Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

INFORMATION OPERATIONS

        Help!  

Term
Definition
USSTRATCOM   Deter attacks on US vital interests, to ensure US freedom of action in space and cyberspace  
🗑
CYBERCOM   Plans, coordinates, integrates, synchronizes and conducts activities to direct the operations and defense of specified DoD information networks  
🗑
JFCC-ISR (Joint Functional Component Command for Intel, surveillance, and Recon operations)   serves as epicenter for planning, execution and assessment of the US's military's global intelligence, surveillance, and reconnaissance operations  
🗑
JFCC- Space (Joint Functional Component Command for Space)   continuously coordinates, plans, integrates, commands, and controls space operations to provide tailored, responsive, local and on order, denies the enemy the same  
🗑
JIOWC (Joint Information Operations Warfare Command)   Responsible for the integration of IO into military plans and operations across the spectrum  
🗑
CSGs 3 Formal Categories   Permanent Military Service Component Expeditionary  
🗑
Customer Relationship Functions in relations to CSGs   Provision of dedicated SIGINT services to a customer, using the capability of the entire US SIGINT System  
🗑
SIGINT PRODUCTION FUNCTIONS in relations to CSGs   these elements formally delegated a mission to a CSG through the mission delegation process and are responsible for overseeing the analytic and reporting mission  
🗑
SIGINT OPERATIONAL RELATIONSHIPS in relations to CSGs   On behalf of DIRNSA, the SIGINT director exercises SIGINT operational control of CSGs though the NSA/ CSS representative accredited to CSG's supporting agency  
🗑
Rules of Engagement   means by which the President, SecDef, and operational CDRs regulate the used of armed force in the context of applicable political and military policy  
🗑
Law of war   body of law concerning acceptable justifications to engage in war  
🗑
No- Strike List   A list of objects or entities characterized as protected from the effects of military operations under international law  
🗑
Restricted Target List   A list of restricted targets nominated by elements of the joint force and approved by joint force CDR  
🗑
Battle Damage Assessment   Compare post- execution results with the projected results generated during target development  
🗑
Information Operations (IO)   Involve actions taken to affect adversary information and information systems while defending one's own information and information systems  
🗑
Information Warfare (IW)   IO conducted during time of crisis or conflict  
🗑
Target Development   Based on what the CDR wants to achieve and the measures and indicators used to evaluate their achievement rather than on the ways and means used to affect the target  
🗑
Time Sensitive Targeting   When the importance of a target rises to such a level that it poses a danger to friendly forces  
🗑
6 Phases of Time Sensitive Targeting   Detect, Locate, Identify, Decide, Strike, Assess  
🗑
Core Capabilities of IO   Offensive and Defensive IO  
🗑
Core Capability of IO Defensive IO DESTROY   To damage a system or entity so badly that it cannot perform any function or be restored  
🗑
Core Capability of IO Defensive IO DISRUPT   To break of interrupt the flow of information  
🗑
Core Capability of IO Defensive IO DEGRADE   To reduce the effectiveness or efficiency of adversary C2 or comms systems.  
🗑
Core Capability of IO Defensive IO DENY   To prevent the adversary from accessing and using critical info, systems, and services  
🗑
Core Capability of IO Defensive IO DECEIVE   To cause a person to believe what is not true  
🗑
Core Capability of IO Defensive IO EXPLOIT   To gain access to adversary C2 systems to collect information or to plant false or misleading information  
🗑
Core Capability of IO Defensive IO INFLUENCE   To cause others to behave in a manner favorable to US forces  
🗑
Core Capability of IO Defensive IO PROTECT   To take action to guard against espionage or capture of sensitive equipment and information  
🗑
Core Capability of IO Defensive IO DETECT   To discover or discern the existence, presence, or face of an intrusion into information systems  
🗑
Core Capability of IO Defensive IO RESTORE   To bring information and information systems back to their original state  
🗑
Core Capability of IO Defensive IO RESPOND   To react quickly to an adversary's IO attack  
🗑
SSN   Nuclear Submarine  
🗑
SSGN   Guided Missile Nuclear Submarine  
🗑
EA-6B (Prowler)   A twin engine, mid- wing electronic  
🗑
E-2C (Hawkeye)   Navy's and Marine's airborne surveillance  
🗑
P-3C (Orion)   maritime patrol aircraft  
🗑
EP-3E   JCC signals reconnaissance version of P-3 Orion  
🗑
RC-135 (Rivet)   Joint Recon aircraft supports theater national level consumers  
🗑
MQ-1A (Predator)   Long endurance, medium altitude unmanned aircraft system for surveillance and recon missions  
🗑
EC-130H (Compass Call)   Airborne tactical weapon system using a modified version of the C-130 Hercules  
🗑
U-2   Single engine, very high altitude recon aircraft operated by the US air force  
🗑
EA-18G   A derivative of the Super hornet project  
🗑
CVN   Aircraft Carrier  
🗑
CG   Guided Missile Cruiser Combat vessel with multiple target response capabilities  
🗑
DDG   Guided Missile Destroyer  
🗑
FFG   Guided Missile Frigate Anti-submarine warfare combatants  
🗑
LCC   Amphibious Command Ships Provide command and control for fleet commanders  
🗑
LHA/LHD   Amphibious Assault Ship  
🗑
LPD   Amphibious Transport Dock Lands elements of a landing force for expeditionary warfare missions  
🗑
LSD   Dock Landing Ship Transport load landing craft  
🗑
PC   Patrol Costal Ship coastal patrol and surveillance  
🗑
MARK 4 Special Operations Craft   Provides medium range insertion and extraction (MRI) support for Special Operation Forces (SOF) personnel in a low to medium threat environment  
🗑
Physical Deception   Activities and resources used to convey or deny selected information to a foreign power  
🗑
Technical Deception   Military material resources and their associated operating techniques used to convey or deny selected information to a foreign power through the deliberate radiation, reradiating, alteration, absorption or reflection of energy  
🗑
Administrative Deception   Resources, methods, and techniques to convey or deny oral, pictorial, documentary, or other physical evidence of a foreign power  
🗑
Fives phases of MILDEC planning process   Deception Mission Analysis, Deception Planning Guidance, Staff Deception Estimate, Commander's Deception estimate, and Deception Plan Development  
🗑
Deception Mission Analysis   Deception mission analysis is conducted as part of the overall mission analysis that is done by a JFC following receipt of a new mission  
🗑
Deception Planning Guidance   After completion of the mission analysis, the CDR issues planning guidance to the staff  
🗑
Staff Deception Estimate   The deception estimate is conducted as part of the operation estimate.  
🗑
CDR's Deception Estimate   Using the staff estimate as a basis, the JFC conducts an estimate  
🗑
Deception Plan Development   Developing a complete deception plan is the most time- consuming part of the planning process  
🗑
MISO   contradicting indicators while conveying selected information and indicators Winning the hearts and minds of the people  
🗑
MILDEC   Degrading general situation information to enhance effect of observables Intentionally deceiving military officials  
🗑
Organizational Responsibilities   When directed by the SECDEF, the CDR, US Special Operations Command transfers MISO forces by attachment to geographic combatant commanders  
🗑
Command and Control   C4s are vital to planning, mounting, and sustaining successful joint MISO  
🗑
How does intelligence support MISO through target analysis   The use of MISO forces and assets is predicted on political, military, economic, cultural, religious, and psychological or social conditions.  
🗑
Information Operations Officer Primary Responsibilities   To assist the J-3 in exercising joint IO responsibilities, the primary function of the IO officer is to supervise the IO cell to ensure capabilities are planned, coordinated, and integrated within the joint force officer staff.  
🗑
Strike Group IWC/IWO Primary Responsibilities   Warfare Commander relationships reporting requirements, TAXSIT, IW weapons posture  
🗑
COMSEC Area Cryptosecurity   The component of communications security that results from the provision of technically sound cryptosystems and their proper use  
🗑
COMSEC Area Transmission Security   The component of communications security that results from all measures designed to protect transmissions from interception and exploitation by telecommunications systems  
🗑
COMSEC Area Emission Security   All measures taken to deny unauthorized persons information of value that might be derived from intercept and analysis of compromising emanations from crypto equipment.  
🗑
COMSEC Area Physical Security   Results from all physical measures necessary to safeguard classified equipment, material, and documents from access thereto or observation thereof by unauthorized persons  
🗑
EEFI   Key questions likely to be asked by an adversary  
🗑
BEADWINDOW   Code to report a disclosure of EEFI, BEADWINDOW procedures uses a code word and a number combination which is transmitted immediately to the station disclosing an EEFI.  
🗑
Only Authorized reply to BEADWINDOW   ROGER- OUT  
🗑
JCMA   Provide COMSEC monitoring services to the DoD and other US gov't departments and agencies  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Popular Military sets