Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
60 Cards in this Set
- Front
- Back
Explain the procedures for the transmission and handling of Privacy Act Information |
Request for a "routine use" disclosure of info must be in writing and state that it is being used for "routine use" |
|
Explain the adjudication process |
1. Investigation - PSI, Suitability, Security Eligibility 2. SAER- Security Access Eligibility Report 3. Appeals- PSAB 4. LOI- Member has 15 days to respond 5. LOD- Letter of Denial, 30 days to respond 6. JCAVS- Joint Clearance and Access Verification System |
|
State the purpose of an SF-86 |
Document used as a basis for current and future investigations. (e-QUIP) |
|
State the purpose of DD Form 1847-1 |
SCI Nondisclosure Statement |
|
State the purpose of the Adjunct Faculty Program |
To utilize subject matter expertise to meet global training needs. |
|
State the minimum DLPT score standard for CTI |
L2/R2 or higher except for : Arabic, Persian-Farsi, Chinese: 1+/2 or 2/1+ |
|
Name the languages associated with the following categories |
Category 1: French, Italian, Portugese, Spanish Category 2: German Category 3: Hebrew, Persian-Farsi, Dari, Russian, Serb-Croatian, Tagalog, Thai, Urdu Category 4: Arabic, Chinese, Korean, Pashto |
|
State the emergency destruction priorities |
Priority 1: All Crypto/COMSEC/EKMS Keying Material Priority 2: Operational SCI - Code word/targeting info Priority 3: Less sensitive administrative SCI & Collateral Material |
|
Describe the Navy's organizational structure as defined by Annexes A & J of FLTCYBERCOM/COMTENTHFLT OPORD 2000 |
USCYBERCOM has OPCON over FLTCYBERCOM CNO had ADCON over FLTCYBERCOM |
|
Describe the functions of USSTRATCOM |
USSTRATCOM- global deterrence capabilities to combat adversary WMD worldwide |
|
Describe the functions of CYBERCOM |
plans, coordinates, integrates, synchronizes, and conducts activities for full-spectrum military cyberspace OPS |
|
Describe the functions of JFCC-ISR |
Director, DIA; coordinates global Intel collection, key enabler to achieving global situational awareness |
|
Describe the functions of JFCC-Space |
Conducts planning, execution & force management for space OPS |
|
Describe the functions of JIOWC |
Joint IO Warfare Center- plans, integrates, and synchronizes IO for Joint Force Commanders |
|
Define the 3 formal categories of CSG's (Cryptologic Support/Service Group) |
Permanent, Service Component, Expeditionary |
|
Define the customer relationship functions of CSG's |
provide reach-back support |
|
Define the SIGINT production functions of CSG's |
Production chain, Sanitize, Collateral level support |
|
Define the SIGINT operational relationships of CSG's |
SIGINT LNO's (Liason Officer) used for site specific needs |
|
Define Rules of Engagement |
directives that delineate the circumstances & limitations under which U.S. forces will initiate and/or continue combat engagement |
|
Define Law of War (armed conflict) |
that part of international law that regulates conduct of armed hostilities |
|
Define No-strike list (NSL) |
list of geographic areas, complexes, or installations not planned for capture or destruction; may violate the Law of Armed Conflict (LOAC) or interfere with friendly relations |
|
Define Restricted target list (RTL) |
list of restricted targets nominated by elements of the joint force |
|
Define Battle Damage Assessment (BDA) |
timely and accurate estimate of damage from the application of military force against an objective |
|
Define Information Operations |
the actions taken to affect adversary's IO systems while defending our own, using the 5 core capabilities |
|
Define Information Warfare |
IO conducted during times of War or conflict |
|
Describe Target Development |
To produce, from approved targets, a target nomination list (TNL) that identifies those elements within an adversary's power base that most closely support JFC's objectives |
|
Define Time Sensitive Targeting and its six phases |
Process in place that reduces the Kill Chain for Targets requiring immediate response because they pose or will pose a danger to friendly forces: 1. FIND, 2. FIX, 3. TARGET, 4. TRACK, 5. ENGAGE, 6. ASSESS |
|
Describe how the 5 core capabilities of IO are applied |
both offensively and defensively: CNO- defending our networks/attacking adversaries EW- jam radars, allow US/friendly forces to do surveillance and reconnaisance MISO- influence human reaction MILDEC- protect our strike groups/infiltrate the adversaries OPSEC- kept as a norm to not release sensitive information for adversaries to exploit |
|
Describe the role of the following IO resources: SSN, SSGN, EA-6B Prowler, E-2C Hawkeye |
SSN- Nuclear powered Fast attack Submarine SSGN- Nuclear powered Cruise Missile Submarine EA-6B Prowler- first electronic warfare aircraft, ability to neutralize hostile radars, umbrella of protection E-2C Hawkeye- tactical airborne warning and control system; early warning of hostile aircraft |
|
Describe the role of the following IO resources: P-3C Orion, EP-3E, RC-135, RQ-1A Predator, EC-130H |
P-3C Orion- ASW aircraft EP-3E- Navy's only land-based multi-intelligence reconnaisance aircraft, worldwide near real time tactical SIGINT RC-135- AF version of the EP-3 RQ-1A Predator- Unmanned Aerial Vehicle |
|
Describe the role of the following IO resources: EC-130H, U-2, EA-18G Growler |
EC-130H- modified C-130 aircraft, uses jamming to prevent comms or degrade C2 of enemy weapons systems U-2- Spy Plane used by AF, China, CIA, and NASA EA-18G Growler- Electronic Attack version of F/A-18F |
|
Discuss MILDEC to include the means of deception |
Physical- Inflatables, decoys, etc. Technical- deceptive comms Administrative- Pictures, papers |
|
Discuss PSYOP (MISO) |
Planned use of propaganda and other psychological actions having the primary purpose of influencing opinions, emotions, attitudes, and behavior of hostile foreign groups to support national objectives |
|
Define MILDEC |
Those actions executed to deliberately mislead adversary decision makers as to friendly military capabilities, intentions, and OPS, thereby causing the enemy to take specific actions/inactions that will help accomplish national objectives |
|
Discuss the 6 phases of MILDEC planning process |
1. Mission Analysis 2. Planning Guidance 3. Staff Deception Estimate 4. Commander's Deception Estimate 5. Plan development 6. Plan Review and Approval |
|
Discuss the difference between PSYOP and MILDEC |
Military deception can amplify, or create an artificial fog of war to mislead the enemy. Can be used in conjunction with MISO. MISO (PSYOP) uses selective truths to target the hearts and minds of the people to prompt a reaction. |
|
Describe Organizational responsibilities and C2 in relation to PSYOP |
Commander, USSTRATCOM has responsibility to coordinate IO across combatant command AOR boundaries. C2 is delegated by OPORD, FRAGO, EXORD, etc but STRATCOM has overall C2 for cross-boundary IO. |
|
Describe how intel supports PSYOP through target analysis |
PSYOP relies on accuracy of intel data to formulate expected Human Factors/reactions that PSYOP activity will effect. |
|
List the primary responsibilities of a Information Operations Officer (IO Cell Chief) |
Ensure all IO are integrated and synchronized in all planning processes of the combatant command staff |
|
State the fundamental duties and responsibilities of the Strike Group IWC/IWO |
Usually Carrier CO, O-5/1810; Responsible for all aspects of IO in the strike group: Warfare commander relationships, Reporting requirements, TACSIT (tactical situation), IW weapons posture |
|
Descibe TACSIT |
TACSIT 1- the exact location of strike group known to enemy TACSIT 2- the general location of strike group known to enemy TACSIT 3- the location of strike group unknown to enemy |
|
Describe crypto security |
component of COMSEC that results from the provision of technically sound cryptosystems and their proper use |
|
Describe transmission security |
component of COMSEC that results from all measures designed to protect transmissions from interception and exploitation |
|
Describe emission security |
component of COMSEC that results from all measures taken to deny unauthorized persons info of value that may be derived from interception of compromising emanations |
|
Describe physical security |
component that results from all physical measures necessary to safeguard classified equipment, material, and documents from unauthorized persons |
|
Discuss the advantages/disadvantages of EMCON |
Ship is harder to find/harder to communicate |
|
Discuss authority to impose EMCON |
Strike Group Commander, or emergency |
|
Discuss authority to break EMCON |
Strike Group Commander, or emergency |
|
Discuss the EMCON conditions |
A- radio silence A1 B- hide from satellites C- reduces ability of enemies to target D- essential equipment is authorized |
|
Explain the function of the following in relation to OFM: EEFI, BEADWINDOW, JCMA |
EEFI- Essential Elements of Friendly Information BEADWINDOW- rapid procedure used by circuit operators to police the security of insecure voice networks JCMA- Joint COMSEC Monitoring Agency |
|
Describe the purpose, scope, and applicability of the Intelligence Oversight Program |
Purpose: ensures all intelligence collection and activities are conducted in accordance with Federal Law, Executive Orders, DoD directives Scope/Applicability: applies to all DON Intel and non-intel components |
|
Define questionable intelligence activities |
Any activity that may violate Federal Law, Executive Order, DON policy |
|
Define special activities in relation to Intelligence Oversight |
Activities conducted in support of national foreign policy objectives abroad that are executed so the role of the US government is not apparent |
|
Define US person in relation to Intelligence Oversight |
An individual or organization that is entitled to protection from intelligence ops: citizen of the US, alien lawfully admitted for permanent residence, corporation that is incorporated in the US |
|
Discuss Intelligence Oversight reporting and training requirements |
All personnel that come in contact with collections data is required to take the OVSC 1800 training annually. |
|
Describe the purpose of USSID SP0018 and SP0018 Annex A |
USSID SP0018- publication that governs the collection on US persons USSID SP0018 Annex A- Instruction implementing FISA; an act of Congress that prescribes procedures for physical and electronic surveillance and collection of foreign intelligence between foreign powers |
|
Describe requirements to gain exceptions to USSID SP0018 and SP0018 Annex A |
USSID SP0018- approval of the US Foreign Intel Surveillance Court, Attorney General, or approval of DIRNSA/CHCSS USSID SP0018 Annex A- certification from Attorney General or court order |
|
Discuss the requirements for Raw Traffic Database Auditing |
Any SIGINT system that offers a significant risk of violating the privacy rights of citizens requires active auditing |
|
Describe 3 Types of IN in relation to NSRP (National SIGINT Requirement Process) |
Standing- request for sustained collection and production efforts is more than 90 days but less than 2 years Limited Duration- request for SIGINT collection and production efforts is from 0-90 days Research- Requests for SIGINT products/services in which information was acquired in the past. |
|
Discuss the 3 timeframes of Time Criticality in relation to NSRP (National SIGINT Requirement Process) |
1. Time critical- requests that must be acted upon within 3 days or less from submission 2. Time sensitive- Requests that must be acted upon within 4-29 calendar days after submission 3. Routine- action required in 30 or more calendar days from submission |