Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
228 Cards in this Set
- Front
- Back
ORM
|
Decision Making tool used by personnel at all levels to identify, assess and manage risk.
|
|
Steps of ORM
|
Identify Hazards
Assess Hazards Make Risk Decisions Implement Controls Supervise |
|
Severity-
|
4 Categories
I- Loss of ability to accomplish the mission IV- Little or no adverse impact on mission |
|
Probability
|
4 Categories
A- Likely to Occure B- Probably will occure in time C- May occure in time D- Unlikely to occur |
|
RAC
|
Risk Assessment Code
Combines the severity with probability |
|
Describe the mission of CID
|
The Mission: To deliver full spectrum Cyber Information Warfare, and Intelligence Training to achieve decision superiority
|
|
CID Organizational Structure
|
CID (Correy Station)
NMITC (Damneck) FITC (San Diego) CID UNITs- Correy Station/ Montery CID Dets- Goodfellow AFB/ Fort Gordon CID Learing Sites Yokosuka, Hawaii, San Diego, Medina, Keesler AFB, Meade, Mayport, Jacksonville, Kings Bay, Norfolk, Groton, |
|
CRC
|
Cryptologic Resource Coordinator
Manages Direct support (DIRSUP) Coordinates Coverage Plans |
|
CND
|
Computer Network Defense
actions taken to protect, monitor, analyze, detect, and respond to unaurtorized activity |
|
CNA
|
Computer Network Attack
disrupt, deny, degrade, or destroy information in computers and computer networks |
|
CNE
|
Computer Network Exploitation
enabling operations and intelligence collection capabilities |
|
GIG
|
Global Information Grid
The globally interconnected, end-to-end set of information |
|
Information Security
|
Protection of information and information systems against unauthorized access
|
|
Defense In Depth
|
DON-preferred security strategy where by layers of protection establish and adequate security posture for a system
|
|
Incident
|
An assessed event of attempted entry, attempted entry on an automated information system.
|
|
Tier One
|
Provides DOD-wide CND operational direction or support
|
|
Tier Two
|
Regional/ Theater
Provides DOD componet-wide direction or support |
|
Tier Three
|
Local
Provides local operational direction or support |
|
Three Services Provided by CND
|
1) Protect
2) Monitor, Analyze, Detect 3) Respond |
|
Navy Computer Netowrk Defense Service Provider
|
Navy Cyber Defense Operations Command (NCDOC)
|
|
List the three firewall types
|
Packet Filtering- examins traffic based on the packet header
Stateful Packet- Filtering- similar to packet filtering but allows for rules to be more concise Application Proxies- most sophisticated, contains both server and client process for each protocol |
|
IDS
|
Intrusion Detection System
a device that attempts to detect intrusion into a computer or network by observation or audit |
|
IPS
|
Intrusion Prevention System
detects attacks and trys to prevent them |
|
RC-4
|
Rivest Cipher 4
streaming symmetric- key algorithm |
|
RSA
|
Rivest Shamir Adleman
(usually seen on lanyards or key rings) improved public-key cryptogragraphy that enables secure digital signatures |
|
Blowfish
|
derivitive of Data Encryption Standard (DES) addresses susceptability to brute-force attacks
|
|
DES
|
Data Encryption Standard
a symetric key algorithm developed in the 1970's |
|
EKMS
|
Electronic Key Managment System (manager)
Responsible for the proper managment of all COMSEC Held at the command Written appointment by the CO (must have an alternate) |
|
Account Cleark
|
individual who is designated by the CO to assist EKMS manager
|
|
EKMS CF
|
EKMS Central Facility
high volume key generation and distribution center |
|
DON
Responsibility to COMSEC |
Department of the Navy
adminisers its own CMCS, impliments national policy, publishes procedures, and establishes its own EKMS accoutns |
|
CNO
Responsibility to COMSEC |
Overall responsibility and authority for implementation of National COMSEC policy with in the DON
|
|
COMNAVNETWARCOM
Responsiblity to COMSEC |
Commander, Naval Network Warfare Command (WARCOM)
Implements the DON COMSEC program |
|
DCMS
Responsiblity to COMSEC |
Director, Communications, Security Material System
Adminsters the DON COMSEC program and is the SERVAUTH for DON |
|
Three types of COMSEC incidents
|
Cryptographic – Use of keying material that is compromised, superseded, defective, previously used and not meant for reuse.
Personnel – Known and suspected defection, known and suspected espionage Physical – The physical loss of COMSEC material |
|
TPI
|
Two-Person Integrity
Prevents single person access |
|
Define Electronic Spillage
|
Electronic spillage is defined as data placed on an IT system possessing insufficient information security controls to protect the data at the required classification
|
|
What is a private IP address
|
a reserved certian IP address for use with internal websites or intranets (not routable to the public)
|
|
Three types of connection Media
|
Copper cabling – Uses electrical signals to transmit data between devices
Fiber-optic cabling – Uses glass or plastic wire, also called fiber, to carry information as light pulses Wireless connection – Uses radio signals, infrared technology (laser) or satellite transmissions |
|
DHCP
|
Dynamic Host Configuration Protocol (DHCP):
-a software utility that automatically assigns IP addresses to client devices in a network |
|
DNS
|
Domain Name Service (DNS):
- a system that provides a way to map friendly hostnames or uniform resource locater (URL) to IP address |
|
Active Directory
|
A more flexible, directory service-based approach to network design allows for large distributed network environments that have a common centralized authority for network security
|
|
Exchange Server
|
Microsoft Exchange server is the server side of a client-server, collaborative application with major features to include: electronic mail, calendaring, contacts, and tasks. Exchange server is integrated with Active Directory and uses Active Directory as the storage mechanism for its data.
|
|
OWA
|
Outlook Web Access (OWA):
-used to access email, calendars, contacts, tasks and other mailbox content when access to Microsoft Outlook desktop is unavailable. |
|
CISCO
|
Commerical and Industrial Secruity company
|
|
CISCO Command Modes
|
User Mode- Allows basic commands, such as those that show the system's status
Privleged Mode- allows users to view the system configuration, restart the system, and enter configuration mode Configuration mode- allows user to modify the running system configuration |
|
Name the servers that reside on our server
What is their functionality? |
Print Server
-allow multiple computers in the network to access a single printer through a Network Interface Card (NIC). File Server -is a server located on the network that provides a centralized storage area for shared disk access. Web Server -is a computer program that delivers (serves) content, such as Web pages, using the Hypertext Transfer Protocol (HTTP), over the World Wide Web. |
|
Ports and uses
|
53 - Domain Name Service (DNS)– Address Translation
80 - Hypertext Transfer Protocol daemon (HTTP) – Web Browsing 110 - Post Office Protocol - used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection 443 – HTTP over Transport Layer Security/Secure Sockets Layer (HTTPS) Secure Web Browsing |
|
Ping
|
is a computer network administration utility used to test the reach ability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. The name comes from active sonar terminology.
|
|
Traceroute
|
is a computer network tool for measuring the route path and transit times of packets across an Internet Protocol (IP) network.
|
|
TELNET
|
is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection.
|
|
Name the two types of nets
|
Direct Net: When operating requirements dictate that net stations obtain Net Control Station (NECOS) permission prior to transmitting, NECOS will control the net as a directed net.
Free Net: When operating conditions permit, the NECOS may direct that the net be operated as a free net |
|
CTM
|
Cryptologic Technician (Maintenance)
Preform Preventitive and corrective maintenance on electrical or electronic cryptologic and acillary systems |
|
CTM mission areas
|
Technicians provide technical and operational support to cryptologic systems in all operational theaters.
|
|
CTM afloat billets
|
CVN
LHD/LPD CG DDG |
|
CTM Serving Subfleet work on what systems?
|
AN/USQ-149(V)2 CLUSTER SNOOP System (ELINT)
AN/ULR-21A(V)2 Integrated Submarine Communication Receiving System (ISCRS) (COMINT) |
|
CTM C school teaches maintenance on what systems
|
AN/SSQ-137 Ships Signals Exploitation Equipment Maintenance (INC ‘E’) ***(taught at CIDU Corry Station, CIDLS San Diego/Norfolk)
AN/SSQ-124(V)X Tactical Exploitation System (TES) Maintenance ***(taught at CIDU Corry Station) AN/SRS-1A (V) series Combat Direction Finding (CDF) System Maintenance ***(taught at CIDU Corry Station) AN/USQ-149(V)2 CLUSTER SNOOP System Maintenance ***(taught at CIDU Corry Station) AN/ULR-21A(V)2 Integrated Submarine Communication Receiving System (ISCRS) Maintenance ***(taught at CIDD FT Gordon, CID LS Hawaii) |
|
CTM NEC's
|
9224 (Tactical Exploitation System Maintenance) - performs organizational level maintenance on the AN/SQQ-124 (V)
9225 (AN/SSQ-137 Ship’s Signal Exploitation Equipment- SSEE Maint. Tech) 9229 (Submarine Carry-On Equipment Technician) perform organizational level maintenance on submarine cryptologic carry-on 9289 (Combat Direction Finding System- SRS-1 Maint. Tech) |
|
PM
|
Preventive Maintenance
|
|
PMS
|
Planned Maintenance System
Provide organizational level with tools to plan, schedule, and control planned maintenance effectively |
|
Signals Analysis
|
is a cutting-edge technical discipline that seeks to recover, understand, and derive intelligence from foreign signals.
|
|
Cryptanalysis
|
is the analytic investigation of an information system with the goal of illuminating hidden aspects of that system. It encompasses any systematic analysis aimed at discovering features in, understanding aspects of, or recovering hidden parameters from an information system.
|
|
Traffic Analysis
|
branch of Cryptology which deals with the study of the external characteristics of signals communications and related materials for the purpose of obtaining information concerning the organization and operation of a communication system
|
|
Fusion Analysis
|
the process of examining all sources of intelligence and information to derive a complete assessment of activity
|
|
RASIN
|
RAdio SIgnals Notation Manual is used by the US SIGINT system (USSS) as a guide to the COMINT Signal Classification System
|
|
USSID
|
United States Signals Intelligence Directives
|
|
LOS
|
LINE OF SIGT-LOS communication is a signal that is simply transmitted directly from the transmitting antenna to the receiving antenna.
|
|
Doppler effect
|
Refraction due to motion. The apparant change in frequency or pitch ehwne a sound source moves either toward or away from a listener
|
|
Morse Code
|
Method of transmitting textual information as a serious of on-off tones/lights/clicks
|
|
Sampling
|
Electric switches used to sample an analog signal numerous times in one second, creating a series of pulses representing the instantaneous amplitude of the analog wave at various moments.
|
|
Direction Finding
|
Method of locating radio transmitters through the use of specially constructed receiving atennas and equipment
|
|
GeoLocation
|
Identification of the real-world geographic location of an object, such as a cell phone or internet connection
|
|
Information Environment
|
defined as the aggregate of individuals, organizations, and systems that collect process and disseminate or act on information.
|
|
Physical
|
Real world environments Land/Sea/Air/Space. Where individuals/organizations/info systems/ and physical networks reside
|
|
Informational
|
consistes of information and where the functions of information systems create information content and flow
|
|
Cognitive
|
Where information is used to form perceptions and attitudes and make decisions
|
|
C2
|
Command and control- Exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission
|
|
How does IO support the 3 levels of war
|
Strategic:
-influence or affect all elements (political, military, economic, or informational) of an adversary’s or potential adversary’s national power while protecting similar friendly elements. Operational: -focus of IO at this level is on affecting adversary line of communication, logistics, command and control and related capabilities and activities while protecting similar friendly capabilities and activities Tactical: -primary focus of IO at this level is affecting adversary information and information systems relating to C2, intelligence and other information-based processes directly relating to the conduct of military operations while protecting similar friendly capabilities |
|
Offensive IO
|
Involves the integrated use of assigned and supporting capabilities and activities, mutually supported by intelligence, to affect adversary decision makers and achieve or promote specific objectives.
|
|
Defensive IO
|
Defensive IO ensure timely, accurate, and relevant information access while denying adversaries the opportunity to exploit friendly information and information systems for their own purposes.
|
|
CAP
|
Crisis Action Planning
Time sensitive development of joint operation plans and operation orders for the deployment, employment and sustainment for assigned, attached, and allocated forces |
|
Deliberated Planning
|
Plans that occur in non-crisis situation
|
|
COG
|
Centers of Gravity- Source of power that provides moral, physical strength, freadom of action or the will to act
|
|
Decisive Points
|
A Geographic place, Specific Key event, critical factor or function that when acted upon commanders gain a marked advantage
|
|
How does IO play in the Targeting Cycle
|
IO is an important discipline bringing new targeting options which should be integrated and de-conflicted with traditional targeting efforts.
IO are conducted across the range of military operations at every level of war to achieve mission objectives. IO affects adversary decision makers, their information and information systems, and achieves or promotes specific objective |
|
How does IO affect target developemnt
|
Successful integration of IO considerations into the targeting process is fundamental to the success of the campaign. IO may call for “targeting” adversary human decision processes (human factors), information, and information systems used to support decision making or adversary morale with a variety of lethal and nonlethal means
|
|
Hard Kill
|
Kinetic (physical attack/destruction by delivery of munitions/ordinance)
|
|
Soft Kill
|
Non Kinetic (temporary elimination, degradation, interuption of a node, link, system)
|
|
MEO
|
Measures of Effectiveness
Assesses changes in system behavior, capability, or the operational environment |
|
MOP
|
Measures of Performance
Criteria for measring task performance or accomplishment |
|
TACREP
|
Tactical Report- Principal reporting tool that supports tactical warning, targeting, indications and warning, and maneuvering.
|
|
TACELINT
|
Tactical Electronic Intelligence- Time-critical Operational ELINT (OPELINT) and parametric information that may be used for indications and warning, data base maintenance, order of battle information, and strike planning.
|
|
MAREP
|
Maritime Report-Primary formal U.S. Navy system for tasking and message reporting of maritime operational, intelligence, and management information.
|
|
MAREP RED
|
Command and Control purposes on contacts with enemy or special interest forces.
|
|
MAREP WHITE
|
-Movement or locations of friendly Naval and routine merchant shipping.
|
|
MAREP BLACK
|
A periodic summary of the activity of enemy or special interest forces.
|
|
ELINT
|
Electronic Intelligence (Notation ELNOT) -
A five position group of characters assigned to each non-communication emission for collection and reporting purposes |
|
AEN
|
Arbitrary ELINT Notation (AEN):
-Assigned to designate otherwise not fully identifiable radar activity. |
|
PEN
|
Parametrically Ordered ELINT Notation (PEN):
-Specific ELNOTs grouped into two radio frequency ranges. |
|
CENOT
|
Communications Emitter Notation (CENOT):
-A five character designator used to identify a communications emitter. |
|
AIS
|
Automatic Identification System VHF System used by vessels for identification of vessels at sea
|
|
MMSI
|
Mobile Maritiem Service Identifier
Unique 9 digit # assigned to a specific Vessel |
|
List 4 items that an analyst can track using AIS
|
Next Port Of Call destination
Ships at anchor or underway Speed of vessel Ships current position and time |
|
List 5 Collection Managment tools
|
Request For Information (RFI)
Informal Formal Product Verification Report (PVR) Enhanced User Interface (EUI) Consolidated Exercise Support Request (CESR) COLISEUM |
|
JTT
|
Joint Tactical Terminal
Provides the capability to disseminate time sensitive C4I and battlefield targeting information to tactical commanders-and intelligence nodes. The intelligence information that is provided to the analyst is received in near-real-time. |
|
State the purpose of EW
|
Electronic Warfare -Military action involving the use of electro-magnetic energy to determine, exploit, reduce, or prevent hostile use of the electro-magnetic spectrum (EMS
|
|
EW Operator
|
EW's maintain the watch with the expertise to monitor the radar electromagnetic spectrum for indications and warning of threats to unit safety in a networked Electronic Support (ES) environment. Duties include collection, tactical analysis, reporting, and fusion of organic EW information with national data, as well as performing maintenance on EW systems
|
|
ES
|
Electronic Support
actions taken to search, detect, localize, and identify sources of radiated elctromagnetic energy for tactical purposes |
|
EA
|
Electronic Attack
invloves the use of equipment, devices, and tactics to prevent or reduce the enemeies effective use of the EMS |
|
EP
|
Eletronic Protect
Actions taken to ensure friendly effective use of the EMS, despite an ememies use of EA |
|
EMS
|
Electro-Magnetic spectrum
|
|
ASMD
|
Anti-Ship Missile Defense
|
|
BDA
|
Battle Damage Assessment
|
|
CTTG
|
Counter Targeting used to deny, reduce, or confuse an adversaries targeting process
|
|
RCS
|
Radar Cross Section
a measure in square meters of a ships reflected Electro- Magnetic energy |
|
MILDEC
|
Military Deception
deliberately mislead advisary military decision makers as to friendly capabilities |
|
Own force monitoring
|
is the process of monitoring the electromagnetic emissions from one’s own unit
|
|
AN/SLQ-32
|
Surface Navy’s primary EW suite designed as an ASMD system for surface combatants. Secondary mission is to conduct limited ELINT collection
|
|
AN/ULQ-16
|
Provides the capability to perform detailed analysis of SLQ-32 collected emitter data
|
|
MK-36 Decoy Launching System
|
Provides passive decoy launch capabilities
|
|
MK-53 Decoy Launching System
|
Provides active/passive decoy launch capabilities.
|
|
AN/SLA-10B
|
Protects the SLQ-32 receivers from saturation by onboard radar signals.
|
|
AN/SSX-1
|
Enables precise measurement of selective emitter parameters and characteristics.
|
|
AN/USQ-151 JTT Joint Tactical Terminal
|
Provides improved interoperability and dissemination of critical intelligence and targeting information.
|
|
Types of Deceptive Counter Measures
|
Electronic: The deliberate radiation, re-radiation, alteration, suppression, denial, enhancement, or reflection of electromagnetic energy in a manner intended to convey misleading information to an enemy of enemy electromagnetic-dependent weapons.
Mechanical: The deliberate absorption and reflection of electromagnetic energy using mechanical decoys in a manner intended to convey misleading information to enemy radar operators |
|
Mechanical
|
Mechanical:
There are four surface launched expendable ASMD decoys. These decoys are used in CTTG, Distraction and Seduction roles, and can be launched at the SLQ-32. MK 216 (Distraction) MK214 (Seduction) MK245 Giant (Infrared IR) MK234 Nulka (Combined Active/Passive/IR) |
|
SATVUL
|
Satelite Vulnerability
designed to mitigate vulnerability of ships emissions to space based sensors Set using EMCON |
|
PCMS
|
Passive Countermeasures System
Reduces RCS through the application of RADAR absorbent material to the superstructure, RADAR absorbent blankets to areas that cannot be coated, modified EW expendable launchers and AN/SLQ-32(V) software, and modified RADAR antennas |
|
Deceptive Jamming
|
Designed to inject false information into a victim RADAR to deny critical information on target azimuth, range, velocity, or a combination of these parameters.
|
|
EMCON
|
Emissions control
The selective and controlled use of electromagnetic, acoustic, or other emitters to optimize command and control capabilities while minimizing, for operations security |
|
Electromagnetic Interference
|
Any electromagnetic disturbance that interrupts, obstructs, or otherwise degrades or limits the effective performance of electronics and electrical equipment
|
|
Four types of Electromagnetic interference
|
Functional - Originates from any source designed to generate electromagnetic energy and which may create interference as a normal part of its operation.
Incidental - Originates from man-made sources. These are sources not designed specifically to generate electromagnetic energy but which do in fact cause interference. Examples of incidental EMI sources include power lines, motors, and switches. Natural - Caused by natural phenomena, such as electrical storms, rain particles, and solar and interstellar radiation. Hull-generated - Caused by the interaction of radiated signals with elements of the hull and rigging of a ship. (The functional signals themselves do not cause interference.) |
|
OOB
|
Order of Battle The identification, strength, command structure, and disposition of the personnel, units, and equipment of any military force
|
|
What are the 5 OOB's
|
EOB – Electronic Order of Battle
NOB – Naval Order of Battle AOB – Air Order of Battle GOB – Ground Order of Battle |
|
USSOCOM
|
United States Special Operations Command
Provide fully capable SOF to defend the US and its interestes |
|
HVT
|
High Value Target- a Target the enemy commander requries for successful completion of the mission
(Financer/ Leader) |
|
HPT
|
High Payoff Target a target whose loss to the enemy will significantly contribute to the success of the friendly course of action
(Bomb Maker/ Courrier) |
|
NSWG-1
|
Naval Special Warfare Group ONE
Coronado SEAL Teams- 1,3,5,7 ADCON for NSWU-1/3 Guam/Bahrain |
|
NSWG-2
|
Little Creek, Virginia
OPCON/ADCON SEAL Team 2,4,8,10 ADCON NSWU-2 |
|
NSWG-3
|
Cornado California
SDVT-1, SDVT-2 |
|
NSWG-4
|
Little Creek
Special Boat teams 12,20,22 |
|
NSWG-10
|
Fort Story Virginia
Support Activity 1/2 |
|
NSWGDG
|
Naval Special Warfare Development Group
Dam Neck, Virginia |
|
Direct Action
|
Short duration strikes and other small-scale offensive operations principally undertaken by SOF to seize, destroy, capture, recover, or inflict damage on designated personnel or material
(Raid, Ambush, Direct Assults) |
|
SR
|
Special Reconnaissance- SOF conducting a wide variety of information gathering activities of strategic or operational significance.
|
|
FID
|
Foreign Internal Defense- SOF's Primary contribution in this interagency activity to organize, train, advise, and assist host nation military
|
|
UW
|
Unconventional Warfare
Broad spectrum of military paramilitary operations, normally of long durration (Guerrilla Warfare/ Low-vis) |
|
Counter Proliferation
|
WMD
Actions takent to seize and destroy, render safe, capture or recover WMD |
|
PSYOPS (MISO)
|
Psycological Operations (MISO Military Informationto Support Operations) Planned operations to convey selected information and indicatiors to foreign audences to influence emotions, motives, objective reasonings
|
|
IO for Expeditionary Warfare
|
Involves actions taken to affect adversary information and information systems while defending one’s own information and information systems.
|
|
Types of Amphibious Operations
|
Amphibous Assult
Establishment of a Landing Force on a hostile.potentially hostile shore Raid Temporary occupation with a planned with draw (swift in and out) Demonstration Show of Force conducted to deceive the expectation of deluding the enemy into a course of action (inviasion of IZ was put on the media) Withdrawl extraction of forces by sea in ships or craft from a potential hostile shore (NEO) |
|
NGA
|
Lead Agency in charge of Geospatial Analysis and products at NATIONAL level
|
|
NRO
|
Lead Agency charged to design, build, and operation of National Reconnaissance satellites
|
|
National System for Geospatial Intelligence-Direct Action
|
Governing body over Geospatial programs
|
|
IPL
|
Image Product Library
Storage of raw Imagery |
|
WARP
|
Web-based Acces Retrieval Portal
|
|
ARC-GIS
|
ARC-Geospatial Information System
|
|
SOCET GXP
|
Soft Copy Exploitation Tool -- Geospatial Expolotation Information System
(DCGS-N system) |
|
OPINTEL
|
Operational Intelligence
the result of analyzing and combining multi-source intelligence information into a product used by Commanders to identify adversary critical vulnerabilities, Centers of Gravity (COGs), and critical nodes in-order to effectively employ assets. Intel Bread and Butter!! |
|
Steps of Intel Cycle
PCPAD |
Planning and Direction
Collection Processing and Exploitation Analysis and Production Dissemination |
|
Role of GCCS in OPINTEL
|
Common Operational and Tactical Picture
Red Database management Threat area plotting |
|
IIR
|
Intelligence Information Reports
The purpose of Intelligence Information Reports is to convey raw, unbiased, objective data. |
|
6 Phases of Joint Targeting Cycle
|
1 Commanders Objective
2 Target Development 3 Capabilities Analysis 4 Commanders Decision 5 Mission Planning 6 Combat Assessment |
|
No-Strike List
|
Objects protected from military action (schools, churches, grave yards)
|
|
Restricted Target List
|
Require approval from a joint force commander
|
|
Joint Integrated Prioritized Target List
|
Selected targets where there are no restrictions and are approved for military action
|
|
Collateral Damage Methodology
|
Unintentional or incidental injury or damage to persons or objects that would not be lawful military targets in the circumstances ruling at the time.
(Target a car that is close to a school) |
|
Geo-positioning
|
- Methods that facilitate the location of one point relative to the surface of the earth.
|
|
CRM
|
Collections Requirements Management
Focuses on the requirements of the customer, is all-source oriented and advocates what information must be collected |
|
COM
|
Collections Operations Managment
focuses on tasking specific systems within a discipline, or across multiple disciplines to collect information addressing the customer’s requirement |
|
PIR
|
Priority Intelligence Requirements
are critical items of information or intelligence related to the enemy or battle space that is required in a timely manner to support a decision |
|
RFI
|
Request for Information
is a request by a consumer for information or products that is not necessarily related to standing requirements or scheduled intelligence production |
|
What is the most important part of intel collections
|
Feedback is key and critical in ensuring that the customer’s needs are being met. Without it the collection manager does not know what is still priority, whether or not needs have been met, and whether or not tweaks and adjustments are necessary to the overall collections strategy
|
|
Collection Capabilities of current systems
|
F/A-18 SUPER HORNET with SHARP
EO/FMV MQ-1B Predator EO/FMV/SI MQ-8B Fire Scout EO/FMV RQ-4 BAMS EO/FMV SCAN EAGLE EO/FMV |
|
Terrorism
|
The unlawful use of violence or threat of violence to instill fear and coerce governments or societies. Terrorism is often motivated/committed based on religious, political, or ideological beliefs.
|
|
Counter Intelligence
|
Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, sabotage, or assassinations. CI is conducted for or on behalf of foreign powers, organizations, persons, their agents, international terrorist organizations, or activities.
|
|
State Sponsored Terrorism
|
Terrorist group that receives substantial support (money, training and weapons) from a state but the actions of the group are autonomous.
|
|
State Directed Terrorism
|
Terrorists who operate as an agent of a host government and receive substantial intelligence, logistics and operational support from the sponsoring government.
|
|
Insurgency
|
The organized use of subversion and violence by a group or movement that seeks to overthrow, or force change of, a governing authority.
|
|
Direct Questioning
|
Ask questions directly related to information
Make no efforts to conceal purpose Use questions to rapidly debrief individuals Establish a baseline to detect deception Questioning by designated personnel |
|
DOD Terrorism Threat Levels
|
1. High - Exceptional terrorist threat of mass casualty attack against substantial DoD presence.
2. Significant - Direct terrorist threat to individuals or small groups of DoD personnel. 3. Moderate - Potential collateral threat to DoD personal from indiscriminate terrorist activity. 4. Loss - No credible indications detected of terrorist threat to DoD personnel. |
|
HUMINT
|
Human Intelligence
A category of intelligence derived from information collected and provided by human sources |
|
MSO
|
Military Source Operations
The collection, by humans, of foreign military related intelligence |
|
Interrogation
|
The systematic effort to procure information to answer specific collection requirements. Achieved by direct and indirect questioning techniques of a person in custody.
|
|
Tactical Questioning/Debriefing
|
Direct questioning by any Department of Defense personnel of a captured or detained person. Conducted in order to obtain time-sensitive, tactical intelligence information. Occurs at or near the point of capture or detention and is consistent with applicable law.
|
|
FORMICA
|
Foreign Military Intelligence Collection Activities
|
|
POW
|
Prisoner of War
A detained person (as defined in Articles 4 and 5 of the Geneva Convention Relative to the Treatment of Prisoners of War of August 12, 1949) who, while engaged in combat under orders of his or her government, is captured by the armed forces of the enemy |
|
Detainee
|
A term used to refer to any person captured or otherwise detained by an armed force.
|
|
Double Agent
|
- Agent in contact with two opposing intelligence services, only one of which is aware of the double contact or quasi-intelligence services.
|
|
Espionage
|
The act of obtaining, delivering, transmitting, communicating, or receiving information about the national defense of a country. The information is obtained with the intent, or reason to believe, that the information may either be used to injure of the United States, or be advantageous to a foreign nation
|
|
4 Steps of Counter Intelligence Process
|
1. Prepare CI estimate - known factors on location, disposition, composition, strength, activities, capabilities, weaknesses, and other pertinent information.
2. Conduct CI Survey - assesses a unit’s security posture against the threats detailed in the CI estimate. 3. Develop CI Plan - details the activities and operations that the command uses to counter hostile intelligence, sabotage, subversion, and terrorist threats. 4. Implement CI Measures - both active and passive encompass a range of activities designed to protect against hostile intelligence, espionage, sabotage, subversion, and terrorism threats. |
|
DLPT
|
Defense Language Proficiency Test
|
|
Arabic
|
L1+/R2 or L2/R1+
|
|
Cjomese (Mandarin)
|
L1+/R2 or L2/R1+
|
|
Persian (farsi)
|
L1+/R2 or L2/R1+
|
|
Hebrew
|
L2/R2
|
|
Korean
|
L2/R2
|
|
Russian
|
L2/R2
|
|
Spanish
|
L2/R2
|
|
Levels of Language Proficiency
|
a. 0+ Memorized proficiency – comprehends memorized utterances
b. 1 Elementary proficiency – minimum survival needs, courtesies, travel; simple Q&A. Slow speech understood, repetition needed. c. 1+ Elementary proficiency, plus – comprehends simple conversations about survival or social situations; beyond immediate survival needs. Faster speech may be understood d. 2 Limited working proficiency – comprehends limited conversations on routine social demands and limited job reqs e. 2+ Limited working proficiency, plus – understands most routine social demands and most work reqs and discussions on concrete topics; understands some implications f. 3 General professional proficiency (goal in DoD) – able to understand essentials of all speech; understands opinions; rarely asks for paraphrasing or explanations; can follow news/phone calls; cannot understand slang or dialect g. 3+ General professional proficiency, plus - Comprehends most content of various forms and styles of speech pertinent to professional needs, & general topics and social conversation. comprehends many cultural references; Increased ability to understand native speakers talking quickly, using nonstandard dialect or slang h. 4 Advanced professional proficiency - Understands all forms and styles of speech for professional needs. Understands fully all speech with extensive and precise vocabulary in all standard dialects on any subject relevant to professional needs within his/her experience, including social conversations; all intelligible broadcasts and telephone calls; and many kinds of technical discussions and discourse. i. 4+ Advanced professional proficiency, plus – Understands extremely difficult and abstract speech & understands all forms and styles of speech pertinent to professional needs & social conversations. Comprehends native speakers using extreme nonstandard dialects and slang, as well as to understand speech in unfavorable conditions. Accuracy is close to that of the well-educated native listener but still not equivalent j. 5 Functionally native proficiency - Comprehension equivalent to that of the well-educated native listener |
|
CLREC
|
Center for Language, Regional Expertise and Culture
|
|
Learning Sites that teach Languages
|
a. CID LS Ft Meade - Russian
b. CID LS Ft Gordon - Arabic/Persian-Farsi/Hebrew c. CID LS Kunia – Chinese/Korean d. CID LS Medina – Spanish |
|
CLPM
|
Command Language Program Manager
|
|
CIT NEC
|
a. 9ARB - Modern Standard Arabic (MSA)
b. 9CMN – Chinese Mandarin c. 9HEB - Hebrew d. 9KOR - Korean e. 9PES – Persian-Farsi (Iranian) f. 9SPA - Spanish g. 9RUS - Russian |
|
How does METOC support Information Dominance
|
The Naval Meteorology and Oceanography Command provides Meteorology and Oceanography (METOC), Bathymetry and Hydrography (Bathy/Hydro), Precise Time and Astrometry (PTA), products and services that enable effective decision-making for operational safety, warfighting success by Naval and Joint forces, and security cooperation.
|
|
NMOC mission
|
Navy Meterology and Oceanography Command
The Naval Meteorology and Oceanography Command provides Meteorology and Oceanography (METOC), Bathymetry and Hydrography (Bathy/Hydro), Precise Time and Astrometry (PTA), products and services that enable effective decision-making for operational safety, warfighting success by Naval and Joint forces, and security cooperation. |
|
Decision Layers
|
3 (Decision) COA, Asset Allocation, Quantified Risk
2 (Performance) How the predicted environment affects the fleet 1 (Environment) The predicted environment 0 (Data) Observations, Measurments (systems) Build from 0-3 |
|
OTSR
|
Optimum Track Ship Routing
A weather advisory service for safety and damange avoidance, spanning long-range planning to enrout serveillance (like Katrina, when we were advised to pull out our ship) |
|
OTSR Divert recommendation
|
issued when conditions are forcast to exceed wind or sea limits (determined by supported unit)
|
|
Special Weather Advisory
|
Issued for prolonged periods of Heavy weather in High Traffic areas 72 hours in advance
|
|
WEAX
|
Enrout Weather Forcast tailored to units points of inteneded movemnt
|
|
OPAREA Forcast
|
Once a day for major operating areas (fleet areas)
|
|
Thunderstorm Watch
|
with in 25 NM or expected with in 6 hours
|
|
Thunderstorm Warning
|
With in 10 NM or expected in 1 hour
|
|
Sever Thunderstorm watch
|
greater tha n 50kts, hail with a diameter greater than 3/4" and/or tornadoes
25NM or with in 6 hours |
|
Sever Thunderstorm Warning
|
Gusts of wind greater than 50kts, hail greater than 3/4" and/or tornadoes
Within 10 NM, or expected within 1 hour |
|
Small Craft Warning
|
sustained wind of 18-33 KTS
|
|
Gail Warning
|
34-47 KTS
|
|
Freezing precipitation advisory
|
up to 1/4"
|
|
Condition V
|
Destructive winds possible within 96 hours
|
|
Condition IV
|
Possible threat of destructive winds with in 72 Hours
|
|
Condition III
|
Destructive winds possibly with in 48 hours
|
|
Condition II
|
Destructive winds anticipated within 24 Hours
|
|
Condition 1
|
Destructive winds anticipated with in 12 hours
|
|
Tsunami Warning
|
Issued when a tsunami with significant widespread inudation is imminent or expected
|
|
Tsunami Advisory
|
When threat of a potential tsunami exists
|
|
Tsunami watch
|
May be upgraded to warning or advisory or even cancled
|
|
Tsunami Information Statement
|
inform emergency managment and public that an earthquake has occured and or a tsunami warning,watch,advisory has been issued
|