IDW: TechFundamentals/OPSEC/Security Flashcards
Wavelength
Physical distance of a wave or cycle
Frequency
Number of cycles that occur in one second; usually in hertz.
Ducting
Temperature or moisture conditions in atmosphere that allow a greater bending of radio waves.
Refraction
Waves that changes direction when passing from one medium to another.
Multiplexing
For simultaneous transmission of two or more signals over a common carrier wave.
Modulation
Impressing intelligence upon a transmission medium.
Demodulation
Removal of intelligence from a transmission medium.
Bandwidth
Space within the (RF) Radio Frequency spectrum that’s signal occupies; expressed in Hertz.
Keying
Inserting noise or data onto a frequency.
Propagation
Movement through a medium.
Continuous Wave
Unmodulated frequency that doesn’t carry additional modulated intelligence and is transmitted for use in some radio transmissions.
Azimuth
Angular measurement in the horizontal plane used in reference to altitude.
Define Operational Security.
Systematic, proven process that identifies, controls and protects generally sensitive, but unclassified information about a mission, operation or activity.
Air Search RADAR
Detect & determine position, course & speed of air targets; used as early warning devices.
Surface search RADAR
Used to detect presence of surface craft & low flying aircraft/navigational aid in coastal waters and poor weather conditions.
Fire Control RADAR has how many phases?
Three
What are the 3 phases of Fire Control RADAR?
Designation - Radar is directed to general location of desired target.
Acquisition - Radar searches small volume of space in a prearranged pattern until target is located.
Tracking - Once target is located, radar system automatically follows target motions.
What is the 5 step planning process?
Identify Critical Information (CI)
Analyze the threat
Analyze the vulnerabilities
Assess the risk
Apply the countermeasures
PAO
Target Audience - Public
Intent - Inform
Method - Public Release
OPSEC
Target Audience - Adversary
Intent - Deny
Method - Five-Step Process
Define Critical Information
Information about friendly activities, intentions, capabilities, or limitations an adversary seeks in order to gain a military, political, diplomatic, economic or technical advantage.
What directives govern personnel security?
- 30: Personnel Security Manual
5510. 36: Information Security Manual
Top Secret
Orange; cause grave damage to the national security.
Secret
Red; Cause serious damage to the national security.
Confidential
Blue; Could be expected to cause damage to national security.
SCI (Sensitive Compartmental Information)
Yellow; Requires a higher level of control (smaller group of ppl)
Unclassified
Green; Potential to the harmful.
What does “need to know” mean?
A determination that a recipient requires access to specific classified information in order to perform their job.
Top Secret Investigation
Favorably completed SSBI every 5 years
Secret Investigation
Favorably completed NACLC every 10 years.
Confidential Investigation
Favorably completed NACLC every 15 years.
Anti-Terrorism Force Protection (ATFP)
Adjustable defensive posture set for mitigation of potential threats.
Events to be reported to SSO.
Arrests and convictions.
Adverse involvement with law enforcement.
Bad credit
Alcohol abuse
Drug involvement
Mental health issues
Outside employment
Security violations
Purpose of EAP
Plan for safeguarding classified material in the event of an emergency; ties into Emergency Destruction.
Procedures for hard copy classified material for Hand Carry
Must have courier card or courier letter
Must go directly to destination
If stopped or pulled over, show military ID and courier card/letter
FPCON Levels
Normal: General global threat of possible terrorist threat; routine security posture
Alpha: Increased general threat of possible terrorist activity.
Bravo: More predictable threat of terrorist activity exists.
Charlie: Incident occurred or targeting personnel/facilities is likely.
Delta: Applies in imminent area where a terrorist where attack has occurred or Intel that an attack is imminent.
SF700
Security Container Information
SF701
Activity Security Checklist
SF702
Security Container Check Sheet
SF703
Top Secret Coversheet
SF312
Classified Non-disclosure agreement
What is a RAM
Random Anti-Terrorism Measure: Random implementation of higher FPCON measures in consideration of local terrorist capabilities.
What is PED (Personal Electronic Devices)?
Personal Electronic Device are prohibited in all classified spaces.
Difference between a Security Violation and Practice Dangerous to Security.
Security Violation: A compromise of classified info to persons not authorized to receive it.
PDS: Failure to comply with the provisions of security regulations which could cause a compromise of classified information.
Define an Access List
Personnel who need uninhibited access to a space to fully perform their duties.
Responsibilities of DONCAF
Authority on authorizing all clearances.
What is Two Person Integrity (TPI)
Ensures that no one person has complete access to sensitive information.
Procedures for sanitizing an area.
Removal of information from the media or equipment such that data recovery using any known technique or analysis is prevented.
What is Joint Personnel Adjudication System (JPAS)
Website used to hold personnel information involving security clearances.
Purpose of SF86
Approved method of requesting PSI products from OPM.