Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
126 Cards in this Set
- Front
- Back
What is the goal of ORM?
|
Is not to completely eliminate risk, but to manage the risk so that the mission can be accomplished effectively and with minimal negative impact.
|
|
What are the 5 steps of ORM?
|
Identify Hazards
Assess the Hazards Make Risk Decisions Implement Controls Supervise |
|
What is the Safety and Mishap Reporting Instruction?
|
OPNAVINST 5102.1D
|
|
What are the 3 Mishap Classifications?
|
Class A
Class B Class C |
|
What is a Class A mishap?
|
Total cost damages to DOD/non DOD property of 1 million or more; injury/illness result in fatality or perm disability
|
|
What is a Class B mishap?
|
The resulting total cost of damages to DoD or non-DoD property is $200,000 or more, but less than $1 million. An injury and/or occupational illness result in permanent partial disability or when three or more personnel are hospitalized for inpatient care (beyond observation) as a result of a single mishap.
|
|
What is a Class C mishap?
|
The resulting total cost of damages to DoD or non-DoD property is $20,000 or more, but less than $200,000; a nonfatal injury that causes any loss of time from work beyond the day or shift on which it occurred; or a nonfatal occupational illness that causes loss of time from work or disability at any time.
|
|
Define Hazard Severity
|
An assessment of the worst credible consequence that can occur as a result of a hazard.
|
|
Define Severity
|
Potential degree of injury, illness, property damage, loss of assets (time, money, personnel) or effect on mission.
|
|
Hazard Severity Category 1
|
Loss of the ability to accomplish the mission. Death or permanent total disability. Loss of a mission-critical system or equipment. Major facility damage. Severe environmental damage. Mission-critical security failure. Unacceptable collateral damage.
|
|
Hazard Severity Category 2
|
Significant degraded mission capability or unit readiness. Permanent partial disability or severe injury to illness. Extensive damage to equipment or systems. Significant damage to property or the environment. Security failure. Significant collateral damage.
|
|
Hazard Severity Category 3
|
Degraded mission capability or unit readiness. Minor damage to equipment, systems, property, or the environment. Minor injury or illness.
|
|
How many Mishap Probability Categories?
|
Four
Cat A Cat B Cat C Cat D |
|
Mishap Probability Category A
|
Likely to occur, immediately or within a short period of time. Expected to occur frequently to an individual item or person; or continuously over a service life for an inventory of items or group.
|
|
Mishap Probability Category B
|
Probably will occur in time. Expected to occur several times to an individual item or person; or frequently over a service life for an inventory of items or group.
|
|
Mishap Probability Category C
|
May occur in time. Expected to occur several times to an individual item or person; or frequently over a service life for an inventory of items or group.
|
|
Mishap Probability Category D
|
Unlikely to occur, but not impossible
|
|
What is a RAC?
|
Risk Assessment Code
|
|
What are the five Risk Assessment Codes?
|
1. Critical
2. Serious 3. Moderate 4. Minor 5. Negligible |
|
What are the 3 objectives of first aid?
|
Save life
Prevent further injury Limit infection |
|
What are the three methods of controlling bleeding?
|
Direct pressure
Pressure points Constricting band |
|
What are the 10 pressure points?
|
1. Front top of ear
2. Jawline 3. Base of neck/carotid 4. Below bicep 5. Inside of elbow 6. Wrist 7. Pelvic area 8. Inner thigh 9. Behind knee 10. Ankle area |
|
What are the 2 types of frostbite?
|
Deep
Superficial |
|
What are the 6 areas that comprise Naval Doctrine?
|
Command & Control
Operations Warfare Logistics Intelligence Planning |
|
What are the 7 principles of Naval Logistics?
|
Responsiveness
Economy Flexibility Simplicity Attainability Sustainability Survivability |
|
What was the first Navy ship named after an enlisted man?
|
USS Osmund Ingram (DD 255)
Launched in February 1919 First enlisted man killed in action during WWI |
|
What were the 3 classes of naval vessels at the inception of U.S. Navy?
|
Ships of the Line: (largest) 64-100 guns
Frigates: (medium) 28-44 guns Sloops of War: (smallest) 16-20 guns |
|
Battle of Coral Sea
|
7-8 May 1942
Breaking of the Japanese Navy code First Carrier to Carrier Battle USS Lexington was lost |
|
Voyage of the Great White Fleet
|
16 Dec 1907
Included 4 battleship divisions from the Atlantic Fleet Demonstration of power and peace, all vessels were painted white |
|
Battle of Normandy
|
6 June 1944
Largest amphibious operation in history, minesweeping, shore-bombardment and amphibious ops Enabled D-Day |
|
Battle of Midway
|
3-5 June 1942
Turning point of the Pac War. Adm Nimitz put the last 3 carriers out of recon range and had them attack as the Japanese attacked Midway (US sent a fake distress signal to lure the Japanese) US sank all 4 carriers and lost the USS Yorktown. |
|
Guadalcanal
|
13-15 Nov 1942
Japan lost 2 cruisers and 6 destroyers and the US lost the Juneau (Sullivan brothers all lost). Protected Australia. |
|
Battle of Leyte Gulf
|
23 Oct 1944
Japanese sent a force to attack the US fleet and lost, and the main source of supply from the south was cut. |
|
The On-the-Roof Gang
|
Shack on top of the Navy bldg in DC. 176 Sailors and Marines trained in Radio Ops. Foundation of the CT community
|
|
The Purple Code
|
Code used for communications between Germany and Japan, named so for the color of binder the decrytion key was kept in.
|
|
Information Dominance and The Battle of Midway
|
Breaking of the Japanese Naval code JN-25 which gave us dates and a target Japan was heading to allowing us to keep our carriers out of recon range
|
|
The Attack on the USS LIBERTY
|
8 June 1967
Israel mistook for enemy ship, attacked with no indications, lost 34 and had 174 injuries. Led to a stricter policy for onboard SIGINT files and data and emergency destruction issues. |
|
The Capture of the USS PUEBLO
|
23 Jan 1968
U.S. Collection vessel seized by N. Korea while in international waters Crew of CT types held captive for almost a year Still located in N. Korea, used as a tourist attraction |
|
Information Dominance and the D-Day Landing
|
6 June 1944
1,200 Navy ships and 4,100 landing craft used Tricked the Germans into thinking we were going to attack later and at different locations then we did |
|
Landing at Inchon
|
General MacArthur’s push to reroute N.Korean army during Korean War, plan required long approaches through shallow channels, poor beaches and tides that restricted ops to a few hours.
|
|
Hainan Island EP-3 incident
|
1 Apr 2001
Force to land, crew held for 10 days and chinese had free reign of aircraft. Crew completed emergency destruction. |
|
Bletchley Park
|
Britain's Cryptology Center
Created BOMBE, electromechanical device used to help decipher German Enigma Machine. |
|
The Attack on the USS STARK
|
17 March 1987
Attacked by Iraqi Mirage, they fired 2 Exocet missles that were never detected. Breakdown of EW, 37 Sailors died. |
|
EC-121 Shoot down
|
15 April 1969
N. Korean MiG fired on double crew. EC-121 retired and replaced with EP-3 and Navy would adopt a higher degree of protection for Recon aircraft. |
|
Discuss the National Security Act of 1947
|
Established the National Security Counsel (NSC), the Central Intelligence Agency (CIA), Merged the DoN and DoW into one DoD under SecDef and established a clear line between domestic and foreign intel.
|
|
State when and why the current Navy Core Values were developed?
|
1992 by ADM Kelso, means of changing the central ethos that guides the conduct of Sailors in the Navy.
|
|
Explain the impact of the John Walker espionage case
|
1968 Walker was a retired Navy CWO who spied for Russia. arrest started a widespread investigation of security procedures within the US IC. Led to the first Director of Counterintelligence on the NSC staff and new TPI requirements
|
|
What is the oldest intelligence organization in the U.S. Navy?
|
March 1882 Office of Intelligence, established by General Order 292 from SecNav William Hunt
|
|
Who was the first CIO/DNI?
|
LT Theodaurus B.M. Mason
|
|
What are the two departments that were combined to form ONI?
|
Department Library and the Office of Intelligence
|
|
Describe the purpose of the EDVR
|
Enlisted Distribution Verification Report
Includes: prospective gains, prospective losses, personnel onboard for temp duty, in a deserter status or admin |
|
Describe the 6 programs of Brilliant on the Basics
|
Sponsor
Indoctrination Ombudsman Mentorship Career Development Boards Sailor recognition |
|
What are the 4 categories of CASREPs
|
Initial
Update Correct Cancel |
|
DD Form 1348-6
|
Single line item requisition
|
|
DD Form 200
|
Report of survey, loss of an asset
|
|
NAVCOMPT 2276
|
Contractual Procurement
|
|
NAVSUP 1250-2
|
Non-NSN requisition
|
|
DD Form 448
|
MIPR (Military Interdependent Purchase Request)
|
|
SF 44
|
Purchase order invoice voucher
|
|
DD Form 1155
|
Delivery Task/Order
|
|
SF 1449
|
Solicitation/Contract Form
|
|
SF 30
|
Modification of contract
|
|
SF 364
|
Report of Discrepancy
|
|
SF 368
|
PQDR (Product Quality Deficiency Report)
|
|
What is CHRIMP?
|
Consolidated Hazardous Material Reutilization & Inventory Management Program
|
|
SF 700
|
Security Container Information
|
|
SF 701
|
Activity Security Checklist
|
|
SF 702
|
Security Container Check Sheet
|
|
SF 703
|
Top Secret Cover Sheet
|
|
SF 153
|
COMSEC Material Report
|
|
SF 312
|
Classified Information Non-Disclosure Agreement
|
|
When should safe combinations be changed?
|
-When combination lock is first installed
-Combination has been compromised -At other times when considered necessary by the SSO |
|
What is the difference between a security violation and (PDS) practice dangerous to security?
|
Security violation is a compromise of classified information. A PDS is failure to comply with security regulations.
|
|
What are the 5 Attributes of IA?
|
Confidentiality
Integrity Availability Non-repudiation Authentication |
|
Describe Confidentiality
|
Information is not disclosed
|
|
Describe Integrity
|
Information is not modified
|
|
Describe Availability
|
Timely & reliable access to data & information systems
|
|
Describe Non-repudiation
|
The sender of data is provided with proof of delivery & the recipient is provided with proof of sender's identity
|
|
Describe Authentication
|
Validation of e-mail messages & information system access requests
|
|
Describe the following: IAVA, IAVB, IAVT
|
Information Assurance Vulnerability Alerts
Information Assurance Vulnerability Bulletin Information Assurance Vulnerability Technical Advisories |
|
What is the difference between a threat & a vulnerability?
|
Threat - potential to adversely impact information systems
Vulnerability - weakness in information systems |
|
What is Configuration Management?
|
Controlling changes to system’s hardware & software, ensuring changes will not decrease data security
|
|
Describe the OSI Model
|
7. Application
6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical |
|
Describe the TCP/IP Model
|
Application
Transport Internet Network |
|
What is the difference between IPv4 and IPv6?
|
IPV4 - 32 bits
IPV6 - 128 Bits |
|
What is the purpose of DNS?
|
Domain Name Server
Port 53 Translates IP addresses into a domain name |
|
What is NOVA?
|
Shore-based message handling system
Processes GENSER messages |
|
What is NREMS?
|
Navy Regional Enterprise Messaging System
|
|
What is EEFI?
|
Essential Elements of Friendly Information
|
|
Describe the EFFI list 01-10
|
01 - Position
02 - Capabilities 03 - Operation 04 - Electronic Warfare 05 - Personnel 06 - COMSEC 07 - Wrong CKT 08-10 - NATO Assigned |
|
What is the difference between GINGERBREAD and BEADWINDOW?
|
GINGERBREAD is called for an intruder on the net, BEADWINDOW is called for disclosing an EEFI on an unsecure net
|
|
What is Meaconing?
|
The intentional transmission of signals designed to deceive users
|
|
Describe Intrusion
|
The deliberate insertion of false information into communications circuits
|
|
What is Jamming?
|
The deliberate radiation, re-radiation, or reflection of electromagnetic energy to disrupt use of electronic devices
|
|
Define the following message precedence:
R, P, O, Z, W |
R: Routine 6 hours
P: Priority 3 hours O: Immediate 30 minutes Z: Flash with in 10 muinutes W: FLASH OVERRIDE |
|
Describe the following warfare areas: ASW, IW, AW, STW, NSW
|
ASW: Anti-Submarine Warfare
IW: Information Warfare AW: Air Warfare STW: Strike Warfare NSW: Naval Special Warfare |
|
Name the 5 IO Core Capabilities
|
PSYOP
MILDEC OPSEC EW CNO |
|
What is the difference between USC Title 10 and USC Title 50?
|
USC Title 10 - outlines the role of armed forces
USC Title 50 - outlines the role of War & National Defense |
|
CCOP
|
Cryptologic Carry On Program
Augmenting SSES capabilities & providing capabilities where no SSES exists |
|
What is the OPSEC 5 step planning process?
|
1. Identify Critical Info
2. Analyze THREAT 3. Analyze VULNERABILITIES 4. Assess RISK 5. Apply COUNTERMEASURES |
|
What is CI?
|
Critical Information
Position, Capabilities, Operations, Personnel |
|
What are the 3 categories of Intelligence?
|
Strategic
Operational Tactical |
|
What are the 5 steps of the Intelligence cycle?
|
1. Planning and Direction
2. Collection 3. Processing 4. Production 5. Dissemination |
|
What is intelligence oversight?
|
Intelligence Oversight
|
|
What is the difference between PIR and CCIR?
|
PIR: Priority Intelligence Requirement
CCIR: Commander Critical Information Requirement |
|
Define US citizen and a US person with regards to US Intelligence Oversight
|
-Born in USA,
-Permanent resident alien (Greencard holder), -Corporation incorporated in USA, but not controlled by foreign government |
|
Give 3 examples of Intelligence briefs
|
Current Intel
Historic Intel Country files Ops Intel Port Intel |
|
What is frequency?
|
The number of cycles of a wave that are completed in a unit of time (Hz)
|
|
What is ducting?
|
Trapping of an RF wave between mediums
|
|
What is propagation?
|
When a radio wave travels through space from transmitter to receiver
|
|
What are the 3 types of wave propagation?
|
Reflection
Diffraction Refraction |
|
What are the 5 modulation types?
|
USB
LSB CW AM FM |
|
How does Naval Oceanography support the Information Dominance Mission?
|
Predicts weather and ocean conditions thereby assisting in the foreseeable intelligence collection, capabilities of the adversary
|
|
What are the various types of METOC products available through the Naval Oceanography Portal (NOP)?
|
USNO - Naval Observatory
JTWC - Joint Typhoon Warning NOOC - Oceanography Operations Center FNMOC - Fleet Numerical Meteorological Oceanography Center NAVO - Oceanography Office |
|
What is the purpose of the Geostationary Operational Environmental Satellite (GOES)?
|
Provides warning of thunderstorms, winter storms, flash floods and other severe weather
|
|
What is the purpose of Polar Operational Environmental Satellite (POES)?
|
Collect global data on a daily basis for a variety of land, ocean and atmoshperic applications via AVHRR
|
|
What is the relationship of METOC to GEOSPATIAL Intelligence?
|
METOC is intelligence layer of GEOINT information base. Critical to joint ops during planning and ongoing operation
|
|
What are the impacts of environmental conditions on
anti-submarine warfare operations? |
Variations in temperature, salinity and pressure affect travel and communications
|
|
What are the impacts of environmental conditions on
Naval Special Warfare operations? |
Terrain restrictions, time of day, adverse weather
|
|
What are the impacts of mpacts of environmental conditions on Mine Warfare operations?
|
Surface winds, wave action, visibility, daylight hours
|
|
What are the weather conditions of a Small Craft Advisory?
|
Winds 33 knots or less
|
|
What are the weather conditions of a Gale warning?
|
Winds 34-47 kts
|
|
Define the following Tropical Cyclone Conditions of Readiness:
COR V COR IV COR III COR II COR I |
COR V: Stormwatch; not anticipated. 96 hour window
COR IV: Possible threat within 72 hours COR III: Possible within 48 hours COR II: Anticipated within 24 hours COR I: ccurring or within 12 hours |
|
Describe apogee
|
An orbit's farthest point from earth
|
|
Describe perigee
|
An orbit's closest point to earth
|
|
Name the 4 Space Mission Areas
|
1. Space Force Enhancement
2. Space Support 3. Space Control 4. Space Force Application |