CRYPTOLOGIC OPERATIONS Flashcards
AN/SSX-1
collects ELINT and correlates it to specific transmissions from ships and aircraft
AN/SLQ-32
the primary EW system in use by U.S. Navy ships
provides early warning, ID and DF capability
interfaced with the MK36 Decoy Launching System, able to launch chaff and infrared decoys
ELECTRONIC WARFARE
use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or defend enemy assaults
Electronic Support (ES)
Electronic Protection (EP)
Electronic Attack (EA)
SIGINT
Signals Intelligence (SIGINT)
- Intel derived from comms, radar, and weapon systems
OPSEC
Operations Security
Identifies, controls, and protects sensitive but unclassified information about an operation, mission, or activity.
ENLISTED RATES AND DESIGNATORS
- Designators: 1810, 6810 (LDO), 7810 (CWO)
- Rate: Cryptologic Technician (CT)
- CTR (collection) - collect and process COMINT, work in SSES (Ship’s Signals Exploitation Space)
- CTM (maintenance) - maintain equipment in SSES
- CTT (technical) - operate/maintain the SLQ-32 and EW equipment. Collect and process ELINT.
- CTI (interpreter) -linguistic support
- CTN (network) - Direct Support (DIRSUP) to staff, conducts Computer Network Operations (CNO)
OPTASK CRYPTOLOGY
Navy-Wide Standing OPTASK Cryptology
Provides the framework and guidance for cryptologic operations
CNO
Computer Network Operations
used to disrupt, disable, degrade, or deceive an enemy’s C2, and protect friendly C2
Computer Network Attack (CNA)
Computer Network Defense (CND)
Computer Network Exploitation (CNE)
MILDEC
deliberately misleading the enemy causing them to take specific actions/inactions
PCMS / Normandy
AN/SLA-10D
Blanker Unit associated with the AN/SLQ-32
It blanks out own ship’s radars
OPTASK IO
Navy-wide OPTASK Information Operations
Provides the framework and guidance for Strike Group IO.
encompasses the core capabilities of CNO, MISO, MILDEC, EW, OPSEC
TITLE 10
- organizational structure of the DOD
- retains power with POTUS
- Subjected to UCMJ
- Restricts the domestic mission with Posse Comitatus (restricts the government’s ability to use the U.S. military as a police force)
Computer network defense (CND)
DCO
DCO
actions taken to discover, detect, analyze, and mitigate network threats
CRC
Cryptologic Resource Coordinator
Works for the Staff N2.
They send out a daily Cryptologic Coverage Plan (CCP) tasking all SSES equipped ship’s in the SG with priorities.
also responsible for determining what Cryptologic Carry On Program (CCOP) gear is needed
Cyber Operations
OCO (Offensive Cyberspace Operations)
DCO (Defensive Cyberspace Operations)
DODIN operations