6.Intro to CWO Flashcards

(110 cards)

1
Q

National Security Strategy (NSS)

A

-Highest level of strategic planning
-Prepared by president, his cabinet and support staff–submitted to congress
-Legal foundation for the document is spelled out in the Goldwater-Nichols Act of 1986, which helped streamline the military chain of command.
-More policy rather than strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

National Defense Strategy (NDS)

A

-Developed by the DOD and signed by the SecDef
-Set of overarching defense objectives that guide the DOD’s security activities and provide direction for the National Military Strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

National Defense Strategy (NDS) – Two main goals

A
  1. To restore America’s competitive edge by blocking global rivals Russia and China from challenging the U.S. and our allies.
  2. To keep those rivals from throwing the current international order out of balance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

National Defense Strategy (NDS) – Three lines of effort

A
  1. Build a more lethal force
  2. Strengthen alliances and find new partners
  3. Reform the Department
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

National Military Strategy (NMS)

A

–CJCS, JCS, CCMD, and OSD prepare the NMS and deliver to SecDef
–Briefly outlines the strategic aims of the armed services by supporting the NSS and implementing the NDS
–Chief source of guidance is the NSS.
–Provides focus for military activities by defining a set of interrelated military objectives from which the service chiefs and CCMD identify desired capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

National Military Strategy (NMS) – Five mission areas

A
  1. Respond to threats
  2. Deter strategic attack (and proliferation of WMD)
  3. Deter conventional attack
  4. Assure allies and partners
  5. Compete below the level of armed conflict (with a military dimension
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

National Military Strategy for Cyberspace Operations (NMS-CO)

A

The Armed Forces’ comprehensive strategic approach for using cyberspace operations to assure US military strategic superiority in the cyber domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Joint Publication (JP) 3–12, Cyberspace Operations

A

Sets forth joint doctrine to govern the activities and performance of the military in joint cyberspace operations, and provide considerations for military interaction with governmental, and non-governmental agencies, multinational forces, and other inter-organizational partners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Air Force Doctrine Document (AFDD) 3–12

A

The Air Force’s foundational doctrine publication for AF ops in, through, and from the cyberspace domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Air Force Policy Directive (AFPD) 17–2

A
  • Establishes Air Force policy for planning and executing Air Force and joint cyberspace operations
  • states the cyberspace operations related responsibilities of MAJCOMs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

COCOM

A

Non-transferable command authority – Authority to perform those functions of command over assigned forces involving organizing and employing commands and forces; assigning tasks; designating objectives; and giving authoritative direction over all aspects of military operations, joint training, and logistics necessary to accomplish the missions assigned to the command.
Logistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ADCON

A

The direction or exercise of authority over subordinate or other organizations with respect to administration and support.
Not a warfighting authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OPCON

A

The authority to perform the functions of command over subordinate forces involving organizing and employing commands and forces, assigning tasks, designating objectives, and giving authoritative direction necessary to accomplish the mission.
Delegatable
does not include authoritative direction for logistics or matters of administration, discipline, internal organization, or unit training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TACON

A

The authority over forces that is limited to the detailed direction and control of movements and maneuvers within the operational area necessary to accomplish missions or tasks.
Small scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Support (Command Authority)

A

– Aids, protects, complements, or sustains another force.
– Used when neither OPCON nor TACON is appropriate.
– SecDef specifies support relationships between CCDRs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

General Support

A

That support which is given to the supported force as a whole rather than to a particular subdivision thereof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Mutual Support

A

That support which units render each other against an enemy because of their assigned tasks, their position relative to each other and to the enemy, and their inherent capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Direct Support

A

A mission requiring a force to support another specific force and authorizing it to answer directly to the supported force’s request for assistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Close Support

A

That action of the supporting force against targets or objectives that are sufficiently near the supported force as to require detailed integration or coordination of the supporting action with the fire, movement, or other actions of the supported force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Department of Defense Information Network (DODIN)

A

– Renamed from the GIG, in 2013, this is the globally interconnected, end-to-end set of information capabilities.
– Includes all owned and leased communications and computing systems and service
– Supports the DOD, national security, and related IC missions and functions
– Provides capes for all operating locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cyber Mission Force (CMF)

A

– Directed by USCYBERCOM to be their action arm in and through cyberspace.
– Consisting of 133 Cyber Mission Teams, Joint Forces Headquarters-Cyber (JFHQ-C), and a Cyber National Mission Force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Drove CMF Creation – DODs 3 mission areas

A
  1. Secure, Operate, and Defend the DODIN
  2. Defend the Nation against cyberspace attack
  3. Provide CCMD support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Three lines of operations, by which the CMF carries out the three mission areas

A
  1. DODIN Operations
  2. Defensive Cyberspace Operations (DCO)
  3. Offensive Cyberspace Operations (OCO)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CMF three subordinate commands

A
  1. Cyber National Mission Force (CNMF)
  2. Cyber Protection Force (CPF)
  3. Cyber Combat Mission Force (CCMF)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CNMF / CNMF-HQ
-Direct and synchronize full spectrum cyberspace operations to, on order, deter, disrupt, and if necessary, defeat adversary cyberspace actors in order to defend the DODIN, US critical infrastructure/key resources, and the nation -defend the US and its interests against cyberspace attacks of significant consequence
26
National Mission Teams (NMTs)
-- Aligned against a specific cyber threat. -- Tactical units - missions normally include defensive cyberspace operations-response actions (DCO-RA), in order to protect and defend the DODIN or other blue cyberspace, when ordered.
27
National Support Teams (NSTs)
Provide specialized technical, analytic, and planning support to NMTs.
28
Cyberspace Protection Force (CPF)
-- "Largest slice of CMF pie" 68 CPTs -- Enable a supported commander’s mission capabilities and in supporting infrastructure by conducting survey, secure, protect, and recover missions to prepare local cyberspace defenders to sustain an advanced cyberspace defense posture and to defend the supported commander’s critical assets and Cyberspace Key Terrain (C-KT) -- Conduct hunt missions to determine if a suspected compromise has taken place
29
Joint Force Headquarters-DoDIN (JFHQ-DODIN)
-- Provides unity of command and unity of effort to secure, operate, and defend the DODIN. -- Operates as a C2 headquarters -- Employs an operational-level C2 approach. -- Delegated directive authority of cyberspace operations over all DOD agencies by CDRUSSTRATCOM
30
Cyber Protection Teams (CPTs)
-- Operate the CVA/H weapon system -- Real-time DCO
31
DODIN CPTs
Conduct their mission on DODIN systems and networks in support of DISA
32
CCMD CPTs
Assigned to specific MAJCOMs in support of the respective missions -- Directed by MAJCOM they are under
33
National CPTs
-- Fall under the Cyber Protection Force, operationally, but they report directly to CNMF-HQ. -- Operate within the AOR of CNMF includes U.S. critical infrastructure/key terrain (CI/KR) and national interests.
34
Service CPTs
Aligned to a particular military branch -- support missions within that service.
35
Cyberspace Combat Mission Force (CCMF)
-- Provide integrated cyberspace capabilities to support military operations and contingency plans. -- Where OCOs are carried out. -- Directed by JFHQ-C
36
JFHQ-C
-- Supports the geographic and functional CCMDs across the globe -- Execute OPCON over the Combat Mission Teams (CMTs) and Combat Support Teams (CSTs) -- led by dual-hatted service cyberspace component commanders
37
Army Cyber Command (ARCYBER)
-U.S. Central Command (USCENTCOM) -U.S. Africa Command (USAFRICOM) -U.S. Northern Command (USNORTHCOM)
38
U.S. Fleet Cyber Command (FLTCYBER)
-U.S. Indo-Pacific Command (USINDOPACOM) -U.S. Southern Command (USSOUTHCOM)
39
Marine Corps Forces Cyberspace Command (MARFORCYBER)
-U.S. Special Operations Command (USSOCOM)
40
Air Forces Cyber (AFCYBER)
-U.S. European Command (USEUCOM) -U.S. Strategic Command (USSTRATCOM) -U.S. Transportation Command (USTRANSCOM)
41
Combat Mission Teams (CMTs)
-- 27 CMTs within the CMF -- Designated by the USCYBERCOM commander and operate at the tactical level of authority -- Comprised of dedicated interactive operators, analysts, targeteers, analyst reporters, linguists, and leadership. -- Conduct planned operations in support of CCMD contingency plans, crisis action plans, or other CCMD validated requirements for cyberspace effect
42
Combat Support Teams (CSTs)
-- Comprised of capability developers, OCO analysts and planners, and DCO analysts and DCO mitigation planners. -- Develop and employ offensive cyberspace capabilities to achieve, or directly support the achievement of CCMD objectives while being integrated, synchronized and/or de-conflicted with operations in other domains
43
Defend the Nation Against Cyberspace Attack (CMF Mission Area)
-- If directed by the president or the SecDef, the US military may conduct cyberspace operations to counter an imminent or on-going attack against the US homeland or interests in cyberspace -- To blunt attack and prevent damage to key infrastructure or loss of life.
44
Defend the Nation Against Cyberspace Attack (CMF Mission Area)
-- If directed by the president or the SecDef, the US military may conduct cyberspace operations to counter an imminent or on-going attack against the US homeland or interests in cyberspace -- To blunt attack and prevent damage to key infrastructure or loss of life.
45
Secure, Operate, and Defend the DODIN (CMF Mission Area)
-- Be able to secure its own networks against attack and recover quickly if security measures fail -- Prepare and be ready to operate in an environment where access to cyberspace is contested
46
Provide CCMD Support (CMF Mission Area)
-- OCOs in support of CCMDs directed by pres or SecDef to deter or defeat strategic threats in other domains
47
DODIN Ops
-- Proactive manner -- Designing, building, configuring, securing, operating, maintaining, and sustaining the information environment that we rely on for operations
48
DCO
-- Passive and active cyberspace defense activities -- Designed to change current paradigm where attackers have advantage -- Ability to discover, detect, analyze, and mitigate threats, to include insider threats
49
OCO
Project power by the application of force in and through cyberspace. These operations are authorized like operations in the physical domains.
50
Defensive Cyberspace Operations-Internal Defensive Measures (DCO-IDM)
-- Hunting on friendly cyber terrain for threats that evade our security and directing appropriate internal responses. -- Detect, defend, analyze, and stop threats and vulnerabilities.
51
Defensive Cyberspace Operations-Responsive Actions (DCO-RA)
-- More-so about going after the threat less about defending. -- Can operate in redspace "best defense is a good offense" stop them before they get to us -- NMTs are the sole entity who conduct DCO-RAs
52
Cyber Operational Preparation of the Environment (OPE)
-- Non-intelligence enabling activities conducted to plan and prepare for followup cyber actions -- Testing a way into the box, pre-staging tools, creating/modifying accounts, setting up beacons, and much more
53
Cyber Intelligence, Surveillance, and Reconnaissance (ISR)
Focuses on tactical and operational intelligence and on mapping adversary cyberspace to support planning and future OCO/DCO
54
Information Operations (IO)
Intended to influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries while protecting our own. 3 Dimension - Physical - Information - Cognative
55
Physical Dimension (IO)
--Control systems, key decision makers, and supporting infrastructure that enable individuals and organizations to create effects. -- Includes, but is not limited to, people, command and control facilities, newspapers, books, microwave towers, laptops, smart phones, computers, or any other objects that are subject to empirical measurement -- Not confined solely to military or even nation-based systems and processes; it is a defused network connected across national, economic, and geographical boundaries.
56
Information Dimension (IO)
-- Where and how information is collected, processed, stored, disseminated, and protected -- Command and control of military forces is exercised and where the commander’s intent is conveyed
57
Cognitive Dimension (IO)
-- Minds of those who transmit, receive, and respond to or act on information and their processing, perception and judgement. -- Influenced by their individual and cultural beliefs, norms, vulnerabilities, motivations, emotions, experiences, morals, education, mental health, identities, and ideologies
58
Information Assurance (IA)
-- Process of processing, storing, and transmitting the right information to the right people at the right time
59
Wing Cybersecurity Office (WCO)
Addresses all cybersecurity requirements on the base for IT under the control of the base communications squadron/flight, including IT of tenant units unless formal agreements exist
59
Wing Cybersecurity Office (WCO)
Addresses all cybersecurity requirements on the base for IT under the control of the base communications squadron/flight, including IT of tenant units unless formal agreements exist
60
Information Assurance Officer (IAO)
Unit-level position that acts as the single liaison between the organization and the WCO for all Computer Security (COMPUSEC) matters under the IA program
61
Special Security Officer (SSO)
-- Security management, operation, implementation, use and dissemination of all types of SCI material within their respective organization. Including dev of classification guides and markings -- Personnel security, communications security, physical security, information security, and/or computer security
62
Information System/COMSEC Users
Responsible for knowing the required safeguards, and using them in accordance with their assigned duties
63
OPSEC Process
1. Identification of Critical Information 2. Analysis of threats 3. Analysis of vulnerabilities 4. Assessment of risk 5. Application of appropriate OPSEC countermeasures
64
16th Air Force (AFCYBER)
Integrates multisource intelligence, surveillance, and reconnaissance, cyber warfare, electronic warfare, and information operations capabilities across the conflict continuum to ensure that our Air Force is fast, lethal and fully integrated in both competition and in war. Sixteenth Air Force provides mission integration of Information Warfare (IW) at operational and tactical levels… recognizing the role of information in creating dilemmas for adversaries in competition and, if necessary, future conflicts.
65
616th Operations Center (616 OC)
Receives orders and tasks from U.S. Cyber Command and, in turn, tasks 16th AF subordinate units to perform a wide range of cyber missions in support of Air Force and joint force commanders -- C3MS Weapon System
66
67th Cyberspace Wing (67 CW)
Lackland Mission: Delivering cyberspace outcomes to generate a decisive advantage across the continuum of conflict for the Nation Execution arm for generating, projecting, and sustaining combat power with the employment of the Cyberspace Vulnerability Assessment/Hunter (CVA/H) weapon system The 67 CW consists of the following four groups: (1) 67th Cyberspace Operations Group (67 COG) (2) 318th Cyberspace Operations Group (318 COG) (3) 567th Cyberspace Operations Group (567 COG) (4) 867th Cyberspace Operations Group (867 COG)
67
67th Cyberspace Operations Group (67 COG)
Lackland The 67 COG has five active squadrons: (1) 91st Cyberspace Operations Squadron (91 COS) (2) 305th Cyberspace Operations Squadron (305 COS) (3) 352nd Cyberspace Operations Squadron (352 COS) (4) 375th Cyberspace Operations Squadron (375 COS) (5) 390th Cyberspace Operations Squadron (390 COS) mission is to provides forces to conduct Air Force computer network operations for United States Strategic Command, United States Cyber Command and other combatant commands. The group conducts computer network operations and warfare planning for the Air Force, joint task forces and combatant commanders. The group also conducts Secretary of Defense-directed special network warfare missions
68
91 COS
Lackland Mission: Conducts offensive cyber operations tasked by USCYBERCOM in support of world-wide Combatant Commander objectives. Executes computer network exploitation as a National Security Agency delegated authority to address intelligence community requirements. Degrades, disrupts, denies, deceives and exploits adversary information systems. Presents trained forces to USCYBERCOM as part of the CMF.
69
305 COS
Ft. Gordon Mission: Conducts offensive cyberspace operations in support of Combatant Commands
70
352 COS
Hickam Mission: Generate, conduct, and sustain offensive cyberspace operations.
71
375 COS
Lackland Mission: Conduct offensive cyberspace and ISR operations in support of Combatant Command objectives
72
390 COS
Lackland Mission: Generate mission-ready offensive cyber maneuver forces for USCYBERCOM and build cyber tacticians for our Service, Joint Force, and Nation.
73
318th Cyberspace Operations Group (318 COG)
Lackland Innovate, Partner & Deliver combat capability in, through, and from cyberspace through the development, testing, training and exercising of material and non-material solutions The 318 COG consists of four squadrons: (1) 39 Information Operations Squadron (39 IOS) (2) 90 Cyberspace Operations Squadron (90 COS) (3) 318 Range Squadron (318 RANS) (4) 346 Test Squadron (346 TS)
74
39 IOS
Hurlburt Mission: To conduct qualification and advanced training to provide mission-ready information operations planners and cyber warfare operators for all Air Force Major Commands.
75
90 COS
Lackland Mission: Accelerate Global Vigilance, Reach and Power by rapidly developing joint cyber capabilities. The 90 COS expeditiously integrates, innovates, and deploys cyberspace capabilities to achieve priority military objectives in and through air, space, and cyberspace.
76
318 RANS
Lackland Operate training and exercise ranges
77
346 TS
Lackland Mission: Execute mission relevant, responsive, and rigorous validation of Department of Defense Cyber-Warfare, Electronic-Warfare (EW), and Information-Warfare (IW) capabilities.
78
567 COG
Scott plans and executes cyberspace operations to assist supported commanders to fight in contested cyberspace environmen The 567 COG consists of four squadrons: (1) 92nd Cyberspace Operations Squadron (92 COS) (2) 834th Cyberspace Operations Squadron (834 COS) (3) 835th Cyberspace Operations Squadron (835 COS) (4) 837th Cyberspace Operations Squadron (837 COS)
79
92 COS
Lackland Mission: To assure Air Force and DoD mission performance by employing CPTs and performing cyberspace vulnerability assessments (CVAs) and COMSEC assessments.
80
834 COS
Lackland Mission: To Employ and Exploit the unique advantages of Cyber Protection Teams in the Defense of AF and DoD Critical mission areas.
81
835 COS
Scott Mission: To protect critical Air Force and Department of Defense infrastructure and mission systems
82
837 COS
Scott Mission: Maintain combat superiority by dominating in cyberspace
83
867th Cyberspace Operations Group (867 COG)
Meade Offensive Cyberspace Operations (OCOs) and providing defensive capabilities to the CNMF. The 867 COG Consists of four squadrons: (1) 315th Cyberspace Operations Squadron (315 COS) (2) 341st Cyberspace Operations Squadron (341 COS) (3) 833d Cyberspace Operations Squadron (833 COS) (4) 836th Cyberspace Operations Squadron (836 COS)
84
315 COS
Meade Mission: Find the enemy, exploit weaknesses, attack!
85
341 COS
Meade Mission: Train and deliver operationally focused Airmen to the Cyber National Mission Force (CNMF) in defense of the nation.
86
833 COS
Lackland Mission: To present, plan, and execute cyberspace operations in order to defend national information networks against cyber threats
87
836 COS
Lackland Mission: To present, plan, and execute cyberspace operations in order to defend national information networks against cyber threats
88
688th Cyberspace Wing (688 CW)
Lackland Mission: Engineer, build, operate, secure, defend and extend the Air Force cyberspace domain to enable and assure Air Force core missions and the Joint fight. The 688 CW consists of four notable groups, of which, we will only discuss two: (1) 26 Cyberspace Operations Group (26 COG) (2) 690 Cyberspace Operations Group (690 COG)
89
26th Cyberspace Operations Group (26 COG)
Lackland performs cyberspace and active-defense operations to achieve full-spectrum cyberspace capabilities through its three squadrons. The three squadrons that fall under the 26 COG: (1) 26th Network Operations Squadron (26 NOS) (2) 33d Network Warfare Squadron (33 NWS) (3) 68th Network Warfare Squadron (68 NWS)
90
26 NOS
Maxwell
91
33 NWS
Lackland AFNOC Mission: Find and defeat the enemy.
92
68 NWS
Lackland Mission: Detect, prevent and assess risk of data content loss in Air Force networks. CDA weapon system
93
7th Intelligence Squadron
Meade conduct red-team operations, DCO, or cyber intelligence operations in support of National Security Agency
94
35th Intelligence Squadron
Lackland Mission: Conduct ISR operations & analysis from and for cyberspace, leveraging cryptologic capabilities to enable USAF and joint operations.
95
Title 10-Armed Forces
Subtitle A - General Military Law, including the Uniform Code of Military Justice (UCMJ) Subtitle B - Army Subtitle C - Navy and Marine Corps Subtitle D - Air Force and Space Force Subtitle E - Reserve Components
96
Title 15- Commerce & Trade
Chapter 7 - National Institute of Standards and Technology (NIST) Chapter 22 - Trademarks Chapter 23 - Dissemination of Technical, Scientific, and Engineering Information Chapter 63 - Technology Innovation Chapter 100 - Cyber Security Research and Development
97
Title 17-Copyright
Chapter 2 - Copyright Ownership and Transfer Chapter 3 - Duration of Copyright Chapter 5 - Copyright Infringement and Remedies Chapter 7 - Copyright Office Chapter 10 - Digital Audio Recording Devices and Media
98
Title 18
Crimes and Criminal Procedure
99
Title 18 §1030
Computer Fraud
100
Title 18 §1343
Wirefraud
101
Title 18 §1362
Communication lines
102
Title 18 §2510-2522
Federal wire tap
103
Title 18 §2701–2712
Stored Communications
104
Title 32
National Guard
105
Title 50
War and National Defense
106
UCMJ
Article 2 - Persons subject to the UCMJ Article 91 - Insubordinate conduct toward warrant officer, noncommissioned officer, or petty officer Article 92 - Failure to obey order or regulation Article 103a - Espionage Article 103b - Aiding the enemy Article 123 - Offenses concerning Government computers Article 134 - General Article
107
The Convention on Cybercrime (2001)
Budapest first international agreement aimed at reducing computer-related crime by harmonizing national laws, improving investigative techniques, and increasing international cooperation
108
2015 G-20 Summit
Ankara Turkey All leaders agreed international law applies to us all in cyberspace and that we will all abide by the norms. We also would not allow cyberspace to be used to steal IP
109
United Nations Convention against Transnational Organized Crime
AKA Palermo Convention Obligates state parties to enact domestic criminal offenses that target organized criminal groups and to adopt new frameworks for extradition, mutual legal assistance, and law enforcement cooperation