Section 109 BKUP 16Feb2013 Flashcards

IDWO section 109

2
Q

Section 109 BKUP 16Feb2013

109.3k1 Discuss Electromagnetic jamming.

A

Electromagnetic Spectrum EM jamming is the deliberate radiation, re-radiation, or reflection of EM energy for the purpose of preventing or reducing an enemy’s effective use of the EMS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Section 109 BKUP 16Feb2013

109.2a Define and discuss EW as an IO core competency.

A

Electronic Warfare refers to any military action involving the use of EM and directed energy to control the EM spectrum or to attack the adversary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Section 109 BKUP 16Feb2013

109.3k2 Discuss Electromagnetic deception.

A

The deliberate radiation, re-radiation, alteration,or suppression, of electromagnetic energy in a manner intended to convey misleading information to an enemy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Section 109 BKUP 16Feb2013

109.3k3 Discuss Comms EA.

A

[classified]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Section 109 BKUP 16Feb2013

109.4a1 Military acoustic deception

A

Acoustic Deception entails the use of sound waves to simulate or conceal forces or movement both in air and under water. * NTTP 3-58.1 (ROOFGANG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Section 109 BKUP 16Feb2013

109.5a Define and discuss PSYOP.

A
  • PSYOP - Psychological Operations* PSYOP’s convey selected information and indicators to influence emotions, motives, objective reasoning, and behavior.* A PSYOP is a weapon whose effectiveness is limited only by the ingenuity of the commander using it.** PSYOP is also known as MISO, Military Information Support to Operations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Section 109 BKUP 16Feb2013

109.5b Discus the following PSYOP media products and the advantages/disadvantages of each.:1. Visual2. Print3. Audio

A
  • A psychological warfare campaign is a war of the mind. * Your primary weapons are sight and sound. * PSYOP’s can be disseminated by face-to-face communication.* Audio visual means (television)* Audio media (radio or loudspeaker)* Visual media (leaflets, newspapers, books, magazines and/or posters). * The weapon is not how its sent, but the message it carries and how that message affects the recipient.** SOURCE: http://www.psywarrior.com/psyhist.html
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Section 109 BKUP 16Feb2013

109.1c Describe and define the duties of the EWO

A
  • Electronic Warfare Officer* Principal EW planner* Develops Operation plans and concept plans.* Plans, Monitors, and coordinates routine EW operations and Joint EW training and exercises.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Section 109 BKUP 16Feb2013

109.1c Describe and define the duties of the SSES DIVO / SIGWO

A

Ships signals exploitation space division officer / signal warfare officer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Section 109 BKUP 16Feb2013

109.1c Describe and define the duties of the ACRC

A

Assistant Cryptologic Resource Coordinator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Section 109 BKUP 16Feb2013

109.1c Describe and define the duties of the CRC

A
  • Cryptologic Resource Coordinator* Manages the OTC’s cryptologic asset’s* OTC = Officer In Tactical Command
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Section 109 BKUP 16Feb2013

109.5c Explain the difference between PSYOP and Public Affairs.

A
  • PSYOP’s influence emotions, motives, objective reasoning, and behavior.* Military Public Affairs plan and coordinate community engagement activities to support the commander’s operational objective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Section 109 BKUP 16Feb2013

109.5d Discuss the relationship among maritime influence, IO, Public Affairs, and strategic communications.

A
  • Effective strategic communications are essential to sustaining global legitimacy and supporting our policy aims.* …setting priorities for the Department of Defense in the areas of strategic communications and public diplomacy.* Application of Navy IO Include : CCDR, MHQ, and JFMCC (when assigned), will use IO to support TSCPs through presence, coordination with public affairs, port calls, multination exercises, peace operations, and support to strategic communications.* Bureau of International Information Programs (IIP): By providing international strategic communications for the foreign affairs community, IIP informs, engages, and influences international audiences about U.S. policy and society to advance America’s interests.* The USD(P) now co-chairs the Global Engagement Strategic Communications Committee (GESCC) with the ASD for Public Affairs. The GESCC is the Department’s SC coordination body that reviews DoD activities for consistency with national directives and represents DoD on Interagency SC matters. * Information Superiority Information superiority embodies the ability to collect, process, and disseminate the correct information to the right person, at the right place and time, in the right form, while denying an adversary the ability to do the same.* IO supports information superiority by corrupting, deceiving, delaying, denying, disrupting, degrading, or destroying one of the dimensions of information before it is presented to the adversary’s commander, while protecting the same friendly information dimensions.* Information superiority is achieved through effects-based approach to operations, maritime power projection, maritime influence, target development, and environmental awareness and shaping (EAS).* Maritime Influence: Naval forces deployed or stationed in areas overseas demonstrate our national resolve, strengthen alliances, and dissuade potential adversaries. IO provides significant support to maritime influence operations during the phases of planning and assessment. U.S. naval forces will protect and use information to influence adversaries, advance friendly objectives, and shape the operating environment to our advantage. With an effects based approach to operations, maritime influence coordinates the employment of maritime activities to affect the attitudes and behaviors of an intended audience in support of commander objectives. With the goal of advancing U.S. interests, maritime influence activities may include actions to deter adversaries, reassuring allies and friends, sending signals of U.S. interest, and fostering good will.* Information Operations impact the three dimensions of the information environment through a variety of capabilities. Electronic warfare and computer network attack both disrupt connectivity, while Soldier and leader engagement enhances connectivity. Military Information Support Operations, public affairs, and Soldier and leader engagement all provide content, while computer network operations can modify content, and units and individual Soldiers provide the most credible content through their actions. While Information Operations cannot modify human mental processing that occurs in the cognitive dimensions, it can apply computer network operations to alter the automated information processing systems. * While the capabilities used to achieve those effects should be unconstrained, primary supporting capabilities of strategic communication at the national strategic level are generally considered as Public Affairs (PA), military Information Operations (IO), and Public Diplomacy (PD). * Purpose of IO. Information Operations seek to influence the behavior of target audiences by changing their ability to make decisions, while simultaneously defending the friendly capability to make proper decisions.* While frequently referred to as “soft-power” or “non-kinetic,” IO includes the use of physical attack against adversary information systems or directly against decision makers. IO also employs technology-based activities to affect adversary information systems.* IO affects the target’s decision cycle (sometimes referred to as his “OODA-loop” (observe, orient, decide, act - loop)) is a means of influencing target behavior. Obviously, reducing an adversary’s ability to make timely and effective decisions will degrade his exercise of initiative or his response to friendly military action.* Within the information environment there are three conceptual dimensions of connectivity, content and cognitive.* “Connectivity” refers to the physical or electronic links, which enable information to flow and includes those non-technical relationships between people.* “content” is comprised of the words, images, databases, etc. that contain the information itself, as well as actions and inactions to which meaning is ascribed. This dimension links the physical real world with the human consciousness of the cognitive dimension both as a source of input (stimulus, senses, etc.) and to convey output (intent, direction, decisions, etc.). * “cognitive” dimension exists in the mind. This is where the individual processes the received information according to a unique set of perceptions (interprets the information), opinions (within a greater context of how he sees the world organized), and beliefs (on a foundation of core central values).* It should be noted that the cognitive dimension cannot be directly attacked (short of mind-altering drugs) but must be influenced indirectly through the physical and information dimensions. * Information Operations impact the three dimensions of the information environment through a variety of capabilities.* Information Operations impact the three dimensions of the information environment through a variety of capabilities. Electronic warfare and computer network attack both disrupt connectivity, while Soldier and leader engagement enhances connectivity. Military Information Support Operations, public affairs, and Soldier and leader engagement all provide content, while computer network operations can modify content, and units and individual Soldiers provide the most credible content through their actions. While Information Operations cannot modify human mental processing that occurs in the cognitive dimensions, it can apply computer network operations to alter the automated information processing systems. * Just as information operations can apply various capabilities to influence the information environment, these capabilities account for subtleties in the communication process when developing messages and when executing operations to convey these messages. These influences can be as elementary as using audio communications means with illiterate receivers, or as complex as accounting for the political influence of sub-tribal cultures when communicating in rural Afghanistan. * Core IO Capabilities. IO employs five core capabilities to achieve desired Combatant Commander effects or prevent the enemy from achieving his desired effects: EW, CNO, MISO, MILDEC, and OPSEC. They are operational in a direct and immediate sense; they either achieve critical operational effects or prevent the adversary from doing so. They are interdependent and increasingly need to be integrated to achieve desired effects.* IO related activities include Public Affairs* There are three military functions: public affairs (PA), civil military operations (CMO), and defense support to public diplomacy, specified as related capabilities for IO. These capabilities make significant contributions to IO and must always be coordinated and integrated with the core and supporting Information Operations capabilities. However, their primary purpose and rules under which they operate must not be compromised by IO. This requires additional care and consideration in the planning and conduct of IO. For this reason, the PA and CMO staffs particularly must work in close coordination with the IO planning staff.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Section 109 BKUP 16Feb2013

109.5e1 Define and discuss MOC IO Cell.

A
  • MOC IO Cell - Maritime Operations Center Information Operations Cell * Responsible for the continuous planning, execution, and assessment of integrated IO and IO-related activities in support of the combatant commander’s goals and objectives.* Responsible for the continuous monitoring and shaping of the information environment.* Responsible for employing IO capabilities, forces, and concepts to achieve information superiority, resulting in the operational advantage on the battlefield.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Section 109 BKUP 16Feb2013

109.1c Describe and define the duties of the DIWC

A
  • Deputy Information Operations Warfare Commander* This person is a member of the IDC* IDC = Information Dominance Community
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Section 109 BKUP 16Feb2013

109.1c Describe and define the duties of the IWC

A
  • Information Operations Warfare Commander* responsible to the CWC to shape and assess the information environment, achieve and maintain information superiority, develop and execute IO plans in support of CWC objectives, and support other warfare commanders.* This person is usually an Admiral or Captain* Most likely a SWO
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Section 109 BKUP 16Feb2013

109.1d Discuss the role and responsibilities of CTN

A
  • Cryptologic Technician Network* Plan and execute CNO actions / counter-actions in support of defending and exploiting computer network systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Section 109 BKUP 16Feb2013

109.1d Discuss the role and responsibilities of CTT

A
  • Cryptologic Technician Technical* Non-Communications SIGINT (ELINT), ES, EA, ASMD* ASMD = Anti-Ship Missile Defense* Servicing and maintaining various related electronic countermeasures systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Section 109 BKUP 16Feb2013

109.1d Discuss the role and responsibilities of CTR

A
  • Cryptologic Technician Collection* Voice / Morse communications and operation of radio direction finding equipment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Section 109 BKUP 16Feb2013

109.1d Discuss the roles and responsibilities of CTI in support or IO

A
  • Cryptologic Technician Interpreter* Radiotelephone communications and foreign language translation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Section 109 BKUP 16Feb2013

109.1d Discuss the role and responsibilities of CTM

A
  • Cryptologic Technician Maintenance* Installation, servicing and repair of electronic and electromechanical equipment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Section 109 BKUP 16Feb2013

109.1b Describe the purpose of the Cryptology OPTASKS

A
  • Action taken to exploit and attack foreign communications and other electromagnetic signals.* Protect our communication and signals.* Provide command and control warfare, electronic warfare, SIGINT, and signals security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Section 109 BKUP 16Feb2013

109.6a6 Define CNE

A
  • CNE = Computer Network Exploitation * Intelligence collection using computer networks* Not destructive…
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Section 109 BKUP 16Feb2013

109.6a7 Define INFOCON

A
  • INFOCON = Information Operations Condition * A comprehensive defense posture based on the status of Information systems, military operations, and intelligence assessments of adversary capabilities and intent.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Section 109 BKUP 16Feb2013

109.6a8 Define CND-in-Depth

A
  • CND = Computer Network Defense* Information Security strategy integrating people, technology, and policies.* The key is that there are multiple barriers that resist an adversary or attacker.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Section 109 BKUP 16Feb2013

109.6b Describe the differences and similarities between IA and CND.

A
  • CND = Computer Network Defense* IA = Information Assurance* CND = defending a network and includes: monitoring, detection, analysis, and response activities.* IA = Measures that protect and defend information and information systems.* IA measures include: ensuring availability, integrity, authentication, confidentiality, and non-repudiation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Section 109 BKUP 16Feb2013

109.6c Define cyberspace operations

A
  • Operations that take place in Cyberspace.* The primary purpose is to achieve objectives in cyberspace.* Operations include: computer network operations (CNO) and activities to operate and defend the global information grid (GiG)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Section 109 BKUP 16Feb2013

109.6d1 Define and discuss Blue team

A

The group responsible for defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Section 109 BKUP 16Feb2013

109.6d2 Define and discuss Red Team

A

A group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Section 109 BKUP 16Feb2013

109.6d3 Define OLS

A

[UNKNOWN]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Section 109 BKUP 16Feb2013

109.6d2 Define and discuss Red Team

A

A group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Section 109 BKUP 16Feb2013

109.1d Discuss the role and responsibilities of CTT

A
  • Cryptologic Technician Technical* Non-Communications SIGINT (ELINT), ES, EA, ASMD* ASMD = Anti-Ship Missile Defense* Servicing and maintaining various related electronic countermeasures systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Section 109 BKUP 16Feb2013

109.1d Discuss the role and responsibilities of CTR

A
  • Cryptologic Technician Collection* Voice / Morse communications and operation of radio direction finding equipment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Section 109 BKUP 16Feb2013

109.6e Discuss the computer network incident reporting process.

A
  • CNDSP = Computer Network Defense Service Provider(a) Report all incidents using the proper classification level.(b) Follow all initial reports to the respective CNDSP with interim updates as required and a complete close-out report.(c) Contact the network manager immediately to initiate corrective actions for centrally managed networks.(d) Report and respond to SCI network incidents.(e) Report losses or compromises of classified information technology systems, terminals, or equipment to CNO.(f) Take the following actions or ensure the network manager takes the following actions: (1) Ensure local or regional IA personnel submit required reports, collect and preserve incident evidence, and act as the primary liaison between the CNDSP and their command. (2) Consult with respective CNDSP before disconnecting suspect computer(s) from the network upon initial indication or notification of an incident. (3) Have experienced system administrator(s) examine audit and system logs ONLY if directed by the CNDSP. (4) If trained personnel are available, capture volatile data, then image and ship computer hard drives to the CNDSP for forensic analysis when requested or required. (5) Isolate and quarantine backup drives/tapes. (6) Continue liaison with the CNDSP from initial incident notification/identification through final incident closure.(g) Protect reports associated with computer network incidents from public disclosure but classify them at the lowest possible level.(h) Report all incidents that have the potential to jeopardize Communications Security (COMSEC) information or material as a Physical COMSEC incident.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Section 109 BKUP 16Feb2013

109.1d Discuss the roles and responsibilities of CTI in support or IO

A
  • Cryptologic Technician Interpreter* Radiotelephone communications and foreign language translation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Section 109 BKUP 16Feb2013

109.1d Discuss the role and responsibilities of CTM

A
  • Cryptologic Technician Maintenance* Installation, servicing and repair of electronic and electromechanical equipment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Section 109 BKUP 16Feb2013

109.1b Describe the purpose of the Cryptology OPTASKS

A
  • Cryptology Optasks are actions taken to exploit and attack foreign communications and other electromagnetic signals, while protecting our own.* The main purpose is command and control warfare, electronic warfare, SIGINT, and signals security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Section 109 BKUP 16Feb2013

109.1b Describe the purpose of the IO OPTASK

A
  • IO = Information Operations* IO in concert with specified supporting and related capabilities, to influence, disrupt, corrupt, or usurp adversarial human and automated decision making while protecting our own.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Section 109 BKUP 16Feb2013

109.1a Define and describe NSW SUPPACT

A
  • Naval Special Warfare Support Activity* No further information found
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Section 109 BKUP 16Feb2013

109.1a Define and describe the functions of NCDOC

A
  • NCDOC = Navy Cyber Defense Operations Center* They fall under 10th Fleet* This command coordinates, monitors, and oversee’s the defense of Navy computer networks and systems.* They are also responsible for accomplishing computer network defense, CND, missions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Section 109 BKUP 16Feb2013

109.1a Define and describe the functions of the FIOC

A
  • FIOC = Fleet Information Operation Command* FIOC’s are the elements of the NIOC’s that are responsible for support to fleet needs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Section 109 BKUP 16Feb2013

109.1a Define and describe the functions of the NIOC, which is an IO/Cryptologic organization.

A
  • NIOC = Navy Information Operation Command* Provides operationally focused training and planning support* NIOC’s are under 10th fleet* Develop doctrine, tactics, techniques, and procedures in support of effects based warfare.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Section 109 BKUP 16Feb2013

109.3k2 Discuss military visual deception

A
  • Affects the sense of sight, including human observers and electro-optical systems. * The use of natural or artificial means to mislead a target about friendly force strength and movement, and to prevent detection or identification of units. * NTTP 3-58.1 (ROOFGANG)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Section 109 BKUP 16Feb2013

109.3k3 Discuss military radar deception

A
  • The deliberate radiation, re-radiation, reflection, and absorption of radar signals to mislead the enemy in interpreting data presented by the radar indicators or radar intercept systems.* NTTP 3-58.1 (ROOFGANG)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Section 109 BKUP 16Feb2013

109.7a Define and discuss OPSEC.

A

OPSEC - Operations Security, is a process of identifying critical information and subsequently analyzing friend actions and other activities to: identify what friendly information is necessary for the adversary to have suffciently accurate knowledge of friendly forces and intentions, deny adversary decision makers critical information about friendly forces and intention, and cause adversary decision makers to misjudge the relevance of known critical friendly information because other information about friendly forces and intentions remain secure.OPSEC denies the adversary the information needed to correctly assess friendly capabilities and intentions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Section 109 BKUP 16Feb2013

109.7b Discuss the five steps of the OPSEC planning process.

A
  1. Identification of critical information2. Analysis of threats3. Analysis of vulnerabilities4. Assessment of risk5. Application of appropriate OPSEC measures
48
Q

Section 109 BKUP 16Feb2013

109.7c1 Define and describe a Navy OPSEC support team.

A
  • NOST = Navy OPSEC Support Team* Designated the Navy and USMC OPSEC Support Element, providing OPSEC support throughout the two services.* Located at NIOC Norfolk* Provide command OPSEC program development, awareness resources, assessment assistance, guidance and support training that promotes an understanding of OPSEC among both active duty and dependent personnel.
49
Q

Section 109 BKUP 16Feb2013

109.7c2 Define and discuss IOSS

A

IOSS - Interagency OPSEC Support Staff - assists DoD components in establishing OPSEC programs, as requested.

50
Q

Section 109 BKUP 16Feb2013

109.7c3 Define and discuss WRA

A

WRA - Web Risk Assessment. Processes for ensuring websites are in compliance with applicable policies.

51
Q

Section 109 BKUP 16Feb2013

109.7c4 Define and discuss JCMA

A
  • JCMA - Joint COMSEC Monitor Activity, * JCMA is a JCS-sponsored organization operating under the guidance of the NSA. * JCS = Joint Chiefs Of Staff* The JCMA conducts COMSEC monitoring of DoD telecommunications signals and automated information systems.
52
Q

Section 109 BKUP 16Feb2013

109.7d Describe the purpose and service provided by the OPSEC Red Team Vulnerability Assessment process.

A

The Red team is used to reveal weakneses in current military readiness. Red teaming operations improve organizational readiness and increase system administrators’ security awareness of real-world IO vulnerabilities and incident recognition.

53
Q

Section 109 BKUP 16Feb2013

109.7e Discuss DON website restrictions

A

Refer to instruction: SECNAVINST 5720.47B

54
Q

Section 109 BKUP 16Feb2013

109.7f Describe the purpose of River City

A

River City is a brevity code that indicates radio blackout until further notice in order toPrevent the adversary from detecting an indicator. A primary OPSEC goal is to mask or control friendly actions to prevent the collection of CI or indicators.

55
Q

Section 109 BKUP 16Feb2013

109.8a1 Define and discuss COMINT as a SIGINT core competency.

A

COMINT - Communications intelligence is intel and technical information derived from collecting and process intercepted foreign communications passed by radio, wire, or other electromagnetic means. Includes CNE.

56
Q

Section 109 BKUP 16Feb2013

109.8a2 Define and discuss ELINT as a SIGINT core competency.

A

ELINT - Electronic Intelligence, is intel derived from the interception and analysis of non-communications emitters (e.g. radar).

57
Q

Section 109 BKUP 16Feb2013

109.8a3 Define and discuss FISINT as a SIGINT core competency.

A

FISINT - Foreign instrumentation signals ntelligence is the technical analysis of data intercepted from foreign equipment and control systems such as telemetry, electronic interrogators, tracking/fusing/arming/firing command systems and video data links.

58
Q

Section 109 BKUP 16Feb2013

109.8b Describe a CRITIC and provide examples of CRITIC information.

A

Critical Information (CRITIC) is information concerning possible foreign threats to US national security that are so significiant they require the immediate attention of the President and the National Security Council.CRITIC events or situations are:- Hostile Acts- Terrorist Acts- Political Disruption or Instability- Crisis Event Governed by USSID CR1501

59
Q

Section 109 BKUP 16Feb2013

109.8c Describe the functions of a SSES

A

SSES - Ship’s Signals Exploitation SpaceResponsible for TS message traffic and ship’s SIGINT collectorsSSES DivO answers to N2 *Staff CRC usually resides in SSES

60
Q

Section 109 BKUP 16Feb2013

109.8d Describe the functions and locations of the SALs

A

[nttp 2-02.1]

61
Q

Section 109 BKUP 16Feb2013

109.8e Define and state the purpose of the CCP.

A
  • CCP = Consolidated Cryptologic Program * The CCP is operated and managed by NSA* DIRNSA is the Program manager. * [NTTP 2-02.1]
62
Q

Section 109 BKUP 16Feb2013

109.8f Define and describe SOTA

A

SOTA - SIGINT Operational Tasking Authority. A military commander’s authority to operationally direct and levy SIGINT requirements on designated SIGINT resources. This includes the authority to deploy or redeploy all or part of the SIGINT resources for which SOTA has been delegated.*DIRNSA has delegated SOTA over Navy forces to the CNO DIRNSA withholds SOTA for SIGINT related to SNE unless otherwise defined or authorized by USSID or other authority. The CNO sub-delegates SOTA to Fleet commanders.

63
Q

Section 109 BKUP 16Feb2013

1093.8g

A

[NTTP 2-02.1]

64
Q

Section 109 BKUP 16Feb2013

109.1c What does IWC stand for?

A

Information Operations Warfare Commander

65
Q

Section 109 BKUP 16Feb2013

109.1c Describe and define the duties of the IWC.

A
  • Information Warfare Commander* Responsible to the CWC* Assesses the information environment* Develop and execute IO plans* Usually an Admiral or Captain
66
Q

Section 109 BKUP 16Feb2013

109.6a7 Define INFOCON

A
  • Information Operations Condition* Comprehensive defense posture based on intelligence assessments of adversary capabilities and intent.
67
Q

Section 109 BKUP 16Feb2013

109.6c Define cyberspace operations

A

The employment of cyber capabilities where the primary purpose is to achieve objectives in or through cyberspace.

68
Q

Section 109 BKUP 16Feb2013

109.1c Describe and define the duties of the CRC

A
  • Cryptologic Resource Coordinator* Manages the OTC’s cryptologic asset’s* OTC = Officer in Tactical Command
69
Q

Section 109 BKUP 16Feb2013

109.5e1 Define and discuss MOC IO Cell

A

MOC IO Cell: Maritime Operations Center Information Operations Cell. * Continuous planning , execution, and assessment of IO-related activities in support of the combatant commander’s goals.* The continuous monitoring and shaping of the information environment, resulting in the operational advantage on the battlefield.

70
Q

Section 109 BKUP 16Feb2013

109.6e Discuss the computer network incident reporting process

A
  • CNDSP = Computer Network Defense Service Provider* There are 8 steps1) Report all incidents using the proper classification level2) Make reports to the CNDSP periodically and finish with a Close-out report3) Report and respond to SCI network incidents4) Report losses or compromises of classified information to the CNO5) Take the following actions or ensure the network manager takes the following actions: A) Make sure the IA personnel are reporting, collecting and preserving incident evidence, and make sure they act as the primary liaison between the CNDSP and their command. B) Consult with CNDSP before disconnecting any computers C) Consult with the CNDSP before allowing System Admins to audit the systems D) If trained personnel are available, capture volatile data, then image and ship the HDD to the CNDSP for forensics. E) Continue to liaison with the CNDSP from beginning to end of the incident6) Classify all incident reports at lowest possible level to protect them from public disclosure.7) Report all COMSEC incidents as a physical COMSEC incident.
71
Q

Section 109 BKUP 16Feb2013

109.2b2 Define and discuss Physical Security as an IO supporting capability.

A
  • Physical security is that part of security concerned with physical measures designed to prevent unauthorized access to equipment, installations, material, and documents, and to safeguard them against espionage, sabotage, damage, and theft.*Just as IA protects friendly electronic information and information systems, physical security protects physical facilities containing information and information systems worldwide.
72
Q

Section 109 BKUP 16Feb2013

109.2b3 Define and discuss Physical Attack as an IO supporting capability.

A
  • Physical attack can be employed in support of IO as a means of attacking C2 nodes to affect enemy ability to exercise C2 and of influencing TAs.
73
Q

Section 109 BKUP 16Feb2013

109.2b4 Define and discuss Counter-Intelligence as an IO supporting capability.

A
  • CI = Counter-Intelligence* A critical part of guarding friendly information and information systems.* CI consists of information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments, or elements thereof, foreign organizations, foreign persons, or international terrorist activities.
74
Q

Section 109 BKUP 16Feb2013

109.2b5 Define and discuss Combat Camera as an IO supporting capability.

A
  • COMCAM = Combat Camera * Supports all of the capabilities of IO that use images of US or friendly force operations, whether to influence an adversary or other TAs or support US forces or allies.** The COMCAM mission is to provide the OSD, the Chairman of the JCS, the Military Departments, the combatant commands, and the JTF with an imagery capability in support of operational planning requirements across the range of military operations.
75
Q

Section 109 BKUP 16Feb2013

109.2c1 Define and discuss Public Affairs as an IO related capability.

A
  • PA = Public Affairs* PA and IO must be coordinated and synchronized to ensure consistent themes and messages are communicated to avoid credibility losses.** PA are public information, command information, and community relations activities. ** Public Affairs plan and coordinate community engagement activities to support the commander’s operational objective.
76
Q

Section 109 BKUP 16Feb2013

109.2c2 Define and discuss Civil-Military Operations as an IO related capability.

A
  • CMO = Civil-Military Operations * Particularly effective in peacetime and pre-/post-combat operations when other capabilities and actions may be constrained.* CMO are the activities that influence relations between military forces, governmental and nongovernmental civilian organizations and authorities, and the civilian populace.
77
Q

Section 109 BKUP 16Feb2013

109.2c3 Define and discuss Defense Support to Public Diplomacy as an IO related capability.

A
  • DSPD = Defense Support to Public Diplomacy* DSPD consists of activities, such as international information activities, and measures taken by the DoD designed to support and facilitate public diplomacy efforts of the US Government.
78
Q

Section 109 BKUP 16Feb2013

109.3a State the objectives of EW

A
  • Deny the opponent an advantage in the EM spectrum * Ensure friendly unimpeded access to the EM spectrum* EW methods include: detection, denial, deception, disruption, degradation, destruction, and protection.
79
Q

Section 109 BKUP 16Feb2013

109.3b1 Define ES

A
  • ES = Electronic Warfare Support* ES operations include finding and identifying sources of intentional and unintentional radiated EM energy.* Primarily ES operations are used for threat recognition, targeting, and the planning of future operations.
80
Q

Section 109 BKUP 16Feb2013

109.3b2 Define EA

A
  • EA = Electronic Attack * The use of EM energy to attack personnel, facilities, or equipment with the intent of degrading, or destroying an enemy combat capability.** 5 things that bring this under title 10: deny, disrupt, degrade, destroy, deceive.
81
Q

Section 109 BKUP 16Feb2013

109.3b3 Define EP

A
  • EP = Electronic Protection * EMS = Electromagnetic Spectrum* Involves actions taken to protect allied resources from any effects of friendly or enemy use of the EMS that degrade, neutralize, or destroy friend combat capability.
82
Q

Section 109 BKUP 16Feb2013

109.3b4 Define EMI

A

Electromagnetic Interference is any EM disturbance that interrupts, obstructs, or otherwise degrades or limits the effective performance of electronics or electrical equipment.

83
Q

Section 109 BKUP 16Feb2013

109.3b5 Define ASMD

A

Anti-ship Missile Defence

84
Q

Section 109 BKUP 16Feb2013

109.3b7 Define CTTG

A

Counter Targeting is the attempt to prevent (or degrade) the engage-and-launch-weapons decision by the enemy.

85
Q

Section 109 BKUP 16Feb2013

109.3b8 Define JRFL

A

Joint Restricted Frequency List, specifies protected, guarded, and taboo frequencies that should not normally be disrupted without prior coordination and planning, either because of friendly use or friendly exploitation.

86
Q

Section 109 BKUP 16Feb2013

109.3b9 Define HERO

A

Hazards of Electromagnetic Radiation to Ordnance, Induce currents of enough magnitude to intiate electro explosive devices of weapon systems.

87
Q

Section 109 BKUP 16Feb2013

109.3b10 Define HULTEC

A

Hull-to-emitter correlation, is the process of determining which specific platform (such as a specific ship or aircraft) is associated with a particular set of emissions, such as a RADAR.

88
Q

Section 109 BKUP 16Feb2013

109.3b11 Define Technical ELINT

A

echELINT describes the signal structure, emission characteristics, modes of operations, emitter functions, and weapons systems associations of such emitters as radars, beacons, jammers, and navigational signals.

89
Q

Section 109 BKUP 16Feb2013

109.3b12 Define Operational ELINT

A

OpELINT concentrates on locating specific ELINT targets and determining the operations patterns of the systems.

90
Q

Section 109 BKUP 16Feb2013

109.3g1 Discuss Surface Search Radar

A

A surface-search radar system has two primary functions: (1) the detection and determination of accurate ranges and bearings of surface objects and low-flying aircraft and (2) the maintenance of a 360- degree search pattern for all objects within line-of-sight distance from the radar antenna. (SPS-67, SPS-73)

91
Q

Section 109 BKUP 16Feb2013

109.3g2 Discuss Air-Search Radar

A

Air-search radar systems initially detect and determine the position, course, and speed of air targets in a relatively large area. (SPS-49)

92
Q

Section 109 BKUP 16Feb2013

109.3g3 Discuss Height-finding search Radar

A

The primary function of a height-finding radar is that of computing accurate ranges, bearing, and altitudes of aircraft targets detected by airsearch radars. (SPS-49)

93
Q

Section 109 BKUP 16Feb2013

109.3g3 Discuss Height-finding search Radar

A

The primary function of a height-finding radar is that of computing accurate ranges, bearing, and altitudes of aircraft targets detected by airsearch radars. (SPY1)

94
Q

Section 109 BKUP 16Feb2013

109.3g4 Discuss Fire control Radar

A

Radar that provides continuous positional data on a target is called tracking radar. Most tracking radar systems used by the military are also fire-control radar; the two names are often used interchangeable. (SPG-62, SPQ-9)

95
Q

Section 109 BKUP 16Feb2013

109.3g5 Discuss Missile guidance radar

A

A radar system that provides information used to guide a missile to a hostile target is called GUIDANCE RADAR. Missiles use radar to intercept targets in three basic ways: (1) Beam-rider missilse follow a beam of radar energy that is kept continuously pointed at the desired target; (2) homing missiles detect and home in on radar energy reflected from the target; (3) passive homing missiles home in on energy that is radiated by the target.

96
Q

Section 109 BKUP 16Feb2013

109.3h State the objectives of EP

A

Electronic Protection is the subdivision of EW involving actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy use of the EMS that degrade, neutralize, or destroy friendly combat capability.

97
Q

Section 109 BKUP 16Feb2013

109.3k1 Discuss Electromagnetic jamming

A

EM jamming is the deliberate radiation, re-radiation, or reflection of EM energy for the purpose of preventing or reducing an enemy’s effective use of the EMS, with the intent of degrading or neutralizing the enemy’s combat capability.

98
Q

Section 109 BKUP 16Feb2013

109.3k2 Discuss Electromagnetic deception

A

The deliberate radiation, re-radiation, alteration, suppression, absorption, denial, enhancement, or reflection of electromagnetic energy in a manner intended to convey misleading information to an enemy or to enemy electromagnetic-dependent weapons, thereby degrading or neutralizing the enemy’s combat capability.

99
Q

Section 109 BKUP 16Feb2013

109.3k3 Discuss Comms EA

A

NO ANSWER PROVIDED (TBD)

100
Q

Section 109 BKUP 16Feb2013

109.6a7 Define INFOCON

A
  • Information Operations Condition* Comprehensive defense posture based on intelligence assessments of adversary capabilities and intent.
101
Q

Section 109 BKUP 16Feb2013

109.6c Define cyberspace operations

A

The employment of cyber capabilities where the primary purpose is to achieve objectives in or through cyberspace.

102
Q

Section 109 BKUP 16Feb2013

109.1c Describe and define the duties of the CRC

A
  • Cryptologic Resource Coordinator* Manages the OTC’s cryptologic asset’s* OTC = Officer in Tactical Command
103
Q

Section 109 BKUP 16Feb2013

109.5e1 Define and discuss MOC IO Cell

A

MOC IO Cell: Maritime Information Operations Center Information Operations Cell. * Continuous planning , execution, and assessment of IO-related activities in support of the combatant commander’s goals.* The continuous monitoring and shaping of the information environment, resulting in the operational advantage on the battlefield.

104
Q

Section 109 BKUP 16Feb2013

109.6e Discuss the computer nbetwork incident reporting process

A

There are 8 steps1) Report all incidents using the proper classification level2)

105
Q

Section 109 BKUP 16Feb2013

What are the five pillars of IO?

A

MILDEC, OPSEC, CNO, EW, PSYOP

106
Q

Section 109 BKUP 16Feb2013

What is the name of the IDS used by NCDOC?

A

Need to figure out if answer is classified

107
Q

Section 109 BKUP 16Feb2013

What is the name of the NSA IDS?

A

Need to figure out if answer is classified

108
Q

Section 109 BKUP 16Feb2013

What is the IDS used by DHS (US-CERT)?

A

DHS - Department of Homeland SecurityEINSTEIN

109
Q

Section 109 BKUP 16Feb2013

109.1a Describe function of NCDOC

A

Navy Cyber Defense Operations Command. Coordinate, monitor, and oversee the defense of Navy computer networks and systems and to be responsible for accomplishing CND missions as assigned by C10F/FCC.

110
Q

Section 109 BKUP 16Feb2013

109.1a Describe function of U.S. Coast Guard Tactical Cryptologic Element

A

Provide a unique maritime cryptologic perspective within SIGINT community, helping to satisfy validated national SIGINT requirements, which also support CG & DHS missions.

111
Q

Section 109 BKUP 16Feb2013

109.1a Describe function of U.S. Marine Corps Radio Battalion

A

Tactical EW. Mainly SIGINT & ELINT

112
Q

Section 109 BKUP 16Feb2013

109.1a Describe function of ETIOS

A

ETIOS - Expeditionary Tactical Info Operations Support. Three man enlisted teams capable of task organizing to conduct tactical SIGNINT EW/ES collection, processing, and analysis in direct support of JFMCC/NCC requirements.

113
Q

Section 109 BKUP 16Feb2013

109.1a Describe function of NSW SUPPACT

A

Navy Spec War Support Activity

114
Q

Section 109 BKUP 16Feb2013

109.1a Describe function of FIOC

A

FIOC - Fleet Information Operations Command. The FIOC is the element of a NIOC that is responsible for support to fleet needs as directed by operational fleet commanders and as specified in the NIOC’s mission.

115
Q

Section 109 BKUP 16Feb2013

109.1a Describe the function of NIOC

A

NIOC - Navy Information Operations Command. Advances Information Operations War fighting capabilities for Naval and Joint forces by: providing operationally focused training and planning support; developing doctrine, tactics, techniques, and procedures; advocating requirements in support of future effects-based warfare; and managing functional data for Info Ops.