CRYPTOLOGIC Flashcards

1
Q

Explain why Intelligence Oversight was established

A

The need for a Department of Defense (DoD) Intelligence Oversight (IO) program came about as a result of certain activities conducted by DoD intelligence and counter-intelligence units against U.S. persons involved in the Civil Rights and anti-Vietnam War movements. During the 1960s and 1970s, the United States experienced significant civil demonstrations from protesters associated with these movements. Some of these demonstrations were believed to be beyond the ability of civilian authorities to control, and military forces were used to assist in the restoration of order. Units deploying for this purpose discovered they needed basic pre-deployment intelligence to perform their missions. The Army, designated as executive agent for providing aid to civilian authorities, requested assistance from the Federal Bureau of Investigation (FBI). When the FBI was unable to provide the information needed, the Army began collecting it. Over time, this collection mushroomed and led to abuse of the Constitutional rights of our citizens. Eventually, DoD intelligence personnel were using inappropriate clandestine and intrusive means to collect information on the legitimate political positions and expressions of U.S. persons, accumulating that information in a nationwide data bank, and sharing that information with law enforcement authorities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the purpose of USSID SP0009

A

Exception to disseminate SIGINT on host nation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the purpose of USSID SP0018

A

Exception to disseminate SIGINT in reference to a US Person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define and discuss the functions of SSES

A

Where specially detached enlisted cryptologic personnel from NAVSECGRU monitor SIGINT and ELINT emanations. Exploited SIGINT is passed along to pertinent users in the battle group for use in support of operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define and discuss the functions of SUPPLOT

A

The function of SUPPLOT is to gather indications and warning (I&W) information and pass it quickly to the pertinent warfare commander(s). SUPPLOT serves as a focal point and fusion center for all-source operational intelligence information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define and discuss the functions of CVIC

A

CVIC must be responsive to the air wing, ship, and embarked staff(s). This involves a great deal of coordination with other functional areas. two major functional groups; Mission Planning (MP) and Multi Sensor Interpretation (MSI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain SIGNALS ANALYSIS

A

Analysis of foreign signals to recover parameters and/or intelligence from said signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain CRYPTANALYSIS:

A

Analysis of foreign ciphers to recover intelligence from the ciphered information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain TRAFFIC ANALYSIS

A

Analysis of foreign communications frequency usage and sent traffic to determine operational trends and recover network construction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain FUSION ANALYSIS

A

Multi-source, multi-intelligence analysis to provide operational commanders and decision makers accurate Indications and Warning (I&W) information, tailored product reports, and to help refine further analysis in response to customer demands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Discuss RASIN Manua

A

RAdio SIgnals Notation (RASIN)Manual
A technical document used in the exploitation of signals of interest. Contains external and internal parameter information and standardizes the classification of signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Discuss USSID

A

United States Signals Intelligence Directives.(USSID)

Directive documents for conducting and reporting on the performance of Signals Intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe LOS communication

A

Line Of Sight (LOS) Communications require that the transmitter and receiver must be within the Radio Horizon of one another for effective communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define the Doppler Effect

A

The Change in frequency (phase shift) of a signal based on the movement of the transmitter as compared to the receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Sampling and how it relates to Signals Collection

A

A signal which is analog (continuous time) in nature can be converted to a digital (discrete time) signal. (Known as ADC - Analog to Digital Conversion).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain Direction Finding and Geo-Location

A

Providing the rough location for a signal transmitter by calculating the Time Difference Of Arrival (TDOA) or the Frequency Difference Of Arrival (FDOA) at multiple receivers at different geographic locations to triangulate the emitters position.

17
Q

Discuss the three dimensions that make up an Information Environment.

A
  • Individuals
  • Organizations
  • Systems
18
Q

What are the two types of warfare planning.

A
  • deliberate-planning

* crisis action planning

19
Q

What is COG?

A

center of gravity — The source of power that provides moral or physical strength, freedom of action, or will to act.

20
Q

What is DP?

A

decisive point — A geographic place, specific key event, critical factor, or function that, when acted upon, allows commanders to gain a marked advantage over an adversary or contribute materially to achieving success.

21
Q

What are the six phases of the Joint targeting cycle?

A
  • Commander’s Objectives
  • Target Development and Prioritization
  • Capabilities Analysis
  • Commander’s Decision and Force Assignment
  • Mission Planning and Force Execution
  • Assessment
22
Q

What is a SOFTKILL?

A

• Making a target non-capable through mean that leave no physical damage. An example would be a Denial of Service attack versus a computer.

23
Q

What is a HARDKILL?

A

• Is making a target non-capable physically, typically through whole or partial destruction. An example would a 500 pound bomb strike from an FA-18E.

24
Q

24) What are the indicators for each message precedence:

A
  • Routine- “R”
  • Priority-“P”
  • Immediate-“O”
  • Flash-“ZZ”
  • Flash Overide-“WW”
25
Q

Define Critic

A

Critical Information concerning foreign situations and other related developments that affect the national security interests of the United States to such an extent that it may require the immediate attention of the President and the National Security Council.

26
Q

Define KL

A

• Klieglight-Used to forward time-sensitive serialized SIGINT technical information.

27
Q

Define TACREP

A

Concise, unserialized reporting used to keep NSA, tactical commanders, and national, theater, local, and tactical-level non-SIGINT organizations advised of the status of continuing or potential threats, and other events of high interest

28
Q

Define TACELINT

A

Tactical ELINT. Signals analysis, interpretation, and production of electronic intelligence on foreign non-communications electromagnetic emitters

29
Q

Define CCP

A

Tasking message sent by AOR Commanders (C2F, C6F, etc) or their designated agents via SOTA (SIGINT Operational Tasking Authority), usually the embarked CRC, that designated what units and there gear will be responsible for specific SIGINT tasking.

30
Q

What is INTELINK?

A

TS/SCI Internet Resource for intelligence customers and agencies. It uses many common tools to provide intelligence resources in a web page format.(HIGH SIDE GOOGLE)

31
Q

What is SEALINK?

A

Office of Naval Intelligence web-based tool for data-based intelligence on primarily civilian vessels.

32
Q

What is GCCS-M?

A

• GCCS-M, Global Command and Control Systems Maritime also known as JMCIS, is an automated Command, Control, Communications, Computers, and Intelligence (C4I) system with an interface to a variety of military communications and computer systems. GCCS-M is designed to meet unique tactical situation assessment, data correlation, and display needs of the battle group, force commanders, subordinate warfare commanders, ship commanding officers, and shore command centers