Flashcards in IDW: TechFundamentals/OPSEC/Security Deck (50):
Number of cycles that occur in one second; usually in hertz.
Physical distance of a wave or cycle
Temperature or moisture conditions in atmosphere that allow a greater bending of radio waves.
Waves that changes direction when passing from one medium to another.
For simultaneous transmission of two or more signals over a common carrier wave.
Impressing intelligence upon a transmission medium.
Removal of intelligence from a transmission medium.
Space within the (RF) Radio Frequency spectrum that's signal occupies; expressed in Hertz.
Inserting noise or data onto a frequency.
Movement through a medium.
Unmodulated frequency that doesn't carry additional modulated intelligence and is transmitted for use in some radio transmissions.
Angular measurement in the horizontal plane used in reference to altitude.
Define Operational Security.
Systematic, proven process that identifies, controls and protects generally sensitive, but unclassified information about a mission, operation or activity.
Air Search RADAR
Detect & determine position, course & speed of air targets; used as early warning devices.
Surface search RADAR
Used to detect presence of surface craft & low flying aircraft/navigational aid in coastal waters and poor weather conditions.
Fire Control RADAR has how many phases?
What are the 3 phases of Fire Control RADAR?
Designation - Radar is directed to general location of desired target.
Acquisition - Radar searches small volume of space in a prearranged pattern until target is located.
Tracking - Once target is located, radar system automatically follows target motions.
What is the 5 step planning process?
Identify Critical Information (CI)
Analyze the threat
Analyze the vulnerabilities
Assess the risk
Apply the countermeasures
Target Audience - Public
Intent - Inform
Method - Public Release
Target Audience - Adversary
Intent - Deny
Method - Five-Step Process
Define Critical Information
Information about friendly activities, intentions, capabilities, or limitations an adversary seeks in order to gain a military, political, diplomatic, economic or technical advantage.
What directives govern personnel security?
5510.30: Personnel Security Manual
5510.36: Information Security Manual
Orange; cause grave damage to the national security.
Red; Cause serious damage to the national security.
Blue; Could be expected to cause damage to national security.
SCI (Sensitive Compartmental Information)
Yellow; Requires a higher level of control (smaller group of ppl)
Green; Potential to the harmful.
What does "need to know" mean?
A determination that a recipient requires access to specific classified information in order to perform their job.
Top Secret Investigation
Favorably completed SSBI every 5 years
Favorably completed NACLC every 10 years.
Favorably completed NACLC every 15 years.
Anti-Terrorism Force Protection (ATFP)
Adjustable defensive posture set for mitigation of potential threats.
Events to be reported to SSO.
Arrests and convictions.
Adverse involvement with law enforcement.
Mental health issues
Purpose of EAP
Plan for safeguarding classified material in the event of an emergency; ties into Emergency Destruction.
Procedures for hard copy classified material for Hand Carry
Must have courier card or courier letter
Must go directly to destination
If stopped or pulled over, show military ID and courier card/letter
Normal: General global threat of possible terrorist threat; routine security posture
Alpha: Increased general threat of possible terrorist activity.
Bravo: More predictable threat of terrorist activity exists.
Charlie: Incident occurred or targeting personnel/facilities is likely.
Delta: Applies in imminent area where a terrorist where attack has occurred or Intel that an attack is imminent.
Security Container Information
Activity Security Checklist
Security Container Check Sheet
Top Secret Coversheet
Classified Non-disclosure agreement
What is a RAM
Random Anti-Terrorism Measure: Random implementation of higher FPCON measures in consideration of local terrorist capabilities.
What is PED (Personal Electronic Devices)?
Personal Electronic Device are prohibited in all classified spaces.
Difference between a Security Violation and Practice Dangerous to Security.
Security Violation: A compromise of classified info to persons not authorized to receive it.
PDS: Failure to comply with the provisions of security regulations which could cause a compromise of classified information.
Define an Access List
Personnel who need uninhibited access to a space to fully perform their duties.
Responsibilities of DONCAF
Authority on authorizing all clearances.
What is Two Person Integrity (TPI)
Ensures that no one person has complete access to sensitive information.
Procedures for sanitizing an area.
Removal of information from the media or equipment such that data recovery using any known technique or analysis is prevented.
What is Joint Personnel Adjudication System (JPAS)
Website used to hold personnel information involving security clearances.