Section 109 BKUP 16Feb2013 Flashcards
IDWO section 109
Section 109 BKUP 16Feb2013
109.3k1 Discuss Electromagnetic jamming.
Electromagnetic Spectrum EM jamming is the deliberate radiation, re-radiation, or reflection of EM energy for the purpose of preventing or reducing an enemy’s effective use of the EMS.
Section 109 BKUP 16Feb2013
109.2a Define and discuss EW as an IO core competency.
Electronic Warfare refers to any military action involving the use of EM and directed energy to control the EM spectrum or to attack the adversary.
Section 109 BKUP 16Feb2013
109.3k2 Discuss Electromagnetic deception.
The deliberate radiation, re-radiation, alteration,or suppression, of electromagnetic energy in a manner intended to convey misleading information to an enemy.
Section 109 BKUP 16Feb2013
109.3k3 Discuss Comms EA.
[classified]
Section 109 BKUP 16Feb2013
109.4a1 Military acoustic deception
Acoustic Deception entails the use of sound waves to simulate or conceal forces or movement both in air and under water. * NTTP 3-58.1 (ROOFGANG)
Section 109 BKUP 16Feb2013
109.5a Define and discuss PSYOP.
- PSYOP - Psychological Operations* PSYOP’s convey selected information and indicators to influence emotions, motives, objective reasoning, and behavior.* A PSYOP is a weapon whose effectiveness is limited only by the ingenuity of the commander using it.** PSYOP is also known as MISO, Military Information Support to Operations.
Section 109 BKUP 16Feb2013
109.5b Discus the following PSYOP media products and the advantages/disadvantages of each.:1. Visual2. Print3. Audio
- A psychological warfare campaign is a war of the mind. * Your primary weapons are sight and sound. * PSYOP’s can be disseminated by face-to-face communication.* Audio visual means (television)* Audio media (radio or loudspeaker)* Visual media (leaflets, newspapers, books, magazines and/or posters). * The weapon is not how its sent, but the message it carries and how that message affects the recipient.** SOURCE: http://www.psywarrior.com/psyhist.html
Section 109 BKUP 16Feb2013
109.1c Describe and define the duties of the EWO
- Electronic Warfare Officer* Principal EW planner* Develops Operation plans and concept plans.* Plans, Monitors, and coordinates routine EW operations and Joint EW training and exercises.
Section 109 BKUP 16Feb2013
109.1c Describe and define the duties of the SSES DIVO / SIGWO
Ships signals exploitation space division officer / signal warfare officer.
Section 109 BKUP 16Feb2013
109.1c Describe and define the duties of the ACRC
Assistant Cryptologic Resource Coordinator
Section 109 BKUP 16Feb2013
109.1c Describe and define the duties of the CRC
- Cryptologic Resource Coordinator* Manages the OTC’s cryptologic asset’s* OTC = Officer In Tactical Command
Section 109 BKUP 16Feb2013
109.5c Explain the difference between PSYOP and Public Affairs.
- PSYOP’s influence emotions, motives, objective reasoning, and behavior.* Military Public Affairs plan and coordinate community engagement activities to support the commander’s operational objective
Section 109 BKUP 16Feb2013
109.5d Discuss the relationship among maritime influence, IO, Public Affairs, and strategic communications.
- Effective strategic communications are essential to sustaining global legitimacy and supporting our policy aims.* …setting priorities for the Department of Defense in the areas of strategic communications and public diplomacy.* Application of Navy IO Include : CCDR, MHQ, and JFMCC (when assigned), will use IO to support TSCPs through presence, coordination with public affairs, port calls, multination exercises, peace operations, and support to strategic communications.* Bureau of International Information Programs (IIP): By providing international strategic communications for the foreign affairs community, IIP informs, engages, and influences international audiences about U.S. policy and society to advance America’s interests.* The USD(P) now co-chairs the Global Engagement Strategic Communications Committee (GESCC) with the ASD for Public Affairs. The GESCC is the Department’s SC coordination body that reviews DoD activities for consistency with national directives and represents DoD on Interagency SC matters. * Information Superiority Information superiority embodies the ability to collect, process, and disseminate the correct information to the right person, at the right place and time, in the right form, while denying an adversary the ability to do the same.* IO supports information superiority by corrupting, deceiving, delaying, denying, disrupting, degrading, or destroying one of the dimensions of information before it is presented to the adversary’s commander, while protecting the same friendly information dimensions.* Information superiority is achieved through effects-based approach to operations, maritime power projection, maritime influence, target development, and environmental awareness and shaping (EAS).* Maritime Influence: Naval forces deployed or stationed in areas overseas demonstrate our national resolve, strengthen alliances, and dissuade potential adversaries. IO provides significant support to maritime influence operations during the phases of planning and assessment. U.S. naval forces will protect and use information to influence adversaries, advance friendly objectives, and shape the operating environment to our advantage. With an effects based approach to operations, maritime influence coordinates the employment of maritime activities to affect the attitudes and behaviors of an intended audience in support of commander objectives. With the goal of advancing U.S. interests, maritime influence activities may include actions to deter adversaries, reassuring allies and friends, sending signals of U.S. interest, and fostering good will.* Information Operations impact the three dimensions of the information environment through a variety of capabilities. Electronic warfare and computer network attack both disrupt connectivity, while Soldier and leader engagement enhances connectivity. Military Information Support Operations, public affairs, and Soldier and leader engagement all provide content, while computer network operations can modify content, and units and individual Soldiers provide the most credible content through their actions. While Information Operations cannot modify human mental processing that occurs in the cognitive dimensions, it can apply computer network operations to alter the automated information processing systems. * While the capabilities used to achieve those effects should be unconstrained, primary supporting capabilities of strategic communication at the national strategic level are generally considered as Public Affairs (PA), military Information Operations (IO), and Public Diplomacy (PD). * Purpose of IO. Information Operations seek to influence the behavior of target audiences by changing their ability to make decisions, while simultaneously defending the friendly capability to make proper decisions.* While frequently referred to as “soft-power” or “non-kinetic,” IO includes the use of physical attack against adversary information systems or directly against decision makers. IO also employs technology-based activities to affect adversary information systems.* IO affects the target’s decision cycle (sometimes referred to as his “OODA-loop” (observe, orient, decide, act - loop)) is a means of influencing target behavior. Obviously, reducing an adversary’s ability to make timely and effective decisions will degrade his exercise of initiative or his response to friendly military action.* Within the information environment there are three conceptual dimensions of connectivity, content and cognitive.* “Connectivity” refers to the physical or electronic links, which enable information to flow and includes those non-technical relationships between people.* “content” is comprised of the words, images, databases, etc. that contain the information itself, as well as actions and inactions to which meaning is ascribed. This dimension links the physical real world with the human consciousness of the cognitive dimension both as a source of input (stimulus, senses, etc.) and to convey output (intent, direction, decisions, etc.). * “cognitive” dimension exists in the mind. This is where the individual processes the received information according to a unique set of perceptions (interprets the information), opinions (within a greater context of how he sees the world organized), and beliefs (on a foundation of core central values).* It should be noted that the cognitive dimension cannot be directly attacked (short of mind-altering drugs) but must be influenced indirectly through the physical and information dimensions. * Information Operations impact the three dimensions of the information environment through a variety of capabilities.* Information Operations impact the three dimensions of the information environment through a variety of capabilities. Electronic warfare and computer network attack both disrupt connectivity, while Soldier and leader engagement enhances connectivity. Military Information Support Operations, public affairs, and Soldier and leader engagement all provide content, while computer network operations can modify content, and units and individual Soldiers provide the most credible content through their actions. While Information Operations cannot modify human mental processing that occurs in the cognitive dimensions, it can apply computer network operations to alter the automated information processing systems. * Just as information operations can apply various capabilities to influence the information environment, these capabilities account for subtleties in the communication process when developing messages and when executing operations to convey these messages. These influences can be as elementary as using audio communications means with illiterate receivers, or as complex as accounting for the political influence of sub-tribal cultures when communicating in rural Afghanistan. * Core IO Capabilities. IO employs five core capabilities to achieve desired Combatant Commander effects or prevent the enemy from achieving his desired effects: EW, CNO, MISO, MILDEC, and OPSEC. They are operational in a direct and immediate sense; they either achieve critical operational effects or prevent the adversary from doing so. They are interdependent and increasingly need to be integrated to achieve desired effects.* IO related activities include Public Affairs* There are three military functions: public affairs (PA), civil military operations (CMO), and defense support to public diplomacy, specified as related capabilities for IO. These capabilities make significant contributions to IO and must always be coordinated and integrated with the core and supporting Information Operations capabilities. However, their primary purpose and rules under which they operate must not be compromised by IO. This requires additional care and consideration in the planning and conduct of IO. For this reason, the PA and CMO staffs particularly must work in close coordination with the IO planning staff.
Section 109 BKUP 16Feb2013
109.5e1 Define and discuss MOC IO Cell.
- MOC IO Cell - Maritime Operations Center Information Operations Cell * Responsible for the continuous planning, execution, and assessment of integrated IO and IO-related activities in support of the combatant commander’s goals and objectives.* Responsible for the continuous monitoring and shaping of the information environment.* Responsible for employing IO capabilities, forces, and concepts to achieve information superiority, resulting in the operational advantage on the battlefield.
Section 109 BKUP 16Feb2013
109.1c Describe and define the duties of the DIWC
- Deputy Information Operations Warfare Commander* This person is a member of the IDC* IDC = Information Dominance Community
Section 109 BKUP 16Feb2013
109.1c Describe and define the duties of the IWC
- Information Operations Warfare Commander* responsible to the CWC to shape and assess the information environment, achieve and maintain information superiority, develop and execute IO plans in support of CWC objectives, and support other warfare commanders.* This person is usually an Admiral or Captain* Most likely a SWO
Section 109 BKUP 16Feb2013
109.1d Discuss the role and responsibilities of CTN
- Cryptologic Technician Network* Plan and execute CNO actions / counter-actions in support of defending and exploiting computer network systems.
Section 109 BKUP 16Feb2013
109.1d Discuss the role and responsibilities of CTT
- Cryptologic Technician Technical* Non-Communications SIGINT (ELINT), ES, EA, ASMD* ASMD = Anti-Ship Missile Defense* Servicing and maintaining various related electronic countermeasures systems.
Section 109 BKUP 16Feb2013
109.1d Discuss the role and responsibilities of CTR
- Cryptologic Technician Collection* Voice / Morse communications and operation of radio direction finding equipment.
Section 109 BKUP 16Feb2013
109.1d Discuss the roles and responsibilities of CTI in support or IO
- Cryptologic Technician Interpreter* Radiotelephone communications and foreign language translation.
Section 109 BKUP 16Feb2013
109.1d Discuss the role and responsibilities of CTM
- Cryptologic Technician Maintenance* Installation, servicing and repair of electronic and electromechanical equipment
Section 109 BKUP 16Feb2013
109.1b Describe the purpose of the Cryptology OPTASKS
- Action taken to exploit and attack foreign communications and other electromagnetic signals.* Protect our communication and signals.* Provide command and control warfare, electronic warfare, SIGINT, and signals security.
Section 109 BKUP 16Feb2013
109.6a6 Define CNE
- CNE = Computer Network Exploitation * Intelligence collection using computer networks* Not destructive…
Section 109 BKUP 16Feb2013
109.6a7 Define INFOCON
- INFOCON = Information Operations Condition * A comprehensive defense posture based on the status of Information systems, military operations, and intelligence assessments of adversary capabilities and intent.
Section 109 BKUP 16Feb2013
109.6a8 Define CND-in-Depth
- CND = Computer Network Defense* Information Security strategy integrating people, technology, and policies.* The key is that there are multiple barriers that resist an adversary or attacker.
Section 109 BKUP 16Feb2013
109.6b Describe the differences and similarities between IA and CND.
- CND = Computer Network Defense* IA = Information Assurance* CND = defending a network and includes: monitoring, detection, analysis, and response activities.* IA = Measures that protect and defend information and information systems.* IA measures include: ensuring availability, integrity, authentication, confidentiality, and non-repudiation.
Section 109 BKUP 16Feb2013
109.6c Define cyberspace operations
- Operations that take place in Cyberspace.* The primary purpose is to achieve objectives in cyberspace.* Operations include: computer network operations (CNO) and activities to operate and defend the global information grid (GiG)
Section 109 BKUP 16Feb2013
109.6d1 Define and discuss Blue team
The group responsible for defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers.
Section 109 BKUP 16Feb2013
109.6d2 Define and discuss Red Team
A group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture.
Section 109 BKUP 16Feb2013
109.6d3 Define OLS
[UNKNOWN]
Section 109 BKUP 16Feb2013
109.6d2 Define and discuss Red Team
A group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture.
Section 109 BKUP 16Feb2013
109.1d Discuss the role and responsibilities of CTT
- Cryptologic Technician Technical* Non-Communications SIGINT (ELINT), ES, EA, ASMD* ASMD = Anti-Ship Missile Defense* Servicing and maintaining various related electronic countermeasures systems.
Section 109 BKUP 16Feb2013
109.1d Discuss the role and responsibilities of CTR
- Cryptologic Technician Collection* Voice / Morse communications and operation of radio direction finding equipment.
Section 109 BKUP 16Feb2013
109.6e Discuss the computer network incident reporting process.
- CNDSP = Computer Network Defense Service Provider(a) Report all incidents using the proper classification level.(b) Follow all initial reports to the respective CNDSP with interim updates as required and a complete close-out report.(c) Contact the network manager immediately to initiate corrective actions for centrally managed networks.(d) Report and respond to SCI network incidents.(e) Report losses or compromises of classified information technology systems, terminals, or equipment to CNO.(f) Take the following actions or ensure the network manager takes the following actions: (1) Ensure local or regional IA personnel submit required reports, collect and preserve incident evidence, and act as the primary liaison between the CNDSP and their command. (2) Consult with respective CNDSP before disconnecting suspect computer(s) from the network upon initial indication or notification of an incident. (3) Have experienced system administrator(s) examine audit and system logs ONLY if directed by the CNDSP. (4) If trained personnel are available, capture volatile data, then image and ship computer hard drives to the CNDSP for forensic analysis when requested or required. (5) Isolate and quarantine backup drives/tapes. (6) Continue liaison with the CNDSP from initial incident notification/identification through final incident closure.(g) Protect reports associated with computer network incidents from public disclosure but classify them at the lowest possible level.(h) Report all incidents that have the potential to jeopardize Communications Security (COMSEC) information or material as a Physical COMSEC incident.
Section 109 BKUP 16Feb2013
109.1d Discuss the roles and responsibilities of CTI in support or IO
- Cryptologic Technician Interpreter* Radiotelephone communications and foreign language translation.
Section 109 BKUP 16Feb2013
109.1d Discuss the role and responsibilities of CTM
- Cryptologic Technician Maintenance* Installation, servicing and repair of electronic and electromechanical equipment
Section 109 BKUP 16Feb2013
109.1b Describe the purpose of the Cryptology OPTASKS
- Cryptology Optasks are actions taken to exploit and attack foreign communications and other electromagnetic signals, while protecting our own.* The main purpose is command and control warfare, electronic warfare, SIGINT, and signals security.
Section 109 BKUP 16Feb2013
109.1b Describe the purpose of the IO OPTASK
- IO = Information Operations* IO in concert with specified supporting and related capabilities, to influence, disrupt, corrupt, or usurp adversarial human and automated decision making while protecting our own.
Section 109 BKUP 16Feb2013
109.1a Define and describe NSW SUPPACT
- Naval Special Warfare Support Activity* No further information found
Section 109 BKUP 16Feb2013
109.1a Define and describe the functions of NCDOC
- NCDOC = Navy Cyber Defense Operations Center* They fall under 10th Fleet* This command coordinates, monitors, and oversee’s the defense of Navy computer networks and systems.* They are also responsible for accomplishing computer network defense, CND, missions.
Section 109 BKUP 16Feb2013
109.1a Define and describe the functions of the FIOC
- FIOC = Fleet Information Operation Command* FIOC’s are the elements of the NIOC’s that are responsible for support to fleet needs.
Section 109 BKUP 16Feb2013
109.1a Define and describe the functions of the NIOC, which is an IO/Cryptologic organization.
- NIOC = Navy Information Operation Command* Provides operationally focused training and planning support* NIOC’s are under 10th fleet* Develop doctrine, tactics, techniques, and procedures in support of effects based warfare.
Section 109 BKUP 16Feb2013
109.3k2 Discuss military visual deception
- Affects the sense of sight, including human observers and electro-optical systems. * The use of natural or artificial means to mislead a target about friendly force strength and movement, and to prevent detection or identification of units. * NTTP 3-58.1 (ROOFGANG)
Section 109 BKUP 16Feb2013
109.3k3 Discuss military radar deception
- The deliberate radiation, re-radiation, reflection, and absorption of radar signals to mislead the enemy in interpreting data presented by the radar indicators or radar intercept systems.* NTTP 3-58.1 (ROOFGANG)
Section 109 BKUP 16Feb2013
109.7a Define and discuss OPSEC.
OPSEC - Operations Security, is a process of identifying critical information and subsequently analyzing friend actions and other activities to: identify what friendly information is necessary for the adversary to have suffciently accurate knowledge of friendly forces and intentions, deny adversary decision makers critical information about friendly forces and intention, and cause adversary decision makers to misjudge the relevance of known critical friendly information because other information about friendly forces and intentions remain secure.OPSEC denies the adversary the information needed to correctly assess friendly capabilities and intentions.