Busy. Please wait.
Log in with Clever

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever

Username is available taken
show password

Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Didn't know it?
click below
Knew it?
click below
Don't Know
Remaining cards (0)
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how



USSTRATCOM Deter attacks on US vital interests, to ensure US freedom of action in space and cyberspace
CYBERCOM Plans, coordinates, integrates, synchronizes and conducts activities to direct the operations and defense of specified DoD information networks
JFCC-ISR (Joint Functional Component Command for Intel, surveillance, and Recon operations) serves as epicenter for planning, execution and assessment of the US's military's global intelligence, surveillance, and reconnaissance operations
JFCC- Space (Joint Functional Component Command for Space) continuously coordinates, plans, integrates, commands, and controls space operations to provide tailored, responsive, local and on order, denies the enemy the same
JIOWC (Joint Information Operations Warfare Command) Responsible for the integration of IO into military plans and operations across the spectrum
CSGs 3 Formal Categories Permanent Military Service Component Expeditionary
Customer Relationship Functions in relations to CSGs Provision of dedicated SIGINT services to a customer, using the capability of the entire US SIGINT System
SIGINT PRODUCTION FUNCTIONS in relations to CSGs these elements formally delegated a mission to a CSG through the mission delegation process and are responsible for overseeing the analytic and reporting mission
SIGINT OPERATIONAL RELATIONSHIPS in relations to CSGs On behalf of DIRNSA, the SIGINT director exercises SIGINT operational control of CSGs though the NSA/ CSS representative accredited to CSG's supporting agency
Rules of Engagement means by which the President, SecDef, and operational CDRs regulate the used of armed force in the context of applicable political and military policy
Law of war body of law concerning acceptable justifications to engage in war
No- Strike List A list of objects or entities characterized as protected from the effects of military operations under international law
Restricted Target List A list of restricted targets nominated by elements of the joint force and approved by joint force CDR
Battle Damage Assessment Compare post- execution results with the projected results generated during target development
Information Operations (IO) Involve actions taken to affect adversary information and information systems while defending one's own information and information systems
Information Warfare (IW) IO conducted during time of crisis or conflict
Target Development Based on what the CDR wants to achieve and the measures and indicators used to evaluate their achievement rather than on the ways and means used to affect the target
Time Sensitive Targeting When the importance of a target rises to such a level that it poses a danger to friendly forces
6 Phases of Time Sensitive Targeting Detect, Locate, Identify, Decide, Strike, Assess
Core Capabilities of IO Offensive and Defensive IO
Core Capability of IO Defensive IO DESTROY To damage a system or entity so badly that it cannot perform any function or be restored
Core Capability of IO Defensive IO DISRUPT To break of interrupt the flow of information
Core Capability of IO Defensive IO DEGRADE To reduce the effectiveness or efficiency of adversary C2 or comms systems.
Core Capability of IO Defensive IO DENY To prevent the adversary from accessing and using critical info, systems, and services
Core Capability of IO Defensive IO DECEIVE To cause a person to believe what is not true
Core Capability of IO Defensive IO EXPLOIT To gain access to adversary C2 systems to collect information or to plant false or misleading information
Core Capability of IO Defensive IO INFLUENCE To cause others to behave in a manner favorable to US forces
Core Capability of IO Defensive IO PROTECT To take action to guard against espionage or capture of sensitive equipment and information
Core Capability of IO Defensive IO DETECT To discover or discern the existence, presence, or face of an intrusion into information systems
Core Capability of IO Defensive IO RESTORE To bring information and information systems back to their original state
Core Capability of IO Defensive IO RESPOND To react quickly to an adversary's IO attack
SSN Nuclear Submarine
SSGN Guided Missile Nuclear Submarine
EA-6B (Prowler) A twin engine, mid- wing electronic
E-2C (Hawkeye) Navy's and Marine's airborne surveillance
P-3C (Orion) maritime patrol aircraft
EP-3E JCC signals reconnaissance version of P-3 Orion
RC-135 (Rivet) Joint Recon aircraft supports theater national level consumers
MQ-1A (Predator) Long endurance, medium altitude unmanned aircraft system for surveillance and recon missions
EC-130H (Compass Call) Airborne tactical weapon system using a modified version of the C-130 Hercules
U-2 Single engine, very high altitude recon aircraft operated by the US air force
EA-18G A derivative of the Super hornet project
CVN Aircraft Carrier
CG Guided Missile Cruiser Combat vessel with multiple target response capabilities
DDG Guided Missile Destroyer
FFG Guided Missile Frigate Anti-submarine warfare combatants
LCC Amphibious Command Ships Provide command and control for fleet commanders
LHA/LHD Amphibious Assault Ship
LPD Amphibious Transport Dock Lands elements of a landing force for expeditionary warfare missions
LSD Dock Landing Ship Transport load landing craft
PC Patrol Costal Ship coastal patrol and surveillance
MARK 4 Special Operations Craft Provides medium range insertion and extraction (MRI) support for Special Operation Forces (SOF) personnel in a low to medium threat environment
Physical Deception Activities and resources used to convey or deny selected information to a foreign power
Technical Deception Military material resources and their associated operating techniques used to convey or deny selected information to a foreign power through the deliberate radiation, reradiating, alteration, absorption or reflection of energy
Administrative Deception Resources, methods, and techniques to convey or deny oral, pictorial, documentary, or other physical evidence of a foreign power
Fives phases of MILDEC planning process Deception Mission Analysis, Deception Planning Guidance, Staff Deception Estimate, Commander's Deception estimate, and Deception Plan Development
Deception Mission Analysis Deception mission analysis is conducted as part of the overall mission analysis that is done by a JFC following receipt of a new mission
Deception Planning Guidance After completion of the mission analysis, the CDR issues planning guidance to the staff
Staff Deception Estimate The deception estimate is conducted as part of the operation estimate.
CDR's Deception Estimate Using the staff estimate as a basis, the JFC conducts an estimate
Deception Plan Development Developing a complete deception plan is the most time- consuming part of the planning process
MISO contradicting indicators while conveying selected information and indicators Winning the hearts and minds of the people
MILDEC Degrading general situation information to enhance effect of observables Intentionally deceiving military officials
Organizational Responsibilities When directed by the SECDEF, the CDR, US Special Operations Command transfers MISO forces by attachment to geographic combatant commanders
Command and Control C4s are vital to planning, mounting, and sustaining successful joint MISO
How does intelligence support MISO through target analysis The use of MISO forces and assets is predicted on political, military, economic, cultural, religious, and psychological or social conditions.
Information Operations Officer Primary Responsibilities To assist the J-3 in exercising joint IO responsibilities, the primary function of the IO officer is to supervise the IO cell to ensure capabilities are planned, coordinated, and integrated within the joint force officer staff.
Strike Group IWC/IWO Primary Responsibilities Warfare Commander relationships reporting requirements, TAXSIT, IW weapons posture
COMSEC Area Cryptosecurity The component of communications security that results from the provision of technically sound cryptosystems and their proper use
COMSEC Area Transmission Security The component of communications security that results from all measures designed to protect transmissions from interception and exploitation by telecommunications systems
COMSEC Area Emission Security All measures taken to deny unauthorized persons information of value that might be derived from intercept and analysis of compromising emanations from crypto equipment.
COMSEC Area Physical Security Results from all physical measures necessary to safeguard classified equipment, material, and documents from access thereto or observation thereof by unauthorized persons
EEFI Key questions likely to be asked by an adversary
BEADWINDOW Code to report a disclosure of EEFI, BEADWINDOW procedures uses a code word and a number combination which is transmitted immediately to the station disclosing an EEFI.
Only Authorized reply to BEADWINDOW ROGER- OUT
JCMA Provide COMSEC monitoring services to the DoD and other US gov't departments and agencies
Popular Military sets




Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
restart all cards