Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/205

Click to flip

205 Cards in this Set

  • Front
  • Back
Five Steps of ORM

"IAMIS"
1) Identify Hazards
2) Assess Hazards
3) Make Risk Decisions
4) Implement Controls
5) Supervise
Objectives of First Aid
1) Save Life
2) Prevent Further Injury
3) Limit Infection
Difference Between Open and Closed Fractures
- Open (AKA Compound): bone protrudes from skin

- Closed (AKA Simple): break is internal
Methods to Control Bleeding
1) Direct Pressure
2) Pressure Points
3) Tourniquet
11 Pressure Points
1) Jaw
2) Neck
3) Collarbone
4) Wrist
5) Inner-Upper Arm
6) Inner Elbow
7) Upper Thigh
8) Ankle
9) Knee
10) Groin
11) Temple
Symptoms of Shock
1) Dilated Pupils
2) Pale/Clammy Skin
3) Shallow Breaths
MSDS
Material Safety Data Sheet - document used for HAZMAT
HERO
HERF
HERP
- Hazards of electromagnetic radiation to ordinance
- Hazards of electromagnetic radiation to fuel
- Hazards of electromagnetic radiation to personnel
Levels of War
- Tactical
- Operational
- Strategic
Battle of Midway
- Turning point of war
- Cryptology role: broke Japanese code (PURPLE CODE)
Coral Sea
First air to air only battle (ships never saw each other)
On the Roof Gang
Enlisted Navy personnel who laid cornerstone for Navy cryptology
First Navy Ship Named After an Enlisted Man
USS Osmand Ingram (DD 255)
Classes of Vessels at the Navy's Inception
- Sloops of war
- Frigates
- Ships of the line
Six Areas of Naval Doctrine

"COWLIP"
1) Command and Control
2) Operations
3) Warfare
4) Logistics
5) Intelligence
6) Planning
Seven Principles of Logistics

"FEARSSS"
1) Flexibility
2) Economy
3) Attainability
4) Readiness
5) Sustainability
6) Survivability
7) Simplicity
Created by the National Security Act
- National Security Council (NSC)
- Central Intelligence Agency (CIA)
Gun Salutes
- Presidents' Day
- Memorial Day
- Independence Day
- Admiral gets 17
- VIce Admiral gets 15
- Rear Admiral gets 13
- Commodore gets 11
ONI
Office of Naval Intelligence

- Established in 1882
- Oldest intelligence organization in the Navy
- LT Theodorous Bailey Myers Mason was first director
Sailors Creed
Written by the Blue Ribbon Recruit Training Panel in 1993
2nd Fleet
Atlantic; Norfolk
3rd Fleet
East/Central Pacific; San Diego
4th Fleet
South/Central America & Caribbean; Mayport
5th Fleet
Middle East/Gulf; Bahrain
6th Fleet
Mediterranean; Gaeta, Italy
7th Fleet
West Pacific/Indian Ocean; Yokosuka, JP
10th Fleet
Worldwide; Ft Meade

- NETWARCOM falls under 10th Fleet
IDC Core Ratings
- AG
- CT
- IT
- IS
NCDOC
Navy Cyber Defense Operations Command

- Provides 24/7 protection of Navy's cyber systems
Navy Mission
Train, maintain, and equip combat readiness capable personnel when in war and maintain freedom of the seas
NCTAMS
Naval Computer Telecommunication Area Master Stations

-Two Locations: Norfolk and Hawaii
NGA
National Geospatial Intelligence Agency
NSA
National Security Agency

- Produce foreign signals intelligence information
EDVR
Enlisted Distribution Verification Report

- Sections: 1 - gains
2 - losses
3 - persons on board TEMDU in deserter status
4 - alpha roster
Page 4
Qualifications/Awards
Page 2
Dependents/Emergency Data
Page 13
Administrative Remarks
OPREP-3 Reports
- Navy SITREP
- Navy Blue
- Pinnacle
Chain of Command:

- Commander, 10th Fleet
- Commander, NETWARCOM
- Commander, NAVCYBERFORCOM
- Commander, FLTCYBERCOM
- Commander, USCYBERCOM
- FLTCYBERCOM, Force Master Chief
- FLTCYBERCOM, Fleet Master Chief
- DIRNSA
- RADM Rodgers
- Captain Chandler
- VADM Herbert
- RADM Rodgers
- General Alexander
- Master Chief Powers
- Master Chief Welch
- General Alexander
Brilliant on the Basics

"MICROS"
- Mentorship
- Comman Indoctrination
- CDBs
- Sailor Recognition
- Ombudsman support
- Sponsorship
DPAS
Defense Property Accountability System

- Track lifecycle of property from receipt to disposition
MOV
Material Obligation Validation

- Contains:
- Julian Date
- Nomenclature
- Balance (running)
DLR
Depot Level Repair

- Manage high cost items that cannot be repaired or reused

- Two Types: turn-in and remain in place
CASREP
Casualty Report

- Equipment malfunction or deficiency cannot be corrected within 48 hours

- Training commands cannot perform

- 4 Categories
NSN
National Stock Number

- 13 digits used to identify an item in the system
APL
Allowance Parts List

- List of equipment on board
OPTAR
Operating Target

- Money required for unit to perform mission; "operating budget or checkbook"
When to Change Safe Combos
- First Install
- Compromise
- Personnel Transfers
SF 700
SF 701
SF 702
SF 703
- Security Container Envelope
- Activity Security Checklist
- Security Container Checklist
- TS Cover Sheet
Directives that Govern Personnel Security
- ICD 704
- ICPD 704.1 - 704.5
- SECNAVINST 5510.30
- DOD 5105.21 - M - 1
Emergency Destruction Priorities
Priority 1: Crypto/COMSEC/EKMS

Priority 2: SCI Codeword, Targeting Materials/Projects

Priority 3: Less sensitive administrative and collateral
SAER
Security Access Eligibility Report

- Reasons for SAER: drugs, debt, compromise, arrest, DUI, mental health
.mil Email Address
- DOD has exclusive use of this domain, restricted to use by US entities
SCI
Sensitive Compartmented Information
Agency that Conducts Clearance Interviews
OPM (Office of Personnel Management)
Agency Responsible for Adjudicating
DONCAF (Department of the Navy Central Adjudication Facility)
Can the CO Administratively Suspend a Clearance/How Long?
Yes/90 Days
Manual that Governs SCI Facilities (SCIF)
- ICD 705
IA
Information Assurance

- Basic security practices all users, operators, managers follow to keep information systems in security standards
Five Attributes of IA

"CIANA"
1) Confidentiality
2) Integrity
3) Availability
4) Non-repudiation
5) Authentication
ATO
Authority/Approval to Operate
IATO
Interim Authority/Approval to Operate

- Good for 180 days and can be extended an additional 180 days
Certification
Evaluation of technical and non-technical security features of a system
Accreditation
Decision to operate in a special environment; Designated Approving Authority (DAA)'s acceptance of responsibility
Requirements to be an Information Assurance Manage (IAM)
- US citizen
- Assigned in writing
- Not a collateral
- Attend DAA school
- Cleared to same level as system
Vulnerability vs. Threat
- Vulnerability is actual threat

- Threat is how bad the vulnerability will affect the system.

"Cupcake vs. Fat Boy"
3 Levels of Information Assurance Vulnerabilities
1) IAVA: Information Assurance Vulnerability Alert - used for immediate action
2) IAVB: Information Assurance Vulnerability Bulletin - medium; not immediate but will be a problem
3) IAVT: Information Assurance Vulnerability Technical Advisory - general issues
SSP
System Security Plan

- Aid in certification process; required settings and postures to be maintained listed
Malicious Mobile Codes
- Virus
- Worm
- Trojan Horse
- Rootkit
- Spyware
- Mobile code
NIPRnet
SIPRnet
JWICS
NMCI
NSAnet
- Nonsecure Internet Protocol Router network (unclassified)
- Secret Internet Protocol Router network (secret)
- Joint Worldwide Intelligence Communications System
- Navy and Marine Corps Internet (unclassified/secret)
- NSA infrastructure (TS/SCI)
PKI
Public Key Infrastructure

- Used for User ID
LAN
MAN
WAN
- Local Area Network
- Metropolitan Area Network
- Wide Area Network
7 Layers of OSI Model

"People Don't Need To See Paula Abdul"
1) Physical
2) Datalink
3) Network
4) Transport
5) Session
6) Presentation
7) Application
Router
A physical device that joins multiple wired or wireless networks
IPv6
IPv4
- 128 bytes
- 32 bytes
Dictionary Attack
Cycles through known words in the dictionary to crack passwords
4 Types of Topology
1) Bus
2) Ring
3) Star
4) Mesh
Social Engineering
Practice of tricking a user into giving sensitive information
Phishing
Attack that uses email or a malicious website to get personal information
Hub
Common connection point for devices in a network
Message Precedence
R: Routine
P: Priority
O: Immediate
Z: Flash
INMARSAT
Commercial satellite system used for voice and data IP communications from ships at sea
Gingerbread
Codeword used when an intruder is on the net
Beadwindow
Said when EEFI has been disclosed on a circuit
River City
Communication restriction tool used to prevent disclosure of mission information

River City 1: Most Restricted; CO, XO, key personnel
River City 2: Dept Heads
River City 3: Chiefs and above
River City 4: Normal Access
MIJI
Meaconing, Intrusion, Jamming, and Interference
PLA
Plain Language Address
- command short title

Example is NIOC Hawaii
COMSPOT
Communications Spot Report

- GENSER message that reports communications outages; sent at immediate precedence after 30 minutes of outage
OTAT
Over-the-Air Transfer
OTAR
Over-the-Air Rekey
EKMS
COMSEC handling guides
TEMPEST
Used to analyze and measure unwanted signal leakage due to equipment radiation
EMCON
Emissions Control

- Control emissions from ship to change the signature to who is looking, tracking, or listening
5 Core Capabilities of Intelligence Operations
1) CNO (Computer Network Operations)
2) OPSEC (Operations Security)
3) MISO (Military Intelligence Surveillance Operations)
4) MILDEC (Military Deception)
5) EW (Electronic Warfare)
FES
Fleet Electronic Support

- They do the installation, removal, maintenance, and repair of all crypto for DIRSUP.
CCOP
Cryptologic Carry On Plan

- Specialized equipment for fleet based cryptologic requirements.
MOC
Maritime Operations Center
ASW
Anti Submarine Warfare
STW
Strike Warfare
AW
Air Warfare
NSW
Special Warfare
USC Title Outlines the Role of War and National Defense in the US
USC Title 50
Red Team
Unannounced assessments of security and readiness by an unfamiliar team of operators
Blue Team
Assist in protection of target assets and conduct training to local personnel
NITES
Navy Integrated Environment Support System
METOC
Meteorology and Oceanography Center

- Forecast database tailored to a specific platform
Who is the OPSEC Officer?
LTJG Blaukamp
FIve Step Planning for OPSEC

"ICCCA"
1) Identify Critical Information
2) Conduct Threat Analysis
3) Conduct Vulnerability Analysis
4) Conduct Risk Assessment
5) Apply Countermeasures
Web Risk Assessment (WRA)
Conducted on DON websites to report OPSEC vulnerabilities
Who is on Command OPSEC Team?
- CO
- XO
- Dept Head
- OPSEC Officer
- Dept/Div Reps
Goal of Intelligence
Provide commanders the intelligence support needed to win in combat
Six Steps of Intelligence

"PCPADE"
1) Planning and Direction
2) Collection
3) Processing and Exploitation
4) Analysis and Production
5) Dissemination and Integration
6) Evaluation and Feedback
Three Categories of Intelligence
1) Tactical
2) Operational
3) Strategic
Organization Responsible for HUMINT
CIA
Organization Responsible for SIGINT
NSA
Examples of Intelligence Briefings
- Deployment briefs
- Debriefings
- Port brief
Continuous Wave (CW)
Wave with constant amplitude and frequency
ELF
SLF
ULF
VLF
LF
MF
HF
VHF
UHF
SHF
EHF
3 - 30HZ
30 - 300Hz
300Hz - 3kHz
3 - 30kHz
30 - 300kHz
300kHz - 3MHz
3 - 30MHz
30 - 300MHz *Bridge to Bridge*
300MHz - 3GHz
3 - 30GHz
30 - 300GHz
Direction Finding
Procedure for obtaining lines of bearings (LOBs)
Propagation
Ability to transmit freely through space
Pulse Duration
Duration between leading and trailing edge of a pulse
PRI
Pulse Repetition Interval

- Duration of time from the leading edge of one pulse to the leading edge of another pulse
Frequency
Number of cycles that occur in one second
Characteristics of a Modulated Wave
Carrier wave impressed data is in upper and lower side bands
OPELINT vs. TECHELINT
- OPELINT is reporting on emitter activity, disposition and movement; provides COP (Common Operational Picture)

- TECHELINT is manual analysis of characteristics and parameters; in depth pulse analysis
Primary Difference between Air Search and Surface Search
- 2D v. 3D Air is usually 3D (bearing, range, altitude)

- Surface is 2D (bearing and range)
Different Modulation Types
- Phase
- Frequency
- Amplitude
- Pulse
Ducting
Temperature and moisture in the atmosphere that allows greater bending and can extend the radio wave
Multiplexing
Simultaneous transmission of two or more signals over a common carrier wave
Tornado
Wind storm over land with funnel shaped cloud that extends toward the ground
Hurricane
Tropical cyclone with heavy rain and winds 73-136 knots
Tropical Storm
Heavy winds and rain 34-63 knots
Tropical Storm and Cyclone Conditions (TYCON)
Condition I: 12 hours
Condition II: 24 hours
Conditon III: 48 hours
Condition IV: 72 hours
Condition V: More than 72 hours
Wind Chill
Air temperature felt on exposed skin due to wind
Sky Condition
The appearance of the sky
Restricted Visibility
Limited visibility due to mist, fog, rain, and snow
Precipitation
All forms of water that falls from clouds and reach ground
Fog
Collection of ice crystals suspended in air near the surface of the earth
Atmospheric Pressure
Pressure exerted by the atmosphere
Sunrise
Daily appearance of the sun over east horizon because of the earth's rotation
Sunset
Daily disappearance of the sun below west horizon
3 Layers of Atmosphere
1) Troposphere
2) Stratosphere
3) Ionosphere
2 Major Launch Facilities
1) Kennedy Space Center, Florida
2) Vandenberg Air Force Base, California
Apogee vs. Perigee
Apogee - point of orbit farthest from earth

Perigee - point of orbit closest to earth
Types of Orbit
Low Earth Orbit (LEO): 150 - 800 miles above earth

High Elliptical Orbit (HEO)

Geosynchronous (GEO)
GPS
Global Positioning System

- Space based radio positioning systems that provides 24hr 3D positioning, velocity, and time information
Defense Satellite Communications System (DSCS)
Provides worldwide, jam resistant, secure voice for C2, crisis management, and Intel data transfer service
Length of Solar Cycle
11 Years
Van Allen Belts
Radiation belts are hazardous to satellites around earth
DLPT
Defense Language Proficiency Test
Minimum DLPT scores for CTI
L2/R2
Category Four Languages
- Chinese
- Arabic
- Korean
- Japanese
DD Form 1847-1
SCI Non-disclosure Agreement
LOI
Letter of Intent - deny/revoke eligibility

- 15 days to respond
- CO can extend 45 days
LOD
Letter of Denial - unfavorable eligibility made

- 30 days to respond
- CO can extend 15 days
PSAB
Personnel Security Appeals Board

- Has final authority on appeals for unfavorable determinations
Operational Control (OPCON) of FLTCYBERCOM
USCYBERCOM
Administrative Control (ADCON) of FLTCYBERCOM
CNO
CSG (3 Categories)
Cryptologic Service Group

1) Permanent
2) Service Component
3) Expeditionary
NSL
RTL
BDA
- No Strike List
- Restricted Target List
- Battle Damage Assessment
MILDEC vs. MISO (PSYOP)
- MILDEC uses deliberate deception methods to mislead.

- MISO uses selected truths to influence adversaries.
3 Types of MILDEC
1) Physical: inflatables
2) Technical: deceptive communications
3) Administrative: pictures
TACSIT (3 Levels)
Tactical Situation

TACSIT 1: Enemy knows exact location of strike group

TACSIT 2: Enemy knows general location of strike group

TACSIT 3: Enemy does not know location of strike group
EP-3E
EA-6B Prowler
E-2 Hawkeye
EA-18G Growler
- Signals Intel Recon Aircraft
- Electronic Warfare (EW) jamming
- Early Warning
- Electronic Attack (EA)
Ships with temporary SSES
- DDG Flight (FLT) I
- LPD
4 Conditions of EMCON
A - radio silence
B - hide from satellites
C - reduce ability of enemy to target
D - essential equipment authorized
Who can impose and/or break EMCON?
IWC (Information Warfare Commander)
JCMA
Joint COMSEC Monitoring Agency
Who is the IO Officer?
Mr. Cory Sparks
Who is the Assistant IO Officer?
CTRC Braden
How often is IO training required?
Annually
Define a US person.
- US Citizen
- Alien lawfully admitted for permanent residence
- A corporation that is incorporated in the US
Publication that governs collection on US persons.
SP0018
Manual that governs intelligence oversight reporting and training.
SECNAVINST 3320.2E
Publication that governs collection on host nations.
SP0009
Publication that governs Intelligence Oversight.
E. O. 12333
NSRP (3 Types)
National SIGINT Requirements Process

1) Research
2) Limited Duration
3) Standing
NSRP (Time Criticality of INs)
- Time Critical: 3 days or less

- Time Sensitive: 4 - 29 days

- Routine: more than 30 days
RASIN Manual
Manual used by USSS for COMINT signal classification
SURREY
NSA database for collection requirements that allows SIGINT analysts and collection management authorities to originate, retrieve, and track collection
RADAR
Radio Detection and Ranging
Natural Horizon v. Radio Horizon
- Natural Horizon is line of sight
- Radio Horizon is approximately 1/3 greater because of space wave being slightly reflected from ground to receiving antenna
Range
Length of a straight line from the radar to the target
Doppler Effect
Apparent change in frequency and pitch when a sound source moves closer or farther away
Echo
Energy reflected from the target
Diffraction
Bending of a wave around an object
Attenuation
Loss of intensity through a medium
Absorption
Energy is absorbed by matter
3 Characteristics of Sound
1) Pitch
2) Intensity
3) Clarity
Reporting Criteria Examples for CRITIC
- Intel on imminent attack
- Threat to US forces or attack on any US asset
- POTUS is kidnapped
- Hostile acts/terrorist acts
- Political disruption
- Crisis (Hurricanes, Tsunami)
Timelines for CRITIC
- 10 minutes to send
- 30 minutes for followup
- 6 hours for summary
- Sent at WW (Flash Override)
Message Precedences
RR: Routine; within 6 hours
PP: Priority; 3 hours
OO: Immediate; 30 minutes
ZZ: Flash; 10 minutes
TACREP vs. KL
- TACREP: does not have the COMTECH line like a KL
IGRAM
Use of multimedia to expand information of original SIGINT report
STRUM
Standard Technical Report Using Modules
Why would you need to MINIMIZE?
During emergency situations, minimize to reduce the volume of message traffic.
NIOC Hawaii PDDG
F2
SIGAD
USJ-750; Used because it is a shorter title
GCCS-M
Global Command and Control System Maritime

-Displays COP for blue and red forces
GALELITE
Generic Area Limitation Environment

- Provides COP and operational planning in a single picture...near real time
VINTAGE HARVEST
World wide web based signals database
WRANGLER
ELINT database
Date that Navy was established
13 October 1775
Year that National Security Act was signed
1947
Year that Central Security Service was established
1972