Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
35 Cards in this Set
- Front
- Back
COMTENTHFLT
|
Subordinate commands are organized by missions and functions in accordance with Annex A
Annex J outlines command relationships and responsibilities. |
|
USSTRATCOM
|
Mission to deter attacks on US vital interests, to ensure US freedom of action in space and cyberspace
Deliver integrated kinetic and non-kinetic effects to include nuclear and info ops in ISO US Joint Force Commander ops Synchronize global missile defense plans and operations Synchronize regional combating of WMD's Provide integrated surveillance and reconnaissance allocation recommendations to the SECDEF Advocate for capabilities as assigned |
|
CYBERCOM
|
Plans, coordinates, integrates, synchronizes, and conducts activities to:
-Direct the operations and defense of specified DoD info networks -Prepare to, and when directed, conduct full-spectrum military cyberspace operations in order to enable actions in all domains -Ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries |
|
JFCC-ISR
|
Joint Functional Component Command for ISR
As directed by CDR USSTRATCOM, recommends allocation of ISR capabilities to satisfy strategic/high-priority combatant command and national operational and intel requirements Advocates for ISR capabilities Provides functional support for USSTRATCOM'S other missions |
|
JFCC-Space
|
Joint Functional Component Command for Space
Vandenber AFB Responsible for executing continuous, integrated space operations to deliver theater and global effects in support of national and combatant commander objectives Coordinates space operational-level planning, integration, and coordination to ensure unity of effort in support of military and national security ops, and support to civil authorities |
|
JIOWC
|
Joint Information Operations Warfare Center
Enable IO and other missions for CDR USSTRATCOM and other Joint Force Commanders as directed Coordinates and synchronizes regional and global IO efforts and enhances IO support across the DoD |
|
Rules of Engagement
|
Directives issued by competent military authority that delineate the circumstances and limitations under which US forces will initiate and/or continue combat engagement with other forces encountered
|
|
Law of War
|
International law that regulates the conduct of armed hostilities. Often called "The Law of Armed Conflict."
|
|
No-Strike list
|
NSL
List of geographic areas, complexes, or installations not planned for capture or destruction. Attacking these may violate the law of armed conflict or interfere with friendly relations with indigenous personnel or governments |
|
Restricted Target List
|
RTL
List of restricted targets nominated by elements of the joint force and approved by the joint force commander. Also includes restricted targets directed by higher authorities. |
|
BDA
|
Battle Damage Assessment
Timely and accurate estimate of damage resulting from the application of military force, lethal or nonlethal, against a predetermined objective. Can be applied to all weapon systems. Primarily an intel responsibility. Composed of: -Phsysical damage assessment -Functional damage assessment -Target system assessment |
|
Information Operations
|
Actions taken to affect adversary information and information systems while defending one's own info and IS
|
|
Information Warfare
|
IO conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries
|
|
What is Target Development?
|
-Target Development always approaches adversary capabilities from the perspective of their support from target systems
-The analysis must be conceived of as procedding through successively greater levels of detail, Macro to Micro -Ultimate goal is to locate and exploit vunerabilities in the adversary's war fighting and/or war sustaining resources and to prepare for the process of matching joint force capabilites against those critical vulnerabilities. |
|
Define TST
|
Time Sensitive Targeting
Those targets requireing immediate response bucause they pose (or will soon pose) a danger to friendly forces or are highly lucrative, fleeting targets of opportunity |
|
Six Phases of TST
|
D LIDSA
1. Detect 2. Locate 3. Identify 4. Decide 5. Strike 6. Assess |
|
What are the 5 core capabilities of IO
|
PSYOPs
MILDEC OPSEC CNO EW |
|
How are the 5 core capabilites of IO applied during Offensive IO
|
Integrated use of assigned and supporting capabilities and activities, mutually supported by intel, to affect decision makers and achieve or promote specific objectives.
|
|
How are the 5 core capabilites of IO applied during Defensive IO
|
Integrate and coordinate policies and procedures, ops, personnel, and technology to protect and defend info and IS. Conducted and assisted through IA, OPCES, physical security, counter deception, counter propaganda, CI, EW, and SIO.
Ensures timely, accurate, and relevant info access while denying adversaries. Can be assisted by Offensive IO |
|
MILDEC
|
Actions executed to deliberately mislead adversary militry decision makers as to friendly military capabilites, intentions, and ops, thereby causing the adversary to take specific actions that will contribute to the accomplishment of the friendly mission
|
|
Types of MILDEC
|
Physical - Displays of troop movements and concentration, feints and demonstrations by maneuver units, false logistic activity, and false HQ
Technical - False communications nets, false radar emissions, and the use of smoke and other obscurants Administrative - Staged compromise or loss of classified documents |
|
6 phases of MILDEC planning process
|
1. Deception Mission Analysis
2. Deception Planning Guidance 3. Staff Deception Estimate 4. Commander's Deception Estimate 5. Deception Plan Development 6. Deception Plan Review and Approval |
|
PSYOPs
|
Convey selected info and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign govs, orgs, groups, and individuals. Purpose to induce or reinforce foreign attitudes and behavior favorable to the originator's objectives.
|
|
Primary responsibilities of an IO Officer
|
-Coordinating the overall IO effort for the JFC
-Coordinating IO issues w/in the joint staff and counterpart IO planners on the component staffs -Coordinating IO defensive and offensive concepts to support the JFC concept of operations -Establishing IO priorities to accomplish planned objective -Determining the availability of IO resources to carry out IO plans -Recommend tasking to the J3 -Consolidated J3 tasking ensures efficiency |
|
What are the areas of COMSEC?
|
Cryptosecurity - resulsts from the provision of technically sound cryptosystems and their proper use
Transmission Security - results from all measures designed to protect transmissions from interception and exploitation by means other than cryptanalysis Emission Security - results from all measures taken to deny unauthorized persons info of value that might be derived from intercept and analysis of compromising emanations from crypto-equipement and telecommuniations systems Physical Security - results from all physical measures necessary to safeguard classified equipemnt, material, and documents from access thereto or observation thereof by unauthorized persons |
|
EEFI
|
Appropriate keyword or key phrase allocated to each EEFI for rapid understanding of BEADWINDOW reports
|
|
BEADWINDOW
|
Simple, rapid procedure for use by curcuit operators to police the security of insecure voice networks
|
|
JCMA
|
Joint COMSEC Monitoring Activity
Provide COMSEC monitoring services to the DoD and other US Gov Departments and agencies |
|
What is the function of the Cryptologic Service Group?
|
CSGs are made up of personnel equipped to provide time-sensitive cryptologic services to a customer, using the capability of the entire U. S. Cryptologic System.
CSGs are DIRNSA's representatives for time-sensitive cryptologic operational matters. |
|
JDISS
|
Joint Deployable Intel Support System
Provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces, in garrison, and deployed during peace, crisis, and war. |
|
Definition of cyberspace
|
A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.
|
|
TECHELINT
|
Collection and identification of the SOI is the primary focus. Includes signal descriptions, emission characteristics, modes of operation, emitter functions, system associations, capabilities and vulnerabilities, and foreign technology indications.
|
|
OPELINT
|
Operational ELINT relates the radar activity to a site, weapon, platform or event. This includes emitter deployment, systems employment, activity levels and schedules, weapons system tactics, platform recognition, force composition and function, and I&W.
|
|
COP
|
Common Operating Picture
Single identical display of relevant information shared by more than one command. A common operational picture facilitates collaborative planning and assists all echelons to achieve situational awareness. |
|
CIP
|
Common Intel Picture
Includes locations of hostile, suspected hostile and neutral forces/entities operating in a specific area detected by available sensors with associated intelligence products. |