• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/126

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

126 Cards in this Set

  • Front
  • Back
What is the goal of ORM?
Is not to completely eliminate risk, but to manage the risk so that the mission can be accomplished effectively and with minimal negative impact.
What are the 5 steps of ORM?
Identify Hazards
Assess the Hazards
Make Risk Decisions
Implement Controls
Supervise
What is the Safety and Mishap Reporting Instruction?
OPNAVINST 5102.1D
What are the 3 Mishap Classifications?
Class A
Class B
Class C
What is a Class A mishap?
Total cost damages to DOD/non DOD property of 1 million or more; injury/illness result in fatality or perm disability
What is a Class B mishap?
The resulting total cost of damages to DoD or non-DoD property is $200,000 or more, but less than $1 million. An injury and/or occupational illness result in permanent partial disability or when three or more personnel are hospitalized for inpatient care (beyond observation) as a result of a single mishap.
What is a Class C mishap?
The resulting total cost of damages to DoD or non-DoD property is $20,000 or more, but less than $200,000; a nonfatal injury that causes any loss of time from work beyond the day or shift on which it occurred; or a nonfatal occupational illness that causes loss of time from work or disability at any time.
Define Hazard Severity
An assessment of the worst credible consequence that can occur as a result of a hazard.
Define Severity
Potential degree of injury, illness, property damage, loss of assets (time, money, personnel) or effect on mission.
Hazard Severity Category 1
Loss of the ability to accomplish the mission. Death or permanent total disability. Loss of a mission-critical system or equipment. Major facility damage. Severe environmental damage. Mission-critical security failure. Unacceptable collateral damage.
Hazard Severity Category 2
Significant degraded mission capability or unit readiness. Permanent partial disability or severe injury to illness. Extensive damage to equipment or systems. Significant damage to property or the environment. Security failure. Significant collateral damage.
Hazard Severity Category 3
Degraded mission capability or unit readiness. Minor damage to equipment, systems, property, or the environment. Minor injury or illness.
How many Mishap Probability Categories?
Four
Cat A
Cat B
Cat C
Cat D
Mishap Probability Category A
Likely to occur, immediately or within a short period of time. Expected to occur frequently to an individual item or person; or continuously over a service life for an inventory of items or group.
Mishap Probability Category B
Probably will occur in time. Expected to occur several times to an individual item or person; or frequently over a service life for an inventory of items or group.
Mishap Probability Category C
May occur in time. Expected to occur several times to an individual item or person; or frequently over a service life for an inventory of items or group.
Mishap Probability Category D
Unlikely to occur, but not impossible
What is a RAC?
Risk Assessment Code
What are the five Risk Assessment Codes?
1. Critical
2. Serious
3. Moderate
4. Minor
5. Negligible
What are the 3 objectives of first aid?
Save life
Prevent further injury
Limit infection
What are the three methods of controlling bleeding?
Direct pressure
Pressure points
Constricting band
What are the 10 pressure points?
1. Front top of ear
2. Jawline
3. Base of neck/carotid
4. Below bicep
5. Inside of elbow
6. Wrist
7. Pelvic area
8. Inner thigh
9. Behind knee
10. Ankle area
What are the 2 types of frostbite?
Deep
Superficial
What are the 6 areas that comprise Naval Doctrine?
Command & Control
Operations
Warfare
Logistics
Intelligence
Planning
What are the 7 principles of Naval Logistics?
Responsiveness
Economy
Flexibility
Simplicity
Attainability
Sustainability
Survivability
What was the first Navy ship named after an enlisted man?
USS Osmund Ingram (DD 255)

Launched in February 1919

First enlisted man killed in action during WWI
What were the 3 classes of naval vessels at the inception of U.S. Navy?
Ships of the Line: (largest) 64-100 guns

Frigates: (medium) 28-44 guns

Sloops of War: (smallest) 16-20 guns
Battle of Coral Sea
7-8 May 1942
Breaking of the Japanese Navy code
First Carrier to Carrier Battle
USS Lexington was lost
Voyage of the Great White Fleet
16 Dec 1907
Included 4 battleship divisions from the Atlantic Fleet
Demonstration of power and peace, all vessels were painted white
Battle of Normandy
6 June 1944
Largest amphibious operation in history, minesweeping, shore-bombardment and amphibious ops
Enabled D-Day
Battle of Midway
3-5 June 1942
Turning point of the Pac War. Adm Nimitz put the last 3 carriers out of recon range and had them attack as the Japanese attacked Midway (US sent a fake distress signal to lure the Japanese)
US sank all 4 carriers and lost the USS Yorktown.
Guadalcanal
13-15 Nov 1942
Japan lost 2 cruisers and 6 destroyers and the US lost the Juneau (Sullivan brothers all lost). Protected Australia.
Battle of Leyte Gulf
23 Oct 1944
Japanese sent a force to attack the US fleet and lost, and the main source of supply from the south was cut.
The On-the-Roof Gang
Shack on top of the Navy bldg in DC. 176 Sailors and Marines trained in Radio Ops. Foundation of the CT community
The Purple Code
Code used for communications between Germany and Japan, named so for the color of binder the decrytion key was kept in.
Information Dominance and The Battle of Midway
Breaking of the Japanese Naval code JN-25 which gave us dates and a target Japan was heading to allowing us to keep our carriers out of recon range
The Attack on the USS LIBERTY
8 June 1967
Israel mistook for enemy ship, attacked with no indications, lost 34 and had 174 injuries. Led to a stricter policy for onboard SIGINT files and data and emergency destruction issues.
The Capture of the USS PUEBLO
23 Jan 1968
U.S. Collection vessel seized by N. Korea while in international waters
Crew of CT types held captive for almost a year
Still located in N. Korea, used as a tourist attraction
Information Dominance and the D-Day Landing
6 June 1944
1,200 Navy ships and 4,100 landing craft used
Tricked the Germans into thinking we were going to attack later and at different locations then we did
Landing at Inchon
General MacArthur’s push to reroute N.Korean army during Korean War, plan required long approaches through shallow channels, poor beaches and tides that restricted ops to a few hours.
Hainan Island EP-3 incident
1 Apr 2001
Force to land, crew held for 10 days and chinese had free reign of aircraft. Crew completed emergency destruction.
Bletchley Park
Britain's Cryptology Center
Created BOMBE, electromechanical device used to help decipher German Enigma Machine.
The Attack on the USS STARK
17 March 1987
Attacked by Iraqi Mirage, they fired 2 Exocet missles that were never detected. Breakdown of EW, 37 Sailors died.
EC-121 Shoot down
15 April 1969
N. Korean MiG fired on double crew. EC-121 retired and replaced with EP-3 and Navy would adopt a higher degree of protection for Recon aircraft.
Discuss the National Security Act of 1947
Established the National Security Counsel (NSC), the Central Intelligence Agency (CIA), Merged the DoN and DoW into one DoD under SecDef and established a clear line between domestic and foreign intel.
State when and why the current Navy Core Values were developed?
1992 by ADM Kelso, means of changing the central ethos that guides the conduct of Sailors in the Navy.
Explain the impact of the John Walker espionage case
1968 Walker was a retired Navy CWO who spied for Russia. arrest started a widespread investigation of security procedures within the US IC. Led to the first Director of Counterintelligence on the NSC staff and new TPI requirements
What is the oldest intelligence organization in the U.S. Navy?
March 1882 Office of Intelligence, established by General Order 292 from SecNav William Hunt
Who was the first CIO/DNI?
LT Theodaurus B.M. Mason
What are the two departments that were combined to form ONI?
Department Library and the Office of Intelligence
Describe the purpose of the EDVR
Enlisted Distribution Verification Report

Includes: prospective gains, prospective losses, personnel onboard for temp duty, in a deserter status or admin
Describe the 6 programs of Brilliant on the Basics
Sponsor
Indoctrination
Ombudsman
Mentorship
Career Development Boards
Sailor recognition
What are the 4 categories of CASREPs
Initial
Update
Correct
Cancel
DD Form 1348-6
Single line item requisition
DD Form 200
Report of survey, loss of an asset
NAVCOMPT 2276
Contractual Procurement
NAVSUP 1250-2
Non-NSN requisition
DD Form 448
MIPR (Military Interdependent Purchase Request)
SF 44
Purchase order invoice voucher
DD Form 1155
Delivery Task/Order
SF 1449
Solicitation/Contract Form
SF 30
Modification of contract
SF 364
Report of Discrepancy
SF 368
PQDR (Product Quality Deficiency Report)
What is CHRIMP?
Consolidated Hazardous Material Reutilization & Inventory Management Program
SF 700
Security Container Information
SF 701
Activity Security Checklist
SF 702
Security Container Check Sheet
SF 703
Top Secret Cover Sheet
SF 153
COMSEC Material Report
SF 312
Classified Information Non-Disclosure Agreement
When should safe combinations be changed?
-When combination lock is first installed
-Combination has been compromised
-At other times when considered necessary by the SSO
What is the difference between a security violation and (PDS) practice dangerous to security?
Security violation is a compromise of classified information. A PDS is failure to comply with security regulations.
What are the 5 Attributes of IA?
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
Describe Confidentiality
Information is not disclosed
Describe Integrity
Information is not modified
Describe Availability
Timely & reliable access to data & information systems
Describe Non-repudiation
The sender of data is provided with proof of delivery & the recipient is provided with proof of sender's identity
Describe Authentication
Validation of e-mail messages & information system access requests
Describe the following: IAVA, IAVB, IAVT
Information Assurance Vulnerability Alerts
Information Assurance Vulnerability Bulletin
Information Assurance Vulnerability Technical Advisories
What is the difference between a threat & a vulnerability?
Threat - potential to adversely impact information systems
Vulnerability - weakness in information systems
What is Configuration Management?
Controlling changes to system’s hardware & software, ensuring changes will not decrease data security
Describe the OSI Model
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical
Describe the TCP/IP Model
Application
Transport
Internet
Network
What is the difference between IPv4 and IPv6?
IPV4 - 32 bits

IPV6 - 128 Bits
What is the purpose of DNS?
Domain Name Server
Port 53
Translates IP addresses into a domain name
What is NOVA?
Shore-based message handling system

Processes GENSER messages
What is NREMS?
Navy Regional Enterprise Messaging System
What is EEFI?
Essential Elements of Friendly Information
Describe the EFFI list 01-10
01 - Position
02 - Capabilities
03 - Operation
04 - Electronic Warfare
05 - Personnel
06 - COMSEC
07 - Wrong CKT
08-10 - NATO Assigned
What is the difference between GINGERBREAD and BEADWINDOW?
GINGERBREAD is called for an intruder on the net, BEADWINDOW is called for disclosing an EEFI on an unsecure net
What is Meaconing?
The intentional transmission of signals designed to deceive users
Describe Intrusion
The deliberate insertion of false information into communications circuits
What is Jamming?
The deliberate radiation, re-radiation, or reflection of electromagnetic energy to disrupt use of electronic devices
Define the following message precedence:
R, P, O, Z, W
R: Routine 6 hours
P: Priority 3 hours
O: Immediate 30 minutes
Z: Flash with in 10 muinutes
W: FLASH OVERRIDE
Describe the following warfare areas: ASW, IW, AW, STW, NSW
ASW: Anti-Submarine Warfare
IW: Information Warfare
AW: Air Warfare
STW: Strike Warfare
NSW: Naval Special Warfare
Name the 5 IO Core Capabilities
PSYOP
MILDEC
OPSEC
EW
CNO
What is the difference between USC Title 10 and USC Title 50?
USC Title 10 - outlines the role of armed forces
USC Title 50 - outlines the role of War & National Defense
CCOP
Cryptologic Carry On Program

Augmenting SSES capabilities & providing capabilities where no SSES exists
What is the OPSEC 5 step planning process?
1. Identify Critical Info
2. Analyze THREAT
3. Analyze VULNERABILITIES
4. Assess RISK
5. Apply COUNTERMEASURES
What is CI?
Critical Information

Position, Capabilities, Operations, Personnel
What are the 3 categories of Intelligence?
Strategic
Operational
Tactical
What are the 5 steps of the Intelligence cycle?
1. Planning and Direction
2. Collection
3. Processing
4. Production
5. Dissemination
What is intelligence oversight?
Intelligence Oversight
What is the difference between PIR and CCIR?
PIR: Priority Intelligence Requirement

CCIR: Commander Critical Information Requirement
Define US citizen and a US person with regards to US Intelligence Oversight
-Born in USA,
-Permanent resident alien (Greencard holder),
-Corporation incorporated in USA, but not controlled by foreign government
Give 3 examples of Intelligence briefs
Current Intel
Historic Intel
Country files
Ops Intel
Port Intel
What is frequency?
The number of cycles of a wave that are completed in a unit of time (Hz)
What is ducting?
Trapping of an RF wave between mediums
What is propagation?
When a radio wave travels through space from transmitter to receiver
What are the 3 types of wave propagation?
Reflection
Diffraction
Refraction
What are the 5 modulation types?
USB
LSB
CW
AM
FM
How does Naval Oceanography support the Information Dominance Mission?
Predicts weather and ocean conditions thereby assisting in the foreseeable intelligence collection, capabilities of the adversary
What are the various types of METOC products available through the Naval Oceanography Portal (NOP)?
USNO - Naval Observatory
JTWC - Joint Typhoon Warning
NOOC - Oceanography Operations Center
FNMOC - Fleet Numerical Meteorological Oceanography Center
NAVO - Oceanography Office
What is the purpose of the Geostationary Operational Environmental Satellite (GOES)?
Provides warning of thunderstorms, winter storms, flash floods and other severe weather
What is the purpose of Polar Operational Environmental Satellite (POES)?
Collect global data on a daily basis for a variety of land, ocean and atmoshperic applications via AVHRR
What is the relationship of METOC to GEOSPATIAL Intelligence?
METOC is intelligence layer of GEOINT information base. Critical to joint ops during planning and ongoing operation
What are the impacts of environmental conditions on
anti-submarine warfare operations?
Variations in temperature, salinity and pressure affect travel and communications
What are the impacts of environmental conditions on
Naval Special Warfare operations?
Terrain restrictions, time of day, adverse weather
What are the impacts of mpacts of environmental conditions on Mine Warfare operations?
Surface winds, wave action, visibility, daylight hours
What are the weather conditions of a Small Craft Advisory?
Winds 33 knots or less
What are the weather conditions of a Gale warning?
Winds 34-47 kts
Define the following Tropical Cyclone Conditions of Readiness:
COR V
COR IV
COR III
COR II
COR I
COR V: Stormwatch; not anticipated. 96 hour window
COR IV: Possible threat within 72 hours
COR III: Possible within 48 hours
COR II: Anticipated within 24 hours
COR I: ccurring or within 12 hours
Describe apogee
An orbit's farthest point from earth
Describe perigee
An orbit's closest point to earth
Name the 4 Space Mission Areas
1. Space Force Enhancement
2. Space Support
3. Space Control
4. Space Force Application