Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

INFORMATION OPERATIONS

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
show Deter attacks on US vital interests, to ensure US freedom of action in space and cyberspace  
🗑
show Plans, coordinates, integrates, synchronizes and conducts activities to direct the operations and defense of specified DoD information networks  
🗑
show serves as epicenter for planning, execution and assessment of the US's military's global intelligence, surveillance, and reconnaissance operations  
🗑
JFCC- Space (Joint Functional Component Command for Space)   show
🗑
JIOWC (Joint Information Operations Warfare Command)   show
🗑
show Permanent Military Service Component Expeditionary  
🗑
Customer Relationship Functions in relations to CSGs   show
🗑
SIGINT PRODUCTION FUNCTIONS in relations to CSGs   show
🗑
SIGINT OPERATIONAL RELATIONSHIPS in relations to CSGs   show
🗑
Rules of Engagement   show
🗑
Law of war   show
🗑
No- Strike List   show
🗑
Restricted Target List   show
🗑
show Compare post- execution results with the projected results generated during target development  
🗑
Information Operations (IO)   show
🗑
Information Warfare (IW)   show
🗑
show Based on what the CDR wants to achieve and the measures and indicators used to evaluate their achievement rather than on the ways and means used to affect the target  
🗑
Time Sensitive Targeting   show
🗑
6 Phases of Time Sensitive Targeting   show
🗑
show Offensive and Defensive IO  
🗑
Core Capability of IO Defensive IO DESTROY   show
🗑
show To break of interrupt the flow of information  
🗑
Core Capability of IO Defensive IO DEGRADE   show
🗑
show To prevent the adversary from accessing and using critical info, systems, and services  
🗑
show To cause a person to believe what is not true  
🗑
show To gain access to adversary C2 systems to collect information or to plant false or misleading information  
🗑
show To cause others to behave in a manner favorable to US forces  
🗑
Core Capability of IO Defensive IO PROTECT   show
🗑
Core Capability of IO Defensive IO DETECT   show
🗑
show To bring information and information systems back to their original state  
🗑
show To react quickly to an adversary's IO attack  
🗑
show Nuclear Submarine  
🗑
show Guided Missile Nuclear Submarine  
🗑
show A twin engine, mid- wing electronic  
🗑
E-2C (Hawkeye)   show
🗑
P-3C (Orion)   show
🗑
show JCC signals reconnaissance version of P-3 Orion  
🗑
RC-135 (Rivet)   show
🗑
MQ-1A (Predator)   show
🗑
show Airborne tactical weapon system using a modified version of the C-130 Hercules  
🗑
show Single engine, very high altitude recon aircraft operated by the US air force  
🗑
show A derivative of the Super hornet project  
🗑
show Aircraft Carrier  
🗑
CG   show
🗑
show Guided Missile Destroyer  
🗑
show Guided Missile Frigate Anti-submarine warfare combatants  
🗑
LCC   show
🗑
LHA/LHD   show
🗑
show Amphibious Transport Dock Lands elements of a landing force for expeditionary warfare missions  
🗑
show Dock Landing Ship Transport load landing craft  
🗑
show Patrol Costal Ship coastal patrol and surveillance  
🗑
MARK 4 Special Operations Craft   show
🗑
Physical Deception   show
🗑
show Military material resources and their associated operating techniques used to convey or deny selected information to a foreign power through the deliberate radiation, reradiating, alteration, absorption or reflection of energy  
🗑
Administrative Deception   show
🗑
Fives phases of MILDEC planning process   show
🗑
show Deception mission analysis is conducted as part of the overall mission analysis that is done by a JFC following receipt of a new mission  
🗑
show After completion of the mission analysis, the CDR issues planning guidance to the staff  
🗑
show The deception estimate is conducted as part of the operation estimate.  
🗑
CDR's Deception Estimate   show
🗑
show Developing a complete deception plan is the most time- consuming part of the planning process  
🗑
MISO   show
🗑
show Degrading general situation information to enhance effect of observables Intentionally deceiving military officials  
🗑
Organizational Responsibilities   show
🗑
Command and Control   show
🗑
How does intelligence support MISO through target analysis   show
🗑
Information Operations Officer Primary Responsibilities   show
🗑
show Warfare Commander relationships reporting requirements, TAXSIT, IW weapons posture  
🗑
COMSEC Area Cryptosecurity   show
🗑
COMSEC Area Transmission Security   show
🗑
show All measures taken to deny unauthorized persons information of value that might be derived from intercept and analysis of compromising emanations from crypto equipment.  
🗑
show Results from all physical measures necessary to safeguard classified equipment, material, and documents from access thereto or observation thereof by unauthorized persons  
🗑
EEFI   show
🗑
show Code to report a disclosure of EEFI, BEADWINDOW procedures uses a code word and a number combination which is transmitted immediately to the station disclosing an EEFI.  
🗑
Only Authorized reply to BEADWINDOW   show
🗑
show Provide COMSEC monitoring services to the DoD and other US gov't departments and agencies  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Popular Military sets