Section 109 Flashcards

1
Q

109.3k1 Discuss Electromagnetic jamming.

A
  • Electromagnetic Spectrum
  • EM jamming is the deliberate radiation, re-radiation, or reflection of EM energy for the purpose of preventing or reducing an enemy’s effective use of the EMS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

109.2a Define and discuss EW as an IO core competency.

A

Electronic Warfare refers to any military action involving the use of EM and directed energy to control the EM spectrum or to attack the adversary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

109.3k2 Discuss Electromagnetic deception.

A

The deliberate radiation, re-radiation, alteration,or suppression, of electromagnetic energy in a manner intended to convey misleading information to an enemy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

109.3k3 Discuss Comms EA.

A

[classified]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

109.4a1 Military acoustic deception

A

Acoustic Deception entails the use of sound waves to simulate or conceal forces or movement both in air and under water.

  • NTTP 3-58.1 (ROOFGANG)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

109.5a Define and discuss PSYOP.

A
  • PSYOP - Psychological Operations
  • PSYOP’s convey selected information and indicators to influence emotions, motives, objective reasoning, and behavior.
  • A PSYOP is a weapon whose effectiveness is limited only by the ingenuity of the commander using it.
    • PSYOP is also known as MISO, Military Information Support to Operations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. 5b Discus the following PSYOP media products and the advantages/disadvantages of each.:
  2. Visual
  3. Print
  4. Audio
A
  • A psychological warfare campaign is a war of the mind.
  • Your primary weapons are sight and sound.
  • PSYOP’s can be disseminated by face-to-face communication.
  • Audio visual means (television)
  • Audio media (radio or loudspeaker)
  • Visual media (leaflets, newspapers, books, magazines and/or posters).
  • The weapon is not how its sent, but the message it carries and how that message affects the recipient.
    • SOURCE: http://www.psywarrior.com/psyhist.html
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

109.1c Describe and define the duties of the EWO

A
  • Electronic Warfare Officer
  • Principal EW planner
  • Develops Operation plans and concept plans.
  • Plans, Monitors, and coordinates routine EW operations and Joint EW training and exercises.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

109.1c Describe and define the duties of the SSES DIVO / SIGWO

A

Ships signals exploitation space division officer / signal warfare officer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

109.1c Describe and define the duties of the ACRC

A

Assistant Cryptologic Resource Coordinator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

109.1c Describe and define the duties of the CRC

A
  • Cryptologic Resource Coordinator
  • Manages the OTC’s cryptologic asset’s
  • OTC = Officer In Tactical Command
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

109.5c Explain the difference between PSYOP and Public Affairs.

A
  • PSYOP’s influence emotions, motives, objective reasoning, and behavior.
  • Military Public Affairs plan and coordinate community engagement activities to support the commander’s operational objective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

109.5d Discuss the relationship among maritime influence, IO, Public Affairs, and strategic communications.

A
  • The purpose of Information Operations (IO) is to influence the information environment of adversaries by changing their ability to make decisions, while simultaneously defending the friendly capability to make proper decisions.
  • Within the information environment there are three conceptual dimensions: connectivity, content, and cognitive.
  • Connectivity refers to the physical or electronic links, which enable information to flow.
  • Content is comprised of the words, images, databases, etc. that contain the information itself.
  • The cognitive dimension exists in the mind. This is where the individual processes the received information according to a unique set of perceptions. This is where they make their decisions.
  • Strategic Communications fall into the connectivity dimension. This includes allowing allies to communicate securely while denying the same to adversaries.
  • Public Affairs affect the Content dimension through actions and inactions to which meaning is ascribed.
  • Maritime Influence affects the cognitive dimension by demonstrating our nation’s strength and resolve by influencing the decisions of potential adversaries’ and dissuading them.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

109.5e1 Define and discuss MOC IO Cell.

A
  • MOC IO Cell - Maritime Operations Center Information Operations Cell
  • Responsible for the continuous planning, execution, and assessment of integrated IO and IO-related activities in support of the combatant commander’s goals and objectives.
  • Responsible for the continuous monitoring and shaping of the information environment.
  • Responsible for employing IO capabilities, forces, and concepts to achieve information superiority, resulting in the operational advantage on the battlefield.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

109.1c Describe and define the duties of the DIWC

A
  • Deputy Information Operations Warfare Commander
  • This person is a member of the IDC
  • IDC = Information Dominance Community
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

109.1c Describe and define the duties of the IWC

A
  • Information Operations Warfare Commander
  • responsible to the CWC to shape and assess the information environment, achieve and maintain information superiority, develop and execute IO plans in support of CWC objectives, and support other warfare commanders.
  • This person is usually an Admiral or Captain
  • Most likely a SWO
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

109.1d Discuss the role and responsibilities of CTN

A
  • Cryptologic Technician Network

* Plan and execute CNO actions / counter-actions in support of defending and exploiting computer network systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

109.1d Discuss the role and responsibilities of CTT

A
  • Cryptologic Technician Technical
  • Non-Communications SIGINT (ELINT), ES, EA, ASMD
  • ASMD = Anti-Ship Missile Defense
  • Servicing and maintaining various related electronic countermeasures systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

109.1d Discuss the role and responsibilities of CTR

A
  • Cryptologic Technician Collection

* Voice / Morse communications and operation of radio direction finding equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

109.1d Discuss the roles and responsibilities of CTI in support or IO

A
  • Cryptologic Technician Interpreter

* Radiotelephone communications and foreign language translation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

109.1d Discuss the role and responsibilities of CTM

A
  • Cryptologic Technician Maintenance

* Installation, servicing and repair of electronic and electromechanical equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

109.1b Describe the purpose of the Cryptology OPTASKS

A
  • Action taken to exploit and attack foreign communications and other electromagnetic signals.
  • Protect our communication and signals.
  • Provide command and control warfare, electronic warfare, SIGINT, and signals security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

109.6a6 Define CNE

A
  • CNE = Computer Network Exploitation
  • Intelligence collection using computer networks
  • Not destructive…
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

109.6a7 Define INFOCON

A
  • INFOCON = Information Operations Condition
  • A comprehensive defense posture based on the status of Information systems, military operations, and intelligence assessments of adversary capabilities and intent.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

109.6a8 Define CND-in-Depth

A
  • CND = Computer Network Defense
  • Information Security strategy integrating people, technology, and policies.
  • The key is that there are multiple barriers that resist an adversary or attacker.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

109.6b Describe the differences and similarities between IA and CND.

A
  • CND = Computer Network Defense
  • IA = Information Assurance
  • CND = defending a network and includes: monitoring, detection, analysis, and response activities.
  • IA = Measures taken to protect and defend information and information systems.
  • IA measures include: ensuring availability, integrity, authentication, confidentiality, and non-repudiation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

109.6c Define cyberspace operations

A
  • Operations that take place in Cyberspace.
  • The primary purpose is to achieve objectives in cyberspace.
  • Operations include: computer network operations (CNO) and activities to operate and defend the global information grid (GiG)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

109.6d1 Define and discuss Blue team

A

The group responsible for defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

109.6d2 Define and discuss Red Team

A

A group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

109.6d3 Define OLS

A

[UNKNOWN]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

109.6d2 Define and discuss Red Team

A

A group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

109.1d Discuss the role and responsibilities of CTT

A
  • Cryptologic Technician Technical
  • Non-Communications SIGINT (ELINT), ES, EA, ASMD
  • ASMD = Anti-Ship Missile Defense
  • Servicing and maintaining various related electronic countermeasures systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

109.1d Discuss the role and responsibilities of CTR

A
  • Cryptologic Technician Collection

* Voice / Morse communications and operation of radio direction finding equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

109.6e Discuss the computer network incident reporting process.

A
  • Everything will be coordinated and reported to the Computer Network Defense Service Provider (CNDSP).
  • Finish with a close-out report
  • Contact the network manager to address issues on a centrally managed network.
  • Report losses or compromises of classified information technology systems, terminals, or equipment to CNO.
  • Consult with CNDSP before disconnecting computers from the network.
  • Isolate and quarantine backup drives/tapes.
  • Protect reports associated with computer network incidents from public disclosure but classify them at the lowest possible level.
  • Report all incidents that have the potential to jeopardize Communications Security (COMSEC) information or material as a Physical COMSEC incident.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

109.1d Discuss the roles and responsibilities of CTI in support or IO

A
  • Cryptologic Technician Interpreter

* Radiotelephone communications and foreign language translation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

109.1d Discuss the role and responsibilities of CTM

A
  • Cryptologic Technician Maintenance

* Installation, servicing and repair of electronic and electromechanical equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

109.1b Describe the purpose of the Cryptology OPTASKS

A
  • Cryptology Optasks are actions taken to exploit and attack foreign communications and other electromagnetic signals, while protecting our own.
  • The main purpose is command and control warfare, electronic warfare, SIGINT, and signals security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

109.1b Describe the purpose of the IO OPTASK

A
  • IO = Information Operations
  • IO in concert with specified supporting and related capabilities, to influence, disrupt, corrupt, or usurp adversarial human and automated decision making while protecting our own.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

109.1a Define and describe NSW SUPPACT

A
  • Naval Special Warfare Support Activity

* No further information found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

109.1a Define and describe the functions of NCDOC

A
  • NCDOC = Navy Cyber Defense Operations Center
  • They fall under 10th Fleet
  • This command coordinates, monitors, and oversee’s the defense of Navy computer networks and systems.
  • They are also responsible for accomplishing computer network defense, CND, missions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

109.1a Define and describe the functions of the FIOC

A
  • FIOC = Fleet Information Operation Command

* FIOC’s are the elements of the NIOC’s that are responsible for support to fleet needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

109.1a Define and describe the functions of the NIOC, which is an IO/Cryptologic organization.

A
  • NIOC = Navy Information Operation Command
  • Provides operationally focused training and planning support
  • NIOC’s are under 10th fleet
  • Develop doctrine, tactics, techniques, and procedures in support of effects based warfare.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

109.3k2 Discuss military visual deception

A
  • Affects the sense of sight, including human observers and electro-optical systems.
  • The use of natural or artificial means to mislead a target about friendly force strength and movement, and to prevent detection or identification of units.
  • NTTP 3-58.1 (ROOFGANG)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

109.3k3 Discuss military radar deception

A
  • The deliberate radiation, re-radiation, reflection, and absorption of radar signals to mislead the enemy in interpreting data presented by the radar indicators or radar intercept systems.
  • NTTP 3-58.1 (ROOFGANG)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

109.7a Define and discuss OPSEC.

A

OPSEC - Operations Security, is a process of identifying critical information and subsequently analyzing friend actions and other activities to: identify what friendly information is necessary for the adversary to have suffciently accurate knowledge of friendly forces and intentions, deny adversary decision makers critical information about friendly forces and intention, and cause adversary decision makers to misjudge the relevance of known critical friendly information because other information about friendly forces and intentions remain secure.

OPSEC denies the adversary the information needed to correctly assess friendly capabilities and intentions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

109.7b Discuss the five steps of the OPSEC planning process.

A
  1. Identification of critical information
  2. Analysis of threats
  3. Analysis of vulnerabilities
  4. Assessment of risk
  5. Application of appropriate OPSEC measures
47
Q

109.7c1 Define and describe a Navy OPSEC support team.

A
  • NOST = Navy OPSEC Support Team
  • Designated the Navy and USMC OPSEC Support Element, providing OPSEC support throughout the two services.
  • Located at NIOC Norfolk
  • Provide command OPSEC program development, awareness resources, assessment assistance, guidance and support training that promotes an understanding of OPSEC among both active duty and dependent personnel.
48
Q

109.7c2 Define and discuss IOSS

A

IOSS - Interagency OPSEC Support Staff - assists DoD components in establishing OPSEC programs, as requested.

49
Q

109.7c3 Define and discuss WRA

A

WRA - Web Risk Assessment. Processes for ensuring websites are in compliance with applicable policies.

50
Q

109.7c4 Define and discuss JCMA

A
  • JCMA - Joint COMSEC Monitor Activity,
  • JCMA is a JCS-sponsored organization operating under the guidance of the NSA.
  • JCS = Joint Chiefs Of Staff
  • The JCMA conducts COMSEC monitoring of DoD telecommunications signals and automated information systems.
51
Q

109.7d Describe the purpose and service provided by the OPSEC Red Team Vulnerability Assessment process.

A

The Red team is used to reveal weakneses in current military readiness. Red teaming operations improve organizational readiness and increase system administrators’ security awareness of real-world IO vulnerabilities and incident recognition.

52
Q

109.7e Discuss DON website restrictions

A

Refer to instruction: SECNAVINST 5720.47B

53
Q

109.7f Describe the purpose of River City

A
  • River City is a brevity code that indicates radio blackout until further notice in order to
  • Prevent the adversary from detecting an indicator. A primary OPSEC goal is to mask or control friendly actions to prevent the collection of CI or indicators.
54
Q

109.8a1 Define and discuss COMINT as a SIGINT core competency.

A

COMINT - Communications intelligence is intel and technical information derived from collecting and process intercepted foreign communications passed by radio, wire, or other electromagnetic means. Includes CNE.

55
Q

109.8a2 Define and discuss ELINT as a SIGINT core competency.

A

ELINT - Electronic Intelligence, is intel derived from the interception and analysis of non-communications emitters (e.g. radar).

56
Q

109.8a3 Define and discuss FISINT as a SIGINT core competency.

A

FISINT - Foreign instrumentation signals ntelligence is the technical analysis of data intercepted from foreign equipment and control systems such as telemetry, electronic interrogators, tracking/fusing/arming/firing command systems and video data links.

57
Q

109.8b Describe a CRITIC and provide examples of CRITIC information.

A

Critical Information (CRITIC) is information concerning possible foreign threats to US national security that are so significiant they require the immediate attention of the President and the National Security Council.

  • CRITIC events or situations are:
  • Hostile Acts
  • Terrorist Acts
  • Political Disruption or Instability
  • Crisis Event
  • Governed by USSID CR1501
58
Q

109.8c Describe the functions of a SSES

A

SSES - Ship’s Signals Exploitation Space

  • Responsible for TS message traffic and ship’s SIGINT collectors
  • SSES DivO answers to N2
  • Staff CRC usually resides in SSES
59
Q

109.8d Describe the functions and locations of the SALs

A

[nttp 2-02.1]

60
Q

109.8e Define and state the purpose of the CCP.

A
  • CCP = Consolidated Cryptologic Program
  • The CCP is operated and managed by NSA
  • DIRNSA is the Program manager.
  • [NTTP 2-02.1]
61
Q

109.8f Define and describe SOTA

A

SOTA - SIGINT Operational Tasking Authority. A military commander’s authority to operationally direct and levy SIGINT requirements on designated SIGINT resources. This includes the authority to deploy or redeploy all or part of the SIGINT resources for which SOTA has been delegated.
*DIRNSA has delegated SOTA over Navy forces to the CNO DIRNSA withholds SOTA for SIGINT related to SNE unless otherwise defined or authorized by USSID or other authority. The CNO sub-delegates SOTA to Fleet commanders.

62
Q

1093.8g

A

[NTTP 2-02.1]

63
Q

109.1c What does IWC stand for?

A

Information Operations Warfare Commander

64
Q

109.1c Describe and define the duties of the IWC.

A
  • Information Warfare Commander
  • Responsible to the CWC
  • Assesses the information environment
  • Develop and execute IO plans
  • Usually an Admiral or Captain
65
Q

109.6a7 Define INFOCON

A
  • Information Operations Condition

* Comprehensive defense posture based on intelligence assessments of adversary capabilities and intent.

66
Q

109.6c Define cyberspace operations

A

The employment of cyber capabilities where the primary purpose is to achieve objectives in or through cyberspace.

67
Q

109.1c Describe and define the duties of the CRC

A
  • Cryptologic Resource Coordinator
  • Manages the OTC’s cryptologic asset’s
  • OTC = Officer in Tactical Command
68
Q

109.5e1 Define and discuss MOC IO Cell

A

MOC IO Cell: Maritime Operations Center Information Operations Cell.

  • Continuous planning , execution, and assessment of IO-related activities in support of the combatant commander’s goals.
  • The continuous monitoring and shaping of the information environment, resulting in the operational advantage on the battlefield.
69
Q

109.6e Discuss the computer network incident reporting process

A
  • Everything will be coordinated and reported to the Computer Network Defense Service Provider (CNDSP).
  • Finish with a close-out report
  • Contact the network manager to address issues on a centrally managed network.
  • Report losses or compromises of classified information technology systems, terminals, or equipment to CNO.
  • Consult with CNDSP before disconnecting computers from the network.
  • Isolate and quarantine backup drives/tapes.
  • Protect reports associated with computer network incidents from public disclosure but classify them at the lowest possible level.
  • Report all incidents that have the potential to jeopardize Communications Security (COMSEC) information or material as a Physical COMSEC incident.
70
Q

109.2b2 Define and discuss Physical Security as an IO supporting capability.

A
  • Physical security is that part of security concerned with physical measures designed to prevent unauthorized access to equipment, installations, material, and documents, and to safeguard them against espionage, sabotage, damage, and theft.
  • Just as IA protects friendly electronic information and information systems, physical security protects physical facilities containing information and information systems worldwide.
71
Q

109.2b3 Define and discuss Physical Attack as an IO supporting capability.

A
  • Physical attack can be employed in support of IO as a means of attacking C2 nodes to affect enemy ability to exercise C2 and of influencing TAs.
72
Q

109.2b4 Define and discuss Counter-Intelligence as an IO supporting capability.

A
  • CI = Counter-Intelligence
  • A critical part of guarding friendly information and information systems.
  • CI consists of information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments, or elements thereof, foreign organizations, foreign persons, or international terrorist activities.
73
Q

109.2b5 Define and discuss Combat Camera as an IO supporting capability.

A
  • COMCAM = Combat Camera
  • Supports all of the capabilities of IO that use images of US or friendly force operations, whether to influence an adversary or other TAs or support US forces or allies.

** The COMCAM mission is to provide the OSD, the Chairman of the JCS, the Military Departments, the combatant commands, and the JTF with an imagery capability in support of operational planning requirements across the range of military operations.

74
Q

109.2c1 Define and discuss Public Affairs as an IO related capability.

A
  • PA = Public Affairs
  • PA and IO must be coordinated and synchronized to ensure consistent themes and messages are communicated to avoid credibility losses.
    • PA are public information, command information, and community relations activities.
    • Public Affairs plan and coordinate community engagement activities to support the commander’s operational objective.
75
Q

109.2c2 Define and discuss Civil-Military Operations as an IO related capability.

A
  • CMO = Civil-Military Operations
  • Particularly effective in peacetime and pre-/post-combat operations when other capabilities and actions may be constrained.
  • CMO are the activities that influence relations between military forces, governmental and nongovernmental civilian organizations and authorities, and the civilian populace.
76
Q

109.2c3 Define and discuss Defense Support to Public Diplomacy as an IO related capability.

A
  • DSPD = Defense Support to Public Diplomacy
  • DSPD consists of activities, such as international information activities.
  • DSPD are measures taken by the DoD designed to support and facilitate public diplomacy efforts of the US Government.
77
Q

109.3a State the objectives of EW

A
  • Deny the opponent an advantage in the EM spectrum
  • Ensure friendly unimpeded access to the EM spectrum
  • EW methods include: detection, denial, deception, disruption, degradation, destruction, and protection.
78
Q

109.3b1 Define ES

A
  • ES = Electronic Warfare Support
  • ES operations include finding and identifying sources of intentional and unintentional radiated EM energy.
  • Primarily ES operations are used for threat recognition, targeting, and the planning of future operations.
79
Q

109.3b2 Define EA

A
  • EA = Electronic Attack
  • The use of EM energy to attack personnel, facilities, or equipment with the intent of degrading, or destroying an enemy combat capability.
    • 5 things that bring this under title 10: deny, disrupt, degrade, destroy, deceive.
80
Q

109.3b3 Define EP

A
  • EP = Electronic Protection
  • EMS = Electromagnetic Spectrum
  • Involves actions taken to protect allied resources from any effects of friendly or enemy use of the EMS that degrade, neutralize, or destroy friend combat capability.
81
Q

109.3b4 Define EMI

A
  • EMI = Electromagnetic Interference
  • Any Electromagnetic disturbance that interrupts, obstructs, or otherwise degrades the effective performance of electronics or electrical equipment.
82
Q

109.3b5 Define ASMD

A
  • ASMD = Anti-ship Missile Defense
83
Q

109.3b7 Define CTTG

A
  • CTTG = Counter Targeting

* The attempt to prevent (or degrade) the engage-and-launch-weapons decision by the enemy.

84
Q

109.3b8 Define JRFL

A
  • JFRL = Joint Restricted Frequency List

* Specifies protected frequencies that should not normally be disrupted without prior coordination and planning.

85
Q

109.3b9 Define HERO

A
  • HERO = Hazards of Electromagnetic Radiation to Ordnance
  • Electromagnetic Radiation may initiate an explosive device in the area.
  • Next it will explode… so get the heck outta there!
86
Q

109.3b10 Define HULTEC

A
  • HULTEC = Hull-to-emitter correlation
  • The process of determining which specific platform (such as a specific ship or aircraft) is associated with a particular set of EM emissions, such as a RADAR.
87
Q

109.3b11 Define Technical ELINT

A
  • TechELINT describes the signal structure, emission characteristics, modes of operations, and emitter functions.
  • TechELINT also describes weapon system associations of such emitters as radars, beacons, jammers, and navigational signals.
88
Q

109.3b12 Define Operational ELINT

A
  • OpELINT = Operational ELINT

* OpELINT concentrates on locating specific ELINT targets and determining the operation patterns of the systems.

89
Q

109.3g1 Discuss Surface Search Radar

A
  • A surface-search radar system has TWO primary functions:
    (1) The detection of surface objects and low-flying aircraft.
    (2) A 360- degree search pattern for all objects within line-of-sight distance from the radar antenna.
  • (SPS-67, SPS-73)
90
Q

109.3g2 Discuss Air-Search Radar

A
  • Air-search radar systems detect the position, course, and speed of air targets in a relatively large area.
  • (SPS-49)
91
Q

109.3g3 Discuss Height-finding search Radar

A
  • Height-finding radar computes accurate ranges, bearing, and altitudes of aircraft targets detected by airsearch radars.
  • (SPY1)
91
Q

109.3g4 Discuss Fire control Radar

A
  • Fire Control Radar = Tracking Radar
  • Radar that provides continuous positional data on a target.
  • Most tracking radar systems used by the military are also fire-control radar.
  • (SPG-62, SPQ-9)
92
Q

109.3g5 Discuss Missile guidance radar

A
  • A radar system that used to guide a missile to a hostile target.
  • Missiles use radar to intercept targets in three basic ways:
    (1) Beam-rider missiles follow a beam of radar energy that is kept continuously pointed at the desired target
    (2) Homing missiles detect and home in on radar energy reflected from the target
    (3) Passive homing missiles home in on energy that is radiated by the target
93
Q

109.3h State the objectives of EP

A

Electronic Protection is the subdivision of EW involving actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy use of the EMS that degrade, neutralize, or destroy friendly combat capability.

94
Q

109.3k1 Discuss Electromagnetic jamming

A

EM jamming is the deliberate radiation, re-radiation, or reflection of EM energy for the purpose of preventing or reducing an enemy’s effective use of the EMS, with the intent of degrading or neutralizing the enemy’s combat capability.

95
Q

109.3k2 Discuss Electromagnetic deception

A

The deliberate radiation, re-radiation, alteration, suppression, absorption, denial, enhancement, or reflection of electromagnetic energy in a manner intended to convey misleading information to an enemy or to enemy electromagnetic-dependent weapons, thereby degrading or neutralizing the enemy’s combat capability.

96
Q

109.3k3 Discuss Comms EA

A

NO ANSWER PROVIDED (TBD)

97
Q

109.6a7 Define INFOCON

A
  • Information Operations Condition

* Comprehensive defense posture based on intelligence assessments of adversary capabilities and intent.

98
Q

109.6c Define cyberspace operations

A

The employment of cyber capabilities where the primary purpose is to achieve objectives in or through cyberspace.

99
Q

109.1c Describe and define the duties of the CRC

A
  • Cryptologic Resource Coordinator
  • Manages the OTC’s cryptologic asset’s
  • OTC = Officer in Tactical Command
100
Q

109.5e1 Define and discuss MOC IO Cell

A

MOC IO Cell: Maritime Information Operations Center Information Operations Cell.

  • Continuous planning , execution, and assessment of IO-related activities in support of the combatant commander’s goals.
  • The continuous monitoring and shaping of the information environment, resulting in the operational advantage on the battlefield.
101
Q

109.6e Discuss the computer nbetwork incident reporting process

A
  • Everything will be coordinated and reported to the Computer Network Defense Service Provider (CNDSP).
  • Finish with a close-out report
  • Contact the network manager to address issues on a centrally managed network.
  • Report losses or compromises of classified information technology systems, terminals, or equipment to CNO.
  • Consult with CNDSP before disconnecting computers from the network.
  • Isolate and quarantine backup drives/tapes.
  • Protect reports associated with computer network incidents from public disclosure but classify them at the lowest possible level.
  • Report all incidents that have the potential to jeopardize Communications Security (COMSEC) information or material as a Physical COMSEC incident.
102
Q

What are the five pillars of IO?

A

MILDEC, OPSEC, CNO, EW, PSYOP

103
Q

What is the name of the IDS used by NCDOC?

A

Need to figure out if answer is classified

104
Q

What is the name of the NSA IDS?

A

Need to figure out if answer is classified

105
Q

What is the IDS used by DHS (US-CERT)?

A
  • DHS - Department of Homeland Security

* EINSTEIN

106
Q

109.1a Describe function of NCDOC

A

Navy Cyber Defense Operations Command. Coordinate, monitor, and oversee the defense of Navy computer networks and systems and to be responsible for accomplishing CND missions as assigned by C10F/FCC.

107
Q

109.1a Describe function of U.S. Coast Guard Tactical Cryptologic Element

A

Provide a unique maritime cryptologic perspective within SIGINT community, helping to satisfy validated national SIGINT requirements, which also support CG & DHS missions.

108
Q

109.1a Describe function of U.S. Marine Corps Radio Battalion

A

Tactical EW. Mainly SIGINT & ELINT

109
Q

109.1a Describe function of ETIOS

A

ETIOS - Expeditionary Tactical Info Operations Support. Three man enlisted teams capable of task organizing to conduct tactical SIGNINT EW/ES collection, processing, and analysis in direct support of JFMCC/NCC requirements.

110
Q

109.1a Describe function of NSW SUPPACT

A

Navy Spec War Support Activity

111
Q

109.1a Describe function of FIOC

A

FIOC - Fleet Information Operations Command. The FIOC is the element of a NIOC that is responsible for support to fleet needs as directed by operational fleet commanders and as specified in the NIOC’s mission.

112
Q

109.1a Describe the function of NIOC

A

NIOC - Navy Information Operations Command. Advances Information Operations War fighting capabilities for Naval and Joint forces by: providing operationally focused training and planning support; developing doctrine, tactics, techniques, and procedures; advocating requirements in support of future effects-based warfare; and managing functional data for Info Ops.