Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
316 Cards in this Set
- Front
- Back
What is ORM?
|
ORM is a decision making tool used by personnel to increase effectiveness by managing risk.
|
|
What are the 5 steps of ORM?
|
IAMIS
Identify Hazard Access Risk Make risk decisions Implement Controls Supervise |
|
What instructions covers mishap reporting?
|
OPNAVINST 5102.1D
|
|
What is the purpose of a HAZREP
|
to be submitted when the elimination and control of a given hazard has community-wide implications in reducing mishaps.
|
|
What are the 3 objectives of first aid
|
SAVE LIFE
PREVENT FURTHER INJURY CONTROL BLEEDING |
|
What are the 3 methods to control bleeding
|
Direct pressure
pressure points tourniquet |
|
How many pressure points are there in the body
|
22- 11 per side
|
|
What is also known as Acute stress reaction
|
Shock
|
|
What is HERO, HERP and HERF
|
Hazardous electromagnetic radiation of Ordanance, Personnel and Fuel
|
|
What is HAZMAT and how should it be stored
|
Hazardous material and it should be stored in a HAZMAT specific storage area and sorted by type of HAZMAT.
|
|
What is a MSDS and what does it include.
|
Material Safety Data Sheet- contains information about hazardous material including use, storage, and disposal information.
|
|
What is PPE
|
Personal Protective Equipment
|
|
What is the goal of the Navy's Conservation Program
|
to prevent occupational hearing loss and assure auditory fitness for duty of all Navy personnel.
-noise-induced hearing loss is the fleet's number one occupational health hazard |
|
What are the 6 areas of the Naval Doctrine
|
WIPLOC
Warfare Intelligence Planning Logistics Planning Command and Control |
|
What are the 7 principles of Naval logistics
|
FEARSSS
Flexibility Economy Attainability Responsiveness Simplicity Sustainability Survivability |
|
What was the first Navy ship named after an enlisted man
|
USS Osmond Ingram (DD255)- It was launched 28 Feb 1919. GM Ingram was the first man killed in World War I when the Cassin (DD43) was torpedoed in October 1917.
|
|
What conditions led to the formation of the US Navy
|
Taxation without representation resulted in a continental congress who implemented the Navy on Oct 13th 1775.
|
|
What 3 classes of ships existed during the inception of the navy
|
Ships of the Line- 64 100 guns
Frigates- 28 44 guns Sloops of war- 10 20 guns |
|
Explain gun salutes
|
21 guns on Memorial Day, Washington's birthday, Independence Day, and to honor the President and heads of foreign state.
Admirals- 17 Vice Adm- 15 Rear Adm- 13 Commodore- 11 |
|
Battle of Coral Sea
|
7-8 May 1942- We broke the Japanese Code and the Navy was alerted to a large Japanese force moving to Coral Sea to seize Port Moresby in New Guinea. It was to be the first step of a planned invasion of Australia.
The Japanese had 3 carriers and the US had 2 On May 7th, the japanese planes sank two minor ships, while the US sank an isolated enemy carrier. The next day both sides launched all their planes. The aircraft passed each other unseen in the clouds, in the world's first carrier to carrier battle. The LExington was sunk and the Yorktown was damaged. Both sides withdrew and Japan never again threatened Australia |
|
Voyage of the Great White Fleet
|
16 December 1907- Left Hampton Roads, Virginia for a round-the-world cruise to show the flag. Demonstrated the strength of the Navy and the fact that we could resupply and stay at sea for long periods of time.
|
|
Battle of Normandy
|
6 Jun 1944- Largest amphibious operation in history. All 3 types of Mildec played an important role.
2 years in planning -1200 ships 4100 landing craft |
|
Midway
|
4-7 June 1942- Turning point of the Pacific war. The fact that the US had broken the japanese code played an important role. Admiral Yamamoto split is force sending ships north to the aleutian islands in a diversionary attack. The us new the japanese were headed towards midway and positioned their carriers outside of recon range and when the japanese planes flew to attack midway, our planes took off and attacked the japanese carriers. We sank all 3 of the japanese carriers.
|
|
Guadalcanal
|
13-15 Nov 1942- Japanese naval forces retreated and marines were able to take over Guadalcanal. The japanese lost 2 cruisers and 6 destroyers. The USS Juneau was lost in the battle and all of the Sullivan brothers were killed.
|
|
Battle of Leyte Gulf
|
23 Oct 1944- The japanese sent a naval force to the Philippines to attack the US fleet but the operation was a complete failure. The loss of the Philippines split the japanese empire in half and they lost control of the pacific.
|
|
Mercury 3
|
05 May 1961- First manned spaceflight. Alan Shepard was the first Naval Aviator in space.
|
|
Gemini 3
|
23 Mar 1965- First 2 man space flight- first spacecraft to maneuver from one orbit to another.
LCDR John Young was on board. |
|
Apollo 11
|
16-24 Jul 19698- First manned moon landing.
Neil Armstrong and Buzz Aldrin |
|
Apollo 17
|
07-19 Dec 1972- Seventh and final lunar landing mission.
Eugene A Cernan, and Ronald E. Evans. |
|
STS-1
|
12-14 Apr 1981- First orbital test flight of the Space Shuttle. All Navy crew. John Young, Robert L. Crippen.
|
|
On the roof gang
|
The foundation of the CT community.
They were named for their training location which was on top of the Navy building in DC. 176 Navy and Marine radio operators trained They cracked the purple code. |
|
Purple Code
|
Japanese cipher used by the Japanese foreign Office, thought to be secure
Named for the color binder decrypts were kept in Germany-Tokyo comms |
|
USS Liberty
|
Attacked by Israelis in 1967 in the Mediterranean Sea. It was supposedly mistaken for an enemy ship. Although severely damaged with a 39 by 24 ft hole, the crew kept her afloat and she was able to leave the area. 34 crewmen were killed and 173 wounded.
|
|
USS Pueblo
|
Captured by N Korea in 1968- lack of communication with higher commands, they were not informed of the Korean's hostility. Emergency Destruct plan was never accomplished. One man was killed. The crew was kept for 11 months and the ship is now used as a museum.
|
|
Landing at Inchon
|
Communists had come across the 38th parallel into South Korea in an attempt to take Seoul. 1950- General MacArthur devised a plan to cut the North Korean army off via Inchon, a strategic port. Plan required mass intelligence and planning due to long approaches through shallow channels, poor beaches and a tidal range that restricted landing operations to a few hours a day. Huge win for METOC.
|
|
Hainan Island
|
01 April 2001- EP-3 was hit by Wong Way in a J-8 interceptor from China. They were forced to land in Hainan Island and were detained for 10 days. During that time China had free reign of the plane and an EDP was not properly conducted prior to landing.
|
|
Bletchley Park
|
Britain's crypto center- they broke the enigma cypher
|
|
Navajo Code Talker
|
extremely complex. Unintelligible to anyone without extensive exposure and training. It has no alphabet or symbols. One estimate indicates that less than 30 non-Navajos, none of them japanese, could understand the language at the outbreak of World War II. It was never broken.
|
|
USS Stark
|
17 May 1987- Iraqi F-1 Mirage fired two Exocet missiles at the Stark while it was in the NAG. Both the AWACS and the Stark detected the missile launch due to the fact that they operators weren't on POS. 37 Sailors were killed.
|
|
EC-121
|
April 1969- Attacked without warning by North Korea MiG while flying its last mission with a double crew for training. (31 men)
The Navy would adopt new procedures to provide its unarmed reconnaissance aircraft with a higher degree of protection from the fleet. STW EC-121 replaced by the EP-3. |
|
What qualities characterize the Navy team as instruments to support national policies.
|
Readiness
Flexibility Self-sustainability Mobility The US Marine Corps allows us to be an expeditionary force. |
|
What are the 3 levels of war
|
Tactical
Operational Strategic |
|
What did the National Security Act of 1947 do?
|
Established the National Security Council
Established the CIA Merged the DoN and DoW into the DOD Established the AirForce |
|
When and why were the current Navy Core Values developed?
|
Adopted by CNO ADM Frank B Kelso in 1992
The Navy Core Values are at the heart of a service wide effort to strengthen the Navy as a values community. |
|
When and why was the Sailor's Creed developed?
|
Written by the Blue Ribbon Recruit Training Panel in 1993 by direction of CNO Admiral Frank Kelso.
|
|
RADM Grace Hopper
|
Computer pioneer
Programmed the Mark I computer Credited with term "bug" Created COBOL the first programming language Joined in 1943, retired 1966, recalled and retired again in 1986. Died 1992. |
|
What was the name of the first computer?
|
ENIAC- Electronic Numerical Integrator and Computer. It was created in 1945 at the University of Pennsylvania.
|
|
ARPANET
|
Was the precursor to the modern internet. UCLA, Stanford Research Institute, UC Santa Barbara, and Utah were the first 4 nodes.
|
|
Explain the impact of the John Walker espionage case.
|
He spied for the Russians starting in 1968. It served as a catalyst for a wide-spread investigations of security procedures inside the intell community. Led directly to the appointment of the first director of counter intelligence on the National Security Council Staff.
|
|
State the oldest organization in the US Navy.
|
The Office of Naval Intelligence. established in 1882 by William H. Hunt. Secretary of the Navy.
|
|
State the first CIO/DNI?
|
LT Theodorus B. M. Mason
|
|
What 2 departments were combined to form the ONI?
|
Department Library and the Office of Intelligence.
|
|
What is the mission of the Navy?
|
Train combat ready forces and maintain freedom of the seas.
|
|
Discuss the NCA, members and its function
|
The National Command Authority, it the ultimate lawful source of military orders.
President Sec Of Defense Joint Chiefs Unified Specific commands |
|
Difference between OPCON and ADCON?
|
OPCON employs command and personnel to satisfy mission requirements.
ADCON has authority over commands and personnel as needed for admin support |
|
Function of COCOM?
|
Commander of a combatant command.
|
|
NAVY COCOM
|
navy capability to provide forces to combatant commanders
|
|
FLT COMMANDER
|
In charge of a specific fleet AOR
|
|
TYPE COMMANDER
|
In charge of a type or specialty
|
|
What are the 2 NCTAMS?
|
NCTAMS LANT- Norfolk, VA
NCTAMS PAC- Wahaiwa, HI |
|
What is C5I
|
Command Control, Communications, Computers, Combat systems and Intelligence
|
|
What is the mission of DISA?
|
Defense Information Systems Agency- provides C2 capabilities to ensure continuous operation net-centric enterprise. Enables information dominance.
|
|
What is the mission of NASIC?
|
National Air and Space Intelligence Center- Primary DOD producer for foreign airspace intelligence. Historically weapons treaty negotiations and verification.
|
|
Mission of the NCDOC
|
Navy Cyber Defense Operations Center- Coordinates the defense of Navy computer systems.
|
|
ODNI
|
Office of Director of National Intelligence- head of the intelligence community and advises the president on national security.
|
|
DIA
|
Defense Itel Agency- provides foreign military intelligence
|
|
NSA
|
SIGINT
|
|
CIA
|
HUMINT
|
|
NGA
|
National Geospaciall Intelligence Agency- provide GEOINT
|
|
DHS
|
Department of Homeland Security- analyze the vulnerabilities of US critical infrastructure and access the scope of terrorist threats
|
|
FBI
|
Federal Bureau of Investigation- counter intelligence and counter terrorism in the US
|
|
DEA
|
Drug Enforcement Agency- enforce drug laws
|
|
DOE
|
Department of Energy- national and economic and energy security of the US
|
|
DOS
|
Department of State- intel analysis on political and economic topics essential to foreign policy.
|
|
DOT
|
Department of Treasury- participates with the DOS with the collection of foreign economic information
|
|
NASA
|
Aerospace Technology
|
|
NRO
|
National Recon Office- overhead
|
|
EDVR
|
Enlisted Distribution Verification Report- it has 12 sections,
|
|
ODCR
|
Officer Distribution Control Report- monthly statement of officer manpower
|
|
AMD
|
Activity Manning Document- total manpower requirements and authorizations for a command. Manpower needs and manning.
|
|
Concurrent Report
|
Record of significant performance in a an additional duty status. ie. if you go on an IA
|
|
Page 2
|
SGLI information
|
|
Navy Unit SITREP
|
Anything the CO may consider SITREP worthy
|
|
Navy BLUE
|
Sent to inform ISIC and upper Navy chains, probable big navy interest
|
|
Pinnacle
|
sent to Navy an DOD upper echelon, significant event such as a loss of a ship or a catastrophe
|
|
IG
|
Inspector General- evaluations relating to programs and operations of the DOD Navy and Fleet Cyber command.
|
|
Purpose of the Navy Correspondance Manual
|
to standardize documents
|
|
What is PTS now?
|
SEAWAY
|
|
Officer Programs
|
BOOST
STA-21 LDO CWO OCS Medical Enlisted Commisioning Program |
|
DLPT
|
Defense Language Proficiency Test
|
|
Duties of the ESO
|
Educational Services Officer- ADVANCEMENT EXAMS,
|
|
Brilliant on the Basics
|
Sponsorship
Ombudsman Recognition CDBs Indoc Mentorship |
|
What system is used by Navy Forces to track equipment and maintain inventories?
|
DPAS- defense property accountability program
|
|
Purpose of 3m/PMS system
|
Planning scheduling and accomplishing preventative maintenance.
|
|
MAM
|
Maintenance Assistance Modules- troubleshooting aid
|
|
CASREP
|
Casualty Report- four categories, Major and minor for primary and secondary. Must be sent if not corrected within 48 hrs.
|
|
NSN
|
national stock number- 13 digits
|
|
Material Obligation Validation Program
|
An unfilled quantity is not available to fill the request. Every 30 days the originator is given the option to keep waiting or cancel the request.
|
|
CHRIMP
|
Consolidated Hazardous Material Reutilization and Inventory Management Program- for procuring, storing, issuing and reusing HAZMAT
|
|
DRMS
|
Defense Reutilization Marketing Service- central point for excess material which can be reissued saving command money
|
|
ServMart
|
A shopping facility that carries a large supply of office materials
|
|
Government commercial Purchase Card
|
used to streamline procurement process
|
|
OPTAR
|
Operating Target- an estimate of amount of money required to perform tasks within a unit or command
|
|
Security Access Eligibility Report
|
any information that can affect eligibility for access to SCI
|
|
SF700
|
Security container information- contains combinations
|
|
SF701
|
Activity security checklist- used at the end of the day to account for classified material
|
|
SF702
|
Security container checksheet- names and times that personnel have opened containers containing classified information
|
|
SF703
|
Top Secret Coversheet
|
|
Form SF153
|
COMSEC Material Report- transfer of secure communications devices
|
|
Form SF312
|
Classified Information Non-disclosure agreement
|
|
What is a DDA?
|
designated disclosure authority
|
|
Purpose of the DCS?
|
Defense Currier Service- like USPS for classified material.
|
|
How to prepare hard-copy material for transportation.
|
double wrapped
properly marked minimum size = 8x11 don't exceed 150 lbs all seams reinforced |
|
THREATCON
|
Alpha
Bravo Charlie Delta |
|
What is the purpose of an EAP?
|
Emergency Action Plan- plan for the protection of classified information in the event of natural disaster or civil disturbance
|
|
EDP Priority
|
Priority One- All equipment
Two- Operational SCI material Three- Less sensitive SCI |
|
How often are vaults and SCIFS inspected?
|
At least annualy.
|
|
Intelligence Community Directives
|
are the principal means by which the DNI provides guidance and policy to the Intel community
|
|
SSO Navy
|
Director of Security
|
|
Duties of the SSO
|
maintain the security of SCI material and advise the CO on security maters
|
|
Who can be a command Security manager
|
Officer or civilian GS-11 or higher
|
|
Purpose of JPAS
|
Joint Personnel adjudication system- official personnel security clearance database management system
|
|
DonCAF
|
Department of the Navy Central Adjudication Facility- determines who is eligible for a clearance
|
|
How long can a CO suspend access before DonCAF revokes a clearance?
|
90 days.
|
|
INFOCON 5
|
no apparent threat to computer networks
|
|
INFOCON 4
|
increased risk of attack to computer networks
|
|
INFOCON 3
|
risk has been identified
|
|
INFOCON 2
|
attack has taken place but the computer network defense system is not at it's highest alert
|
|
INFOCON 1
|
attacks are taking place and the computer network defense system is at maximum alertness
|
|
Executive Order 13526
|
Prescribes a uniform system for classifying, safeguarding, and declassifying security information
|
|
Certification
|
evaluation of security features of an information system
|
|
Accreditation
|
official management decision to permit operation of an information system at a acceptable level of risk
|
|
Delegated Authoring Official
|
Review IT accreditation, review OS
|
|
SSP
|
system security plan - formal document that describes the plan required to meet the system security reqs
|
|
ATO
|
authority to operate - formal declaration by the DDA that IS is approved to operate
|
|
IATO
|
Interim authority to operate - temporary authorization
|
|
configuration management
|
handles all changes to a site during its operational life cycle
|
|
5 attributes of IA
|
Confidentiality, Integrity, Availability, Non-repudiation, Authentication
Non-repudiation - receipt stating who sent and received message |
|
Root level intrusion
|
admin. unauthorized privileged access to a DOD system
|
|
User level intrusion
|
Unauthorized access to a DOD institution
|
|
Denial of servicce
|
Activity that denies system function
|
|
Malicious logic
|
installation of software designed to be malicious
|
|
Unsuccessful activity attempt
|
deliberate attempts to gain access that are defeated by a normal defensive mechanisms
|
|
Non compliance activity
|
activity that potentially exposes Dod systems to increased risks as a result of an action of an authorized user
|
|
Reconnnaisance
|
activity that seeks to gather info on a dod system
|
|
INvestigating
|
events that are potentially malicious and are under review
|
|
Explained anomally
|
suspicious events that are determined to be non malicious activity
|
|
information assurance vulnerability alert
|
announcement of a high risk computer software vulnerability provides corrective action
|
|
IA vulnerability bulletin
|
announcement of medium risk software activity in a form of a bulletin
|
|
communications tasking order
|
dod wide instruction that promulgates mandatory changes and standing instructions on how communications are handled
|
|
navy telecommunications directive
|
naval message giving direction regarding certain IT functions
|
|
service pack
|
collection of udates fixes and/or enhancements to software programs delivered in a single installable package
|
|
vulnerability assessment
|
testing process used to evaluate networks and users to identify weaknesses
|
|
IA MANAGER
|
appointed by the CO to manage IA program
|
|
CCRI
|
Command cyber readiness inspection - conducted by DISA and ensures compliance with IA standards
|
|
Host Client
|
Computer or network that requests data from other networks
|
|
Server
|
host that shares resources with clients
|
|
Hub
|
Repeater. Connects LANS or segments of a LAN
|
|
Switch
|
handles traffic to intended recipients
|
|
Router
|
Connects ttwo or more networks
|
|
WAP
|
Wireless Application Protocol - International standard for network communications in a wireless environment.
|
|
Proxy server
|
Keeps machines anonymous but like a normal server
|
|
VPN
|
Virtual Private Network. Network uses public infrastructure to provide users with secure access to their organizations network.
|
|
Access Router
|
Small office or home model. optimized for low cost
|
|
Distribution Router
|
designed to handle traffic for multiple access router
|
|
Core Router
|
provide a colapsed backbone. optimized for high bandwidth
|
|
Topology
|
Layout pattern of a computer network.
|
|
Bus
|
Connected in one line
|
|
Star
|
Devices connected to a central hub
|
|
Ring
|
circular fashion. each device access a repeater
|
|
Mesh
|
All components directly connected to every other component
|
|
LAN
|
Local Area Network (i.e. home)
|
|
WAN
|
Wide Area Network (internet, national boundaries)
|
|
MAN
|
Metropolitan Area Network (i.e. HarvardNet)
|
|
GAN
|
Global Area Network mobile and data over IP networks
|
|
OSI Model
|
Physical
Data Link Network Transport Session Presentation Application |
|
TCP/IP Model
|
Data Link
Internet Transport Application |
|
IPv4 vs IPv6
|
IPv4 - 32
IPv6 - 128 |
|
NIPRnet
|
Non-classified Internet Protocol Router Network
|
|
SIPRnet
|
Secure/Secret Internet Protocol Router Network
|
|
JWICS
|
Joint Worldwide Intelligence Communication System for TSSCI
|
|
DoDN (GIG)
|
Global Information Grid
|
|
DISN
|
Defense INformation Systems Network - data and voice and video services
|
|
NMCI
|
Navy Marine Corps Internet
|
|
ONENet
|
OCONUS Navy Network
|
|
Machine Language
|
Binary Code
|
|
Assembly Language
|
Programming Language
|
|
High level Lang
|
Hides details of the CPU. Programming lang with strong differences from the details of the computer
|
|
Virus
|
A program that can copy itself
|
|
Worm
|
Self replicating virus. Does so without user interaction
|
|
Trojan
|
appears to perform a good function but is really a bad function
|
|
Network Enumeration
|
Usernames info is retrieved from computer network
|
|
Buffer Overflow
|
Program is writing outside of its allotted memory
|
|
SQL Injection
|
insertion of a malicious code
|
|
PKI
|
Public Key Infrastructure - For digital certs. binds keys with respective user identities
|
|
Automated Digital Network System (ADNS)
|
Connects shipboard networks with external platforms and WANs it pass data.
|
|
Common User Digital Information Exchange System (CUDIXS)
|
Fleet UHF SATCOM access for ships
|
|
VLF Digital Information Network (VERDIN)
|
secure system for submarine communications
|
|
NOVA
|
shore based message handling systems to process GENSER message traffic
|
|
IBS
|
integrated broadcast system- various SIGINT broadcast systems integrated
|
|
INMARSAT
|
international maritime SATCOM- SATCOM for the maritime community
|
|
DMS
|
Defense Messaging System
|
|
NREMS
|
Navy regional messaging system- web based messaging via a web browser or email
|
|
AMHS
|
Automated message handling system- simplified message sending recieving
|
|
VTC
|
video teleconference
|
|
Defense connect online
|
web based virtual meeting room.
|
|
GINGERBREAD
|
brevity code used for when an intruder is on the net
|
|
What is EEFI
|
essential elements of friendly information
|
|
BEAD WINDOW
|
brevity code for an EEFI disclosure on the net- reply is ROGER OUT
|
|
RIVER CITY
|
communication blackout for OPSEC purposes
|
|
Meaconing
|
intentional transmission of signals to deceive nagvigational aid to users
|
|
Intrusion
|
Deliberate insertions of false information into communications circuits
|
|
Jamming
|
deliberate radiation or reflection of electromagnetic energy to disrupt use of electronic devices
|
|
Spectrum management
|
planning and coordinating joint use of the EM spectrum
|
|
Plain language address
|
used in message traffic to denote command short title
|
|
Date Time Group
|
unique designator for message ID and filing
|
|
Universal Time Code
|
Zulu time- common understood time
|
|
Routine Priority
|
R- 6 hours
|
|
Priority
|
P- 3 hours
|
|
Immediate
|
O- 30 minutes
|
|
Flash
|
Z- withing 10 minutes
|
|
Flash Override
|
W- Overrides all other traffic as fast as possible
|
|
OPTASK COMMS
|
nets and frequencies are authorized within a given area
|
|
COMMPLAN
|
circuits are required and where/when they are needed throughout a given period
|
|
Telecommunications Service Order
|
authorization from DISA to start, change , or disconnect circuits
|
|
Telecommunications Service Request
|
an approved and funded telecom requirement for service
|
|
COMSPOT
|
provides information concerning conditions that impose serious degradation of communications equipment
|
|
EKMS
|
electronic key management system- administrative controls used for electronic keys
|
|
OTAT/ OTAR
|
over the air transfer and over the air rekey
|
|
TEMPEST
|
studies of compromising emissions and the shielding used to block them
|
|
EMCON- emissions control
|
no emitting device within designated bands will be operated unless essential
|
|
ASW
|
anti submarine warfare
|
|
SUW
|
surface warfare
|
|
IW
|
information warfare
|
|
AW
|
air warfare
|
|
STW
|
strike warfare
|
|
NSW
|
navy special warfare
|
|
How does the reserve component integrate with the active component
|
integrates both reserve and active components into a single force. The reserves provide trained units to be available for active duty
|
|
What is the purpose of direct support assets
|
to meet quick reaction mission requirements
|
|
Mine Warfare UUV Platoon
|
precisely locates and classifies min-like objects, provides detailed information to estimate location of enemy-deployed mine defenses
|
|
Naval Oceanographic ASW Team (NOAT)
|
sub hunters
|
|
Strike Group Oceanographic Team
|
weather team deployed to a strike group
|
|
Mobile Environmental Team (MET)
|
provide short term, on scene environmental support to ships and activities
|
|
Fleet Survey Team
|
conduct worldwide hydrographic surveys
|
|
PSYOP
|
induce or reinforce attitudes and behavior favorable to the originator's cause
|
|
MILDEC
|
actions executed to deliberately mislead adversary decisions
|
|
OPSEC
|
operational security- identifying and protecting critical information
|
|
EW
|
military action involving the use of EM and directed energy
|
|
CNO
|
Computer network operations
|
|
Blue Team
|
password scrubs, scans for malicious software and intrusions
|
|
Red Team
|
acts as adversary to expose and exploit system vulnerabilities
|
|
Fleet Electronic Support
|
assist all ships entering port with cryptologic equipment problems
|
|
USC Title 10
|
establishes military and judicial systems
|
|
USC Tile 50
|
discusses operations during a time of war, legal rights and boundaries
|
|
CRITIC
|
a reporting used to notify the president and the national security council of critical information
|
|
CCOP
|
cryptologic carry on equipment- addresses gaps in current information operations that are not met by permanent systems
|
|
NITES
|
navy integrated tactical environment system- tacitical weather for the navy
|
|
JDISS
|
joint deployable intelligence support system- developed to ensure that each of the services and national agencies had an intelligence system that was both compatible and interoperable using a common data standard
|
|
What is the purpose of a MOC
|
and element of the maritime headquarters which conducts service and joint operations as required by the commander
|
|
What are the 5 steps of the planning process
|
identify critical information
threat assessment vulnerability analysis risk assessment measure/ countermeasures |
|
What is the responsibility of the OPSEC officer
|
coordinate functions for the commander and advising the commander on the best course of action
|
|
WRA
|
security officers should review their commands web site through the eyes of their adversary
|
|
EEFI
|
essential elements of friendly information
|
|
What is the purpose of Naval Intelligence
|
Support the commander
protecting the force |
|
What are the 5 steps of intelligence
|
planning
collection processing productions dissemination |
|
What are the 3 categories of intelligence
|
tactical
strategic operational |
|
Priority Intel Requirement
|
an intelligence requirement to understand the adversary or the operational environment
|
|
Commander critical information requirement
|
designed to feed time-sensitive infor to the commander
|
|
What is intelligence oversight
|
the supervision of intelligence agencies, and making them accountable for their actions
|
|
HUMINT
|
human intel
|
|
OSINT
|
open source
|
|
MASINT
|
measurement and signature
|
|
SIGINT
|
signals
|
|
COMINT
|
communications
|
|
FISINT
|
foreign instrumentations signals
|
|
ELINT
|
elctronic
|
|
IMINT
|
imagery
|
|
ACINT
|
acoustic intel
|
|
Freq Spectrum
|
EVLMHVUSE
starting 3hz - 300ghz |
|
Frequency
|
number of cycles that occur in one second
|
|
wavelength
|
distance from the crest of one wave to the crest of the next
|
|
ducting
|
phenomenon where a signal propigates along the boundary of two dissimilar air masses
|
|
refraction
|
wave that changes direction when passing from one medium to another
|
|
multiplexing
|
simultaneously transmitting two or more signals
|
|
modulation/ demodulation
|
impressing or removing intel from a medium
|
|
bandwidth
|
the amount of the freq spectrum that a signal takes up
|
|
keying
|
generating of signals by the interruption or modulation of a signal
|
|
Layers of the atmosphere
|
Troposhere
stratosphere ionisphere |
|
USB
|
upper side band
|
|
CW
|
carrier wave
|
|
AM
|
amplitude modulation
|
|
FM
|
frequency modulation
|
|
PRI
|
pulse repetition interval
|
|
PRF
|
pulse repition frequency
|
|
3 types of RADAR scans
|
air search
surface search fire control |
|
What is the difference between OPELINT and TECHELINT?
|
OPELINT- operationally relevant information
TECHELINT- technical aspects of foreign non-communications emitters |
|
How does Naval Oceanography support Information Dominance
|
overseas panel issues, enables collaboration across communities, and develops a consensus on issues of importance
|
|
What products are available through the Navy Oceanography Portal
|
time, earth orientation, astronomy, meteorology, oceanography, ice
|
|
Tropical depression
|
thunderstorms that are grouped together 33 knt winds
|
|
Tropical Storm
|
max sustained winds between 35 -6 4knts
|
|
Hurricane
|
sustained winds of at least 64 knts
|
|
What are the 3 levels of the ocean
|
Mixed
Thermocline deep layer |
|
What 3 things effect the transmission of sound in water
|
pressure salinity and temperature
|
|
Small craft warning
|
33 knots or less
|
|
Gale
|
34-47 knots
|
|
Storm
|
48 knots or higher
|
|
What are the Tropical Cyclone conditions of readiness
|
COR 5- normal
COR 4- 72 hrs COR 3- 48 hrs COR 2- 24 hrs COR 1-12 hrs |
|
Space Force Enhancement
|
increase joint force effectiveness by increasing the combat potential of that force, enhancing operational awareness and providing needed joint force support
|
|
Space Support
|
space lift operations
satellite operations reconstitution of space forces |
|
Space Control
|
offensive space control
defensive space control space Situational Awareness |
|
Space Force Application
|
combat operations in space to influence the outcome of conflict by holding terrestrial targets at risk
|
|
What is the solar cycle
|
11-year cycle, 4 years rising in activity and then 7 years decreasing in activity
|
|
Van Allen radiation belt
|
two regions of stble trapped charged particles that exist because the geomagnetic field near the earth
|
|
Apogee
|
farthest away from the earth
|
|
Perigee
|
closest to the earth
|
|
GPS
|
Global positioning system- using messages received from a minimum of three satellites to determine a position
|