Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
45 Cards in this Set
- Front
- Back
Explain the procedures for the transmission and handling of Privacy Act Information.
|
Individuals or organizations may seek a "routine use" disclosure of info from a DoN Privacy Act (PA) system of records if the system is available. The request must be in writing.
|
|
Explain the adjudication process:
Investigation |
Personal security investigations (PSI), are conducted to meet OPM and Executive Branch requirements for employment suitability and personnel security eligibility
|
|
SAER (Security Access Eligibility Report)
|
Report submitted through JPAS to DONCAF to get the adjudication process started. Also used through JPAS when an incident occurs and additional time is needed to provide more info
|
|
Appeals
|
Used to dispute the findings of an unfavorable PSI. DoN will convene an appeals board for such cases
|
|
LOI (Letter of Intent)
|
Issued to deny or revoke eligibility for assignment to sensitive security positions or access to classified info
|
|
LOD (Letter of Denial)
|
Issued to DoN for individuals denied clearances based on their security eligibility
|
|
JCAVS (Joint Clearance and Access Verification System)
|
System where Security Manager ensures that personnel security investigations, clearances, and accesses are properly recorded
|
|
State the purpose of SF86
|
Document used as a basis for current and future investigations, security clearance investigations, and determinations for your suitability for employment
|
|
State the purpose of DD Form 1847-1
|
SCI Nondisclosure Statement. It identifies people when it is necessary to certify their access to SCI
|
|
State the purpose of the Adjunct Faculty Program
|
To utilize subject matter expertise to meet global training needs
|
|
State the minimum DLPT score standard for CTI
|
2/2(Listening/Reading) or higher except for:
Arabic, Persian-Farsi, and Chinese which require 1+/2 or 2/1+ |
|
Name the language associated with the following category:
Category 1 |
French, Italian, Portuguese, and Spanish
|
|
Name the language associated with the following category:
Category 2 |
German
|
|
Name the language associated with the following category:
Category 3 |
Hebrew, Persian-Farsi and Dari, Russian, Serb-Croatian, Tagalog, Thai, and Urdu
|
|
Name the language associated with the following category:
Category 4 |
Arabic, Chinese, Korean, Pashto
|
|
State the emergency destruction priority assigned to cryptologic equipment and documents
|
Priority ONE (total destruction priority assigned to cryptologic equipment and documents
|
|
Describe the Navy's organization structure as defined by annexes A&J of OPORD 2000
|
FLTCYBERCOM OPCON to USCYBERCOM
FLTCYBERCOM ADCON to CNO Provides operational support to commanders world-wide, serves as Navy Component commander to USCYBERCOM, and assumes OPCON of cryptologic, cyber networks, space and IO |
|
Describe the functions of the following command:
USSTRATCOM (US Strategic Command) |
Provides nation with global deterrence capabilities to combat adversary WMD worldwide. Space and global strike ops; IO; integrated missile defense
|
|
Describe the functions of the following command:
CYBERCOM (Cyber Command) |
Plans, coordinates, integrates, synchronizes, and conducts activities to prepare for and conduct full spectrum military cyberspace ops, ensure US/Allied freedom of action in cyberspace, and deny the same to adversaries
|
|
Describe the functions of the following command:
JFCC-ISR (Joint Functional Component Command-ISR) |
Responsible for coordinating global intel collection; key enabler to achieving global situational awareness. The commander also serves as the Director, DIA.
|
|
Describe the functions of the following command:
JFCC-Space (Joint Functional Component Command-Space) |
Conducts planning, execution, and force management, as directed by USSTRATCOM, of assigned missions for space ops; Commander 14th Air Force
|
|
Describe the functions of the following command:
JIOWC (Joint IO Warfare Center) |
Plans, integrates, and synchronizes IO in direct support of Joint Force Commanders; located at Lackland AFB, Texas
|
|
Define the following in relation to CSGs:
Three formal categories |
Permanent, Service Component, and Expeditionary
|
|
Define the following in relation to CSGs:
Customer relationship functions |
Facilitate Ins
Provide expertise Educate Reachback support Stand watch as needed |
|
Define the following in relation to CSGs:
SIGINT production functions |
If granted- production chain, sanitize, and collateral level support
|
|
SIGINT operational relationships
|
SIGINT LNOs(Liason Officer), 2nd and 3rd party LNOs, DNI LNOs, or site specific needs
|
|
Rules of Engagement
|
directives that dictate circumstances for starting or continuing combat engagement
|
|
Law of war (armed conflict)
|
Part of international law that regulates the conduct of armed hostilities.
|
|
No-strike list (NSL)
|
List of geographic areas, complexes, or installations not planned for capture or destruction; Safe zone
|
|
Restricted target list (RTL)
|
List of restricted targets nominated by elements of the joint force and approved by the joint force commander
|
|
Battle Damage Assessment (BDA)
|
Timely and accurate estimate of damage from the application of military force against a predetermined objective
|
|
Information Operations
|
The integrated employment of EW, CNO, PSYOP, MILDEC, and OPSEC to influence, disrupt, corrupt, or usurp adversarial human and automated decision making while protection our own
|
|
Information Warfare
|
use and management of information technology, may involve collection of tactical information
|
|
Describe Target Development
|
To produce from the approved targets a target nomination list (TNL) that identifies those elements within an adversary's power base that most closely support the JFC's objectives
|
|
Define Time Sensitive Targeting and its six phases
|
Targets requiring immediate response because they pose or will pose a danger to friendly forces: 1) Detect 2) Locate 3) Identify 4) Decide 5) Strike 6) Assess
|
|
SSN
|
Nuclear powered attack submarines; USS Seawolf, USS Los Angeles
|
|
SSGN
|
Nuclear powered guided missle submarine; USS Ohio
|
|
EA-6B Prowler
|
EW jamming system, data links, and communication capabilities. Designed for carriers or forward base ops.
|
|
E-2C Hawkeye
|
Carrier based tactical airborne warning and control system. Maintain surveillance of both airborne and surface, hostile and friendly
|
|
P-3C Orion
|
Land based, long range anti submarine warfare patrol aircraft
|
|
EP-3E
|
Real-time tactical electronic reconnaissance capabilities
|
|
RC-135
|
near real-time on-scene collection, analysis and dissemination capabilities
|
|
RQ-1A Predator
|
medium altitude remotely operated aircraft designed to conduct recon and target acquisitions within a 400 nautical mile radius
|
|
EC-130H Compass Call
|
modified C-130 Hercules configured to use noise and modulated jamming to prevent comms or degrade transfer of info essential to enemy systems and resources
|
|
U-2
|
provides high altitude all weather, day and night intelligence gathering. Also used for electronic sensor research and development and satellite calibration/data validation.
|