INFORMATION OPERATIONS
Help!
|
|
||||
---|---|---|---|---|---|
show | Deter attacks on US vital interests, to ensure US freedom of action in space and cyberspace
🗑
|
||||
CYBERCOM | show 🗑
|
||||
show | serves as epicenter for planning, execution and assessment of the US's military's global intelligence, surveillance, and reconnaissance operations
🗑
|
||||
JFCC- Space (Joint Functional Component Command for Space) | show 🗑
|
||||
JIOWC (Joint Information Operations Warfare Command) | show 🗑
|
||||
show | Permanent
Military Service Component
Expeditionary
🗑
|
||||
Customer Relationship Functions in relations to CSGs | show 🗑
|
||||
show | these elements formally delegated a mission to a CSG through the mission delegation process and are responsible for overseeing the analytic and reporting mission
🗑
|
||||
show | On behalf of DIRNSA, the SIGINT director exercises SIGINT operational control of CSGs though the NSA/ CSS representative accredited to CSG's supporting agency
🗑
|
||||
Rules of Engagement | show 🗑
|
||||
Law of war | show 🗑
|
||||
show | A list of objects or entities characterized as protected from the effects of military operations under international law
🗑
|
||||
Restricted Target List | show 🗑
|
||||
show | Compare post- execution results with the projected results generated during target development
🗑
|
||||
show | Involve actions taken to affect adversary information and information systems while defending one's own information and information systems
🗑
|
||||
show | IO conducted during time of crisis or conflict
🗑
|
||||
show | Based on what the CDR wants to achieve and the measures and indicators used to evaluate their achievement rather than on the ways and means used to affect the target
🗑
|
||||
show | When the importance of a target rises to such a level that it poses a danger to friendly forces
🗑
|
||||
6 Phases of Time Sensitive Targeting | show 🗑
|
||||
show | Offensive and Defensive IO
🗑
|
||||
show | To damage a system or entity so badly that it cannot perform any function or be restored
🗑
|
||||
Core Capability of IO Defensive IO DISRUPT | show 🗑
|
||||
show | To reduce the effectiveness or efficiency of adversary C2 or comms systems.
🗑
|
||||
Core Capability of IO Defensive IO DENY | show 🗑
|
||||
Core Capability of IO Defensive IO DECEIVE | show 🗑
|
||||
Core Capability of IO Defensive IO EXPLOIT | show 🗑
|
||||
show | To cause others to behave in a manner favorable to US forces
🗑
|
||||
Core Capability of IO Defensive IO PROTECT | show 🗑
|
||||
Core Capability of IO Defensive IO DETECT | show 🗑
|
||||
show | To bring information and information systems back to their original state
🗑
|
||||
show | To react quickly to an adversary's IO attack
🗑
|
||||
SSN | show 🗑
|
||||
SSGN | show 🗑
|
||||
EA-6B (Prowler) | show 🗑
|
||||
E-2C (Hawkeye) | show 🗑
|
||||
show | maritime patrol aircraft
🗑
|
||||
show | JCC signals reconnaissance version of P-3 Orion
🗑
|
||||
show | Joint Recon aircraft supports theater national level consumers
🗑
|
||||
show | Long endurance, medium altitude unmanned aircraft system for surveillance and recon missions
🗑
|
||||
show | Airborne tactical weapon system using a modified version of the C-130 Hercules
🗑
|
||||
U-2 | show 🗑
|
||||
show | A derivative of the Super hornet project
🗑
|
||||
show | Aircraft Carrier
🗑
|
||||
CG | show 🗑
|
||||
show | Guided Missile Destroyer
🗑
|
||||
show | Guided Missile Frigate
Anti-submarine warfare combatants
🗑
|
||||
show | Amphibious Command Ships
Provide command and control for fleet commanders
🗑
|
||||
show | Amphibious Assault Ship
🗑
|
||||
show | Amphibious Transport Dock
Lands elements of a landing force for expeditionary warfare missions
🗑
|
||||
LSD | show 🗑
|
||||
show | Patrol Costal Ship
coastal patrol and surveillance
🗑
|
||||
MARK 4 Special Operations Craft | show 🗑
|
||||
show | Activities and resources used to convey or deny selected information to a foreign power
🗑
|
||||
show | Military material resources and their associated operating techniques used to convey or deny selected information to a foreign power through the deliberate radiation, reradiating, alteration, absorption or reflection of energy
🗑
|
||||
Administrative Deception | show 🗑
|
||||
Fives phases of MILDEC planning process | show 🗑
|
||||
show | Deception mission analysis is conducted as part of the overall mission analysis that is done by a JFC following receipt of a new mission
🗑
|
||||
show | After completion of the mission analysis, the CDR issues planning guidance to the staff
🗑
|
||||
show | The deception estimate is conducted as part of the operation estimate.
🗑
|
||||
CDR's Deception Estimate | show 🗑
|
||||
show | Developing a complete deception plan is the most time- consuming part of the planning process
🗑
|
||||
show | contradicting indicators while conveying selected information and indicators
Winning the hearts and minds of the people
🗑
|
||||
MILDEC | show 🗑
|
||||
Organizational Responsibilities | show 🗑
|
||||
show | C4s are vital to planning, mounting, and sustaining successful joint MISO
🗑
|
||||
show | The use of MISO forces and assets is predicted on political, military, economic, cultural, religious, and psychological or social conditions.
🗑
|
||||
show | To assist the J-3 in exercising joint IO responsibilities, the primary function of the IO officer is to supervise the IO cell to ensure capabilities are planned, coordinated, and integrated within the joint force officer staff.
🗑
|
||||
show | Warfare Commander relationships
reporting requirements, TAXSIT, IW weapons posture
🗑
|
||||
show | The component of communications security that results from the provision of technically sound cryptosystems and their proper use
🗑
|
||||
show | The component of communications security that results from all measures designed to protect transmissions from interception and exploitation by telecommunications systems
🗑
|
||||
show | All measures taken to deny unauthorized persons information of value that might be derived from intercept and analysis of compromising emanations from crypto equipment.
🗑
|
||||
show | Results from all physical measures necessary to safeguard classified equipment, material, and documents from access thereto or observation thereof by unauthorized persons
🗑
|
||||
show | Key questions likely to be asked by an adversary
🗑
|
||||
show | Code to report a disclosure of EEFI, BEADWINDOW procedures uses a code word and a number combination which is transmitted immediately to the station disclosing an EEFI.
🗑
|
||||
Only Authorized reply to BEADWINDOW | show 🗑
|
||||
show | Provide COMSEC monitoring services to the DoD and other US gov't departments and agencies
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
Adventureaddict89
Popular Military sets