CRYPTOLOGIC OPERATIONS Flashcards
(33 cards)
AN/SSX-1
collects ELINT and correlates it to specific transmissions from ships and aircraft
AN/SLQ-32
the primary EW system in use by U.S. Navy ships
provides early warning, ID and DF capability
interfaced with the MK36 Decoy Launching System, able to launch chaff and infrared decoys
ELECTRONIC WARFARE
use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or defend enemy assaults
Electronic Support (ES)
Electronic Protection (EP)
Electronic Attack (EA)
SIGINT
Signals Intelligence (SIGINT)
- Intel derived from comms, radar, and weapon systems
OPSEC
Operations Security
Identifies, controls, and protects sensitive but unclassified information about an operation, mission, or activity.
ENLISTED RATES AND DESIGNATORS
- Designators: 1810, 6810 (LDO), 7810 (CWO)
- Rate: Cryptologic Technician (CT)
- CTR (collection) - collect and process COMINT, work in SSES (Ship’s Signals Exploitation Space)
- CTM (maintenance) - maintain equipment in SSES
- CTT (technical) - operate/maintain the SLQ-32 and EW equipment. Collect and process ELINT.
- CTI (interpreter) -linguistic support
- CTN (network) - Direct Support (DIRSUP) to staff, conducts Computer Network Operations (CNO)
OPTASK CRYPTOLOGY
Navy-Wide Standing OPTASK Cryptology
Provides the framework and guidance for cryptologic operations
CNO
Computer Network Operations
used to disrupt, disable, degrade, or deceive an enemy’s C2, and protect friendly C2
Computer Network Attack (CNA)
Computer Network Defense (CND)
Computer Network Exploitation (CNE)
MILDEC
deliberately misleading the enemy causing them to take specific actions/inactions
PCMS / Normandy
AN/SLA-10D
Blanker Unit associated with the AN/SLQ-32
It blanks out own ship’s radars
OPTASK IO
Navy-wide OPTASK Information Operations
Provides the framework and guidance for Strike Group IO.
encompasses the core capabilities of CNO, MISO, MILDEC, EW, OPSEC
TITLE 10
- organizational structure of the DOD
- retains power with POTUS
- Subjected to UCMJ
- Restricts the domestic mission with Posse Comitatus (restricts the government’s ability to use the U.S. military as a police force)
Computer network defense (CND)
DCO
DCO
actions taken to discover, detect, analyze, and mitigate network threats
CRC
Cryptologic Resource Coordinator
Works for the Staff N2.
They send out a daily Cryptologic Coverage Plan (CCP) tasking all SSES equipped ship’s in the SG with priorities.
also responsible for determining what Cryptologic Carry On Program (CCOP) gear is needed
Cyber Operations
OCO (Offensive Cyberspace Operations)
DCO (Defensive Cyberspace Operations)
DODIN operations
Defensive Cyberspace Operations (DCO)
DCO provides the ability to discover, detect, analyze, and mitigate threats
JP 3-13
Information Operations
Joint pub for the planning, preparation, execution, and assessment of IO
5 PILLARS OF INFORMATION OPERATIONS
- COMPUTER NETWORK OPERATIONS
- CNA
- CNE
- CND
- MISO ( FORMERLY PSYOPS)
- MILITARY DECEPTION (MILDEC)
- ELECTRONIC WARFARE
- ES
- EA
- EP
- OPSEC
SSEE Increment E/F
Ship’s Signal Exploitation Equipment
Electronic Attack (EA)
using the RF spectrum to disrupt, deny, and degrade, the enemy’s ability to use the spectrum.
ex. jamming, active decoys
EMCON
EMISSIONS CONTROL
The selective/controlled use of emitters for OPSEC
- EMCON A – No Emissions
- EMCON B – Limited; Only critical communications and radar
- EMCON C – Limited; Specific to mission/ship identifying signatures IE. Radar
- EMCON D – No Restrictions
Electronic Support (ES)
search, identify, and locate sources of electromagnetic energy for threat recognition
(threat warning, direction finding)
SLQ-32
Computer network exploitation (CNE)
infiltration of the enemy’s network to extract and gather intel data.
Computer network attack (CNA)
using computer networks to disrupt, deny, degrade, or destroy information on enemy computers and networks.