "The Law of Armed Conflict."
No-Strike list
NSL

List of geographic areas, complexes, or installations not planned for capture or destruction. Attacking these may violate the law of armed conflict or interfere with friendly relations with indigenous personnel or governments
Restricted Target List
RTL

List of restricted targets nominated by elements of the joint force and approved by the joint force commander. Also includes restricted targets directed by higher authorities.
BDA
Battle Damage Assessment

Timely and accurate estimate of damage resulting from the application of military force, lethal or nonlethal, against a predetermined objective. Can be applied to all weapon systems. Primarily an intel responsibility.
Composed of:
-Phsysical damage assessment
-Functional damage assessment
-Target system assessment
Information Operations
Actions taken to affect adversary information and information systems while defending one's own info and IS
Information Warfare
IO conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries
What is Target Development?
-Target Development always approaches adversary capabilities from the perspective of their support from target systems
-The analysis must be conceived of as procedding through successively greater levels of detail, Macro to Micro
-Ultimate goal is to locate and exploit vunerabilities in the adversary's war fighting and/or war sustaining resources and to prepare for the process of matching joint force capabilites against those critical vulnerabilities.
Define TST
Time Sensitive Targeting

Those targets requireing immediate response bucause they pose (or will soon pose) a danger to friendly forces or are highly lucrative, fleeting targets of opportunity
Six Phases of TST
D LIDSA
1. Detect
2. Locate
3. Identify
4. Decide
5. Strike
6. Assess
What are the 5 core capabilities of IO
PSYOPs
MILDEC
OPSEC
CNO
EW
How are the 5 core capabilites of IO applied during Offensive IO
Integrated use of assigned and supporting capabilities and activities, mutually supported by intel, to affect decision makers and achieve or promote specific objectives.
How are the 5 core capabilites of IO applied during Defensive IO
Integrate and coordinate policies and procedures, ops, personnel, and technology to protect and defend info and IS. Conducted and assisted through IA, OPCES, physical security, counter deception, counter propaganda, CI, EW, and SIO.
Ensures timely, accurate, and relevant info access while denying adversaries.
Can be assisted by Offensive IO
MILDEC
Actions executed to deliberately mislead adversary militry decision makers as to friendly military capabilites, intentions, and ops, thereby causing the adversary to take specific actions that will contribute to the accomplishment of the friendly mission
Types of MILDEC
Physical - Displays of troop movements and concentration, feints and demonstrations by maneuver units, false logistic activity, and false HQ

Technical - False communications nets, false radar emissions, and the use of smoke and other obscurants

Administrative - Staged compromise or loss of classified documents
6 phases of MILDEC planning process
1. Deception Mission Analysis
2. Deception Planning Guidance
3. Staff Deception Estimate
4. Commander's Deception Estimate
5. Deception Plan Development
6. Deception Plan Review and Approval
PSYOPs
Convey selected info and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign govs, orgs, groups, and individuals. Purpose to induce or reinforce foreign attitudes and behavior favorable to the originator's objectives.
Primary responsibilities of an IO Officer
-Coordinating the overall IO effort for the JFC
-Coordinating IO issues w/in the joint staff and counterpart IO planners on the component staffs
-Coordinating IO defensive and offensive concepts to support the JFC concept of operations
-Establishing IO priorities to accomplish planned objective
-Determining the availability of IO resources to carry out IO plans
-Recommend tasking to the J3
-Consolidated J3 tasking ensures efficiency
What are the areas of COMSEC?
Cryptosecurity - resulsts from the provision of technically sound cryptosystems and their proper use

Transmission Security - results from all measures designed to protect transmissions from interception and exploitation by means other than cryptanalysis

Emission Security - results from all measures taken to deny unauthorized persons info of value that might be derived from intercept and analysis of compromising emanations from crypto-equipement and telecommuniations systems

Physical Security - results from all physical measures necessary to safeguard classified equipemnt, material, and documents from access thereto or observation thereof by unauthorized persons
EEFI
Appropriate keyword or key phrase allocated to each EEFI for rapid understanding of BEADWINDOW reports
BEADWINDOW
Simple, rapid procedure for use by curcuit operators to police the security of insecure voice networks
JCMA
Joint COMSEC Monitoring Activity

Provide COMSEC monitoring services to the DoD and other US Gov Departments and agencies
What is the function of the Cryptologic Service Group?
CSGs are made up of personnel equipped to provide time-sensitive cryptologic services to a customer, using the capability of the entire U. S. Cryptologic System.

CSGs are DIRNSA's representatives for time-sensitive cryptologic operational matters.
JDISS
Joint Deployable Intel Support System

Provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces, in garrison, and deployed during peace, crisis, and war.
Definition of cyberspace
A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.
TECHELINT
Collection and identification of the SOI is the primary focus. Includes signal descriptions, emission characteristics, modes of operation, emitter functions, system associations, capabilities and vulnerabilities, and foreign technology indications.
OPELINT
Operational ELINT relates the radar activity to a site, weapon, platform or event. This includes emitter deployment, systems employment, activity levels and schedules, weapons system tactics, platform recognition, force composition and function, and I&W.
COP
Common Operating Picture

Single identical display of relevant information shared by more than one command. A common operational picture facilitates collaborative planning and assists all echelons to achieve situational awareness.
CIP
Common Intel Picture

Includes locations of hostile, suspected hostile and neutral forces/entities operating in a specific area detected by available sensors with associated intelligence products.