Knowledge ID: K0403

Knowledge Description: Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.

Work Roles with this Knowledge:

  • Work Role ID: AN-TGT-002
    Work Role Description: Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks, and the applications on them.
    Category: Analyze
    Specialty Area(s): Targets
  • Work Role ID: CO-OPL-001
    Work Role Description: Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and levy requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.
    Specialty Area(s): Cyber Operational Planning
  • Work Role ID: CO-OPL-002
    Work Roles: Cyber Ops Planner
    Work Role Description: Develops detailed plans for the conduct or support of the applicable range of cyber operations through collaboration with other planners, operators and/or analysts. Participates in targeting selection, validation, synchronization, and enables integration during the execution of cyber actions.
    Specialty Area(s): Cyber Operational Planning
  • Work Role ID: CO-OPL-003
    Work Role Description: Works to advance cooperation across organizational or national borders between cyber operations partners. Aids the integration of partner cyber teams by providing guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions.
    Specialty Area(s): Cyber Operational Planning
  • Work Role ID: CO-OPS-001
    Work Roles: Cyber Operator
    Work Role Description: Conducts collection, processing, and/or geolocation of systems to exploit, locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and, when directed, executes on-net operations.
    Specialty Area(s): Cyber Operations