Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
386 Cards in this Set
- Front
- Back
Mercury 3
|
05 MAY 1961 (Alan B. Shepard) – First U.S. manned space flight.
|
|
Gemini 3 |
23 MAR 1965 (John W. Young) - First U.S. two-man space mission; first spacecraft to maneuver from one orbit to another; 3 Earth orbits. |
|
Apollo 11
|
16-24 JUL 1969 (Neil A. Armstrong) - First manned lunar landing.
|
|
Apollo 17
|
07-19 DEC 1972 (Eugene A. Cernan and Ronald E. Evans) - Seventh and final lunar landing mission.
|
|
STS-1
|
12-14 APR 1981 (John W. Young and Robert L. Crippen) - First orbital test flight of a Space Shuttle. All Navy crew.
|
|
The on the Roof Gang
|
In July, 1928, CNO announced the establishment of a school to instruct radio operators in intercept operations, particularly for Japanese kana. These classes were held in a wood structure set atop the Navy Headquarters Building in Washington.
|
|
The purple code
|
27 September 1940. The SIS had made their first solution to Japanese diplomatic messages enciphered in the Purple Code. The Purple machine was first used by Japan in June 1938. U.S. and British crypto-analysts had broken some of its messages well before the attack on Pearl Harbor.
|
|
Attack on the USS LIBERTY
|
Israeli Air Force jet fighter aircraft and motor torpedo boats of the Israeli Navy attacked USS Liberty in international waters. Attack killed 34 and injured 170 crew members. Ineffective message handling and routing, the CPA change messages were not received until after the attack.
|
|
The Capture of the USS PUEBLO
|
January 23, 1968. USS Pueblo is an ELINT and SIGINT Banner-class technical research ship (Navy intelligence) which was boarded and captured by the Democratic People’s Republic of Korea (DPRK). North Korea claimed the vessel had strayed into their territorial waters, and U.S. claimed that shipped remained in international waters. Pueblo is still held by DPRK today; officially remains a commissioned vessel of the US Navy. It is located in DPRK’s Wonsan Harbor and used as a museum ship. It is the only US ship currently being held captive.
|
|
The Attack on the USS STARK
|
In 1987 during the Iran-Iraq war, an Iraqi jet fighter fired missiles at the USS Stark; killing 37, wounding 21. It is the only successful anti-ship missile attack on a U.S. Navy warship.
|
|
Discuss the National Security Act of 1947
|
Signed by President Truman on July 26, 1947; realigned and reorganized the US Armed Forces, foreign policy, and the Intelligence Community after the Cold War.
a. Merged the Department of War and the Department of the Navy into the National Military Establishment (later known as DoD) headed by the SECDEF. b. Established the Joint Chiefs of Staff c. Eventually unified the Army, Navy and Air Force into a federated structure. |
|
State RADM Grace Hopper’s contribution to the U.S. Navy
|
The invention, in 1953, of the compiler, the intermediate program that translates English language Instructions into the language of the target computer.
|
|
Discuss ARPANET and when it was developed
|
(Advanced Research Projects Agency Network) created by a small research team at the head of the MIT and the Defense Advanced Research Projects Agency (DARPA) of the United States DoD. World's first operational packet switching network and the predecessor of the contemporary global Internet. The first message transmitted over the ARPANET was sent by UCLA student programmer Charley Kline, on October 29, 1969. Kline transmitted from the university's Host computer to the Stanford Research Institute's Host computer. The first permanent ARPANET link was established on November 21, 1969, between the IMP at UCLA and the IMP at the Stanford Research Institute.
|
|
Explain the impact of the John walker espionage case
|
is a retired United States Navy Chief Warrant Officer and communications specialist convicted of spying for the Soviet Union from 1968 to 1985. CWO Walker helped the Soviets decipher more than a million encrypted naval messages. This is what initiated the requirement of Two-Person Integrity (TPI) when handling classified information.
|
|
Location, mission and component commands of PACOM.
|
Camp Smith, HI, U.S. Pacific Command protects and defends, in concert with other U.S. Government agencies, the territory of the United States, its people, and its interests. With allies and partners, U.S. Pacific Command is committed to enhancing stability in the Asia-Pacific region by promoting security cooperation, encouraging peaceful development, responding to contingencies, deterring aggression, and, when necessary, fighting to win.
|
|
Location, mission and component commands of EUCOM
|
Stuttgart, Germany, The mission of the U.S. European Command is to conduct military operations, international military partnering, and interagency partnering to enhance transatlantic security and defend the United States forward.
|
|
Location, mission and component commands of JFCOM
|
Norfolk, VA, The United States Joint Forces Command provides mission-ready Joint capable forces and supports the development and integration of Joint, Interagency, and Multinational capabilities to meet the present and future operational needs of the Joint Force.
|
|
Location, mission and component commands of SOUTHCOM
|
Miami, FL, ready to conduct joint and combined full-spectrum military operations and support whole-of-government efforts to enhance regional security and cooperation.
|
|
Location, mission and component commands of CENTCOM
|
MacDill, AFB, FL, U.S. Central Command promotes cooperation among nations, responds to crises, and deters or defeats state and non-state aggression, and supports development and, when necessary, reconstruction in order to establish the conditions for regional security, stability, and prosperity.
|
|
Location, mission and component commands of NORTHCOM
|
Peterson AFB CO , anticipates and conducts Homeland Defense and Civil Support operations within the assigned area of responsibility to defend, protect, and secure the United States and its interests.
|
|
Location, mission and component commands of SOCOM
|
Tampa, FL. Provide fully capable Special Operations Forces to defend the United States and its interests. All Military Components.
|
|
Location, mission and component commands of TRANSCOM
|
Galveston, TX. Develop and direct the Joint Deployment and Distribution Enterprise to globally project strategic national security capabilities; accurately sense the operating environment; provide end-to-end distribution process visibility; and responsive support of joint, U.S. government and Secretary of Defense-approved multinational and non-governmental logistical requirements. All Military Components.
|
|
Location, mission and component commands of STRATCOM
|
Offutt AFB, NE. The missions of US Strategic Command are: to deter attacks on US vital interests, to ensure US freedom of action in space and cyberspace, to deliver integrated kinetic and non-kinetic effects to include nuclear and information operations in support of US Joint Force Commander operations, to synchronize global missile defense plans and operations, to synchronize regional combating of weapons of mass destruction plans, to provide integrated surveillance and reconnaissance allocation recommendations to the SECDEF, and to advocate for capabilities as assigned. All military Components.
|
|
Location, mission and component commands of AFRICOM
|
Stuttgart-Moehringen, Germany. United States Africa Command, in concert with other U.S. government agencies and international partners, conducts sustained security engagement through military-to-military programs, military-sponsored activities, and other military operations as directed to promote a stable and secure African environment in support of U.S. foreign policy. All Military Components.
|
|
Location, mission and component commands of USCYBERCOM
|
Direct the operations and security of the Navy's portion of the Global Information Grid (GIG). Deliver reliable and secure Net-Centric and Space war fighting capabilities in support of strategic, operational, and tactical missions across the Navy.
|
|
2ND FLEET |
(Disestablished 30Sep11, merged into US Fleet Forces Command): Norfolk, VA; Operates in the Atlantic Ocean
|
|
3RD FLEET |
San Diego; CA; Operates in the Eastern Pacific Area
|
|
4TH FLEET |
Mayport, FL; Operates in the Caribbean, Central and South America and surrounding waters
|
|
5TH FLEET |
Manama, Bahrain; Operates in the Arabian Gulf/Indian Ocean/Persian Gulf
|
|
6TH FLEET |
Gaeta, Italy; Operates in the MED and Black Sea areas
|
|
7TH FLEET |
Yokosuka, Japan; Operates in the Western Pacific/Indian Ocean
|
|
10TH FLEET |
Ft. Meade, Maryland; Operates Globally.
|
|
Location, mission and component commands of NCTAMS PAC
|
Location: Wahiawa, HI Mission: Deliver and operate a reliable, secure and battle-ready Navy Network, providing sustained information superiority to Navy, Joint and Coalition war fighters in the Pacific and Indian Ocean areas of responsibility.
|
|
Location, mission and component commands of NCTAMS LANT
|
Location: Norfolk, VA. Mission: provide classified and unclassified voice, messaging, data and video to ships, submarines, aircraft and ground forces operating worldwide in support of Naval and joint missions.
|
|
What does C4ISR stand for?
|
Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance
|
|
Define C4ISR
|
Encompasses the gathering, processing, and distribution of information vital to the conduct of military planning and operations. It forms the foundation of unity of command and is essential to the decision process at all levels. In peacetime, command, control and surveillance systems permit us to monitor situations of interest, giving us indications and warnings that allow us to position our forces when necessary. In humanitarian relief and other support operations, our command and control system becomes part of the overall network by tying together diverse government and non-government agencies, as well as the many international and inter-service forces that may join the operation.
|
|
Explain the mission of the DISA (Defense Information Systems Agency)
|
A Combat Support Agency, engineers and provides command and control capabilities and enterprise infrastructure to continuously operate and assure a global net-centric enterprise in direct support to joint war fighters, National level leaders, and other mission and coalition partners across the full spectrum of operations.
|
|
State the mission of the NCDOC (Naval Cyber Defense Operations Comman)
|
To organize and prioritize, training, modernization, and maintenance, requirements, and capabilities of command and control architecture/networks, cryptologic and space-related systems and intelligence and information operations activities, and to coordinate with Type Commanders, to deliver interoperable, relevant and ready forces at the right time at the best cost, today and in the future.
|
|
Define Information Assurance
|
Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.
|
|
Certification
|
Certification is a comprehensive evaluation of the technical and non-technical security features of an IT system and other safeguards, made in support of the Accreditation process, to establish the extent that a particular design and implementation meets a set of specified security requirements.
|
|
Accreditation
|
Accreditation is the formal declaration by the Designated Approving Authority (DAA) that an Information Technology (IT) system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk.
|
|
Designated Approving Authority
|
The official with the authority to formally assume responsibility for operating a system (or network) at an acceptable level of risk.
|
|
Authority to Operate
|
The formal declaration by the DAA that an Information System is approved to operate in a particular security mode using a prescribed set of safeguards. Good for 3 years.
|
|
Interim Authority to Operate
|
may be issued when the requirements for full Accreditation cannot be met. Must include a milestone plan with dates to achieve full Accreditation. Good for 180 days.
|
|
Confidentiality
|
Authorized restrictions on information access and disclosures, including means for protecting personal privacy and proprietary information.
|
|
Integrity
|
information and programs are changed only in a specified and authorized manner
|
|
Availability
|
timely and reliable access to data and information services for authorized users.
|
|
Non-repudiation
|
An authentication that with high assurance can be asserted to be genuine, and that cannot subsequently be refuted.
|
|
Authentication
|
a measure of confidence that users or processes that access information are who they say they are and have the appropriate rights to access that information.
|
|
IAVA (Information Assurance Vulnerability Alert)
|
High priority network vulnerability with an associated date by which that vulnerability must be eradicated from the network.
|
|
IAVB (Information Assurance Vulnerability Bulletin)
|
Medium priority, associated with vulnerabilities that do not pose an immediate threat to the infrastructure.
|
|
IAVT (Information Assurance Vulnerability Technical Advisory)
|
Technical notes on network vulnerabilities, without remediation urgency. Low priority, no known exploit, or no available patch to load.
|
|
CTO (Computer Tasking Order)
|
Record message issued to components and or supporting organizations of all Armed Services to implement required actions in order to operate and defend the Global Information Grid. Normally comes with reporting requirements.
|
|
NTD (Naval Telecommunications Directive)
|
Record message coordinated by NNWC establishing Navy policies and procedures with regard to communications.
|
|
Service Pack
|
A collection of updates, fixes and/or enhancements to a software program delivered in the form of a single installable package.
|
|
Vulnerability |
Intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To be vulnerable, an attacker must have at least one applicable tool or technique that can connect to a system weakness.
|
|
Threat
|
Circumstances, events, or people with the potential to cause harm to a system.
|
|
Responsibilities of The Information Assurance Manager
|
is responsible for the information assurance program within a command, site, system, or enclave. The IAM is responsible to the local IA command authority and Designated Approving Authority (DAA) for ensuring the security of an IT system, and that it is approved, operated, and maintained throughout its life cycle in accordance with IT system security certification and accreditation documentation.
|
|
Host/ client
|
Describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request.
|
|
Hub
|
A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets. Operates at Layer 1 (Physical Layer) of the OSI model.
|
|
Switch
|
A small hardware device that joins multiple computers together within one LAN. Switches appear nearly identical to hubs, but a switch generally contains more intelligence than a hub. Unlike hubs, network switches are capable of inspecting data packets as they are received, determining the source and destination device of each packet, and forwarding them appropriately. By delivering messages only to the connected device intended, a network switch conserves network bandwidth and offers generally better performance than a hub. Operates at Layer two (Data Link Layer) of the OSI model.
|
|
d. Router
|
Device that forwards data packets between networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When data comes in on one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey or drops the packet. A data packet is typically forwarded from one router to another through networks that constitute the internetwork until it gets to its destination node. Operates at Layer three (Network Layer) of the OSI model, because the wired/wireless router connects multiple networks (as gateways do).
|
|
Topology |
BUS/AIR/RING/MESH |
|
Bus
|
A network architecture in which a set of clients are connected via a shared communications line, called a bus. Bus networks are the simplest way to connect multiple clients, but may have problems when two clients want to transmit at the same time on the same bus. Thus systems which use bus network architectures normally have some scheme of collision handling or collision avoidance for communication on the bus, quite often using Carrier Sense Multiple Access or the presence of a bus master which controls access to the shared bus resource.
|
|
Star |
One of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub or computer, which acts as a conduit to transmit messages.
|
|
Ring |
network architecture in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet. Because a ring topology provides only one pathway between any two nodes, ring networks may be disrupted by the failure of a single link. A node failure or cable break might isolate every node attached to the ring. FDDI networks overcome this vulnerability by sending data on a clockwise and a counterclockwise ring: in the event of a break data is wrapped back onto the complementary ring before it reaches the end of the cable, maintaining a path to every node along the resulting "C-Ring".
|
|
Mesh |
Network architecture wherein each node in the network may act as an independent router, regardless of whether it is connected to another network or not. It allows for continuous connections and reconfiguration around broken or blocked paths by “hopping” from node to node until the destination is reached. A mesh network whose nodes are all connected to each other is a fully connected network. Mesh networks differ from other networks in that the component parts can all connect to each other via multiple hops, and they generally are not mobile.
|
|
LAN (Local Area Network) |
A group of computers and associated devices that share a common communications line or wireless link. Typically, connected devices share the resources of a single processor or server within a small geographic area (for example, within an office building).
|
|
WAN (Wide Area Network) |
Spans a large geographic area, such as a state, province or country. WANs often connect multiple smaller networks, such as local area networks (LANs) or metro area networks (MANs). The world's most popular WAN is the Internet.
|
|
MAN (Metropolitan Area Network) |
Usually interconnects a number of Local Area Networks (LANs) using a high-capacity backbone technology, such as fiber-optical links, and provides up-link services to Wide Area Networks and the Internet. A MAN is a large computer network that usually spans a city or a large campus.
|
|
GAN (Global Area Network) |
Refers to any network that is composed of different interconnected computer networks (WANs) and also covers an unlimited geographical area.
|
|
Open Systems Interconnection (OSI) Model (7 Layers)
|
A way of sub-dividing a communications system into smaller parts called layers. Similar communication functions are grouped into logical layers. A layer provides services to its upper layer while receiving services from the layer below.
|
|
Open Systems Interconnection: Layer 1 (Physical Layer
|
Media, signal and binary transmission
|
|
Open Systems Interconnection: Layer 2 (Data Link Layer)
|
Physical addressing
|
|
Open Systems Interconnection: Layer 3 (Network Layer)
|
Path determination and logical addressing
|
|
Open Systems Interconnection: Layer 4 (Transport Layer)
|
End-to-end connections and reliability, flow control
|
|
Open Systems Interconnection: Layer 5 (Session Layer)
|
Inter host communication.
|
|
Open Systems Interconnection: Layer 6 (Presentation Layer)
|
Data representation, encryption and decryption, convert machine dependent data to machine independent data.
|
|
Open Systems Interconnection: Layer 7 (Application Layer)
|
Network process to application.
|
|
Transmission Control Protocol and Internet Protocol (TCP/IP) Model (4 Layers)
|
Is the most used network protocol . TCP/IP is not just one protocol, but a set of protocols (a protocol stack). Protocol is like a language used to make two computers to talk to each other.
|
|
Transmission Control Protocol and Internet Protocol: Layer 1 (Network Interface Layer)
|
Receives packets from the network to be sent over the Internet Layer. On this layer packets are called frames.
|
|
Transmission Control Protocol and Internet Protocol: Layer 2 (Internet Layer)
|
IP (Internet Protocol), which gets the packets received from the Transport layer and adds virtual address information, i.e., adds the address of the computer that is sending data and the address of the computer that will receive this data. On this layer packets are called datagrams.
|
|
Transmission Control Protocol and Internet Protocol: Layer 3 (Transport Layer)
|
Usually the TCP protocol. This layer is in charge of getting data sent by the upper layer, dividing them into packets and sending them to the Internet layer. During data reception, this layer is in charge of putting the packets received from the network in order (because they can be received out-of-order) and also checking if the contents of the packets are intact.
|
|
Transmission Control Protocol and Internet Protocol: Layer 4 (Application Layer)
|
Programs talk to the Application Layer. On this layer you will find Application protocols such as SMTP (for e-mail), FTP (for file transfer) and HTTP (for web browsing). Each kind of program talks to a different Application protocol, depending on purpose of program.
|
|
Internet Protocol version 4 (IPv4)
|
The fourth revision in the development of the Internet Protocol (IP) and it is the first version of the protocol to be widely deployed. IPv4 defined an IP address as a 32-bit number (consisting of 4 octets). In IPv4 an address consists of 32 bits which limits the address space to 4294967296 (232) possible unique addresses. IPv4 reserves some addresses for special purposes such as private networks (~18 million addresses) or multicast addresses (~270 million addresses). Due to the enormous growth of the Internet and the predicted depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995.
|
|
Internet Protocol version 6 (IPv6)
|
The rapid exhaustion of IPv4 address space, despite conservation techniques, prompted the Internet Engineering Task Force (IETF) to explore new technologies to expand the Internet's addressing capability. The permanent solution was deemed to be a redesign of the Internet Protocol itself. IPv6 defined an IP address as a 128-bit number (consisting of 16 octets). Mathematically, the new address space provides the potential for a maximum of 2128, or about 3.403×1038 unique addresses.
|
|
Unclassified but Sensitive Internet Protocol (IP) Router Network (NIPRNet)
|
i. A global long-haul IP based network to support unclassified IP data communications services for combat support applications to the Department of Defense (DoD), Joint Chiefs of Staff (JS), Military Departments (MILDEPS), and Combatant Commands (COCOM).
|
|
Secret IP Router Network (SIPRNet)
|
DoD's largest interoperable Command and Control (C2) data network.
|
|
SIPRNet supports |
1. Global Command and Control System (GCCS)
2. Defense Message System (DMS) 3. Collaborative planning 4. And numerous other classified warfighter applications. |
|
Joint Worldwide Intelligence Communications System (JWICS)
|
Operated by the Defense Intelligence Agency (DIA) as a secure global network designed to meet the requirements for TS/SCI multimedia intelligence communications worldwide. It provides users an SCI-level high-speed multimedia network using high-capacity communications to handle data, voice, imagery, and graphics.
|
|
Primary uses of JWICS by afloat users
|
1. Secure e-mail
2. Chat rooms 3. Point-to-point and multipoint VTCs 4. Broadcast of the DIN 5. Website accesses are the primary uses of JWICS by afloat users. |
|
Virus
|
Computer program that can copy itself and infect a computer. Spreads from one computer to another (in some form of executable code) when its host is taken to the targeted infected computer.
|
|
Worms
|
Self-replicating malware computer programs. They use a computer network to send copies of their selves to other nodes (computers on the network) and may do so without any user intervention.
|
|
Describe the functionality of PKI
|
Set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.
|
|
ADNS - (Automated Digital Networking System)
|
The primary function of the ADNS is to connect Navy shipboard networks to other ship and shore networks for transferring Internet Protocol (IP) data of various classification levels.
|
|
CUDIXS (Common User Digital Information Exchange Subsystem)
|
CUDIXS provides a 2400 baud full duplex interface, over a satellite link with mobile platforms, for the receipt and transmission of narrative message traffic between FMX and mobile platforms equipped with afloat automated systems.
|
|
Discuss GINGERBREAD
|
Warning sent over the net to alert operators that hostile forces are attempting to intrude on the net by Imitative Communications Deceptions (ICD)
|
|
When an operator recognizes or suspects that net is being subject to ICD, they will....
|
• Announce GINGERBREAD on the net
• Give the call sign of the suspected deception station • Authenticate the stations on the net • Notify the radio supervisor and make an entry on the circuit log • Notify the Communications Officer and request further instructions |
|
How many types of disclosures of EEFI (Essential Elements of Friendly Information) are there?
|
5 |
|
EEFI POSITION 01
|
Friendly or enemy position, movement or intended movement: position; course; speed; altitude; or destination of any air, sea or ground element unit or force.
|
|
EEFI CAPABILITIES 02 |
Friendly or enemy capabilities or limitations: force composition or identity; capabilities, limitations or significant casualties to special equipment, weapon systems, sensors, units or personnel; percentages of fuels or ammunition remaining.
|
|
EEFI OPERATIONS 03 |
Friendly or enemy operations, intentions, progress or results: operational or logistic intentions; assault objectives; mission participants; flying programs; mission situation report results of friendly or enemy operations.
|
|
EEFI ELECTRONIC WARFARE 04 |
Friendly or enemy EW/EMCON intentions, progress or results: intention to employ EMC; results of friendly or enemy ECM objectives of ECM; results of friendly or enemy ECCM; results of ESM; present or intended EMCON policy; equipment effected by EMCON policy.
|
|
EEFI PERSONNEL 05
|
Friendly or enemy key personnel: movement or identity of friendly or enemy flag officers; distinguished visitors; unit commanders; movements of key maintenance personnel indicating equipment limitations.
|
|
Define RIVER CITY and state when is utilized
|
An OPSEC tool that limits communications is River City. River Cityconditions provide procedures to control outgoing paths from ships and shoresystems (e-mail, web browsing, POTS, cell phones) for the purpose of OPSEC andforceprotection.
|
|
R - Routine |
6 hours |
|
P - Priority |
3 hours |
|
O - Immediate |
30 minutes |
|
Z - Flash |
Asfast as possible with an objective of less than 10 minutes |
|
W - Flash override |
3 minutes |
|
State the purpose of Emission Control (EMCON)
|
controlof all electromagnetic and acoustic radiations, including communications,radar, EW and sonar. During its imposition, no electronic emitting devicewithin designated bands, including personal communications devices, will beoperated unless absolutely essential to the mission. The OTC or his designatedsubordinate commander is responsible for imposing EMCON.
|
|
Explain the INCOFON (Information Operations Condition) system
|
athreat level system in the United States similar to that of FPCON. It is adefense system based primarily on the status of information systems and is amethod used by the military to defend against a computer network attack.
|
|
How many levels of INFOCON? |
5 |
|
INFOCON 5 |
describes a situation where there is no apparent hostile activity against computernetworks.
|
|
INFOCON 4 |
describes an increased risk of attack.
|
|
INFOCON 3 |
describes when a risk has been identified.
|
|
INFOCON 2 |
describes when an attack has taken place but the Computer Network Defensesystem is not at its highest alertness.
|
|
INFOCON 1 |
describes when attacks are taking place and the Computer Network Defensesystem is at maximum alertness.
|
|
FLTNOC - Fleet Network Operations Centers
|
Provide a regional gateway from the various communication systems supporting ships tothe Defense Information Systems Network.
|
|
NCTS- Naval Computer and TelecommunicationsStation
|
Thereare a total of seven NCTS’ world-wide which are managed by and report to thetwo NCTAMS. They are strategically located around the world in customerconcentration areas for ease in providing C4I support. Their primary mission isto provide the Navy Information Technology infrastructure and support servicesrequired for rapid and reliable voice and data communications within aspecified Area of Responsibility (AOR).gment--��0�Bߨ
|
|
HTTP (Hypertext transfer protocol)
|
Asystem for transmitting and receiving information across the Internet. Httpserves as a request and response procedure that all agents on the Internetfollow so that information can be rapidly, easily, and accurately disseminatedbetween servers, which hold information, and clients, who are trying to accessit. Default port is 80.
|
|
HTTPS (Secure Hypertext transfer protocol)
|
in many ways HTTPS is identical to HTTP because it follows the same basicprotocols. HTTPS works by transmitting normal http interactions through anencrypted system, so that in theory, the information cannot be accessed by anyparty other than the client and end server. Default port is 443.
|
|
Define and state the purpose of a VLAN (VIRTUALLOCAL AREA NETWORK)
|
alogical local area network (or LAN) that extends beyond a single traditionalLAN to a group of LAN segments, given specific configurations. Since a VLAN isa logical entity, its creation and configuration is done completely insoftware. A VLAN solution can alleviate both, relocating personnel and physicaldisjoined locations, by permitting the same broadcast domain to extend beyond asingle segment.
|
|
Define and state the purpose of RAID REDUNDANTARRAY OF INDEPENDENT
|
A way of storing the same data in different places (thus, redundantly) onmultiple hard disks. By placing data on multiple disks, I/O (input/output)operations can overlap in a balanced way, improving performance. There are atleast nine types of RAID plus a non-redundant array (RAID-0).
|
|
Penetration |
The unauthorized act of gaining access to a machine or resource.
|
|
Electronic Spillage |
An Electronic Spillage (ES) is defined as data that is placed on aninformation system possessing insufficient security controls to protect thedata at the required classification, which poses a risk to National Security(example: SCI onto Secret, Secret onto Unclass). This process also applies tosituations where Unclassified Naval Nuclear Propulsion Information (U-NNPI) isintroduced to Non-U-NNPI hardware. However, U-NNPI ES are not subject toreporting requirements.
|
|
HBSS |
Host Based Security System |
|
Purpose of HBSS |
1. HBSSprovides host based security through behavioral, signature, desktop firewall,and application blocking protections.
2. Behavioral rules are established toidentify a profile of network activity. Deviation from an established activityprofile results in a system alert. 3. TheHost Intrusion Prevention System (HIPS) is used to provide signatureprotection. HIPS agents work by cross-checking host activities against adatabase of signature rules to assess whether or not activity is malicious. Ifmalicious activity is detected, an alert (event) is sent to the ePolicyOrchestrator (ePO) console. 4. HBSS provides desktop firewallprotection by establishing a filter between the host system and the network orInternet. All network traffic to and from the host is scanned at the packetlevel and compared against a list of firewall rules. 5. Application blocking prevents thelaunching of certain executable files on the host system and is provided for bythe Data Loss Prevention (DLP) module. This module also blocks the installationof USB devices on the computer and when a USB device is plugged into acomputer, an alert (event) is sent to the ePO console. |
|
State the responsibilities of a NECOS- Net Controller Station
|
1. Directand control the flow of messages and other matters during their assigned nets.
2. Exercise strict circuit discipline atall times. 3. Ensurethat the Net is operating within tolerance of the assigned frequency andimmediately notify any station that is out of tolerance. 4. Keep the State Director and/or NetManager informed of Net Activities and make recommendations for changes orimprovements concerning net operations. 5. Provide "on-the-job"training to any member having difficulties transmitting, relaying or requestingrepetitions of a message during their net. |
|
JFTOC -24-7
|
One stop shop for C5I Needs (C5I = command, control, communications, computers, collaboration, intelligence). JFTOC interacts with the fleet and joint customers via message traffic (service advisories, COMSPOTS, OPREP-3), SIPR chat, phone, and/or VTC. Support customers in the PAC and IO AOR’s – third, seventh, and fifth fleets and associated units.
|
|
Define and explain the concept of DAMA
|
Demand Assigned Multiple Access(DAMA) one channel with multiple users sequentially at different times. Thistechnology is mainly useful with sparsely used networks of transient clients.By using DAMA technology the number of separate nodes that can use a limitedpool of circuits can be greatly increased at the expense of no longer beingable to provide simultaneous access for all possible pairs of nodes.
|
|
EHF |
The use of EHF frequencies offers a number of advantages--assurance of reliable communications in a nuclear environment, minimal susceptibility to enemy jamming and eavesdropping, and the ability to achieve smaller secure beams with modest-sized antennas.
|
|
SHF |
Thisrange offers significantly increased bandwidths (hundreds of MHz) for high datarates or increased use of spread-spectrum techniques, together withlocalized coverage and adaptive antenna techniques for nulling unwanted signalsor interference (weather).
|
|
CBSP Commercial Broadband Satellite Program
|
Thepurpose of the CBSP services acquisition is to provide satellite capacity in C,Commercial X, Ku, and possibly other bands as well as terrestrial andsupporting requirements this is the main spectrum (SHF) that supports voice,video, and imagery.
|
|
DSCS: Defense Satellite Communication System
|
Militarycommunications to support globally distributed military users. This is the mainspectrum (SHF) that, (like CBSP – except on a larger scale) supports voice,video, and imagery. DSCS will be replaced by the Wideband Global SATCOM system.
|
|
State the Purpose of the EKMS
|
Anindividual designated in writing by the CO to manage COMSEC material issued toan EKMS account. The EKMS Manager is the CO's primary advisor on mattersconcerning the security and handling of COMSEC material and the associatedrecords, reports, and audits.
|
|
What is a COMSEC Incident? |
when accountability with crypto or cryptographic items havebeen lost.
|
|
How many different types of COMSEC Incidents are there? |
3 |
|
COMSEC Incident 1: Cryptographic |
Useof COMSEC keying material that is compromised, superseded, defective, orpreviously used and not authorized for reuse
|
|
COMSEC Incident 2: Personnel |
Defection,espionage, capture by enemy
|
|
COMSEC Incident 3: Physical |
Physicalloss of COMSEC material, unauthorized access to COMSEC material, COMSECmaterial found outside of required accountability or physical control, failureto maintain TPI
|
|
Describe the 2 types of PDS |
1. ReportablePDS outside the Command. Premature or out-of-sequence use of keying materialbefore its effective date 2. Non-reportablePDS Up to the CO. Late Destruction of a local account crypto.
|
|
HERO |
Hazards from electromagnetic radiation to ordnance |
|
HERP |
Hazards of electromagnetic radiation to personnel |
|
HERF |
Hazards of electtromagnetic radiation to fuels |
|
Subcategory "A" of mishap probability |
likely to occur |
|
Subcategory "D" of mishap probability |
unlikely to occur |
|
Subcategory "C" of mishap probability |
may occur |
|
Subcategory "B" of mishap probability |
probably will occur |
|
OPREP-3 PINNACLE |
used to report incidents that is of national level interest to the National Military Command Center |
|
OPREP-3 NAVY BLUE |
used to provide the CNO and other naval commanders notification of incidents that are of high Navy, as opposed to nation-level interest |
|
OPREP-3 NAVY UNIT SITREP |
used to inform the operational commander, or appropriate higher authority, of incidents not meeting OPREP-3 NAVY BLUE criteria |
|
6 programs of Brilliant on the Basics |
Career Developement Boards Sponsorship Mentorship Sailor Recognition Command Indoctrination Command Ombudsmen support |
|
AIRFOR |
provide the proper air assets and manning for CVN and squadrons |
|
SURFOR |
manage the manning of personnel and schools |
|
CYBERFOR |
manage the information dominance portion of missions |
|
TAC # RADIO |
03-108-0-C |
|
TAC # ADP |
4-180-1-Q |
|
TAC # EW MODULE |
03-165-2-C |
|
TAC # MSI |
03-119-2-C |
|
TAC # METOC |
06-165-3-C |
|
TAC # SIAC |
03-133-0-Q |
|
N1 |
Admiral and his aides |
|
N2 |
Administration and legal department |
|
N4 |
Supply Department |
|
N5 |
Planning Department |
|
HUMINST |
Human Intelligence |
|
IMINT |
Imagery Intelligence |
|
OSINT |
Open Source Intelligence |
|
(OPT) Operation Planning |
the process of setting for the mission |
|
(BWC) Battle Watch Commander |
the watch that maintains the overall picture of situation |
|
(CLF) Commander Landing Forces |
in charge of getting landing forces ashore |
|
(NGO) Non Government Organization |
any organization that is not government related |
|
6 area which comprise Naval Doctrine |
Warfare Intelligence Operations Logistics Planning Command & Control |
|
Importance of Battle of Coral Sea |
7-8 May 1942; the world's first carrier verse carrier battle |
|
Importance of the Great White Fleet |
16 December 1907; Roosevelt dispatched 16 U.S. Navy battleships of the Atlantic Fleet for world cruise to demonstrate the strength of the U.S. Navy |
|
Importance of Battle of Normandy |
6 June 1944; largest amphibious operation in history |
|
Importance of Battle of Midway |
4-7 June 1942; turning point of the pacific war |
|
3 classes of Naval Vessels that existed at inception of the U.S. Navy |
Ships of the line Frigates Sloops of war |
|
7 areas which comprise Naval logistics |
Responsiveness Simplicity Flexibility Economy Attainability Sustainability Survivability |
|
3 levels of war |
tactical operational strategic |
|
Keel was laid |
3 November 1984 |
|
ship was launched |
13 February 1988 |
|
ship was christened |
11 November 1989 |
|
LT Kara Hultgreen first female Tomcat pilot died when her plane crashed due to engine failure and pilot error |
25 October 1994 |
|
Lincoln and Sacremento collide during an UNREP |
5 June 1995 |
|
Abraham Lincoln's Birthday |
12 February 1809 |
|
Lincoln became the Republican nominee for President |
6 Novermber 1860 |
|
Forces of South Carolina began a bombardment of Ft. Sumter in Charleston Harbor. |
12 April 1861 |
|
The Emancipation Proclamation was issued |
22 September 1862 |
|
Gettysburg address was delivered |
19 November 1863 |
|
Lincoln inaugurated for his second term |
4 March 1865 |
|
Death of Abraham Lincoln |
15 April 1865 |
|
TOP SECRET |
ORANGE; EXPECTED TO CAUSE EXCEPTIONALLY GRAVE DAMAGE TO NATIONAL SECURITY |
|
SECRET |
RED; EXPECTED TO CAUSE SERIOUS DAMAGE TO NATIONAL SECURITY |
|
CONFIDENTIAL |
BLUE; EXPECTED TO CAUSE DAMAGE TO NATIONAL SECURITY |
|
UNCLASSIFIED |
GREEN; EXPECTED TO CAUSE NO DAMAGE TO NATIONAL SECURITY |
|
NEED TO KNOW |
RESTRICTION OF DATA WHICH IS CONSIDERED VERY SENSATIVE |
|
SF-700 |
SECURITY CONTAINER INFORMATION |
|
SF-701 |
ACTIVITY SECURITY CHECKLIST |
|
SF-702 |
SECURITY CONTAINER CHECK SHEET |
|
SF-703 |
TOP SECRET COVER SHEET |
|
WHEN SHOULD SAFE COMBINATIONS BE CHANGED |
ANUALLY SAFE HAS BEEN COMPROMISED INDIVIDUAL WHO HOLDS THE COMBINATION TRANSFERS FROM THE COMMAND |
|
THREATCON LEVEL NORMAL |
NO KNOWN THREAT INDICATED |
|
THREATCON LEVEL ALPHA |
GENERAL THREAT OF POSSIBLE TERRORIST ACTIVITY AGAINST INSTALLATIONS AND PERSONNEL |
|
THREATCON LEVEL BRAVO |
AN INCREASED AND MORE PREDICTABLE THREAT OF TERRORIST ACTIONQ |
|
THREATCON LEVEL CHARLIE |
INCIDENT HAS OCCURED AND SOME FORM OF TERRORIST ACTION IS IMMINENT |
|
THREATCON LEVEL DELTA |
TERRORIST ATTACK HAS OCCURED AND IS NORMALLY DECLARED AS A LOCALIZED WARNING |
|
STEP 1 PLANNING PROCESS |
IDENTIFY CRITICAL INFORMATION |
|
STEP 2 PLANNING PROCESS |
THREAT ASSESSMENT |
|
STEP 3 PLANNING PROCESS |
VULNERABILITY ANALYSIS |
|
STEP 4 PLANNING PROCESS |
RISK ASSESSMENT |
|
STEP 5 PLANNING PROCESS |
MEASURES/COUNTERMEASURES |
|
BLUE TEAM |
MUST DEFEND AGAINST REAL OR SIMULATED ATTACKS |
|
RED TEAM |
PERFORMS REAL OR SIMULATED ATTACKS |
|
TRANSPORTING TOP SECRET INFORMATION |
WILL BE COMPLETED THROUGH THE DEFENSE COURIER SERVICE |
|
TRANSPORTING SECRET AND BELOW INFORMATION |
CAN BE COMPLETED THROUGH THE U.S. POST OFFICE OR FEDEX |
|
CCOP |
CRYPTOLOGIC CARRY-ON PROGRAM |
|
NITES |
NAVY INTEGRATED TACTICAL ENVIRONMENT |
|
JDISS |
JOINT DEPLOYABLE INTELLIGENCE SUPPORT SYSTEM |
|
(ASW) ANTI-SUBMARINE WARFARE |
OPERATIONS CONDUCTED WITH THE INTENTION OF DENYING THE ENEMY THE EFFECTIVE USE OF SUBMARINES |
|
(SUW) SURFACE WARFARE |
OPERATIONS CONDUCTED TO DESTROY OR NUETRALIZE ENEMY NAVAL SURFACE FORCES AND MERCHANT VESSELS |
|
(IW) INFORMATION WARFARE |
CONDUCTED DURING TIME OF CRISIS OR CONFLICT TO ACHIEVE OR PROMOTE SPECIFIC OBJECTIVES OVER A SPECIFIC ADVERSARY OR ADVERARIES |
|
(AW) AIR WAREFARE; OR AIR DEFENSE |
DEFENSIVE MEASURES TO DESTROY ATTACKING ENEMY AIRCRAFT OR MISSILES. |
|
(STW) STRIKE WARFARE |
OPERATIONS TO DESTROY OR NUETRALIZE ENEMY TARGETS ASHORE |
|
(NSW) NAVAL SPECIAL WARFARE |
OPERATIONS ARE CHARACTERIZED BY STEALTH, SPEED AND PRECISE VIOLENT APPLICATION OF FORCE |
|
SF-86 |
APPLICATION FOR SECURITY CLEARANCE |
|
COMSEC |
COMMUNICATIONS SECURITY |
|
INFOSEC |
INFORMATION SECURITY |
|
COMPUSEC |
COMPUTER SECURITY |
|
PSP |
PERSONNEL SECURITY PROGRAM |
|
ATFP |
ANTI-TERRORISM FORCE PROTECTION |
|
AT |
DEFENSE MEASURES USED TO REDUCE THE VULNERABILITY OF INDIVIDUALS AND PROPERTY TO TERRORIST ACTS |
|
FP |
ACTIONS TAKEN TO PREVENT OR MITIGATE HOSTILE ACTIONS AGAINST DOD PERSONNEL RESOURCES, FACILITIES AND CRITICAL INFORMATION |
|
TIME SENSITIVE TARGET |
TARGETS REQUIRING IMMEDIATE RESPONSE BECAUSE THEY POSE, OR WILL SOON POSE A DANGER TO FREINDLY FORCES OR ARE HIGHLY LUCRATIVE |
|
NO-STRIKE LIST |
MOSQUES SCHOOLS HOSPITALS CEMETARIES HISTORICAL SITES |
|
3 PHASES OF BATTLE DAMAGE ASSESSMENT |
PHYSICAL DAMAGE ASSESSMENT PHASE FUNCTIONAL DAMAGE ASSESSMENT PHASE WEAPON SYSTEM ASSESSMENT PHASE |
|
INFORMATION OPERATIONS |
ACTIONS TO CONTROL FREINDLY FORCE'S USE OF INFORMATION AND THE ACTIONS TO MITIGATE THE EFFECTS OF ADVERSARY USE OF INFORMATION AND INFORMATION SYSTEMS |
|
EW |
ELECTRONIC WARFARE |
|
MILDEC |
TACTICAL MILITARY DECEPTION |
|
MISO |
MILITARY INFORMATION SUPPORT OPERATIONS |
|
CND |
COMPUTER NETWORK DEFENSE |
|
CNA |
COMPUTER NETWORK ATTACK |
|
CNE |
COMPUTER NETWORK EXPLOITATION |
|
ROLE OF SSN |
GATHER SIGINT IN AREAS NOT ACCESSIBLE BY NORMAL PLATFORMS |
|
ROLE OF SSGN |
GATHER SIGINT IN AREAS NOT ACCESSIBLE BY NORMAL PLATFORMS |
|
ROLE OF EA-6B PROWLER |
TACTICAL EW IN THE FORM OF RADAR & COMMS EA |
|
ROLE OF E-2C HAWKEYE |
AIR EARLY WARNING AND COMMAND AND CONTROL |
|
ROLE OF P-3 ORION |
C4ISR |
|
ROLE OF EP-3E |
NEAR REAL TIME TACTICAL SIGINT |
|
ROLE OF RC-135 COBRA BALL |
AIRBORNE BALLISTIC MISSILE SIGNATURE AND COLLECTION SYSTEM |
|
ROLE OF MQ-1A PREDATOR |
UAVs & ISR |
|
ROLE OF EC-130H COMPASS CALL |
COMMS EA, TACTICAL COMMAND, CONTROL & COMMUNICATION COUNTERMEASURES |
|
ROLE OF U-2 |
ELECTRO OPTICAL IMAGING AND SIGINT |
|
ROLE OF EA-18G |
ALQ-99, EA & SEAD |
|
ROLE OF CVN AIRCRAFT CARRIER |
E2-C, EA-6B, EA-18G, SLQ-32, CVIC, SSES |
|
ROLE OF CG GUIDED MISSILE CRUISER |
LAMPS HELO, SLQ-32, SSES OR TSCIF |
|
ROLE FFG GUIDED MISSILE FRIGATE |
LAMPS HELO, SLQ-32, SSES OR TSCIF |
|
ROLE OF LCC AMPHIBIOUS COMMAND SHIP |
COMMAND PLATFORMS |
|
ROLE OF LHA/LHD AMPHIBIOUS ASSAULT SHIPS |
JIC, EXPLOT, SLQ-32, SSES |
|
ROLE OF LPD AMPHIBIOUS TRANSPORT DOCK |
SLQ-32, SSES OR TSCIF |
|
ROLE OF LSD DOCK LANDING SHIP |
SLQ-32, SSES OR TSCIF
|
|
ROLE OF PC PATROL COASTAL SHIP |
SLQ-32 AND POSSIBLE TSCIF |
|
6 PRINCIPLES OF MILITARY DECEPTION |
FOCUS OBJECTIVE CENTRALIZED CONTROL SECURITY TIMELINESS INTEGRITY |
|
5 PHASES OF MILITARY DECEPTION PLANNING PROCESS |
INITIATION CONCEPT DEVELOPMENT PLAN DEVELOPMENT PLAN REVIEW SUPPORT PLANS |
|
3 CATEGORIES OF MEANS OF DECEPTION |
PHYSICAL TECHNICAL ADMINISTRATIVE |
|
4 CATEGORIES OF DECEPTION TACTICS |
ACOUSTIC VISUAL ELECTROMAGNETIC COMMUNICATION |
|
NOST |
NAVAL OPSEC SUPPORT TEAM |
|
IOSS |
INTERAGENCY OPSEC SUPPORT STAFF |
|
JCMA |
JOINT COMSEC MONITOR ACTIVITY |
|
NCIS |
NAVAL CRIMINAL INVESTIGATIVE SERVICE |
|
IAVA |
INFORMATION ASSURANCE VULNERABILITY ALERT; HIGH PRIORITY |
|
IAVB |
INFORMATION ASSURANCE VULNERABILITY BULLETIN; MEDIUM PRIORITY |
|
IAVT |
INFORMATION ASSURANCE VULNERABILITY TECHNICAL ADVISORY; LOW PRIORITY |
|
CTO |
COMPUTER TASKING ORDER |
|
SAAR |
SYSTEM AUTHORIZATION ACCESS REQUEST |
|
ZOMBIE |
ANY SYSTEM TAKING DIRECTIONS FROM A MASTER CONTROL COMPUTER |
|
BOT |
AUTOMATED SOFTWARE PROGRAM THAT COLLECTS INFORMATION ON THE WEB |
|
ZERO DAY EXPLOIT |
COMPUTER THREAT THAT TRIES TO EXPLOIT COMPUTER APPLICATION VULNERABILITIES |
|
SPYWARE |
PROGRAMS THAT WORK ON BEHALF OF A THIRD PARTY |
|
LOGIC BOMB |
ANY CODE THAT IS HIDDEN WITHIN AN APPLICATION AND CAUSES SOMETHING UNEXPECTED TO HAPPEN BASED ON SOME CRITERIA BEING MET |
|
IDS |
INTRUSION DETECTION SYSTEM |
|
2 TYPES OF IDS |
ACTIVE PASSIVE |
|
PROXY SERVER |
ACTS AS AN INTERMEDIARY FOR REQUESTS FROM CLIENTS SEEKING RESOURCES FROM OTHER SERVERS |
|
FIREWALL |
DESIGNED TO PERMIT OR DENY NETWORK TRANSMISSIONS BASED ON A SET OF RULES |
|
VIRTUAL PRIVATE NETWORK CONCENTRATOR |
DEVICE THAT INCORPORATES THE MOST ADVANCED INCRYPTION AND AUTHENTICATION TECHNIQUES AVAILABLE |
|
BACK-UP |
MAKING COPIES OF DATA |
|
NETWORK REPEATER |
REGENERATES INCOMING ELECTRICAL, WIRELESS OR OPTICAL SIGNALS |
|
VIRUS |
PROGRAM THAT CAN COPY ITSELF AND INFECT A COMPUTER |
|
WORMS |
SELF-REPLICATING MALWARE COMPUTER PROGRAMS |
|
BACKDOOR |
BYPASSES NORMAL AUTHENTICATION WHILE ATTEMPTING TO REMAIN UNDETECTED |
|
TROJANS |
APPEARS TO PERFORM A DESIREABLE FUNCTION FOR THE USER PRIOR TO RUN OR INSTALL BUT INSTEAD FACILITATES UNAUTHORIZED ACCESS OF THE USER'S COMPUTER SYSTEM |
|
PHISHING |
CRIMINALLY FRAUDULENT PROCESS OF ATTEMPTING TO ACQUIRE SENSATIVE INFORMATION BY MASQUERADING AS A TRUSTWORTHY ENTITY |
|
IMAGE PRODUCT LIBRARY |
IMAGERY RECEIVED WILL BE ARCHIVED TO THE IPL AND MADE AVAILABLE TO REMOTE USERS VIA ALLOCATED COMMUNICATIONS BANDWIDTH |
|
JSIPS |
JOINT SERVICE IMAGERY PROCESSING SYSTEM |
|
VANTAGE |
SOFTWARE SUITE THAT PROVIDES IMAGE PROCESSING, DISPLAY AND DATABASE STORAGE FOR NITF IMAGERY |
|
DCRS |
DIGITAL CAMERA RECEIVING STATION |
|
VIG |
VIDEO INTERFACE GROUP |
|
CENTRIX |
SIPR SYSTEM THAT ALLOWS THE EXCHANGE OF DATA BETWEEN US AND COALITION ASSETS |
|
DOMAIN CONTROLLER |
STORES ONE DOMAIN DIRECTORY PARTITION CONSISTING OF INFORMATION ABOUT THE DOMAIN IN WHICH IT IS LOCATED |
|
EXCHANGE SERVER |
PROCESS EMAIL MESSAGES FROM A SENDER TO RECIPIENTS IN A SECURE AND TIMELY WAY |
|
NIAPS |
UNCLASSIFIED SERVER THAT PROVIDES ONBOARD CAPABILITY FOR THE SAILOR TO ACCESS APPLICATIONS FOR PERSONAL AND PROFESSIONAL DEVELOPMENT |
|
BEWT |
ALLOWS FOR THE RUNNING OF SIMULATION ON THE SLQ-32 TO PROVIDE REAL WORLD TRAINING TO OPERATORS |
|
GEOSTATIONARY ENVIRONMENTAL SATELLITES |
THE BACKBONE TO SHORT TERM FORCASTINGPO |
|
POLAR OPERATIONAL ENVIRONMENTAL SATELLITES |
ABLE TO COLLECT GLOBAL DATA ON A DAILY BASIS FOR A VARIETY OF LAND, OCEAN AND ATMOSPHERIC APPLICATIONS |
|
DEFENSE METEOROLOGICAL SATELLITE PROGRAM |
SEES CLOUDS, BODIES OF WATER, SNOW, FIRE AND POLLUTION IN THE VISUAL AND INFRARED SPECTRA |
|
NATIONAL POLAR ORBITING OPERATIONAL ENVIRONMENTAL SATELLITE SYSTEM |
IS THE NEXT GENERATION OF LOW EARTH ORBITING SATELLITES CIRCLING THE EARTG APPROXIMATELY ONCE EVERY 100 MINUTES |
|
TROPICAL RAINFALL MEASURING MISSION |
A RESEARCH SATELLITE DESIGNED TO HELP UNDERSTAND THE WATER CYCLE OF THE ATMOSPHERE COVERING THE TROPICAL AND SEMI-TROPICAL REGIONS |
|
VISIBILITY |
OFFENSE-CONCEAL MOVEMENT OF MILITARY FORCES DEFENSE- HINDERS RECONNAISSANCE |
|
PRECIPITATION |
AFFECTS VISIBILITY AND THE FUNCTIONING OF MANY INFRARED AND ELECTRO-OPTICAL SENSORS, RADAR, AND COMMUNICATION SYSTEMS |
|
WINDS |
WINDBLOWN SAND, DUST, RAIN OR SNOW CAN REDUCE THE EFFECTIVENESS OF RADARS AND COMMUNICATION SYSTEMS |
|
CLOUD COVER |
DEGRADES THE EFFECTIVENESS OF MANY TARGET ACQUISITION AND SURVEILLANCE SYSTEMS |
|
TEMPERATURE AND HUMIDITY |
EXTREMES OF TEMPERATURE AND HUMIDITY HAVE DEBILITATING EFFECTS ON PERSONNELE AND REDUCE EQUIPMENT CAPABILITIES AND THE EFFECTIVENESS OF CHEMICAL AND BIOLOGICAL WEAPONS |
|
OCEAN SURFACE |
RELATIVE SEAT STATE IS A MAJOR FACTOR IN DETERMINING THE FEASIBILITY OF NAVAL OPERATIONS AND THE FUNCTIONALITY OF MARITIME WEAPONS PLATFORMS |
|
OCEAN SUBSURFACE |
CRUCIAL TO THE CONDUCT OF SUBMARINE, ANTISUBMARINE AND MINING OPERATIONS |
|
LITTORAL |
CHARACTERISTICS SUCH AS LITTORAL GRADIENT AND COMPOSITION, COASTAL TERRAIN FEATURES AND TRANSPORTATION INFRASTRUCTURE |
|
3 THERMAL LAYERS WITHIN THE OCEAN |
MIXED LAYER THERMO CLINE DEEP LAYER |
|
METOC FUNCTIONS PERTAINING TO FLEET OPERATIONS |
COLLECT ANALYZE PREDICT TAILOR INTEGRATE |
|
5 ENVIRONMENTAL CONDITIONS THAT EXISTS IN LITTORAL MINE WARFARE |
BOTTOM MAPPING TIDES CURRENTS OPTICS SALINITY |
|
SPACE MISSION AREAS |
SPACE FORCE ENHANCEMENT' SPACE SUPPORT SPACE CONTROL SPACE FORCE APPLICATION |
|
APOGEE |
A POINT ON THE SATELLITES ORBIT FARTHEST FROM THE CENTER OF THE EARTH |
|
PERIGEE |
A POINT ON THE SATELLITES ORBIT CLOSEST TO THE CENTER OF THE EARTH |
|
LOW EARTH ORBIT |
150-800 MILES ABOUT THE EARTHS SURFACE |
|
MEDIUM EARTH ORBIT |
ABOVE EARTH LEO AND BELOW GEOSTATIONARY ORBIT |
|
HIGHLY ELLIPTICAL ORBIT |
USED TO OBTAIN COMMUNICATIONS IN THE NORTHERN AND SOUTHERN HEMISPHERE |
|
GEOSYNCHRONOUS ORBIT |
19,300 NAUTICAL MILES |
|
POLAR ORBIT |
PASSES OVER THE ENTIRE SURFACE OF THE EARTH AND HAS AN INCLINATION OF 90 DEGREES AND IS USUALLY CIRCULAR |
|
SPACE LAUNCH FACILITIES |
VANDENBURG AIR FORCE BASE NASA'S KENNEDY SPACE CENTER CAPE CANAVERAL AIR FORCE STATION |
|
ASTROMETRY |
THE SCIENTIFIC MEASUREMENT OF THE POSITIONS AND MOTIONS OF CELESTIAL BODIES |
|
EARTH ORIENTATION PARAMETERS |
THE IRREGULARITIES OF THE EARTH'S ROTATIONS. MEASURES THE EARTH'S ROTATION |
|
DEPARTURE/ARRIVAL WX |
WEATHER COULD POTENTIALLY IMPACT LAUNCH/RECOVERY OF AIRCRAFT |
|
TARGET WEATHER |
CLOUDS AND PRECIPITATION HINDER TARGET IDENTIFICATION AND WEAPONS DEPLOYMENT |
|
FLIGHT LEVEL WINDS |
STRONG WINDS COULD POTENTIALLY IMPACT TRAJECTORY OF WEAPONS |
|
ABSOLUTE HUMIDITY |
CAUSES DEGRADATION TO SENSORS AND ULTIMATELY IMPACTS DEPLOYMENT OF WEAPONS |
|
THERMAL CROSSOVER |
IMPACTS SENSOR PERFORMANCE DUE TO LOSS OF TARGET/BACKGROUND DIFFERENTIATION |
|
LINCOLN'S HEAVY WEATHER CONDITION 4 |
18+ FT SEAS AND OR 50+ KNOT WINDS POSSIBLE WITHIN 72 HOURS |
|
LINCOLN'S HEAVY WEATHER CONDITION 3 |
18+ FT SEAS AND OR 50+ KNOT WINDS POSSIBLE WITHIN 48 HOURS |
|
LINCOLN'S HEAVY WEATHER CONDITION 2
|
18+ FT SEAS AND OR 50+ KNOT WINDS POSSIBLE WITHIN 24 HOURS
|
|
LINCOLN'S HEAVY WEATHER CONDITIONS |
18+ FT SEAS AND OR 50+ KNOT WINDS POSSIBLE WITHIN 12 HOURS OR ARE OCCURING |
|
THUNDERSTORM CONDITION 1 |
THUNDERSTORMS EXPECTED WITHIN 6 HOURS AND/OR 25 NM |
|
THUNDERSTORM CONDITION 2 |
THUNDERSTORMS EXPECTED WITHIN 1 HOUR AND/OR 10 NM |
|
6 STEPS OF INTELLIGENCE |
PLANNING & DIRECTION COLLECTION PROCESSING & EXPLOITATION ANALYSIS & PRODUCTION DISSEMINATION & INTEGRATION EVALUATION & FEEDBACK |
|
3 CATEGORIES OF INTELLIGENCE |
STRATEGIC OPERATIONAL TACTICAL |
|
STRATEGIC INTELLIGENCE |
NATIONAL-LEVEL ACTIVITIES AND ASSETS SUPPORT THE PRESIDENT AND NATIONAL-LEVEL POLITICAL AND MILITARY LEADERSHIP |
|
OPERATIONAL INTELLIGENCE |
INTELLIGENCE REQUIRED FOR PLANNING AND CONDUCTING CAMPAIGNS AND MAJOR OPERATIONS TO ACCOMPLISH STRATEGIC OBJECTIVES WITHIN THEATERS OR OPERATIONAL AREAS |
|
TACTICAL INTELLIGENCE |
REQUIRED FOR THE PLANNING AND CONDUCT OF TACTICAL OPERATIONS |
|
HUMINT |
HUMAN INTELLIGENCE |
|
OSINT |
OPEN SOURCE INTELLIGENCE |
|
MASINT |
MEASUREMENT AND SIGNATURE INTELLIGENCE |
|
SIGINT |
SIGNALS INTELLIGENCE |
|
COMINT |
COMMUNICATIONS INTELLIGENCE |
|
FISINT |
FOREIGN INSTRUMENT SIGNALS INTELLIGENCE |
|
ELINT |
ELECTRONIC INTELLIGENCE |
|
IMINT |
IMAGERY INTELLIGENCE |
|
ACINT |
ACOUSTIC INTELLIGENCE |
|
8 CATEGORIES OF CULTURAL AWARENESS |
PERSISTENCE AWARENESS CLIMATE COMMITMENT LEVELS OF INCLUSION LEVELS OF TOLERANCE AND UNDERSTANDING DEGREE OF EMPATHY DEGREE OF ADAPTION AND CHANGE |
|
4 TYPES OF AMPHIBIOUS OPERATIONS |
ASSUALT RAID DEMONSTRATION WITHDRAWAL |
|
6 PLANNING PHASES OF AN AMPHIBIOUS OPERATION |
MISSION ANALYSIS COA DEVELOPMENT COA WAR-GAME COA COMPARE AND DECIDE ORDERS AND OPGEN DEVELOPMENT TRANSITION |
|
OPERATIONAL PLANNING |
SHORT TERM WAYS OF ACHIEVING MILESTONES AND EXPLAINS HOW, OR WHAT PORTION OF, A STRATEGIC PLAN WILL BE PUT INTO OPERATION DURING A GIVEN OPERATIONAL PERIOD |
|
OPERATIONS ORDER |
SITUATION FACING THE UNIT, THE MISSION OF THE UNIT, AND WHAT ACTIVITIES THE UNIT WILL CONDUCT TO ACHIEVE THE MISSION GOALS |
|
WARNING ORDER |
PRELIMINARY NOTICE OF AN ORDER OR ACTION WHICH IS TO FOLLOW |
|
PLANNING ORDER |
PLANNING DIRECTIVE THAT PROVIDES ESSENTIAL PLANNING GUIDANCE AND DIRECTS THE INITIATION OF EXECUTION PLANNING BEFORE THE DIRECTING AUTHORITY APPROVES A MILITARY COURSE OF ACTION |
|
EXECUTE ORDER |
ORDER TO INITIATE MILITARY OPERATIONS AS DIRECTED |
|
CONCEPT PLAN |
ABBREVIATED FORMAT THAT MAY REQUIRE CONSIDERABLE EXPANSION OR ALTERATION TO CONVERT IT INTO A COMPLETE OPERATION PLAN OR OPERATION ORDER |
|
AGENCY RESPONSIBLE FOR HUMAN INTELLIGENCE |
DEFENSE INTELLIGENCE AGENCY |
|
AGENCY RESPONSIBLE FOR SIGNAL INTELLIGENCE |
NATIONAL SECURITY AGENCY |
|
AGENCY RESPONSIBLE FOR IMAGERY INTELLIGENCE |
NATIONAL GEOSPATIAL AGENCY |
|
CVN CAN COLLECT WHICH TYPES OF INTELLIGENCE |
SIGINT, ELINT, COMINT, IMINT, HUMINT, OSINT & ACINT |
|
SUPPORTING ARMS COORDINATOR |
PLANS, COORDINATES AND CONTROLS ALL ORGANIC AND NONORGANIC FIRES WITHIN THE OPERATIONAL AREA IN SUPPORT OF THE ASSAULT FORCE |
|
NAVAL GUNFIRE SECTION |
MONITORS THE NAVAL GUNFIRE CONTROL, SUPPORT AND OTHER NETS |
|
AIR SUPPORT SECTION |
CONTROL OF ALL AIRCRAFT IN THE OBJECTIVE AREA ASSIGNED FOR TACTICAL AIR OPERATIONS, INCLUDING OFFENSIVE AND DEFENSIVE AIR SUPPORT |
|
TARGET INFORMATION CENTER |
TARGETING INFORMATION AND INTELLIGENCE |
|
LANDING FORCE FIRE SUPPORT COORDINATOR |
FIRE SUPPORT FOR THE LANDING FORCE |
|
FORWARD AIR CONTROLLER |
CONTROLS ALL AIRCRAFT IN SUPPORT OF THE LANDING FORCE |
|
AMPHIBIOUS TASK FORCE TARGET INTELLIGENCE OFFICER |
PROVIDES INTELLIGENCE SUPPORT FOR UNITS ASSIGNED TO THE AMPHIBIOUS TASK FORCE |
|
LANDING FORCE TARGET INTELLIGENCE OFFICER |
PROVIDES INTELLIGENCE SUPPORT TO LANDING FORCES |
|
JOINT SERVICE IMAGERY PROCESSING SYSTEM-NAVY (JSIPS-N) |
PRIMARY IMAGERY SYSTEM FOR CVN |
|
CORONA |
THE FIRST IMAGING SYSTEM TO PROVIDE ALL WEATHER, NEAR REAL-TIME IMAGERY |
|
IMAGERY THAT RADAR PROVIDES |
DAY/NIGHT, ALL WEATHER |
|
IMAGERY THAT ELECTRO-OPTICAL PROVIDES |
DAY, HIGH RESOLUTION, AFFECTED BY WEATHER |
|
IMAGERY THAT INDFRARED PROVIDES |
DAY/NIGHT, INFRARED LOW RESOLUTION, AFFECTED BY WEATHER |
|
IPIR |
INITIAL PHASE INTERPRETATION REPORT |
|
IPL |
IMAGE PRODUCT LIBRARY |
|
JCA |
JOINT CONCENTRATOR ARCHITECTURE |
|
PTW |
PRECISION TARGETING WORKSTATION |
|
DCGS-N |
DISTRIBUTIVE COMMON GROUND STATION-NAVY |