• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/64

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

64 Cards in this Set

  • Front
  • Back

Advances Information Operations war fighting capabilities for Naval and Joint Forces by: providing operationally focused training and planning support; developing doctrine, tactics, techniques, and procedures; advocating requirements in support of future effects-based warfare; and managing functional data for Information Operations.

NIOC - Navy Information Operations Command
The element of a NIOC that is responsible for support to fleet needs as directed by operational fleet commanders and as specified in the NIOC’s mission.
FIOC - Fleet Information Operations Command
Mission statement: To coordinate, monitor, and oversee the defense of Navy computer networks and systems and to be responsible for accomplishing Computer Network Defense (CND) missions as assigned by Commander, U.S. Tenth Fleet and Commander, U.S. Cyber Command.
NCDOC - Navy Cyber Defense Operations Center
Primary units that were established to provide intelligence supports to Naval Special Warfare.
NSW SUPPACT - Navy Special Warfare Support Activity One and Two
Deployable teams, three-man enlisted teams capable of task organizing to conduct tactical SIGINT electronic warfare (EW)/electronic warfare support (ES) collection, processing, and analysis in direct support of JFMCC or NCC requirements.
ETIOS - Expeditionary Tactical Information Operatons Support
Tactical electronic warfare units that consists mainly of signals intelligence and electronic intelligence operators
organized into smaller tactical units with different roles. Basic collection teams consist of 4–6 operators using specialized equipment based in HMMWVs.
US Marine Corp Radio Battalion
Provides a unique maritime cryptologic perspective
within the SIGINT community, helping to satisfy validated national SIGINT requirements, which also
support Coast Guard and DHS missions.
US Coast Guard Tactical Cryptologic Element
Described as the integrated employment of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception
(MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities, to influence, disrupt, corrupt, or usurp adversarial human and automated decision making while protecting our own.
Information Operations (IO)
Action taken to exploit and attack foreign communications and other electromagnetic signals, while protecting our own, for the purposes of command and control warfare, electronic warfare, signals intelligence, and signals security.
Cryptology
Who is responsible to the CWC to shape and assess the information environment; achieve and maintain information superiority; develop and execute IO plans in support of CWC objectives; and support other warfare commanders.
Information Operations Warfare Commander (IWC)
The officer assigned some or the entire Officer in
Tactical Command’s (OTC’s) detailed responsibilities for management of cryptologic assets, cryptologic coverage and tasking plans, personnel and augmentation requirements, cryptologic direct support operations, signal security operations, direct service interfaces, cryptologic sanitation, and correlation procedures.
Cryptologic Resource Coordinator
What is SSES?
Ship's Signal Exploitation Space
Principal EW planner. Develops operation plans (OPLANs) and concept plans (CONPLANs), plans and monitors routine EW operations and activities, and coordinates joint EW training and exercises.
Electronic Warfare Officer (EWO)
Radiotelephone communications and foreign language
translation
Cryptologic Technician (Interpretive) - CTI
The installation, servicing and repair of electronic and
electromechanical equipment.
Cryptologic Technician (Maintenance) - CTM
Plan and execute computer network operations (CNO)
actions/counter-actions in support of defending and exploiting computer network systems.
Cryptologic Technician (Network) - CTN
Voice/morse communications and operation of radio direction finding equipment.
Cryptologic Technician (Collection) - CTR
Non-communications signals intelligence (ELINT), Electronic Warfare Support (ES), Electronic Attack (EA), Electronic Protect (EP), Anti-Ship Missile Defense (ASMD), while a portion perform servicing and maintenance of various related electronic countermeasures systems (i.e., AN/SLQ-32).
Cryptologic Technician (Technical) - CTT

Refers to any military action involving the use of electromagnetic (EM) and directed energy to control the EM spectrum or to attack the adversary. Includes three major subdivisions: EA, electronic protection (EP), and electronic warfare support (ES).

Electronic Warfare (EW)

A process of identifying critical information and subsequently analyzing friendly actions and other activities to: identify what friendly information is necessary for the adversary to have sufficiently accurate knowledge of friendly forces and intentions; deny adversary decision makers critical information about friendly forces and intentions; and cause adversary decision makers to misjudge the relevance of known critical friendly information because other information about friendly forces and intentions remain secure.
Operations Security (OPSEC)
Those actions executed to deliberately mislead adversary decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly forces’ mission.
Military Deception (MILDEC)
Planned operations to convey selected truthful information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately, the behavior of their governments, organizations, groups, and individuals.
Psychological Operations (PSYOP)
The increasing use of networked computers and supporting IT infrastructure systems by military and
civilian organizations.
Computer Network Operations (CNO)
Defined as measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.
Information Assurance (IA)
Security concerned with physical measures designed to safeguard personnel, to prevent unauthorized access to equipment, installations, material, and documents, and
to safeguard them against espionage, sabotage, damage, and theft.
Physical security
Disrupts, damages, or destroys adversary targets through destructive power.
Physical attack
Consists of information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments
or elements thereof, foreign organizations, foreign persons, or international terrorist activities.
Counter-intelligence
Mission is to provide the OSD, the Chairman of the Joint Chiefs of Staff (CJCS), the Military Departments, the combatant commands, and the JTF with an imagery capability in support of operational and planning requirements across the range of military operations.
Combat Camera
Public information, command information, and community relations activities directed toward both external and internal audiences with interest in DOD.
Public Affairs
The activities of a commander that establish, maintain, influence, or exploit relations between military forces, governmental and nongovernmental civilian organizations and authorities, and the civilian populace.
Civil-Military Operations
Consists of activities and measures taken by DOD components, not solely in the area of IO, to support and facilitate public diplomacy efforts of the USG.
Defense Support to Public Diplomacy
State the objectives of EW.
The purpose of EW is to deny the opponent an advantage in the EM spectrum and ensure friendly
unimpeded access to the EM spectrum portion of the information environment. EW can be applied from air, sea, land, and space by manned and unmanned systems. EW is employed to support military
operations involving various levels of detection, denial, deception, disruption, degradation, protection, and destruction.
Define and discuss ES.
Electronic Warfare Support (ES). ES refers to that division of EW involving actions tasked by, or under
direct control of, an operational commander to search for, intercept, identify, and locate or localize sources of intentional and unintentional radiated EM energy for the purpose of immediate threat recognition, targeting, planning and conduct of future operations.
Define and discuss EA.
Electronic Attack. EA is the subdivision of EW involving the use of EM energy, DE, or antiradiation weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability and is considered a form of fires.
Define and discuss EP.
Electronic Protection. EP is the subdivision of EW involving actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy use of the EMS that degrade, neutralize, or destroy friendly combat capability.
Define and discuss EMI.
Electromagnetic Interference. EMI is any EM disturbance that interrupts, obstructs, or otherwise
degrades or limits the effective performance of electronics or electrical equipment. It can be induced
intentionally, as in some forms of EW, or unintentionally, as a result of spurious emissions and
responses, and intermodulation products.
Describes the signal structure, emission characteristics, modes of operation, emitter functions, and weapons systems associations of such emitters as radars, beacons, jammers, and navigational signals.
Technical ELINT (TECHELINT)
Concentrates on locating specific ELINT targets and determining the operational patterns of the systems. These results are commonly called Electronic Order of Battle (EOB).
Operational ELINT (OPELINT)
Which radar system has two primary functions: (1) the detection and determination of accurate ranges and bearings of surface objects and low-flying aircraft and (2) the maintenance of a 360- degree search pattern for all objects within line-of-sight distance from the radar antenna?
Surface search
Which radar systems initially detect and determine the position, course, and speed of air targets in a relatively large area?
Air search
The primary function of a _______radar (sometimes
referred to as a three-coordinate or 3D radar) is that of
computing accurate ranges, bearings, and altitudes of aircraft targets detected by airsearch radars.
Height-finding search
Radar that provides continuous positional data on a target is called tracking radar. Most tracking radar systems used by the military are also _______ radar; the two names are often used interchangeably.
Fire-control
A radar system that provides information used to guide a missile to a hostile target is called __________.
Guidance radar
State the objective of EP.
Electronic Protection. EP is the subdivision of EW involving actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy use of the EMS that degrade, neutralize, or destroy friendly combat capability.
What is the control of all electromagnetic and acoustic radiations, including communications, radar, EW and sonar?
EMCON
What is the deliberate radiation, reradiation, or reflection of EM energy for the purpose of preventing or reducing an enemy’s effective use of the EMS, with the intent of degrading or neutralizing the enemy’s combat capability?
Electromagnetic jamming
The deliberate radiation, re-radiation, alteration, suppression, absorption, denial, enhancement, or
reflection of electromagnetic energy in a manner intended to convey misleading information to an
enemy or to enemy electromagnetic-dependent weapons, thereby degrading or neutralizing the
enemy’s combat capability.
Electromagnetic deception
Explain the difference between PSYOP and Public Affairs.
(1) PSYOP are used to influence the attitudes, opinions, and behavior of foreign TAs in a manner favorable to US objectives.
(2) Military PA forces plan, coordinate, and synchronize public information, command information, and
community engagement activities and resources to support the commander’s operational objectives.
Through timely dissemination of factual information to international and domestic audiences, PA puts operational actions in context, facilitates the development of informed perceptions about military
operations among information consumers, and undermines adversarial information efforts. PA
operations and activities shall not focus on directing or manipulating public actions or opinion.
What is the only active Army psychological
operations unit at Fort Bragg, NC, that constitutes 26 percent of all U.S. Army psychological operations units; the remaining 74 percent being filled by reservists?
4th Military Information Support Group (4th POG)
Who is responsible for providing PSYOP support to
joint or multinational operations at the tactical and operational levels. The JPOTF is also responsible
for deconflicting all PSYOP that occur under the joint task force and other commands as designated
by the establishing authority?
Joint Psychological Operations Task Force (JPOTF)
An operational activity, related to CNA, that uses cyberspace tools to gain access, confirm continued access, and to gather information about computers and computer networks being targeted for CNA.
CNA-OPE (CNA-Operational Preparation of the Environment)
Enabling operations and intelligence collection capabilities conducted through the use of computer
networks to gather data from target or adversary automated information systems or networks.
Computer Network Enabling (CNE)
A comprehensive defense posture and response based on the status of ISs, military operations, and intelligence assessments of adversary capabilities and intent.
INFOCON
Describe the differences and similarities between IA and CND.
CND - Actions taken to defend against unauthorized activity within computer networks. CND includes
monitoring, detection, analysis (such as trend and pattern analysis), and response and restoration
activities.

IA - Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.
Define cyberspace operations.
The employment of cyber capabilities where the primary purpose is to achieve objectives in or through
cyberspace. Such operations include computer network operations and activities to operate and defend the global information grid (GIG).
A process of identifying critical information and subsequently analyzing friendly actions and other activities to: identify what friendly information is necessary for the adversary to have sufficiently accurate knowledge of friendly forces and intentions; deny adversary decision makers critical information about friendly forces and intentions; and cause adversary decision makers to misjudge the relevance of known critical friendly information because other information about friendly forces and intentions remain secure.
Operations Security (OPSEC)
Discuss the five steps of the OPSEC planning process.
1. Identification of Critical Information
2. Analysis of Threats
3. Analysis of Vulnerabilities
4. Assessment of Risk
5. Application of Appropriate Operations
Processes for ensuring websites are in compliance with applicable policies.
Web Risk Assessment (WRA)
Conditions provide procedures to control outgoing paths from ships and shore systems (e-mail, web browsing, POTS, cell phones) for the purpose of OPSEC and force protection.
River City
Intelligence and technical information derived from collecting and processing intercepted foreign communications passed by radio, wire, or other electromagnetic means. It includes computer network exploitation.
COMINT
Intelligence derived from the interception and analysis of noncommunications emitters (e.g. radar). Consists of OPELINT (operationally relevant information) and
TECHELINT (technical aspects of foreign communications).
ELINT
Technical analysis of data intercepted from foreign
equipment and control systems such as telemetry, electronic interrogators, tracking/fusing/arming/firing command systems and video data links.
FISINT
Message contains information of vital importance and must be given the most rapid handling possible from origin to ultimate delivery to authorized recipients.
CRITIC
A military commander’s authority to operationally direct and levy signals intelligence (SIGINT) requirements on designated SIGINT resources; includes authority to
deploy and redeploy all or part of the SIGINT resources for which SIGINT operational tasking authority has been delegated.
SIGINT Operational Tasking Authority (SOTA)