CRYPTOLOGIC OPERATIONS Flashcards
AN/SSX-1
collects ELINT and correlates it to specific transmissions from ships and aircraft
AN/SLQ-32
the primary EW system in use by U.S. Navy ships
provides early warning, ID and DF capability
interfaced with the MK36 Decoy Launching System, able to launch chaff and infrared decoys
ELECTRONIC WARFARE
use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or defend enemy assaults
Electronic Support (ES)
Electronic Protection (EP)
Electronic Attack (EA)
SIGINT
Signals Intelligence (SIGINT)
- Intel derived from comms, radar, and weapon systems
OPSEC
Operations Security
Identifies, controls, and protects sensitive but unclassified information about an operation, mission, or activity.
ENLISTED RATES AND DESIGNATORS
- Designators: 1810, 6810 (LDO), 7810 (CWO)
- Rate: Cryptologic Technician (CT)
- CTR (collection) - collect and process COMINT, work in SSES (Ship’s Signals Exploitation Space)
- CTM (maintenance) - maintain equipment in SSES
- CTT (technical) - operate/maintain the SLQ-32 and EW equipment. Collect and process ELINT.
- CTI (interpreter) -linguistic support
- CTN (network) - Direct Support (DIRSUP) to staff, conducts Computer Network Operations (CNO)
OPTASK CRYPTOLOGY
Navy-Wide Standing OPTASK Cryptology
Provides the framework and guidance for cryptologic operations
CNO
Computer Network Operations
used to disrupt, disable, degrade, or deceive an enemy’s C2, and protect friendly C2
Computer Network Attack (CNA)
Computer Network Defense (CND)
Computer Network Exploitation (CNE)
MILDEC
deliberately misleading the enemy causing them to take specific actions/inactions
PCMS / Normandy
AN/SLA-10D
Blanker Unit associated with the AN/SLQ-32
It blanks out own ship’s radars
OPTASK IO
Navy-wide OPTASK Information Operations
Provides the framework and guidance for Strike Group IO.
encompasses the core capabilities of CNO, MISO, MILDEC, EW, OPSEC
TITLE 10
- organizational structure of the DOD
- retains power with POTUS
- Subjected to UCMJ
- Restricts the domestic mission with Posse Comitatus (restricts the government’s ability to use the U.S. military as a police force)
Computer network defense (CND)
DCO
DCO
actions taken to discover, detect, analyze, and mitigate network threats
CRC
Cryptologic Resource Coordinator
Works for the Staff N2.
They send out a daily Cryptologic Coverage Plan (CCP) tasking all SSES equipped ship’s in the SG with priorities.
also responsible for determining what Cryptologic Carry On Program (CCOP) gear is needed
Cyber Operations
OCO (Offensive Cyberspace Operations)
DCO (Defensive Cyberspace Operations)
DODIN operations
Defensive Cyberspace Operations (DCO)
DCO provides the ability to discover, detect, analyze, and mitigate threats
JP 3-13
Information Operations
Joint pub for the planning, preparation, execution, and assessment of IO
5 PILLARS OF INFORMATION OPERATIONS
- COMPUTER NETWORK OPERATIONS
- CNA
- CNE
- CND
- MISO ( FORMERLY PSYOPS)
- MILITARY DECEPTION (MILDEC)
- ELECTRONIC WARFARE
- ES
- EA
- EP
- OPSEC
SSEE Increment E/F
Ship’s Signal Exploitation Equipment
Electronic Attack (EA)
using the RF spectrum to disrupt, deny, and degrade, the enemy’s ability to use the spectrum.
ex. jamming, active decoys
EMCON
EMISSIONS CONTROL
The selective/controlled use of emitters for OPSEC
- EMCON A – No Emissions
- EMCON B – Limited; Only critical communications and radar
- EMCON C – Limited; Specific to mission/ship identifying signatures IE. Radar
- EMCON D – No Restrictions
Electronic Support (ES)
search, identify, and locate sources of electromagnetic energy for threat recognition
(threat warning, direction finding)
SLQ-32
Computer network exploitation (CNE)
infiltration of the enemy’s network to extract and gather intel data.
Computer network attack (CNA)
using computer networks to disrupt, deny, degrade, or destroy information on enemy computers and networks.
MISO (PSYOPS)
Military Information Support Operations (MISO)
Operations that promote favorable behavior to U.S
Includes air dropped pamphlets, broadcasts.
TITLE 50
FISA
The Foreign Intelligence Surveillance Act
intelligence agencies, intelligence activities, and covert action
MK-36
Decoy Launching System
launches chaff and IR decoys under control of SLQ-32
Electronic Protection (EP)
protection of personnel, facilities, or equipment against EW
PCMS (passive counter-measures system), EMCON
SIGWO
Signals Warfare Officer
division officer for both SSES and the EW module
CRITIC
Time-sensitive message released for a National Security event.
Must be identified by SSES personnel within 3 minutes.
The goal is that the President will be in receipt in 10 minutes.
Precedence is Flash-override (W).
HOSTILE ACTS, TERRORIST ACTS, POLITICAL DISRUPTION/INSTABILITY
CR-1501 - Handling of Critical Information
EO 12333
PCMS
Passive Countermeasures System (PCMS)
a radar absorbent that minimizes radar signature and makes ships looks smaller
used for military deception and EP
DEFINITION OF US PERSON
- A US citizen or Permanent Resident
- Corporations (incorporated in the U.S.)
- Associations (primary membership composed of U.S. persons)
- US Flagged ship/aircraft
FOURTH AMENDMENT
- Protects against unreasonable search and seizure
- Requires probable cause for a search warrant