• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/316

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

316 Cards in this Set

  • Front
  • Back
What is ORM?
ORM is a decision making tool used by personnel to increase effectiveness by managing risk.
What are the 5 steps of ORM?
IAMIS
Identify Hazard
Access Risk
Make risk decisions
Implement Controls
Supervise
What instructions covers mishap reporting?
OPNAVINST 5102.1D
What is the purpose of a HAZREP
to be submitted when the elimination and control of a given hazard has community-wide implications in reducing mishaps.
What are the 3 objectives of first aid
SAVE LIFE
PREVENT FURTHER INJURY
CONTROL BLEEDING
What are the 3 methods to control bleeding
Direct pressure
pressure points
tourniquet
How many pressure points are there in the body
22- 11 per side
What is also known as Acute stress reaction
Shock
What is HERO, HERP and HERF
Hazardous electromagnetic radiation of Ordanance, Personnel and Fuel
What is HAZMAT and how should it be stored
Hazardous material and it should be stored in a HAZMAT specific storage area and sorted by type of HAZMAT.
What is a MSDS and what does it include.
Material Safety Data Sheet- contains information about hazardous material including use, storage, and disposal information.
What is PPE
Personal Protective Equipment
What is the goal of the Navy's Conservation Program
to prevent occupational hearing loss and assure auditory fitness for duty of all Navy personnel.

-noise-induced hearing loss is the fleet's number one occupational health hazard
What are the 6 areas of the Naval Doctrine
WIPLOC
Warfare
Intelligence
Planning
Logistics
Planning
Command and Control
What are the 7 principles of Naval logistics
FEARSSS
Flexibility
Economy
Attainability
Responsiveness
Simplicity
Sustainability
Survivability
What was the first Navy ship named after an enlisted man
USS Osmond Ingram (DD255)- It was launched 28 Feb 1919. GM Ingram was the first man killed in World War I when the Cassin (DD43) was torpedoed in October 1917.
What conditions led to the formation of the US Navy
Taxation without representation resulted in a continental congress who implemented the Navy on Oct 13th 1775.
What 3 classes of ships existed during the inception of the navy
Ships of the Line- 64 100 guns
Frigates- 28 44 guns
Sloops of war- 10 20 guns
Explain gun salutes
21 guns on Memorial Day, Washington's birthday, Independence Day, and to honor the President and heads of foreign state.

Admirals- 17
Vice Adm- 15
Rear Adm- 13
Commodore- 11
Battle of Coral Sea
7-8 May 1942- We broke the Japanese Code and the Navy was alerted to a large Japanese force moving to Coral Sea to seize Port Moresby in New Guinea. It was to be the first step of a planned invasion of Australia.
The Japanese had 3 carriers and the US had 2
On May 7th, the japanese planes sank two minor ships, while the US sank an isolated enemy carrier. The next day both sides launched all their planes. The aircraft passed each other unseen in the clouds, in the world's first carrier to carrier battle. The LExington was sunk and the Yorktown was damaged. Both sides withdrew and Japan never again threatened Australia
Voyage of the Great White Fleet
16 December 1907- Left Hampton Roads, Virginia for a round-the-world cruise to show the flag. Demonstrated the strength of the Navy and the fact that we could resupply and stay at sea for long periods of time.
Battle of Normandy
6 Jun 1944- Largest amphibious operation in history. All 3 types of Mildec played an important role.
2 years in planning
-1200 ships 4100 landing craft
Midway
4-7 June 1942- Turning point of the Pacific war. The fact that the US had broken the japanese code played an important role. Admiral Yamamoto split is force sending ships north to the aleutian islands in a diversionary attack. The us new the japanese were headed towards midway and positioned their carriers outside of recon range and when the japanese planes flew to attack midway, our planes took off and attacked the japanese carriers. We sank all 3 of the japanese carriers.
Guadalcanal
13-15 Nov 1942- Japanese naval forces retreated and marines were able to take over Guadalcanal. The japanese lost 2 cruisers and 6 destroyers. The USS Juneau was lost in the battle and all of the Sullivan brothers were killed.
Battle of Leyte Gulf
23 Oct 1944- The japanese sent a naval force to the Philippines to attack the US fleet but the operation was a complete failure. The loss of the Philippines split the japanese empire in half and they lost control of the pacific.
Mercury 3
05 May 1961- First manned spaceflight. Alan Shepard was the first Naval Aviator in space.
Gemini 3
23 Mar 1965- First 2 man space flight- first spacecraft to maneuver from one orbit to another.
LCDR John Young was on board.
Apollo 11
16-24 Jul 19698- First manned moon landing.

Neil Armstrong and Buzz Aldrin
Apollo 17
07-19 Dec 1972- Seventh and final lunar landing mission.
Eugene A Cernan, and Ronald E. Evans.
STS-1
12-14 Apr 1981- First orbital test flight of the Space Shuttle. All Navy crew. John Young, Robert L. Crippen.
On the roof gang
The foundation of the CT community.
They were named for their training location which was on top of the Navy building in DC.
176 Navy and Marine radio operators trained
They cracked the purple code.
Purple Code
Japanese cipher used by the Japanese foreign Office, thought to be secure
Named for the color binder decrypts were kept in
Germany-Tokyo comms
USS Liberty
Attacked by Israelis in 1967 in the Mediterranean Sea. It was supposedly mistaken for an enemy ship. Although severely damaged with a 39 by 24 ft hole, the crew kept her afloat and she was able to leave the area. 34 crewmen were killed and 173 wounded.
USS Pueblo
Captured by N Korea in 1968- lack of communication with higher commands, they were not informed of the Korean's hostility. Emergency Destruct plan was never accomplished. One man was killed. The crew was kept for 11 months and the ship is now used as a museum.
Landing at Inchon
Communists had come across the 38th parallel into South Korea in an attempt to take Seoul. 1950- General MacArthur devised a plan to cut the North Korean army off via Inchon, a strategic port. Plan required mass intelligence and planning due to long approaches through shallow channels, poor beaches and a tidal range that restricted landing operations to a few hours a day. Huge win for METOC.
Hainan Island
01 April 2001- EP-3 was hit by Wong Way in a J-8 interceptor from China. They were forced to land in Hainan Island and were detained for 10 days. During that time China had free reign of the plane and an EDP was not properly conducted prior to landing.
Bletchley Park
Britain's crypto center- they broke the enigma cypher
Navajo Code Talker
extremely complex. Unintelligible to anyone without extensive exposure and training. It has no alphabet or symbols. One estimate indicates that less than 30 non-Navajos, none of them japanese, could understand the language at the outbreak of World War II. It was never broken.
USS Stark
17 May 1987- Iraqi F-1 Mirage fired two Exocet missiles at the Stark while it was in the NAG. Both the AWACS and the Stark detected the missile launch due to the fact that they operators weren't on POS. 37 Sailors were killed.
EC-121
April 1969- Attacked without warning by North Korea MiG while flying its last mission with a double crew for training. (31 men)
The Navy would adopt new procedures to provide its unarmed reconnaissance aircraft with a higher degree of protection from the fleet. STW EC-121 replaced by the EP-3.
What qualities characterize the Navy team as instruments to support national policies.
Readiness
Flexibility
Self-sustainability
Mobility
The US Marine Corps allows us to be an expeditionary force.
What are the 3 levels of war
Tactical
Operational
Strategic
What did the National Security Act of 1947 do?
Established the National Security Council
Established the CIA
Merged the DoN and DoW into the DOD
Established the AirForce
When and why were the current Navy Core Values developed?
Adopted by CNO ADM Frank B Kelso in 1992

The Navy Core Values are at the heart of a service wide effort to strengthen the Navy as a values community.
When and why was the Sailor's Creed developed?
Written by the Blue Ribbon Recruit Training Panel in 1993 by direction of CNO Admiral Frank Kelso.
RADM Grace Hopper
Computer pioneer
Programmed the Mark I computer
Credited with term "bug"
Created COBOL the first programming language
Joined in 1943, retired 1966, recalled and retired again in 1986. Died 1992.
What was the name of the first computer?
ENIAC- Electronic Numerical Integrator and Computer. It was created in 1945 at the University of Pennsylvania.
ARPANET
Was the precursor to the modern internet. UCLA, Stanford Research Institute, UC Santa Barbara, and Utah were the first 4 nodes.
Explain the impact of the John Walker espionage case.
He spied for the Russians starting in 1968. It served as a catalyst for a wide-spread investigations of security procedures inside the intell community. Led directly to the appointment of the first director of counter intelligence on the National Security Council Staff.
State the oldest organization in the US Navy.
The Office of Naval Intelligence. established in 1882 by William H. Hunt. Secretary of the Navy.
State the first CIO/DNI?
LT Theodorus B. M. Mason
What 2 departments were combined to form the ONI?
Department Library and the Office of Intelligence.
What is the mission of the Navy?
Train combat ready forces and maintain freedom of the seas.
Discuss the NCA, members and its function
The National Command Authority, it the ultimate lawful source of military orders.
President
Sec Of Defense
Joint Chiefs
Unified Specific commands
Difference between OPCON and ADCON?
OPCON employs command and personnel to satisfy mission requirements.

ADCON has authority over commands and personnel as needed for admin support
Function of COCOM?
Commander of a combatant command.
NAVY COCOM
navy capability to provide forces to combatant commanders
FLT COMMANDER
In charge of a specific fleet AOR
TYPE COMMANDER
In charge of a type or specialty
What are the 2 NCTAMS?
NCTAMS LANT- Norfolk, VA
NCTAMS PAC- Wahaiwa, HI
What is C5I
Command Control, Communications, Computers, Combat systems and Intelligence
What is the mission of DISA?
Defense Information Systems Agency- provides C2 capabilities to ensure continuous operation net-centric enterprise. Enables information dominance.
What is the mission of NASIC?
National Air and Space Intelligence Center- Primary DOD producer for foreign airspace intelligence. Historically weapons treaty negotiations and verification.
Mission of the NCDOC
Navy Cyber Defense Operations Center- Coordinates the defense of Navy computer systems.
ODNI
Office of Director of National Intelligence- head of the intelligence community and advises the president on national security.
DIA
Defense Itel Agency- provides foreign military intelligence
NSA
SIGINT
CIA
HUMINT
NGA
National Geospaciall Intelligence Agency- provide GEOINT
DHS
Department of Homeland Security- analyze the vulnerabilities of US critical infrastructure and access the scope of terrorist threats
FBI
Federal Bureau of Investigation- counter intelligence and counter terrorism in the US
DEA
Drug Enforcement Agency- enforce drug laws
DOE
Department of Energy- national and economic and energy security of the US
DOS
Department of State- intel analysis on political and economic topics essential to foreign policy.
DOT
Department of Treasury- participates with the DOS with the collection of foreign economic information
NASA
Aerospace Technology
NRO
National Recon Office- overhead
EDVR
Enlisted Distribution Verification Report- it has 12 sections,
ODCR
Officer Distribution Control Report- monthly statement of officer manpower
AMD
Activity Manning Document- total manpower requirements and authorizations for a command. Manpower needs and manning.
Concurrent Report
Record of significant performance in a an additional duty status. ie. if you go on an IA
Page 2
SGLI information
Navy Unit SITREP
Anything the CO may consider SITREP worthy
Navy BLUE
Sent to inform ISIC and upper Navy chains, probable big navy interest
Pinnacle
sent to Navy an DOD upper echelon, significant event such as a loss of a ship or a catastrophe
IG
Inspector General- evaluations relating to programs and operations of the DOD Navy and Fleet Cyber command.
Purpose of the Navy Correspondance Manual
to standardize documents
What is PTS now?
SEAWAY
Officer Programs
BOOST
STA-21
LDO
CWO
OCS
Medical Enlisted Commisioning Program
DLPT
Defense Language Proficiency Test
Duties of the ESO
Educational Services Officer- ADVANCEMENT EXAMS,
Brilliant on the Basics
Sponsorship
Ombudsman
Recognition
CDBs
Indoc
Mentorship
What system is used by Navy Forces to track equipment and maintain inventories?
DPAS- defense property accountability program
Purpose of 3m/PMS system
Planning scheduling and accomplishing preventative maintenance.
MAM
Maintenance Assistance Modules- troubleshooting aid
CASREP
Casualty Report- four categories, Major and minor for primary and secondary. Must be sent if not corrected within 48 hrs.
NSN
national stock number- 13 digits
Material Obligation Validation Program
An unfilled quantity is not available to fill the request. Every 30 days the originator is given the option to keep waiting or cancel the request.
CHRIMP
Consolidated Hazardous Material Reutilization and Inventory Management Program- for procuring, storing, issuing and reusing HAZMAT
DRMS
Defense Reutilization Marketing Service- central point for excess material which can be reissued saving command money
ServMart
A shopping facility that carries a large supply of office materials
Government commercial Purchase Card
used to streamline procurement process
OPTAR
Operating Target- an estimate of amount of money required to perform tasks within a unit or command
Security Access Eligibility Report
any information that can affect eligibility for access to SCI
SF700
Security container information- contains combinations
SF701
Activity security checklist- used at the end of the day to account for classified material
SF702
Security container checksheet- names and times that personnel have opened containers containing classified information
SF703
Top Secret Coversheet
Form SF153
COMSEC Material Report- transfer of secure communications devices
Form SF312
Classified Information Non-disclosure agreement
What is a DDA?
designated disclosure authority
Purpose of the DCS?
Defense Currier Service- like USPS for classified material.
How to prepare hard-copy material for transportation.
double wrapped
properly marked
minimum size = 8x11
don't exceed 150 lbs
all seams reinforced
THREATCON
Alpha
Bravo
Charlie
Delta
What is the purpose of an EAP?
Emergency Action Plan- plan for the protection of classified information in the event of natural disaster or civil disturbance
EDP Priority
Priority One- All equipment
Two- Operational SCI material
Three- Less sensitive SCI
How often are vaults and SCIFS inspected?
At least annualy.
Intelligence Community Directives
are the principal means by which the DNI provides guidance and policy to the Intel community
SSO Navy
Director of Security
Duties of the SSO
maintain the security of SCI material and advise the CO on security maters
Who can be a command Security manager
Officer or civilian GS-11 or higher
Purpose of JPAS
Joint Personnel adjudication system- official personnel security clearance database management system
DonCAF
Department of the Navy Central Adjudication Facility- determines who is eligible for a clearance
How long can a CO suspend access before DonCAF revokes a clearance?
90 days.
INFOCON 5
no apparent threat to computer networks
INFOCON 4
increased risk of attack to computer networks
INFOCON 3
risk has been identified
INFOCON 2
attack has taken place but the computer network defense system is not at it's highest alert
INFOCON 1
attacks are taking place and the computer network defense system is at maximum alertness
Executive Order 13526
Prescribes a uniform system for classifying, safeguarding, and declassifying security information
Certification
evaluation of security features of an information system
Accreditation
official management decision to permit operation of an information system at a acceptable level of risk
Delegated Authoring Official
Review IT accreditation, review OS
SSP
system security plan - formal document that describes the plan required to meet the system security reqs
ATO
authority to operate - formal declaration by the DDA that IS is approved to operate
IATO
Interim authority to operate - temporary authorization
configuration management
handles all changes to a site during its operational life cycle
5 attributes of IA
Confidentiality, Integrity, Availability, Non-repudiation, Authentication

Non-repudiation - receipt stating who sent and received message
Root level intrusion
admin. unauthorized privileged access to a DOD system
User level intrusion
Unauthorized access to a DOD institution
Denial of servicce
Activity that denies system function
Malicious logic
installation of software designed to be malicious
Unsuccessful activity attempt
deliberate attempts to gain access that are defeated by a normal defensive mechanisms
Non compliance activity
activity that potentially exposes Dod systems to increased risks as a result of an action of an authorized user
Reconnnaisance
activity that seeks to gather info on a dod system
INvestigating
events that are potentially malicious and are under review
Explained anomally
suspicious events that are determined to be non malicious activity
information assurance vulnerability alert
announcement of a high risk computer software vulnerability provides corrective action
IA vulnerability bulletin
announcement of medium risk software activity in a form of a bulletin
communications tasking order
dod wide instruction that promulgates mandatory changes and standing instructions on how communications are handled
navy telecommunications directive
naval message giving direction regarding certain IT functions
service pack
collection of udates fixes and/or enhancements to software programs delivered in a single installable package
vulnerability assessment
testing process used to evaluate networks and users to identify weaknesses
IA MANAGER
appointed by the CO to manage IA program
CCRI
Command cyber readiness inspection - conducted by DISA and ensures compliance with IA standards
Host Client
Computer or network that requests data from other networks
Server
host that shares resources with clients
Hub
Repeater. Connects LANS or segments of a LAN
Switch
handles traffic to intended recipients
Router
Connects ttwo or more networks
WAP
Wireless Application Protocol - International standard for network communications in a wireless environment.
Proxy server
Keeps machines anonymous but like a normal server
VPN
Virtual Private Network. Network uses public infrastructure to provide users with secure access to their organizations network.
Access Router
Small office or home model. optimized for low cost
Distribution Router
designed to handle traffic for multiple access router
Core Router
provide a colapsed backbone. optimized for high bandwidth
Topology
Layout pattern of a computer network.
Bus
Connected in one line
Star
Devices connected to a central hub
Ring
circular fashion. each device access a repeater
Mesh
All components directly connected to every other component
LAN
Local Area Network (i.e. home)
WAN
Wide Area Network (internet, national boundaries)
MAN
Metropolitan Area Network (i.e. HarvardNet)
GAN
Global Area Network mobile and data over IP networks
OSI Model
Physical
Data Link
Network
Transport
Session
Presentation
Application
TCP/IP Model
Data Link
Internet
Transport
Application
IPv4 vs IPv6
IPv4 - 32
IPv6 - 128
NIPRnet
Non-classified Internet Protocol Router Network
SIPRnet
Secure/Secret Internet Protocol Router Network
JWICS
Joint Worldwide Intelligence Communication System for TSSCI
DoDN (GIG)
Global Information Grid
DISN
Defense INformation Systems Network - data and voice and video services
NMCI
Navy Marine Corps Internet
ONENet
OCONUS Navy Network
Machine Language
Binary Code
Assembly Language
Programming Language
High level Lang
Hides details of the CPU. Programming lang with strong differences from the details of the computer
Virus
A program that can copy itself
Worm
Self replicating virus. Does so without user interaction
Trojan
appears to perform a good function but is really a bad function
Network Enumeration
Usernames info is retrieved from computer network
Buffer Overflow
Program is writing outside of its allotted memory
SQL Injection
insertion of a malicious code
PKI
Public Key Infrastructure - For digital certs. binds keys with respective user identities
Automated Digital Network System (ADNS)
Connects shipboard networks with external platforms and WANs it pass data.
Common User Digital Information Exchange System (CUDIXS)
Fleet UHF SATCOM access for ships
VLF Digital Information Network (VERDIN)
secure system for submarine communications
NOVA
shore based message handling systems to process GENSER message traffic
IBS
integrated broadcast system- various SIGINT broadcast systems integrated
INMARSAT
international maritime SATCOM- SATCOM for the maritime community
DMS
Defense Messaging System
NREMS
Navy regional messaging system- web based messaging via a web browser or email
AMHS
Automated message handling system- simplified message sending recieving
VTC
video teleconference
Defense connect online
web based virtual meeting room.
GINGERBREAD
brevity code used for when an intruder is on the net
What is EEFI
essential elements of friendly information
BEAD WINDOW
brevity code for an EEFI disclosure on the net- reply is ROGER OUT
RIVER CITY
communication blackout for OPSEC purposes
Meaconing
intentional transmission of signals to deceive nagvigational aid to users
Intrusion
Deliberate insertions of false information into communications circuits
Jamming
deliberate radiation or reflection of electromagnetic energy to disrupt use of electronic devices
Spectrum management
planning and coordinating joint use of the EM spectrum
Plain language address
used in message traffic to denote command short title
Date Time Group
unique designator for message ID and filing
Universal Time Code
Zulu time- common understood time
Routine Priority
R- 6 hours
Priority
P- 3 hours
Immediate
O- 30 minutes
Flash
Z- withing 10 minutes
Flash Override
W- Overrides all other traffic as fast as possible
OPTASK COMMS
nets and frequencies are authorized within a given area
COMMPLAN
circuits are required and where/when they are needed throughout a given period
Telecommunications Service Order
authorization from DISA to start, change , or disconnect circuits
Telecommunications Service Request
an approved and funded telecom requirement for service
COMSPOT
provides information concerning conditions that impose serious degradation of communications equipment
EKMS
electronic key management system- administrative controls used for electronic keys
OTAT/ OTAR
over the air transfer and over the air rekey
TEMPEST
studies of compromising emissions and the shielding used to block them
EMCON- emissions control
no emitting device within designated bands will be operated unless essential
ASW
anti submarine warfare
SUW
surface warfare
IW
information warfare
AW
air warfare
STW
strike warfare
NSW
navy special warfare
How does the reserve component integrate with the active component
integrates both reserve and active components into a single force. The reserves provide trained units to be available for active duty
What is the purpose of direct support assets
to meet quick reaction mission requirements
Mine Warfare UUV Platoon
precisely locates and classifies min-like objects, provides detailed information to estimate location of enemy-deployed mine defenses
Naval Oceanographic ASW Team (NOAT)
sub hunters
Strike Group Oceanographic Team
weather team deployed to a strike group
Mobile Environmental Team (MET)
provide short term, on scene environmental support to ships and activities
Fleet Survey Team
conduct worldwide hydrographic surveys
PSYOP
induce or reinforce attitudes and behavior favorable to the originator's cause
MILDEC
actions executed to deliberately mislead adversary decisions
OPSEC
operational security- identifying and protecting critical information
EW
military action involving the use of EM and directed energy
CNO
Computer network operations
Blue Team
password scrubs, scans for malicious software and intrusions
Red Team
acts as adversary to expose and exploit system vulnerabilities
Fleet Electronic Support
assist all ships entering port with cryptologic equipment problems
USC Title 10
establishes military and judicial systems
USC Tile 50
discusses operations during a time of war, legal rights and boundaries
CRITIC
a reporting used to notify the president and the national security council of critical information
CCOP
cryptologic carry on equipment- addresses gaps in current information operations that are not met by permanent systems
NITES
navy integrated tactical environment system- tacitical weather for the navy
JDISS
joint deployable intelligence support system- developed to ensure that each of the services and national agencies had an intelligence system that was both compatible and interoperable using a common data standard
What is the purpose of a MOC
and element of the maritime headquarters which conducts service and joint operations as required by the commander
What are the 5 steps of the planning process
identify critical information
threat assessment
vulnerability analysis
risk assessment
measure/ countermeasures
What is the responsibility of the OPSEC officer
coordinate functions for the commander and advising the commander on the best course of action
WRA
security officers should review their commands web site through the eyes of their adversary
EEFI
essential elements of friendly information
What is the purpose of Naval Intelligence
Support the commander
protecting the force
What are the 5 steps of intelligence
planning
collection
processing
productions
dissemination
What are the 3 categories of intelligence
tactical
strategic
operational
Priority Intel Requirement
an intelligence requirement to understand the adversary or the operational environment
Commander critical information requirement
designed to feed time-sensitive infor to the commander
What is intelligence oversight
the supervision of intelligence agencies, and making them accountable for their actions
HUMINT
human intel
OSINT
open source
MASINT
measurement and signature
SIGINT
signals
COMINT
communications
FISINT
foreign instrumentations signals
ELINT
elctronic
IMINT
imagery
ACINT
acoustic intel
Freq Spectrum
EVLMHVUSE

starting 3hz - 300ghz
Frequency
number of cycles that occur in one second
wavelength
distance from the crest of one wave to the crest of the next
ducting
phenomenon where a signal propigates along the boundary of two dissimilar air masses
refraction
wave that changes direction when passing from one medium to another
multiplexing
simultaneously transmitting two or more signals
modulation/ demodulation
impressing or removing intel from a medium
bandwidth
the amount of the freq spectrum that a signal takes up
keying
generating of signals by the interruption or modulation of a signal
Layers of the atmosphere
Troposhere
stratosphere
ionisphere
USB
upper side band
CW
carrier wave
AM
amplitude modulation
FM
frequency modulation
PRI
pulse repetition interval
PRF
pulse repition frequency
3 types of RADAR scans
air search
surface search
fire control
What is the difference between OPELINT and TECHELINT?
OPELINT- operationally relevant information

TECHELINT- technical aspects of foreign non-communications emitters
How does Naval Oceanography support Information Dominance
overseas panel issues, enables collaboration across communities, and develops a consensus on issues of importance
What products are available through the Navy Oceanography Portal
time, earth orientation, astronomy, meteorology, oceanography, ice
Tropical depression
thunderstorms that are grouped together 33 knt winds
Tropical Storm
max sustained winds between 35 -6 4knts
Hurricane
sustained winds of at least 64 knts
What are the 3 levels of the ocean
Mixed
Thermocline
deep layer
What 3 things effect the transmission of sound in water
pressure salinity and temperature
Small craft warning
33 knots or less
Gale
34-47 knots
Storm
48 knots or higher
What are the Tropical Cyclone conditions of readiness
COR 5- normal
COR 4- 72 hrs
COR 3- 48 hrs
COR 2- 24 hrs
COR 1-12 hrs
Space Force Enhancement
increase joint force effectiveness by increasing the combat potential of that force, enhancing operational awareness and providing needed joint force support
Space Support
space lift operations
satellite operations
reconstitution of space forces
Space Control
offensive space control
defensive space control
space Situational Awareness
Space Force Application
combat operations in space to influence the outcome of conflict by holding terrestrial targets at risk
What is the solar cycle
11-year cycle, 4 years rising in activity and then 7 years decreasing in activity
Van Allen radiation belt
two regions of stble trapped charged particles that exist because the geomagnetic field near the earth
Apogee
farthest away from the earth
Perigee
closest to the earth
GPS
Global positioning system- using messages received from a minimum of three satellites to determine a position