Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

60 Cards in this Set

  • Front
  • Back

Explain the procedures for the transmission and handling of Privacy Act Information

Request for a "routine use" disclosure of info must be in writing and state that it is being used for "routine use"

Explain the adjudication process

1. Investigation - PSI, Suitability, Security Eligibility

2. SAER- Security Access Eligibility Report

3. Appeals- PSAB

4. LOI- Member has 15 days to respond

5. LOD- Letter of Denial, 30 days to respond

6. JCAVS- Joint Clearance and Access Verification System

State the purpose of an SF-86

Document used as a basis for current and future investigations. (e-QUIP)

State the purpose of DD Form 1847-1

SCI Nondisclosure Statement

State the purpose of the Adjunct Faculty Program

To utilize subject matter expertise to meet global training needs.

State the minimum DLPT score standard for CTI

L2/R2 or higher except for : Arabic, Persian-Farsi, Chinese: 1+/2 or 2/1+

Name the languages associated with the following categories

Category 1: French, Italian, Portugese, Spanish

Category 2: German

Category 3: Hebrew, Persian-Farsi, Dari, Russian, Serb-Croatian, Tagalog, Thai, Urdu

Category 4: Arabic, Chinese, Korean, Pashto

State the emergency destruction priorities

Priority 1: All Crypto/COMSEC/EKMS Keying Material

Priority 2: Operational SCI - Code word/targeting info

Priority 3: Less sensitive administrative SCI & Collateral Material

Describe the Navy's organizational structure as defined by Annexes A & J of FLTCYBERCOM/COMTENTHFLT OPORD 2000



Describe the functions of USSTRATCOM

USSTRATCOM- global deterrence capabilities to combat adversary WMD worldwide

Describe the functions of CYBERCOM

plans, coordinates, integrates, synchronizes, and conducts activities for full-spectrum military cyberspace OPS

Describe the functions of JFCC-ISR

Director, DIA; coordinates global Intel collection, key enabler to achieving global situational awareness

Describe the functions of JFCC-Space

Conducts planning, execution & force management for space OPS

Describe the functions of JIOWC

Joint IO Warfare Center- plans, integrates, and synchronizes IO for Joint Force Commanders

Define the 3 formal categories of CSG's (Cryptologic Support/Service Group)

Permanent, Service Component, Expeditionary

Define the customer relationship functions of CSG's

provide reach-back support

Define the SIGINT production functions of CSG's

Production chain, Sanitize, Collateral level support

Define the SIGINT operational relationships of CSG's

SIGINT LNO's (Liason Officer) used for site specific needs

Define Rules of Engagement

directives that delineate the circumstances & limitations under which U.S. forces will initiate and/or continue combat engagement

Define Law of War (armed conflict)

that part of international law that regulates conduct of armed hostilities

Define No-strike list (NSL)

list of geographic areas, complexes, or installations not planned for capture or destruction; may violate the Law of Armed Conflict (LOAC) or interfere with friendly relations

Define Restricted target list (RTL)

list of restricted targets nominated by elements of the joint force

Define Battle Damage Assessment (BDA)

timely and accurate estimate of damage from the application of military force against an objective

Define Information Operations

the actions taken to affect adversary's IO systems while defending our own, using the 5 core capabilities

Define Information Warfare

IO conducted during times of War or conflict

Describe Target Development

To produce, from approved targets, a target nomination list (TNL) that identifies those elements within an adversary's power base that most closely support JFC's objectives

Define Time Sensitive Targeting and its six phases

Process in place that reduces the Kill Chain for Targets requiring immediate response because they pose or will pose a danger to friendly forces: 1. FIND, 2. FIX, 3. TARGET, 4. TRACK, 5. ENGAGE, 6. ASSESS

Describe how the 5 core capabilities of IO are applied

both offensively and defensively:

CNO- defending our networks/attacking adversaries

EW- jam radars, allow US/friendly forces to do surveillance and reconnaisance

MISO- influence human reaction

MILDEC- protect our strike groups/infiltrate the adversaries

OPSEC- kept as a norm to not release sensitive information for adversaries to exploit

Describe the role of the following IO resources:

SSN, SSGN, EA-6B Prowler, E-2C Hawkeye

SSN- Nuclear powered Fast attack Submarine

SSGN- Nuclear powered Cruise Missile Submarine

EA-6B Prowler- first electronic warfare aircraft, ability to neutralize hostile radars, umbrella of protection

E-2C Hawkeye- tactical airborne warning and control system; early warning of hostile aircraft

Describe the role of the following IO resources: P-3C Orion, EP-3E, RC-135, RQ-1A Predator, EC-130H

P-3C Orion- ASW aircraft

EP-3E- Navy's only land-based multi-intelligence reconnaisance aircraft, worldwide near real time tactical SIGINT

RC-135- AF version of the EP-3

RQ-1A Predator- Unmanned Aerial Vehicle

Describe the role of the following IO resources: EC-130H, U-2, EA-18G Growler

EC-130H- modified C-130 aircraft, uses jamming to prevent comms or degrade C2 of enemy weapons systems

U-2- Spy Plane used by AF, China, CIA, and NASA

EA-18G Growler- Electronic Attack version of F/A-18F

Discuss MILDEC to include the means of deception

Physical- Inflatables, decoys, etc.

Technical- deceptive comms

Administrative- Pictures, papers

Discuss PSYOP (MISO)

Planned use of propaganda and other psychological actions having the primary purpose of influencing opinions, emotions, attitudes, and behavior of hostile foreign groups to support national objectives


Those actions executed to deliberately mislead adversary decision makers as to friendly military capabilities, intentions, and OPS, thereby causing the enemy to take specific actions/inactions that will help accomplish national objectives

Discuss the 6 phases of MILDEC planning process

1. Mission Analysis

2. Planning Guidance

3. Staff Deception Estimate

4. Commander's Deception Estimate

5. Plan development

6. Plan Review and Approval

Discuss the difference between PSYOP and MILDEC

Military deception can amplify, or create an artificial fog of war to mislead the enemy. Can be used in conjunction with MISO. MISO (PSYOP) uses selective truths to target the hearts and minds of the people to prompt a reaction.

Describe Organizational responsibilities and C2 in relation to PSYOP

Commander, USSTRATCOM has responsibility to coordinate IO across combatant command AOR boundaries. C2 is delegated by OPORD, FRAGO, EXORD, etc but STRATCOM has overall C2 for cross-boundary IO.

Describe how intel supports PSYOP through target analysis

PSYOP relies on accuracy of intel data to formulate expected Human Factors/reactions that PSYOP activity will effect.

List the primary responsibilities of a Information Operations Officer (IO Cell Chief)

Ensure all IO are integrated and synchronized in all planning processes of the combatant command staff

State the fundamental duties and responsibilities of the Strike Group IWC/IWO

Usually Carrier CO, O-5/1810; Responsible for all aspects of IO in the strike group: Warfare commander relationships, Reporting requirements, TACSIT (tactical situation), IW weapons posture

Descibe TACSIT

TACSIT 1- the exact location of strike group known to enemy

TACSIT 2- the general location of strike group known to enemy

TACSIT 3- the location of strike group unknown to enemy

Describe crypto security

component of COMSEC that results from the provision of technically sound cryptosystems and their proper use

Describe transmission security

component of COMSEC that results from all measures designed to protect transmissions from interception and exploitation

Describe emission security

component of COMSEC that results from all measures taken to deny unauthorized persons info of value that may be derived from interception of compromising emanations

Describe physical security

component that results from all physical measures necessary to safeguard classified equipment, material, and documents from unauthorized persons

Discuss the advantages/disadvantages of EMCON

Ship is harder to find/harder to communicate

Discuss authority to impose EMCON

Strike Group Commander, or emergency

Discuss authority to break EMCON

Strike Group Commander, or emergency

Discuss the EMCON conditions

A- radio silence


B- hide from satellites

C- reduces ability of enemies to target

D- essential equipment is authorized

Explain the function of the following in relation to OFM: EEFI, BEADWINDOW, JCMA

EEFI- Essential Elements of Friendly Information

BEADWINDOW- rapid procedure used by circuit operators to police the security of insecure voice networks

JCMA- Joint COMSEC Monitoring Agency

Describe the purpose, scope, and applicability of the Intelligence Oversight Program

Purpose: ensures all intelligence collection and activities are conducted in accordance with Federal Law, Executive Orders, DoD directives

Scope/Applicability: applies to all DON Intel and non-intel components

Define questionable intelligence activities

Any activity that may violate Federal Law, Executive Order, DON policy

Define special activities in relation to Intelligence Oversight

Activities conducted in support of national foreign policy objectives abroad that are executed so the role of the US government is not apparent

Define US person in relation to Intelligence Oversight

An individual or organization that is entitled to protection from intelligence ops: citizen of the US, alien lawfully admitted for permanent residence, corporation that is incorporated in the US

Discuss Intelligence Oversight reporting and training requirements

All personnel that come in contact with collections data is required to take the OVSC 1800 training annually.

Describe the purpose of USSID SP0018 and SP0018 Annex A

USSID SP0018- publication that governs the collection on US persons

USSID SP0018 Annex A- Instruction implementing FISA; an act of Congress that prescribes procedures for physical and electronic surveillance and collection of foreign intelligence between foreign powers

Describe requirements to gain exceptions to USSID SP0018 and SP0018 Annex A

USSID SP0018- approval of the US Foreign Intel Surveillance Court, Attorney General, or approval of DIRNSA/CHCSS

USSID SP0018 Annex A- certification from Attorney General or court order

Discuss the requirements for Raw Traffic Database Auditing

Any SIGINT system that offers a significant risk of violating the privacy rights of citizens requires active auditing

Describe 3 Types of IN in relation to NSRP (National SIGINT Requirement Process)

Standing- request for sustained collection and production efforts is more than 90 days but less than 2 years

Limited Duration- request for SIGINT collection and production efforts is from 0-90 days

Research- Requests for SIGINT products/services in which information was acquired in the past.

Discuss the 3 timeframes of Time Criticality in relation to NSRP (National SIGINT Requirement Process)

1. Time critical- requests that must be acted upon within 3 days or less from submission

2. Time sensitive- Requests that must be acted upon within 4-29 calendar days after submission

3. Routine- action required in 30 or more calendar days from submission