AN/SSX-1
collects ELINT and correlates it to specific transmissions from ships and aircraft
AN/SLQ-32
the primary EW system in use by U.S. Navy ships
provides early warning, ID and DF capability
interfaced with the MK36 Decoy Launching System, able to launch chaff and infrared decoys
ELECTRONIC WARFARE
use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or defend enemy assaults
Electronic Support (ES)
Electronic Protection (EP)
Electronic Attack (EA)
SIGINT
Signals Intelligence (SIGINT)
OPSEC
Operations Security
Identifies, controls, and protects sensitive but unclassified information about an operation, mission, or activity.
ENLISTED RATES AND DESIGNATORS
OPTASK CRYPTOLOGY
Navy-Wide Standing OPTASK Cryptology
Provides the framework and guidance for cryptologic operations
CNO
Computer Network Operations
used to disrupt, disable, degrade, or deceive an enemy’s C2, and protect friendly C2
Computer Network Attack (CNA)
Computer Network Defense (CND)
Computer Network Exploitation (CNE)
MILDEC
deliberately misleading the enemy causing them to take specific actions/inactions
PCMS / Normandy
AN/SLA-10D
Blanker Unit associated with the AN/SLQ-32
It blanks out own ship’s radars
OPTASK IO
Navy-wide OPTASK Information Operations
Provides the framework and guidance for Strike Group IO.
encompasses the core capabilities of CNO, MISO, MILDEC, EW, OPSEC
TITLE 10
Computer network defense (CND)
DCO
DCO
actions taken to discover, detect, analyze, and mitigate network threats
CRC
Cryptologic Resource Coordinator
Works for the Staff N2.
They send out a daily Cryptologic Coverage Plan (CCP) tasking all SSES equipped ship’s in the SG with priorities.
also responsible for determining what Cryptologic Carry On Program (CCOP) gear is needed
Cyber Operations
OCO (Offensive Cyberspace Operations)
DCO (Defensive Cyberspace Operations)
DODIN operations
Defensive Cyberspace Operations (DCO)
DCO provides the ability to discover, detect, analyze, and mitigate threats
JP 3-13
Information Operations
Joint pub for the planning, preparation, execution, and assessment of IO
5 PILLARS OF INFORMATION OPERATIONS
SSEE Increment E/F
Ship’s Signal Exploitation Equipment
Electronic Attack (EA)
using the RF spectrum to disrupt, deny, and degrade, the enemy’s ability to use the spectrum.
ex. jamming, active decoys
EMCON
EMISSIONS CONTROL
The selective/controlled use of emitters for OPSEC
Electronic Support (ES)
search, identify, and locate sources of electromagnetic energy for threat recognition
(threat warning, direction finding)
SLQ-32
Computer network exploitation (CNE)
infiltration of the enemy’s network to extract and gather intel data.
Computer network attack (CNA)
using computer networks to disrupt, deny, degrade, or destroy information on enemy computers and networks.