• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/67

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

67 Cards in this Set

  • Front
  • Back
Discuss the purpose of a Red Cross message
Red Cross relays urgent messages containing accurate, factual, complete and verified descriptions of the emergency to service members stationed anywhere in the world
ADNS
Automated Digital Networking System

Used to connect Navy shipboard networks to other ship and shore networks for transferring Internet Protocol (IP) data of various classifications.
CUDIXS
Common User Digital Information exchange

provides a full duplex interface, over a satellite link with mobile platforms, for the receipt and transmission of general service (GENSER/SIPR) message traffic.
VERDIN
VERy low frequency Digital Information Network

provides a highly reliable and secure system for the delivery of operational, tactical, and administrative messages for deployed submarines.
NOVA
An automated message, store and forward switching system that provides automated re-addressal and quote functions for authorized users.
IBS
Integrated Broadcast System

Integrated several intelligence and information systems into a single broadcast system that delivers threat information as well as targeting support for deployed units
INMARSAT
International Maritime Satellite

Provides worldwide Data, Fax, and Voice services via a mobile base station.
DMS
Defense Message System

-NREMS -- provides web based Defense Message System (DMS) messaging capability via web browser or e-mail.

-AMHS -- provides a user-friendly means to send and receive messages via the Automated Digital Network (AUTODIN).
DCO
Defense Connect Online

A web based virtual meeting room.
GINGERBREAD
A code word used to alert that there is an Intruder on the Net.
EEFI
Essential Elements of Friendly Information
Beadwindow EEFI disclosure list:
01 – Position
02 – Capabilities
03 – Operations
04 – Electronic Warfare
05 – Personnel
06 – COMSEC
07 – Inappropriate transmission
Define RIVERCITY and state when it is utilized.
An OPSEC/Information Assurance condition used to limit the access to the unclassified internet.
JSIR
Joint Spectrum Interference Resolution
Meaconing
The intentional transmission of signals designed to deceive users of navigational aids.
Intrusion
the intentional insertion of electromagnetic (EM) energy into transmission paths in any manner, with the objective of deceiving operators or causing confusion
Jamming
Is the deliberate radiation, re-radiation, or reflection of electromagnetic energy for the purpose of preventing or reducing an enemy’s effective use of the EM spectrum
Spectrum management
Used to ensure that the useable frequency spectrum is deconflicted and ensure that fratricide does not occur
List the components of a standard Navy message
FL /2 - Message Header
FL /4 - Classification
FL /5 - DTG
FL /6 - From
FL /7 - To
FL /8 - INFO
FL /12 - Subject, classication, body
Message Precedences:
R – ROUTINE - 6 hours
P – PRIORITY - 3 hours
O – IMMEDIATE - 30 minutes
Z – FLASH - AS FAST AS POSSIBLE!
W – FLASH OVERRIDE
Telecommunications Service Order (TSO)
The authorization from Headquarters, DISA, a DISA area, or DISA-DSC to start, change, or discontinue circuits or trunks and to effect administrative changes.
Telecommunications Service Request (TSR)
A valid, approved, and funded telecommunications requirement prepared in accordance with the format from, and submitted to, DISA or DISA activities for fulfillment.
State the purpose of Electronic Key Management System (EKMS)
The long-term goal of EKMS is to minimize human access to keying material.
OTAT/OTAR
Over The Air Transmission - Electronic KEYMAT material transmitted via broadcast directly to Crypto devices

Over The Air Rekeying - The same as an OTAT, but it is used to rekey crypto equipment in case of an update or emergency.
TEMPEST
The codeword for unwanted electromagnetic/mechanical radiation.
EMCON
Emissions Control - conducted to minimize or cease all electromagnetic radiation to avoid detection or geolocation by hostile forces.
ASW
SUW
IW
AW
STW
NSW
Anti Submarine Warfare
Surface Warfare
Information Warfare
Air Warfare
Strike Warfare
Naval Special Warfare
Discuss the purpose of Direct Support Assets
Direct Support (DIRSUP) assets are used for short-duration requirements which require specialists not normally included in a ship’s PCS complement.
PSYOP
Psychological Operations: are planned operations to convey selected information to targeted foreign audiences to influence their behavior.
MILDEC
Military Deception: are actions taken to deliberately mislead adversary military decision makers as to the disposition, numbers, or intentions of friendly forces, thereby causing the adversary misinterpret the actual military situation.
OPSEC
Operations Security: is a process of identifying information that is critical to friendly operations and that could enable adversaries to attack or exploit operational vulnerabilities.
CNO
Computer Network Operations: is comprised of Computer Network Attack (CNA), Computer Network Exploit (CNE), and Computer Network Defense (CND)
Define the roles of the U. S. Navy Blue and Red teams.
Red Team - uses publicly available data to test IAVA and system configuration compliance of US Navy networks and attempt to detect any vulnerabilities.

Blue Team - ensures US Navy networks meet IAVA and system configuration compliance.
USC Title 10

USC Title 50
10 - It provides the legal basis for the roles, missions, and organization of each or the services as well as the US DoD.

50 - Outlines the role of war and the National defense in the United States Code.
Define CRITIC
CRITIC messages are a reporting vehicle used to notify the President and the National Security Council of critical information.

Sent at FLASH OVERRIDE message precedence

Message sent in under 3 minutes from CRITIC reportable event!
CCOP
Cryptologic Carry-On Program

-Provides specialized equipment for Fleet cryptologic requirements
-Provides Comprehensive Cryptologic Capability to the Furthest Corners of the World Where None May Exist.
NITES
Navy Integrated Environmental Support Subsystem

A set of METOC forecast, database, and decision aid tools tailored for specific platforms.
JDISS
Joint Deployable Intelligence Support System

provides a family of hardware and software capabilities that allow connectivity and interoperability with supporting and joint forces in any situation
MDA
Maritime Domain Awareness

The effective understanding of any maritime threat that could impact the security, safety, economy, or environment of our nation.
MOC
Maritime Operations Center

Provides support in the execution of the nation’s Maritime Strategy
OPSEC
Denying an adversary critical information regarding our planning, processes or operations; and regularly assessing our ability to prevent exploitation.
Discuss The Five Step Planning Process (OPSEC)
Step 1: Identify Critical Information (CI)

Step 2: Threat Assessment

Step 3: Vulnerability Analysis

Step 4: Risk Assessment

Step 5: Measures / Countermeasures
Describe The OPSEC Considerations Regarding Public Affairs
The PAO and OPSEC Officer should coordinate the release of data relative to the mission or to impending potentially sensitive activity together.
WRA
Web Risk Assessment
Define the six steps of Intelligence.
Planning and Direction
Collection
Processing and Exploitation
Analysis and Production
Dissemination and Integration
Evaluation and Feedback
Describe the three categories of Intelligence.
Strategic Intelligence - for the formation of policy and military plans

Operational Intelligence - for planning operations within regional theaters or areas of operations.

Tactical Intelligence - focuses on a potential adversary capabilities, his immediate intentions, and the environment.
DJIOC
Defense Joint Intelligence Operations Center

The DJIOC is the lead DOD intelligence organization responsible for integrating and synchronizing military intelligence and national intelligence capabilities.
JIOC
Combatant Command Joint Intelligence Operations Centers

The combatant command JIOCs are the primary intelligence organizations providing support to joint forces at the operational and tactical levels.
JTF JISE
Joint Task Force Joint Intelligence Support Elements

Normally manages the intelligence collection, production, analysis, and dissemination for a joint force.
PIR
Priority Intelligence Requirement

An intelligence requirement that the commander and staff need to understand adversary or the operational environment.
CCIR
Commander Critical Information Requirement

Designed to feed important, time-sensitive information to the commander so he can make a decision that should dramatically affect the fight.
Explain Intelligence Oversight and state the publications that govern it.
The supervision of Intelligence Agencies, and making them accountable for their actions.

Executive Order 12333
DoD Regulation 5240.1-R
NSA Policy 1-23
USSID SP0018
IPBE
Intelligence Preparation of the Battlespace Environment

The analytical process used to produce intelligence assessments, estimates and other intelligence products in support of the commander’s decision making process.
Mission of Fleet Intelligence Office
Office of Naval Intelligence provides the intelligence necessary to plan, build, train, equip, and maintain US Naval forces.
Explain ISR mission requirements and fundamentals
Address how all available ISR assets and associated tasking processing, exploitation, and dissemination (TPED) infrastructure
Explain the function of an Intelligence Fusion Cell
The process of collecting and examining information from all available sources and intelligence disciplines to derive as complete of an assessment as possible of detected activity.
HUMINT
Human Intelligence
OSINT
Open Source Intelligence
MASINT
Measurement and Signature Intelligence
SIGINT
Signals Intelligence
COMINT
Communications Intelligence
FISINT
Foreign Instrumentations Signals Intelligence
ELINT
Electronic Intelligence
ACINT
Acoustic Intelligence
IMINT
Imagery Intelligence
Type of Intelligence briefs
Current Intelligence Briefings Aircrew Briefings
Deployment Briefings
Port Briefings
Pre-Deployment briefings Strike Support Briefs
Define the role of an Intelligence watch floor.
Order of battle analysis, analysis of adversary C4, and maintenance of a 24- hour watch.