• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/164

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

164 Cards in this Set

  • Front
  • Back
Five Steps of ORM

"IAMIS"
1) Identify Hazards
2) Assess Hazards
3) Make Risk Decisions
4) Implement Controls
5) Supervise
Objectives of First Aid
1) Save Life
2) Prevent Further Injury
3) Limit Infection
Methods to Control Bleeding
1) Direct Pressure
2) Pressure Points
3) Tourniquet
11 Pressure Points
1) Jaw
2) Neck
3) Collarbone
4) Wrist
5) Inner-Upper Arm
6) Inner Elbow
7) Upper Thigh
8) Ankle
9) Knee
10) Groin
11) Temple
Symptoms of Shock
1) Dilated Pupils
2) Pale/Clammy Skin
3) Shallow Breaths
Battle of Midway
- Turning point of war
- Cryptology role: broke Japanese code (PURPLE CODE)
Coral Sea
First air to air only battle (ships never saw each other)
On the Roof Gang
Enlisted Navy personnel who laid cornerstone for Navy cryptology
First Navy Ship Named After an Enlisted Man
USS Osmand Ingram (DD 255)
Created by the National Security Act
- National Security Council (NSC)
- Central Intelligence Agency (CIA)
Sailors Creed
Written by the Blue Ribbon Recruit Training Panel in 1993
2nd Fleet
Atlantic; Norfolk
4th Fleet
South/Central America & Caribbean; Mayport
6th Fleet
Mediterranean; Gaeta, Italy
7th Fleet
West Pacific/Indian Ocean; Yokosuka, JP
Navy Mission
Train, maintain, and equip combat readiness capable personnel when in war and maintain freedom of the seas
NCTAMS
Naval Computer Telecommunication Area Master Stations

-Two Locations: Norfolk and Hawaii
NGA
National Geospatial Intelligence Agency
OPREP-3 Reports
- Navy SITREP
- Navy Blue
- Pinnacle
Chain of Command:

- Commander, 10th Fleet
- Commander, NETWARCOM
- Commander, NAVCYBERFORCOM
- Commander, FLTCYBERCOM
- Commander, USCYBERCOM
- FLTCYBERCOM, Force Master Chief
- FLTCYBERCOM, Fleet Master Chief
- DIRNSA
- RADM Rodgers
- Captain Chandler
- VADM Herbert
- RADM Rodgers
- General Alexander
- Master Chief Powers
- Master Chief Welch
- General Alexander
Brilliant on the Basics

"MICROS"
- Mentorship
- Comman Indoctrination
- CDBs
- Sailor Recognition
- Ombudsman support
- Sponsorship
DPAS
Defense Property Accountability System

- Track lifecycle of property from receipt to disposition
MOV
Material Obligation Validation

- Contains:
- Julian Date
- Nomenclature
- Balance (running)
DLR
Depot Level Repair

- Manage high cost items that cannot be repaired or reused

- Two Types: turn-in and remain in place
CASREP
Casualty Report

- Equipment malfunction or deficiency cannot be corrected within 48 hours

- Training commands cannot perform

- 4 Categories
NSN
National Stock Number

- 13 digits used to identify an item in the system
APL
Allowance Parts List

- List of equipment on board
OPTAR
Operating Target

- Money required for unit to perform mission; "operating budget or checkbook"
When to Change Safe Combos
- First Install
- Compromise
- Personnel Transfers
SF 700
SF 701
SF 702
SF 703
- Security Container Envelope
- Activity Security Checklist
- Security Container Checklist
- TS Cover Sheet
Directives that Govern Personnel Security
- ICD 704
- ICPD 704.1 - 704.5
- SECNAVINST 5510.30
- DOD 5105.21 - M - 1
Emergency Destruction Priorities
Priority 1: Crypto/COMSEC/EKMS

Priority 2: SCI Codeword, Targeting Materials/Projects

Priority 3: Less sensitive administrative and collateral
SAER
Security Access Eligibility Report

- Reasons for SAER: drugs, debt, compromise, arrest, DUI, mental health
.mil Email Address
- DOD has exclusive use of this domain, restricted to use by US entities
Agency that Conducts Clearance Interviews
OPM (Office of Personnel Management)
Agency Responsible for Adjudicating
DONCAF (Department of the Navy Central Adjudication Facility)
Can the CO Administratively Suspend a Clearance/How Long?
Yes/90 Days
Manual that Governs SCI Facilities (SCIF)
- ICD 705
IA
Information Assurance

- Basic security practices all users, operators, managers follow to keep information systems in security standards
Five Attributes of IA

"CIANA"
1) Confidentiality
2) Integrity
3) Availability
4) Non-repudiation
5) Authentication
Certification
Evaluation of technical and non-technical security features of a system
Accreditation
Decision to operate in a special environment; Designated Approving Authority (DAA)'s acceptance of responsibility
Requirements to be an Information Assurance Manage (IAM)
- US citizen
- Assigned in writing
- Not a collateral
- Attend DAA school
- Cleared to same level as system
Vulnerability vs. Threat
- Vulnerability is actual threat

- Threat is how bad the vulnerability will affect the system.

"Cupcake vs. Fat Boy"
SSP
System Security Plan

- Aid in certification process; required settings and postures to be maintained listed
Malicious Mobile Codes
- Virus
- Worm
- Trojan Horse
- Rootkit
- Spyware
- Mobile code
NIPRnet
SIPRnet
JWICS
NMCI
NSAnet
- Nonsecure Internet Protocol Router network (unclassified)
- Secret Internet Protocol Router network (secret)
- Joint Worldwide Intelligence Communications System
- Navy and Marine Corps Internet (unclassified/secret)
- NSA infrastructure (TS/SCI)
PKI
Public Key Infrastructure

- Used for User ID
LAN
MAN
WAN
- Local Area Network
- Metropolitan Area Network
- Wide Area Network
7 Layers of OSI Model

"People Don't Need To See Paula Abdul"
1) Physical
2) Datalink
3) Network
4) Transport
5) Session
6) Presentation
7) Application
Router
A physical device that joins multiple wired or wireless networks
Dictionary Attack
Cycles through known words in the dictionary to crack passwords
Social Engineering
Practice of tricking a user into giving sensitive information
Phishing
Attack that uses email or a malicious website to get personal information
Hub
Common connection point for devices in a network
Message Precedence
R: Routine
P: Priority
O: Immediate
Z: Flash
INMARSAT
Commercial satellite system used for voice and data IP communications from ships at sea
Gingerbread
Codeword used when an intruder is on the net
Beadwindow
Said when EEFI has been disclosed on a circuit
River City
Communication restriction tool used to prevent disclosure of mission information

River City 1: Most Restricted; CO, XO, key personnel
River City 2: Dept Heads
River City 3: Chiefs and above
River City 4: Normal Access
MIJI
Meaconing, Intrusion, Jamming, and Interference
PLA
Plain Language Address
- command short title

Example is NIOC Hawaii
COMSPOT
Communications Spot Report

- GENSER message that reports communications outages; sent at immediate precedence after 30 minutes of outage
EKMS
COMSEC handling guides
TEMPEST
Used to analyze and measure unwanted signal leakage due to equipment radiation
EMCON
Emissions Control

- Control emissions from ship to change the signature to who is looking, tracking, or listening
5 Core Capabilities of Intelligence Operations
1) CNO (Computer Network Operations)
2) OPSEC (Operations Security)
3) MISO (Military Intelligence Surveillance Operations)
4) MILDEC (Military Deception)
5) EW (Electronic Warfare)
FES
Fleet Electronic Support

- They do the installation, removal, maintenance, and repair of all crypto for DIRSUP.
CCOP
Cryptologic Carry On Plan

- Specialized equipment for fleet based cryptologic requirements.
MOC
Maritime Operations Center
USC Title Outlines the Role of War and National Defense in the US
USC Title 50
Red Team
Unannounced assessments of security and readiness by an unfamiliar team of operators
Blue Team
Assist in protection of target assets and conduct training to local personnel
NITES
Navy Integrated Environment Support System
METOC
Meteorology and Oceanography Center

- Forecast database tailored to a specific platform
FIve Step Planning for OPSEC

"ICCCA"
1) Identify Critical Information
2) Conduct Threat Analysis
3) Conduct Vulnerability Analysis
4) Conduct Risk Assessment
5) Apply Countermeasures
Web Risk Assessment (WRA)
Conducted on DON websites to report OPSEC vulnerabilities
Who is on Command OPSEC Team?
- CO
- XO
- Dept Head
- OPSEC Officer
- Dept/Div Reps
Goal of Intelligence
Provide commanders the intelligence support needed to win in combat
Six Steps of Intelligence

"PCPADE"
1) Planning and Direction
2) Collection
3) Processing and Exploitation
4) Analysis and Production
5) Dissemination and Integration
6) Evaluation and Feedback
Three Categories of Intelligence
1) Tactical
2) Operational
3) Strategic
Organization Responsible for HUMINT
CIA
Organization Responsible for SIGINT
NSA
Examples of Intelligence Briefings
- Deployment briefs
- Debriefings
- Port brief
Continuous Wave (CW)
Wave with constant amplitude and frequency
ELF
SLF
ULF
VLF
LF
MF
HF
VHF
UHF
SHF
EHF
3 - 30HZ
30 - 300Hz
300Hz - 3kHz
3 - 30kHz
30 - 300kHz
300kHz - 3MHz
3 - 30MHz
30 - 300MHz *Bridge to Bridge*
300MHz - 3GHz
3 - 30GHz
30 - 300GHz
Direction Finding
Procedure for obtaining lines of bearings (LOBs)
Propagation
Ability to transmit freely through space
Pulse Duration
Duration between leading and trailing edge of a pulse
PRI
Pulse Repetition Interval

- Duration of time from the leading edge of one pulse to the leading edge of another pulse
Frequency
Number of cycles that occur in one second
Characteristics of a Modulated Wave
Carrier wave impressed data is in upper and lower side bands
OPELINT vs. TECHELINT
- OPELINT is reporting on emitter activity, disposition and movement; provides COP (Common Operational Picture)

- TECHELINT is manual analysis of characteristics and parameters; in depth pulse analysis
Primary Difference between Air Search and Surface Search
- 2D v. 3D Air is usually 3D (bearing, range, altitude)

- Surface is 2D (bearing and range)
Different Modulation Types
- Phase
- Frequency
- Amplitude
- Pulse
Ducting
Temperature and moisture in the atmosphere that allows greater bending and can extend the radio wave
Multiplexing
Simultaneous transmission of two or more signals over a common carrier wave
Tornado
Wind storm over land with funnel shaped cloud that extends toward the ground
Hurricane
Tropical cyclone with heavy rain and winds 73-136 knots
Tropical Storm
Heavy winds and rain 34-63 knots
Tropical Storm and Cyclone Conditions (TYCON)
Condition I: 12 hours
Condition II: 24 hours
Conditon III: 48 hours
Condition IV: 72 hours
Condition V: More than 72 hours
Wind Chill
Air temperature felt on exposed skin due to wind
Sky Condition
The appearance of the sky
Restricted Visibility
Limited visibility due to mist, fog, rain, and snow
Precipitation
All forms of water that falls from clouds and reach ground
Fog
Collection of ice crystals suspended in air near the surface of the earth
Atmospheric Pressure
Pressure exerted by the atmosphere
Sunrise
Daily appearance of the sun over east horizon because of the earth's rotation
Sunset
Daily disappearance of the sun below west horizon
3 Layers of Atmosphere
1) Troposphere
2) Stratosphere
3) Ionosphere
2 Major Launch Facilities
1) Kennedy Space Center, Florida
2) Vandenberg Air Force Base, California
Apogee vs. Perigee
Apogee - point of orbit farthest from earth

Perigee - point of orbit closest to earth
Types of Orbit
Low Earth Orbit (LEO): 150 - 800 miles above earth

High Elliptical Orbit (HEO)

Geosynchronous (GEO)
GPS
Global Positioning System

- Space based radio positioning systems that provides 24hr 3D positioning, velocity, and time information
Defense Satellite Communications System (DSCS)
Provides worldwide, jam resistant, secure voice for C2, crisis management, and Intel data transfer service
Length of Solar Cycle
11 Years
Van Allen Belts
Radiation belts are hazardous to satellites around earth
Category Four Languages
- Chinese
- Arabic
- Korean
- Japanese
DD Form 1847-1
SCI Non-disclosure Agreement
LOI
Letter of Intent - deny/revoke eligibility

- 15 days to respond
- CO can extend 45 days
LOD
Letter of Denial - unfavorable eligibility made

- 30 days to respond
- CO can extend 15 days
PSAB
Personnel Security Appeals Board

- Has final authority on appeals for unfavorable determinations
Operational Control (OPCON) of FLTCYBERCOM
USCYBERCOM
Administrative Control (ADCON) of FLTCYBERCOM
CNO
CSG (3 Categories)
Cryptologic Service Group

1) Permanent
2) Service Component
3) Expeditionary
NSL
RTL
BDA
- No Strike List
- Restricted Target List
- Battle Damage Assessment
MILDEC vs. MISO (PSYOP)
- MILDEC uses deliberate deception methods to mislead.

- MISO uses selected truths to influence adversaries.
3 Types of MILDEC
1) Physical: inflatables
2) Technical: deceptive communications
3) Administrative: pictures
TACSIT (3 Levels)
Tactical Situation

TACSIT 1: Enemy knows exact location of strike group

TACSIT 2: Enemy knows general location of strike group

TACSIT 3: Enemy does not know location of strike group
EP-3E
EA-6B Prowler
E-2 Hawkeye
EA-18G Growler
- Signals Intel Recon Aircraft
- Electronic Warfare (EW) jamming
- Early Warning
- Electronic Attack (EA)
Ships with temporary SSES
- DDG Flight (FLT) I
- LPD
4 Conditions of EMCON
A - radio silence
B - hide from satellites
C - reduce ability of enemy to target
D - essential equipment authorized
Who can impose and/or break EMCON?
IWC (Information Warfare Commander)
JCMA
Joint COMSEC Monitoring Agency
How often is IO training required?
Annually
Define a US person.
- US Citizen
- Alien lawfully admitted for permanent residence
- A corporation that is incorporated in the US
Publication that governs collection on US persons.
SP0018
Manual that governs intelligence oversight reporting and training.
SECNAVINST 3320.2E
Publication that governs collection on host nations.
SP0009
Publication that governs Intelligence Oversight.
E. O. 12333
NSRP (3 Types)
National SIGINT Requirements Process

1) Research
2) Limited Duration
3) Standing
NSRP (Time Criticality of INs)
- Time Critical: 3 days or less

- Time Sensitive: 4 - 29 days

- Routine: more than 30 days
RASIN Manual
Manual used by USSS for COMINT signal classification
SURREY
NSA database for collection requirements that allows SIGINT analysts and collection management authorities to originate, retrieve, and track collection
RADAR
Radio Detection and Ranging
Natural Horizon v. Radio Horizon
- Natural Horizon is line of sight
- Radio Horizon is approximately 1/3 greater because of space wave being slightly reflected from ground to receiving antenna
Range
Length of a straight line from the radar to the target
Doppler Effect
Apparent change in frequency and pitch when a sound source moves closer or farther away
Echo
Energy reflected from the target
Diffraction
Bending of a wave around an object
Attenuation
Loss of intensity through a medium
Absorption
Energy is absorbed by matter
3 Characteristics of Sound
1) Pitch
2) Intensity
3) Clarity
Reporting Criteria Examples for CRITIC
- Intel on imminent attack
- Threat to US forces or attack on any US asset
- POTUS is kidnapped
- Hostile acts/terrorist acts
- Political disruption
- Crisis (Hurricanes, Tsunami)
TACREP vs. KL
- TACREP: does not have the COMTECH line like a KL
IGRAM
Use of multimedia to expand information of original SIGINT report
STRUM
Standard Technical Report Using Modules
GCCS-M
Global Command and Control System Maritime

-Displays COP for blue and red forces
GALELITE
Generic Area Limitation Environment

- Provides COP and operational planning in a single picture...near real time
VINTAGE HARVEST
World wide web based signals database
WRANGLER
ELINT database
Date that Navy was established
13 October 1775
Year that National Security Act was signed
1947
Year that Central Security Service was established
1972