6.Intro to CWO Flashcards

1
Q

National Security Strategy (NSS)

A

-Highest level of strategic planning
-Prepared by president, his cabinet and support staff–submitted to congress
-Legal foundation for the document is spelled out in the Goldwater-Nichols Act of 1986, which helped streamline the military chain of command.
-More policy rather than strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

National Defense Strategy (NDS)

A

-Developed by the DOD and signed by the SecDef
-Set of overarching defense objectives that guide the DOD’s security activities and provide direction for the National Military Strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

National Defense Strategy (NDS) – Two main goals

A
  1. To restore America’s competitive edge by blocking global rivals Russia and China from challenging the U.S. and our allies.
  2. To keep those rivals from throwing the current international order out of balance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

National Defense Strategy (NDS) – Three lines of effort

A
  1. Build a more lethal force
  2. Strengthen alliances and find new partners
  3. Reform the Department
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

National Military Strategy (NMS)

A

–CJCS, JCS, CCMD, and OSD prepare the NMS and deliver to SecDef
–Briefly outlines the strategic aims of the armed services by supporting the NSS and implementing the NDS
–Chief source of guidance is the NSS.
–Provides focus for military activities by defining a set of interrelated military objectives from which the service chiefs and CCMD identify desired capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

National Military Strategy (NMS) – Five mission areas

A
  1. Respond to threats
  2. Deter strategic attack (and proliferation of WMD)
  3. Deter conventional attack
  4. Assure allies and partners
  5. Compete below the level of armed conflict (with a military dimension
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

National Military Strategy for Cyberspace Operations (NMS-CO)

A

The Armed Forces’ comprehensive strategic approach for using cyberspace operations to assure US military strategic superiority in the cyber domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Joint Publication (JP) 3–12, Cyberspace Operations

A

Sets forth joint doctrine to govern the activities and performance of the military in joint cyberspace operations, and provide considerations for military interaction with governmental, and non-governmental agencies, multinational forces, and other inter-organizational partners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Air Force Doctrine Document (AFDD) 3–12

A

The Air Force’s foundational doctrine publication for AF ops in, through, and from the cyberspace domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Air Force Policy Directive (AFPD) 17–2

A
  • Establishes Air Force policy for planning and executing Air Force and joint cyberspace operations
  • states the cyberspace operations related responsibilities of MAJCOMs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

COCOM

A

Non-transferable command authority – Authority to perform those functions of command over assigned forces involving organizing and employing commands and forces; assigning tasks; designating objectives; and giving authoritative direction over all aspects of military operations, joint training, and logistics necessary to accomplish the missions assigned to the command.
Logistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ADCON

A

The direction or exercise of authority over subordinate or other organizations with respect to administration and support.
Not a warfighting authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OPCON

A

The authority to perform the functions of command over subordinate forces involving organizing and employing commands and forces, assigning tasks, designating objectives, and giving authoritative direction necessary to accomplish the mission.
Delegatable
does not include authoritative direction for logistics or matters of administration, discipline, internal organization, or unit training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TACON

A

The authority over forces that is limited to the detailed direction and control of movements and maneuvers within the operational area necessary to accomplish missions or tasks.
Small scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Support (Command Authority)

A

– Aids, protects, complements, or sustains another force.
– Used when neither OPCON nor TACON is appropriate.
– SecDef specifies support relationships between CCDRs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

General Support

A

That support which is given to the supported force as a whole rather than to a particular subdivision thereof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Mutual Support

A

That support which units render each other against an enemy because of their assigned tasks, their position relative to each other and to the enemy, and their inherent capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Direct Support

A

A mission requiring a force to support another specific force and authorizing it to answer directly to the supported force’s request for assistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Close Support

A

That action of the supporting force against targets or objectives that are sufficiently near the supported force as to require detailed integration or coordination of the supporting action with the fire, movement, or other actions of the supported force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Department of Defense Information Network (DODIN)

A

– Renamed from the GIG, in 2013, this is the globally interconnected, end-to-end set of information capabilities.
– Includes all owned and leased communications and computing systems and service
– Supports the DOD, national security, and related IC missions and functions
– Provides capes for all operating locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cyber Mission Force (CMF)

A

– Directed by USCYBERCOM to be their action arm in and through cyberspace.
– Consisting of 133 Cyber Mission Teams, Joint Forces Headquarters-Cyber (JFHQ-C), and a Cyber National Mission Force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Drove CMF Creation – DODs 3 mission areas

A
  1. Secure, Operate, and Defend the DODIN
  2. Defend the Nation against cyberspace attack
  3. Provide CCMD support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Three lines of operations, by which the CMF carries out the three mission areas

A
  1. DODIN Operations
  2. Defensive Cyberspace Operations (DCO)
  3. Offensive Cyberspace Operations (OCO)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CMF three subordinate commands

A
  1. Cyber National Mission Force (CNMF)
  2. Cyber Protection Force (CPF)
  3. Cyber Combat Mission Force (CCMF)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

CNMF / CNMF-HQ

A

-Direct and synchronize full spectrum cyberspace operations to, on order, deter, disrupt, and if necessary, defeat adversary cyberspace actors in order to defend the DODIN, US critical infrastructure/key resources, and the nation
-defend the US and its interests against cyberspace attacks of significant consequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

National Mission Teams (NMTs)

A

– Aligned against a specific cyber threat.
– Tactical units - missions normally include defensive cyberspace operations-response actions (DCO-RA), in order to protect and defend the DODIN or other blue cyberspace, when ordered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

National Support Teams (NSTs)

A

Provide specialized technical, analytic, and planning support to NMTs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Cyberspace Protection Force (CPF)

A

– “Largest slice of CMF pie” 68 CPTs
– Enable a supported commander’s mission capabilities and in supporting infrastructure by conducting survey, secure, protect, and recover missions to prepare local cyberspace defenders to sustain an advanced cyberspace defense posture and to defend the supported commander’s critical assets and Cyberspace Key Terrain (C-KT)
– Conduct hunt missions to determine if a suspected compromise has taken place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Joint Force Headquarters-DoDIN (JFHQ-DODIN)

A

– Provides unity of command and unity of effort to secure, operate, and defend the DODIN.
– Operates as a C2 headquarters
– Employs an operational-level C2 approach.
– Delegated directive authority of cyberspace operations over all DOD agencies by CDRUSSTRATCOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Cyber Protection Teams (CPTs)

A

– Operate the CVA/H weapon system
– Real-time DCO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

DODIN CPTs

A

Conduct their mission on DODIN systems and networks in support of DISA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

CCMD CPTs

A

Assigned to specific MAJCOMs in support of the respective missions – Directed by MAJCOM they are under

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

National CPTs

A

– Fall under the Cyber Protection Force, operationally, but they report directly to CNMF-HQ.
– Operate within the AOR of CNMF includes U.S. critical infrastructure/key terrain (CI/KR) and national interests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Service CPTs

A

Aligned to a particular military branch – support missions within that service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Cyberspace Combat Mission Force (CCMF)

A

– Provide integrated cyberspace capabilities to support military operations and contingency plans.
– Where OCOs are carried out.
– Directed by JFHQ-C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

JFHQ-C

A

– Supports the geographic and functional CCMDs across the globe
– Execute OPCON over the Combat Mission Teams (CMTs) and Combat Support Teams (CSTs)
– led by dual-hatted service cyberspace component commanders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Army Cyber Command (ARCYBER)

A

-U.S. Central Command (USCENTCOM)

-U.S. Africa Command (USAFRICOM)

-U.S. Northern Command (USNORTHCOM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

U.S. Fleet Cyber Command (FLTCYBER)

A

-U.S. Indo-Pacific Command (USINDOPACOM)

-U.S. Southern Command (USSOUTHCOM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Marine Corps Forces Cyberspace Command (MARFORCYBER)

A

-U.S. Special Operations Command (USSOCOM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Air Forces Cyber (AFCYBER)

A

-U.S. European Command (USEUCOM)

-U.S. Strategic Command (USSTRATCOM)

-U.S. Transportation Command (USTRANSCOM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Combat Mission Teams (CMTs)

A

– 27 CMTs within the CMF
– Designated by the USCYBERCOM commander and operate at the tactical level of authority
– Comprised of dedicated interactive operators, analysts, targeteers, analyst reporters, linguists, and leadership.
– Conduct planned operations in support of CCMD contingency plans, crisis action plans, or other CCMD validated requirements for cyberspace effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Combat Support Teams (CSTs)

A

– Comprised of capability developers, OCO analysts and planners, and DCO analysts and DCO mitigation planners.
– Develop and employ offensive cyberspace capabilities to achieve, or directly support the achievement of CCMD objectives while being integrated, synchronized and/or de-conflicted with operations in other domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Defend the Nation Against Cyberspace Attack (CMF Mission Area)

A

– If directed by the president or the SecDef, the US military may conduct cyberspace operations to counter an imminent or on-going attack against the US homeland or interests in cyberspace
– To blunt attack and prevent damage to key infrastructure or loss of life.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Defend the Nation Against Cyberspace Attack (CMF Mission Area)

A

– If directed by the president or the SecDef, the US military may conduct cyberspace operations to counter an imminent or on-going attack against the US homeland or interests in cyberspace
– To blunt attack and prevent damage to key infrastructure or loss of life.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Secure, Operate, and Defend the DODIN (CMF Mission Area)

A

– Be able to secure its own networks against attack and recover quickly if security measures fail
– Prepare and be ready to operate in an environment where access to cyberspace is contested

46
Q

Provide CCMD Support (CMF Mission Area)

A

– OCOs in support of CCMDs directed by pres or SecDef to deter or defeat strategic threats in other domains

47
Q

DODIN Ops

A

– Proactive manner
– Designing, building, configuring, securing, operating, maintaining, and sustaining the information environment that we rely on for operations

48
Q

DCO

A

– Passive and active cyberspace defense activities
– Designed to change current paradigm where attackers have advantage
– Ability to discover, detect, analyze, and mitigate threats, to include insider threats

49
Q

OCO

A

Project power by the application of force in and through cyberspace. These operations are authorized like operations in the physical domains.

50
Q

Defensive Cyberspace Operations-Internal Defensive Measures (DCO-IDM)

A

– Hunting on friendly cyber terrain for threats that evade our security and directing appropriate internal responses.
– Detect, defend, analyze, and stop threats and vulnerabilities.

51
Q

Defensive Cyberspace Operations-Responsive Actions (DCO-RA)

A

– More-so about going after the threat less about defending.
– Can operate in redspace “best defense is a good offense” stop them before they get to us
– NMTs are the sole entity who conduct DCO-RAs

52
Q

Cyber Operational Preparation of the Environment (OPE)

A

– Non-intelligence enabling activities conducted to plan and prepare for followup cyber actions
– Testing a way into the box, pre-staging tools, creating/modifying accounts, setting up beacons, and much more

53
Q

Cyber Intelligence, Surveillance, and Reconnaissance (ISR)

A

Focuses on tactical and operational intelligence and on mapping adversary cyberspace to support planning and future OCO/DCO

54
Q

Information Operations (IO)

A

Intended to influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries while protecting our own.
3 Dimension
- Physical
- Information
- Cognative

55
Q

Physical Dimension (IO)

A

–Control systems, key decision makers, and supporting infrastructure that enable individuals and organizations to create effects.
– Includes, but is not limited to, people, command and control facilities, newspapers, books, microwave towers, laptops, smart phones, computers, or any other objects that are subject to empirical measurement
– Not confined solely to military or even nation-based systems and processes; it is a defused network connected across national, economic, and geographical boundaries.

56
Q

Information Dimension (IO)

A

– Where and how information is collected, processed, stored, disseminated, and protected
– Command and control of military forces is exercised and where the commander’s intent is conveyed

57
Q

Cognitive Dimension (IO)

A

– Minds of those who transmit, receive, and respond to or act on information and their processing, perception and judgement.
– Influenced by their individual and cultural beliefs, norms, vulnerabilities, motivations, emotions, experiences, morals, education, mental health, identities, and ideologies

58
Q

Information Assurance (IA)

A

– Process of processing, storing, and transmitting the right information to the right people at the right time

59
Q

Wing Cybersecurity Office (WCO)

A

Addresses all cybersecurity requirements on the base for IT under the control of the base communications squadron/flight, including IT of tenant units unless formal agreements exist

59
Q

Wing Cybersecurity Office (WCO)

A

Addresses all cybersecurity requirements on the base for IT under the control of the base communications squadron/flight, including IT of tenant units unless formal agreements exist

60
Q

Information Assurance Officer (IAO)

A

Unit-level position that acts as the single liaison between the organization and the WCO for all Computer Security (COMPUSEC) matters under the IA program

61
Q

Special Security Officer (SSO)

A

– Security management, operation, implementation, use and dissemination of all types of SCI material within their respective organization. Including dev of classification guides and markings
– Personnel security, communications security, physical security, information security, and/or computer security

62
Q

Information System/COMSEC Users

A

Responsible for knowing the required safeguards, and using them in accordance with their assigned duties

63
Q

OPSEC Process

A
  1. Identification of Critical Information
  2. Analysis of threats
  3. Analysis of vulnerabilities
  4. Assessment of risk
  5. Application of appropriate OPSEC countermeasures
64
Q

16th Air Force (AFCYBER)

A

Integrates multisource intelligence, surveillance, and reconnaissance, cyber warfare, electronic warfare, and information operations capabilities across the conflict continuum to ensure that our Air Force is fast, lethal and fully integrated in both competition and in war. Sixteenth Air Force provides mission integration of Information Warfare (IW) at operational and tactical levels… recognizing the role of information in creating dilemmas for adversaries in competition and, if necessary, future conflicts.

65
Q

616th Operations Center (616 OC)

A

Receives orders and tasks from U.S. Cyber Command and, in turn, tasks 16th AF subordinate units to perform a wide range of cyber missions in support of Air Force and joint force commanders
– C3MS Weapon System

66
Q

67th Cyberspace Wing (67 CW)

A

Lackland
Mission: Delivering cyberspace outcomes to generate a decisive advantage across the continuum of conflict for the Nation

Execution arm for generating, projecting, and sustaining combat power with the employment of the Cyberspace Vulnerability Assessment/Hunter (CVA/H) weapon system

The 67 CW consists of the following four groups:
(1) 67th Cyberspace Operations Group (67 COG)
(2) 318th Cyberspace Operations Group (318 COG)
(3) 567th Cyberspace Operations Group (567 COG)
(4) 867th Cyberspace Operations Group (867 COG)

67
Q

67th Cyberspace Operations Group (67 COG)

A

Lackland
The 67 COG has five active squadrons:
(1) 91st Cyberspace Operations Squadron (91 COS)
(2) 305th Cyberspace Operations Squadron (305 COS)
(3) 352nd Cyberspace Operations Squadron (352 COS)
(4) 375th Cyberspace Operations Squadron (375 COS)
(5) 390th Cyberspace Operations Squadron (390 COS)

mission is to provides forces to conduct Air Force computer network operations for United States Strategic Command, United States Cyber Command and other combatant commands. The group conducts computer network operations and warfare planning for the Air Force, joint task forces and combatant commanders. The group also conducts Secretary of Defense-directed special network warfare missions

68
Q

91 COS

A

Lackland
Mission: Conducts offensive cyber operations tasked by USCYBERCOM in support of world-wide Combatant Commander objectives. Executes computer network exploitation as a National Security Agency delegated authority to address intelligence community requirements. Degrades, disrupts, denies, deceives and exploits adversary information systems. Presents trained forces to USCYBERCOM as part of the CMF.

69
Q

305 COS

A

Ft. Gordon
Mission: Conducts offensive cyberspace operations in support of Combatant Commands

70
Q

352 COS

A

Hickam
Mission: Generate, conduct, and sustain offensive cyberspace operations.

71
Q

375 COS

A

Lackland
Mission: Conduct offensive cyberspace and ISR operations in support of Combatant Command objectives

72
Q

390 COS

A

Lackland
Mission: Generate mission-ready offensive cyber maneuver forces for USCYBERCOM and build cyber tacticians for our Service, Joint Force, and Nation.

73
Q

318th Cyberspace Operations Group (318 COG)

A

Lackland
Innovate, Partner & Deliver combat capability in, through, and from cyberspace through the development, testing, training and exercising of material and non-material solutions

The 318 COG consists of four squadrons:
(1) 39 Information Operations Squadron (39 IOS)
(2) 90 Cyberspace Operations Squadron (90 COS)
(3) 318 Range Squadron (318 RANS)
(4) 346 Test Squadron (346 TS)

74
Q

39 IOS

A

Hurlburt
Mission: To conduct qualification and advanced training to provide mission-ready information operations planners and cyber warfare operators for all Air Force Major Commands.

75
Q

90 COS

A

Lackland
Mission: Accelerate Global Vigilance, Reach and Power by rapidly developing joint cyber capabilities.

The 90 COS expeditiously integrates, innovates, and deploys cyberspace capabilities to achieve priority military objectives in and through air, space, and cyberspace.

76
Q

318 RANS

A

Lackland
Operate training and exercise ranges

77
Q

346 TS

A

Lackland
Mission: Execute mission relevant, responsive, and rigorous validation of Department of Defense Cyber-Warfare, Electronic-Warfare (EW), and Information-Warfare (IW) capabilities.

78
Q

567 COG

A

Scott
plans and executes cyberspace operations to assist supported commanders to fight in contested cyberspace environmen

The 567 COG consists of four squadrons:
(1) 92nd Cyberspace Operations Squadron (92 COS)
(2) 834th Cyberspace Operations Squadron (834 COS)
(3) 835th Cyberspace Operations Squadron (835 COS)
(4) 837th Cyberspace Operations Squadron (837 COS)

79
Q

92 COS

A

Lackland
Mission: To assure Air Force and DoD mission performance by employing CPTs and performing cyberspace vulnerability assessments (CVAs) and COMSEC assessments.

80
Q

834 COS

A

Lackland
Mission: To Employ and Exploit the unique advantages of Cyber Protection Teams in the Defense of AF and DoD Critical mission areas.

81
Q

835 COS

A

Scott
Mission: To protect critical Air Force and Department of Defense infrastructure and mission systems

82
Q

837 COS

A

Scott
Mission: Maintain combat superiority by dominating in cyberspace

83
Q

867th Cyberspace Operations Group (867 COG)

A

Meade
Offensive Cyberspace Operations (OCOs) and providing defensive capabilities to the CNMF.
The 867 COG Consists of four squadrons:
(1) 315th Cyberspace Operations Squadron (315 COS)
(2) 341st Cyberspace Operations Squadron (341 COS)
(3) 833d Cyberspace Operations Squadron (833 COS)
(4) 836th Cyberspace Operations Squadron (836 COS)

84
Q

315 COS

A

Meade
Mission: Find the enemy, exploit weaknesses, attack!

85
Q

341 COS

A

Meade
Mission: Train and deliver operationally focused Airmen to the Cyber National Mission Force (CNMF) in defense of the nation.

86
Q

833 COS

A

Lackland
Mission: To present, plan, and execute cyberspace operations in order to defend national information networks against cyber threats

87
Q

836 COS

A

Lackland
Mission: To present, plan, and execute cyberspace operations in order to defend national information networks against cyber threats

88
Q

688th Cyberspace Wing (688 CW)

A

Lackland
Mission: Engineer, build, operate, secure, defend and extend the Air Force cyberspace domain to enable and assure Air Force core missions and the Joint fight.

The 688 CW consists of four notable groups, of which, we will only discuss two:
(1) 26 Cyberspace Operations Group (26 COG)
(2) 690 Cyberspace Operations Group (690 COG)

89
Q

26th Cyberspace Operations Group (26 COG)

A

Lackland
performs cyberspace and active-defense operations to achieve full-spectrum cyberspace capabilities through its three squadrons.

The three squadrons that fall under the 26 COG:
(1) 26th Network Operations Squadron (26 NOS)
(2) 33d Network Warfare Squadron (33 NWS)
(3) 68th Network Warfare Squadron (68 NWS)

90
Q

26 NOS

A

Maxwell

91
Q

33 NWS

A

Lackland
AFNOC
Mission: Find and defeat the enemy.

92
Q

68 NWS

A

Lackland
Mission: Detect, prevent and assess risk of data content loss in Air Force networks.
CDA weapon system

93
Q

7th Intelligence Squadron

A

Meade
conduct red-team operations, DCO, or cyber intelligence operations in support of National Security Agency

94
Q

35th Intelligence Squadron

A

Lackland
Mission: Conduct ISR operations & analysis from and for cyberspace, leveraging cryptologic capabilities to enable USAF and joint operations.

95
Q

Title 10-Armed Forces

A

Subtitle A - General Military Law, including the Uniform Code of Military Justice (UCMJ)

Subtitle B - Army

Subtitle C - Navy and Marine Corps

Subtitle D - Air Force and Space Force

Subtitle E - Reserve Components

96
Q

Title 15- Commerce & Trade

A

Chapter 7 - National Institute of Standards and Technology (NIST)

Chapter 22 - Trademarks

Chapter 23 - Dissemination of Technical, Scientific, and Engineering Information

Chapter 63 - Technology Innovation

Chapter 100 - Cyber Security Research and Development

97
Q

Title 17-Copyright

A

Chapter 2 - Copyright Ownership and Transfer

Chapter 3 - Duration of Copyright

Chapter 5 - Copyright Infringement and Remedies

Chapter 7 - Copyright Office

Chapter 10 - Digital Audio Recording Devices and Media

98
Q

Title 18

A

Crimes and Criminal Procedure

99
Q

Title 18 §1030

A

Computer Fraud

100
Q

Title 18 §1343

A

Wirefraud

101
Q

Title 18 §1362

A

Communication lines

102
Q

Title 18 §2510-2522

A

Federal wire tap

103
Q

Title 18 §2701–2712

A

Stored Communications

104
Q

Title 32

A

National Guard

105
Q

Title 50

A

War and National Defense

106
Q

UCMJ

A

Article 2 - Persons subject to the UCMJ

Article 91 - Insubordinate conduct toward warrant officer, noncommissioned officer, or petty officer

Article 92 - Failure to obey order or regulation

Article 103a - Espionage

Article 103b - Aiding the enemy

Article 123 - Offenses concerning Government computers

Article 134 - General Article

107
Q

The Convention on Cybercrime (2001)

A

Budapest
first international agreement aimed at reducing computer-related crime by harmonizing national laws, improving investigative techniques, and increasing international cooperation

108
Q

2015 G-20 Summit

A

Ankara Turkey
All leaders agreed international law applies to us all in cyberspace and that we will all abide by the norms. We also would not allow cyberspace to be used to steal IP

109
Q

United Nations Convention against Transnational Organized Crime

A

AKA Palermo Convention
Obligates state parties to enact domestic criminal offenses that target organized criminal groups and to adopt new frameworks for extradition, mutual legal assistance, and law enforcement cooperation