Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
67 Cards in this Set
- Front
- Back
Discuss the purpose of a Red Cross message
|
Red Cross relays urgent messages containing accurate, factual, complete and verified descriptions of the emergency to service members stationed anywhere in the world
|
|
ADNS
|
Automated Digital Networking System
Used to connect Navy shipboard networks to other ship and shore networks for transferring Internet Protocol (IP) data of various classifications. |
|
CUDIXS
|
Common User Digital Information exchange
provides a full duplex interface, over a satellite link with mobile platforms, for the receipt and transmission of general service (GENSER/SIPR) message traffic. |
|
VERDIN
|
VERy low frequency Digital Information Network
provides a highly reliable and secure system for the delivery of operational, tactical, and administrative messages for deployed submarines. |
|
NOVA
|
An automated message, store and forward switching system that provides automated re-addressal and quote functions for authorized users.
|
|
IBS
|
Integrated Broadcast System
Integrated several intelligence and information systems into a single broadcast system that delivers threat information as well as targeting support for deployed units |
|
INMARSAT
|
International Maritime Satellite
Provides worldwide Data, Fax, and Voice services via a mobile base station. |
|
DMS
|
Defense Message System
-NREMS -- provides web based Defense Message System (DMS) messaging capability via web browser or e-mail. -AMHS -- provides a user-friendly means to send and receive messages via the Automated Digital Network (AUTODIN). |
|
DCO
|
Defense Connect Online
A web based virtual meeting room. |
|
GINGERBREAD
|
A code word used to alert that there is an Intruder on the Net.
|
|
EEFI
|
Essential Elements of Friendly Information
|
|
Beadwindow EEFI disclosure list:
|
01 – Position
02 – Capabilities 03 – Operations 04 – Electronic Warfare 05 – Personnel 06 – COMSEC 07 – Inappropriate transmission |
|
Define RIVERCITY and state when it is utilized.
|
An OPSEC/Information Assurance condition used to limit the access to the unclassified internet.
|
|
JSIR
|
Joint Spectrum Interference Resolution
|
|
Meaconing
|
The intentional transmission of signals designed to deceive users of navigational aids.
|
|
Intrusion
|
the intentional insertion of electromagnetic (EM) energy into transmission paths in any manner, with the objective of deceiving operators or causing confusion
|
|
Jamming
|
Is the deliberate radiation, re-radiation, or reflection of electromagnetic energy for the purpose of preventing or reducing an enemy’s effective use of the EM spectrum
|
|
Spectrum management
|
Used to ensure that the useable frequency spectrum is deconflicted and ensure that fratricide does not occur
|
|
List the components of a standard Navy message
|
FL /2 - Message Header
FL /4 - Classification FL /5 - DTG FL /6 - From FL /7 - To FL /8 - INFO FL /12 - Subject, classication, body |
|
Message Precedences:
|
R – ROUTINE - 6 hours
P – PRIORITY - 3 hours O – IMMEDIATE - 30 minutes Z – FLASH - AS FAST AS POSSIBLE! W – FLASH OVERRIDE |
|
Telecommunications Service Order (TSO)
|
The authorization from Headquarters, DISA, a DISA area, or DISA-DSC to start, change, or discontinue circuits or trunks and to effect administrative changes.
|
|
Telecommunications Service Request (TSR)
|
A valid, approved, and funded telecommunications requirement prepared in accordance with the format from, and submitted to, DISA or DISA activities for fulfillment.
|
|
State the purpose of Electronic Key Management System (EKMS)
|
The long-term goal of EKMS is to minimize human access to keying material.
|
|
OTAT/OTAR
|
Over The Air Transmission - Electronic KEYMAT material transmitted via broadcast directly to Crypto devices
Over The Air Rekeying - The same as an OTAT, but it is used to rekey crypto equipment in case of an update or emergency. |
|
TEMPEST
|
The codeword for unwanted electromagnetic/mechanical radiation.
|
|
EMCON
|
Emissions Control - conducted to minimize or cease all electromagnetic radiation to avoid detection or geolocation by hostile forces.
|
|
ASW
SUW IW AW STW NSW |
Anti Submarine Warfare
Surface Warfare Information Warfare Air Warfare Strike Warfare Naval Special Warfare |
|
Discuss the purpose of Direct Support Assets
|
Direct Support (DIRSUP) assets are used for short-duration requirements which require specialists not normally included in a ship’s PCS complement.
|
|
PSYOP
|
Psychological Operations: are planned operations to convey selected information to targeted foreign audiences to influence their behavior.
|
|
MILDEC
|
Military Deception: are actions taken to deliberately mislead adversary military decision makers as to the disposition, numbers, or intentions of friendly forces, thereby causing the adversary misinterpret the actual military situation.
|
|
OPSEC
|
Operations Security: is a process of identifying information that is critical to friendly operations and that could enable adversaries to attack or exploit operational vulnerabilities.
|
|
CNO
|
Computer Network Operations: is comprised of Computer Network Attack (CNA), Computer Network Exploit (CNE), and Computer Network Defense (CND)
|
|
Define the roles of the U. S. Navy Blue and Red teams.
|
Red Team - uses publicly available data to test IAVA and system configuration compliance of US Navy networks and attempt to detect any vulnerabilities.
Blue Team - ensures US Navy networks meet IAVA and system configuration compliance. |
|
USC Title 10
USC Title 50 |
10 - It provides the legal basis for the roles, missions, and organization of each or the services as well as the US DoD.
50 - Outlines the role of war and the National defense in the United States Code. |
|
Define CRITIC
|
CRITIC messages are a reporting vehicle used to notify the President and the National Security Council of critical information.
Sent at FLASH OVERRIDE message precedence Message sent in under 3 minutes from CRITIC reportable event! |
|
CCOP
|
Cryptologic Carry-On Program
-Provides specialized equipment for Fleet cryptologic requirements -Provides Comprehensive Cryptologic Capability to the Furthest Corners of the World Where None May Exist. |
|
NITES
|
Navy Integrated Environmental Support Subsystem
A set of METOC forecast, database, and decision aid tools tailored for specific platforms. |
|
JDISS
|
Joint Deployable Intelligence Support System
provides a family of hardware and software capabilities that allow connectivity and interoperability with supporting and joint forces in any situation |
|
MDA
|
Maritime Domain Awareness
The effective understanding of any maritime threat that could impact the security, safety, economy, or environment of our nation. |
|
MOC
|
Maritime Operations Center
Provides support in the execution of the nation’s Maritime Strategy |
|
OPSEC
|
Denying an adversary critical information regarding our planning, processes or operations; and regularly assessing our ability to prevent exploitation.
|
|
Discuss The Five Step Planning Process (OPSEC)
|
Step 1: Identify Critical Information (CI)
Step 2: Threat Assessment Step 3: Vulnerability Analysis Step 4: Risk Assessment Step 5: Measures / Countermeasures |
|
Describe The OPSEC Considerations Regarding Public Affairs
|
The PAO and OPSEC Officer should coordinate the release of data relative to the mission or to impending potentially sensitive activity together.
|
|
WRA
|
Web Risk Assessment
|
|
Define the six steps of Intelligence.
|
Planning and Direction
Collection Processing and Exploitation Analysis and Production Dissemination and Integration Evaluation and Feedback |
|
Describe the three categories of Intelligence.
|
Strategic Intelligence - for the formation of policy and military plans
Operational Intelligence - for planning operations within regional theaters or areas of operations. Tactical Intelligence - focuses on a potential adversary capabilities, his immediate intentions, and the environment. |
|
DJIOC
|
Defense Joint Intelligence Operations Center
The DJIOC is the lead DOD intelligence organization responsible for integrating and synchronizing military intelligence and national intelligence capabilities. |
|
JIOC
|
Combatant Command Joint Intelligence Operations Centers
The combatant command JIOCs are the primary intelligence organizations providing support to joint forces at the operational and tactical levels. |
|
JTF JISE
|
Joint Task Force Joint Intelligence Support Elements
Normally manages the intelligence collection, production, analysis, and dissemination for a joint force. |
|
PIR
|
Priority Intelligence Requirement
An intelligence requirement that the commander and staff need to understand adversary or the operational environment. |
|
CCIR
|
Commander Critical Information Requirement
Designed to feed important, time-sensitive information to the commander so he can make a decision that should dramatically affect the fight. |
|
Explain Intelligence Oversight and state the publications that govern it.
|
The supervision of Intelligence Agencies, and making them accountable for their actions.
Executive Order 12333 DoD Regulation 5240.1-R NSA Policy 1-23 USSID SP0018 |
|
IPBE
|
Intelligence Preparation of the Battlespace Environment
The analytical process used to produce intelligence assessments, estimates and other intelligence products in support of the commander’s decision making process. |
|
Mission of Fleet Intelligence Office
|
Office of Naval Intelligence provides the intelligence necessary to plan, build, train, equip, and maintain US Naval forces.
|
|
Explain ISR mission requirements and fundamentals
|
Address how all available ISR assets and associated tasking processing, exploitation, and dissemination (TPED) infrastructure
|
|
Explain the function of an Intelligence Fusion Cell
|
The process of collecting and examining information from all available sources and intelligence disciplines to derive as complete of an assessment as possible of detected activity.
|
|
HUMINT
|
Human Intelligence
|
|
OSINT
|
Open Source Intelligence
|
|
MASINT
|
Measurement and Signature Intelligence
|
|
SIGINT
|
Signals Intelligence
|
|
COMINT
|
Communications Intelligence
|
|
FISINT
|
Foreign Instrumentations Signals Intelligence
|
|
ELINT
|
Electronic Intelligence
|
|
ACINT
|
Acoustic Intelligence
|
|
IMINT
|
Imagery Intelligence
|
|
Type of Intelligence briefs
|
Current Intelligence Briefings Aircrew Briefings
Deployment Briefings Port Briefings Pre-Deployment briefings Strike Support Briefs |
|
Define the role of an Intelligence watch floor.
|
Order of battle analysis, analysis of adversary C4, and maintenance of a 24- hour watch.
|