• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/442

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

442 Cards in this Set

  • Front
  • Back
101 FIRST AID / SAFETY
101 FIRST AID / SAFETY

Next set of slides
ORM
(Operational Risk Management)

Management tool to identify, access & manage risk
5 Steps of ORM
ID hazards
Assess Risk
Make risk decisions
Implement Controls
Supervise
Implement Controls
Administrative
PPE
Engineering
RAC
(Risk Assessment Codes)
1 Critical
2 Serious
3 Moderate
4 Minor
5 Negligible
SIREP
(Safety Investigation Report)

Submit w/ in 30 days
3 Objectives of First Aid
Save life
Prevent further injury
Limit infection
3 Methods of Controlling Bleeding
Direct pressure
Pressure points
Constricting band
give 2 Pressure Points
Temple, Lower Neck, Wrist, Bicep, Armpit, Inside Thigh, Ankle, Foot
How to use water when treating shock
Sparingly
Body exposed to subnormal temparatures
Hypothermia
Types of Frostbite
Deep
Superficial
Body depleted supply of water and salt
Heat Stroke
Hazards from Electromagnetic Radiation
Ordnance (HERO)
Personnel (HERP)
Fuels (HERF)
MSDS
Material Safety Data Sheets (MSDS)
MSDS informations
Hazards
Ingredients
First Aid
Contact Info
Last Update
Disposal
PPE
Hearing Conservation Program
Prevent occupational hearing loss
102 HERITAGE / DOCTRINE
102 HERITAGE / DOCTRINE

Next set of slides
6 areas comprise Naval Doctrine
Command & Control
Operations
Warfare
Logistics
Intelligence
Planing
7 principles of Naval Logistics
Responsiveness
Economy
Flexibility
Simplicity
Attainability
Sustainability
Survivability
First navy ship named after an Enlisted man
Osmond Ingram (DD 255)
Launched year 1919
3 classes of naval vessels at inception of U.S. Navy
Ships of the Line
Frigates
Sloops of War
Battle of Coral Sea
-7-8 May 1942
-Breaking of the Japanese Navy code
-Carier to Carier
Voyage of the Great White Fleet
-Pre-World War I year 1907
-Show strength of the U.S. Navy
Apollo 11
-1969
-First lunar landing
-Neil Armstrong
STS-1
-1981
-First orbital test flight of Space Shuttle
-16 orbits
-All Navy crew
Father of Navy Cryptology
Laurence Stafford
US Navy ship captured, remains in North Korea
USS PUEBLO
D-Day Landing
June 6, 1944
Bletchley Park also known as
Station X
Navajo Code Talkers
-Radio messages sent in native language which were never broken by Japanese.
-Philip Johnston
3 levels of war
Strategic
Tactical
Operational
Who develop Sailor's Creed & Core Values
ADM Frank Kelso
Grace Hopper's contributions to U.S. Navy
-"It's easier to ask forgiveness than it is to get permission"
-COBOL Computer Language
-"Bug""De-Bugging"
-HARVARD MK 1 Computer
First computer
ABC (Atanasoff-Berry Computer) or ENIAC
ONI (Office of Naval Intelligence)
-Oldest continuously operating intelligence organization
-General Order 292
Departments that combined to form ONI
Navy Department Library & Naval Office of Intelligence
First E-mail sent
1972
103 ORGANIZATION
103 ORGANIZATION

Next set of Slides
Mission of the U.S. Navy
Maintain, train and equip combat-ready naval forces capable of winning wars, deterring aggression and maintaining freedom of the seas.
U.S. Southern Command (SOUTHCOM) location:
Miami, Florida
U.S. Special Operations Command (SOCOM) location:
Tampa Bay, Florida
2nd Fleet
Norfolk, Virginia
3rd Fleet
San Diego, California
4th Fleet
Mayport, Florida
5th Fleet
Manama, Baharain
6th Fleet
Geata, Italy
7th Fleet
Yokosuka, Japan
10th Fleet
Ft. Mead, Maryland
(Global)
NCA
National Command Authority
104 ADMINISTRATION
104 ADMINISTRATION

Next set of slides
President
SECDEF
SECNAV
CNO
MCPON
President - Obama
SECDEF - Hagen
SECNAV - Maybus
CNO - Greenert
MCPON - Stevens
EDVR
Enlisted Distribution Verification Report

Includes: prospective gains, prospective losses, personnel onboard for temp duty, in a deserter status or admin.
ODCR
OFFICER DISTRIBUTION CONTROL REPORT
Evaluation report
E6 Below
Fitness report
E7 above
Concurrent report
IA Personnel

Additional Duty (ADDU) or Temporary Additional Duty (TEMADD) status
Page 2
Page 4
Page 13
Page 2 – Personnel/dependant information
Page 4 – Qualifications/Awards
Page 13 – Misc remarks
PTS program
Force shaping tool that aids in leveling rating manning
Name 3 Officer programs
-Seaman to Admiral-21 (STA)
-Enlisted Commissioning Program (ECP)
-Aviation Enlisted Commissioning Program (AECP)
-Nuclear Enlisted Commissioning Program (NECP)
-Civil Engineer Corps Enlisted Commissioning Program (CECECP)
-Fleet Accession to Naval Reserve Officer Training Corps (NROTC)
-US Naval Academy
-Limited Duty Officer (LDO)
-Chief Warrant Officer (CWO)
ESO
Chief Mendoza
DAPA
Senior Chief Young
Brilliant on the Basics
Sponsor
Indoctrination
Ombudsman
Mentorship
Career Development Boards
Sailor recognition
PAO
LTJG Puentes
105 SUPPLY & SUPPORT
105 SUPPLY & SUPPORT

Next set of slides
3-M
Maintenance and Material Management
PMS
Planned Maintenance System
MOV
Material Obligation Validation
DLR
Depot Level Repairable

1 for 1 turn in
RIP
Remain in Place
MAMs
Maintenance Assist Modules
Bulkhead ready spares
Bulky items that are stored in the actual spaces that they will be used
CASREP
Malfunction or deficiency cannot be corrected within 48 hours & reduces an ability to perform primary or secondary mission
4 categories of CASREP
Initial
Update
Correct
Cancel
NSN
National Stock Number
APL

AEL
Allowance Parts List

Allowance Equipage List
NC
Not Carried
SIM
Selected Item Maintenance
DD Form 1348-6
Receipt of material
DD Form 200
Survey
CHRIMP
Consolidated Hazardous Material Reutilization & Inventory Management Program
Government commercial purchase Card
Micro purchases - $3000
Training - $25000

Over $3000 needs 3 quotes from 3 different vendors
106 SECURITY
106 SECURITY

Next set of slides
Classification color codes:
CSI
Top Secret
Secret
Confidential
Unclassified
CSI - YELLOW
Top Secret - ORANGE
Secret - RED
Confidential - BLUE
Unclassified - GREEN
SECNAVINST 5510.30
PERSONNEL SECURITY
SECNAVISNT 5510.36
INFORMATION SECURITY
Explain “need-to-know”
Recipient requires access to specific classified information
-Top Secret
-CSI
SSBI , SSBIPR , PPR every 5 years
-Secret
-Confidential
NACLC every 10 years
SAER
Security Access Eligibility Report
SF 701
Activity Security Checklist
SF 702
Security Container Check Sheet
SF 703
Top Secret Coversheet
SF 312
Classified Non-disclosure agreement
State when Safe combinations should be changed
-When combination lock is first installed
-Combination has been compromised
-At other times when considered necessary by the SSO
EAP
Emergency Action Plan
Who can give order to initiate Emergency Destruction.
CO or SSO
Difference between a security violation and (PDS) practice dangerous to security
Security violation is a compromise of classified information.
PDS is failure to comply w/ the security regulations.
Explain DoD escort policy
Only DoD civilian & military assigned to SCIF are authorized to escort
How long a Commanding Officer can administratively suspend access
90 days
Emergency Destruction Procedures
Priority one
Priority two
Priority three
107 INFORMATION ASSURANCE
107 INFORMATION ASSURANCE

Next set of slides
Define IA
Protects information & information systems by ensuring their availability, integrity, authentication, confidentiality & non-repudiation.
ATO
Approval to Operate
IATO
Interim Approval to Operate
DAA
Designated Approving Authority
5 Attributes of IA
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
Confidentiality
Information is not disclosed
Integrity
Information is not modified
Availability
Timely & reliable access to data & information systems
Non-repudiation
sender of data is provided w/ proof of delivery & recipient is provided w/ proof of sender's identity
Authentication
validation of e-mail messages & information system access requests
Configuration Management
controlling changes to system’s hardware & software, insuring changes will not decreased data security
Risk management
to balance operational & economic costs of protective measures to IT systems
IAVA
IAVB
IAVT
-Information Assurance Vulnerability Alerts
-Information Assurance Vulnerability Bulletin
-Information Assurance Vulnerability Technical Advisories
Difference between threat & vulnerability
Threat - potential to adversely impact information systems
Vulnerability - weakness in information systems
IAM
Information Assurance Manager

-Brad Stein
108 NETWORKS
108 NETWORKS

Next set of slides
Firewall
device designed to block unauthorized protocols
Repeater
regenerate weakened signals
Layers of Routing
Access
Distribution
Core
Bus Topology
uses Coaxial cable
Star Topology
-Most common network type.
-Connect computers together from a central point.
Ring Topology
All computers connected to each other.
Mesh Topology
A topology that interconnects every device on the network
LAN
WAN
MAN
GAN
LAN - Local Area Network
WAN - Wide Area Network
MAN - Metropolitan Area Network
GAN - Global Area Networks
OSI Model
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical
What kind of Data passes through Level 1,2,3 & 4
L1- BITS
L2- Frames
L3- Packets
L4- Segment
TCP/IP Model
Application
Transport
Internet
Network Inter-phase
TCP/IP model compared to OSI model:

Aplication
OSI Model:

7. Application
6. Presentation
5. Session
TCP/IP compared to OSI:

Network Inter-phase
OSI Model:

2. Data Link
1. Physical
IPV4

IPV6
IPV4 - 32 bits

IPV6 - 128 Bits
NIPRNET

SIPRNET
NIPRNET – Non-secure Internet Protocol Router Network

SIPRNET – Secure Internet Protocol Router Network
JWICS
Joint Worldwide Intelligence Communications System
NMCI
Contenental US based Internet contract and service
ONE NET
Overseas based Internet contract and service
IT21
Ship's Network
Virus
Malicious program that can harm computer
Worm
Self replicating virus
Trojan
Malicious program that appears to be useful
Phishing
steals personal info through email or websites
PKI
Public Key Infrastructure

- Authentication that verifies user
Social Engineering
Talking, calling on the phone, befriending to get information
Name 2 Operating System (OS)
UNIX, Windows, RedHat, Novell, Mac OS, SCOPE, Newton, Atari TOS, SIPROS, Chrome, BSD, DOS, Posix, Linux, Ubuntu
Difference between a brute force and dictionary attack
Dictionary attack runs through a list of passwords while a brute force attack utilizes every character available.
Name 2 high level language
C++, JAVA, Cobra, Basic, Ada, Jovial, Perl, Delphi, Python, Visual Basic, Pascal, Foxpro, WinDev, Fortran, CLEO
DNS
-Domain Name Server
-Port 53
-Translates IP addresses into a domain name
ARP
-Address Resolution Protocol
-Translates IP address into a MAC address
MAC
Media Access Card
109 COMMUNICATIONS
109 COMMUNICATIONS

Next set of slides
ADNS
Automated Digital Network System
CUDIXS
Common User Digital Information Exchange System
NOVA
-Shore-based message handling systems
-Processes GENSER messages
IBS
Integrated Broadcast Service
NREMS
Navy Regional Enterprise Messaging System
VTC
Video Teleconference
DCO
Defense Connect Online
Red Cross Message
communication system to notify service members of an emergency
GINGERBREAD
Intruder on the net
EEFI
Essential Elements of Friendly Information
BEADWINDOW
disclosing an EEFI on unsecure net
intentional transmission of signals designed to deceive users
Meaconing
deliberate insertion of false information into communications circuits
Intrusion
deliberate radiation, re-radiation, or reflection of electromagnetic energy to disrupt use of electronic devices
Jamming
PLA
Plain Language Address
DTG
Date Time Group
Define the following message precedence:
R, P, O, Z, W
R: Routine 6 hours
P: Priority 3 hours
O: Immediate, 30 minutes
Z: Flash with in 10 muinutes
W: FLASH OVERRIDE
OPTASK COMMS
Nets and approved frequencies w/in a area
COMMPLAN
communication circuits required for underway period
COMSPOT
information concerning serious degradation of communications operations
EKMS
Electronic Key Management System
OTAT

OTAR
Over-the-Air Key Transfer

Over-the-Air Rekey
EKMS Manager

EKMS Alternate Managers
EKMS Manager - ITC Lawson

EKMS Alternate Managers - IT1 Little, IT1 Davis
110 OPERATIONS
110 OPERATIONS

Next set of slides
ASW, IW, AW, STW, NSW
ASW – ANTI-SUBMARINE WARFARE
IW –INFORMATION WARFARE
AW – AVIATION WARFARE
STW – STRIKE WARFARE
NSW-NAVAL SPECAIL WARFARE
IO Core Capabilities
PSYOP, MILDEC, OPSEC, EW, and CNO
3 subdivisions of EW (Electronic Warfare)
EA, EP, ES
3 subdivisions of CNO
CNA, CND, CNE
USC Title 10

USC Title 50
USC Title 10 - outlines the role of armed forces
USC Title 50 - outlines the role of War & National Defense
CCOP
Cryptologic Carry On Program

-augmenting SSES capabilities & providing capabilities where no SSES exists
111 OPSEC
111 OPSEC

Next set of slides
OPSEC
Operations Security

-protects generally sensitive but unclassified information
5 Step Planning Process
1. Identify Critical Info
2. Analyze THREAT
3. Analyze VULNERABILITIES
4. Assess RISK
5. Apply COUNTERMEASURES
OPSEC considerations regarding PAO
PAO & OPSEC officers must be active participants in deciding what information should be released to the public
WRA
Web Risk Assessment
-useful TOOL to determine critical info on command's website
CI
Critical Information

-Position, Capabilities, Operations, Personnel
112 INTELLIGENCE
112 INTELLIGENCE

Next set of slides
Naval Intelligence
-Providing support to operating forces
-Support operations at all levels of warfare both afloat & ashore.
3 categories of Intelligence
Strategic
Operational
Tactical
5 steps of the Intelligence cycle
1. Planning and Direction
2. Collection
3. Processing
4. Production
5. Dissemination
Intelligence Oversight
process of ensuring intelligence activities are conducted in accordance with U.S. law
PIR
Priority Intelligence Requirement
CCIR
Commander Critical Information Requirement
EO 12333
United States Intelligence Activities
Define US citizen and a US person with regards to US Intelligence Oversight
-Born in USA,
-Permanent resident alien (Greencard holder),
-Groups substantially composed of US citizens (51%),
-Corporation incorporated in USA, but not controlled by foreign government
Intelligence Fusion Cell
Uses all source of intel information
HUMINT
-Human Intelligence
-gathering of information through human contact
OSINT
-Open Source Information
-newspapers, journals, radio, television, and the internet
MASINT
Measurement & Signature Intelligence
SIGINT
-Signals Intelligence
-communications, radars & weapons systems used by our adversaries
COMINT
-Communications Intelligence
-interception of FOREIGN COMMUNICATIONS
ELINT
-Electronic Intelligence
-FOREIGN NONCOMMUNICATIONS electromagnetic radiation
FISINT
-Foreign Instrumentation Signals Intelligence
-intercept of foreign electromagnetic emissions
IMINT
-Imagery Intelligence
-interpretation or analysis of imagery
ACINT
-Acoustic Intelligence
-collection and processing of acoustic phenomena.
3 subset of SIGINT
COMINT
ELINT
FISINT
3 examples of Intelligence briefs
Current Intel, Historic Intel, Country files, Ops Intel, Port Intel
113 TECHNICAL FUNDAMENTALS
113 TECHNICAL FUNDAMENTALS

Next set of slides
VHF: Very High Frequency
30Mhz - 300Mhz / Distress
SHF: Super High Frequency
3Ghz - 30Ghz/ Satcom
The number of cycles of a wave that are completed in a unit of time (Hz)
Frequency
Trapping of an RF wave between mediums
Ducting
When a radio wave travels through space from transmitter to reciever
Propagation
3 types of Propagation
Reflection
Diffraction
Refraction
Bending of waves as they move from one medium to another
Refraction
Bending around an object - this medium can be used to encircle the earth
Diffraction
When a wave bounces itself from various surfaces or objects
Reflection
Ability to impress/remove intel info upon a transmission medium
Modulation/Demodulation
Modulation Types
USB, LSB, CW, AM, FM
3 Atmospheric Layers
IONOSPHERE- for long distant point to point comms
STRATOSPHERE- usually no effect on radio waves
TROPOSPHERE - all weather occurs
RADAR
Radio Detection & Ranging
Air Search RADAR
SPS 49, SPS 48, SPS 49
Surface Search RADAR
SPS 55, SPS 73, SPS 77
Fire Control RADAR
SPQ-9B
SLQ 25

SLQ 32
SLQ 25 - Nixie torpedo countermeasures system

SLQ 32 - Electronic Countermeasures
114 METOC
114 METOC

Next set of slides
GOES
Geostationary Operational Environmental Satellite
-Coverage: North America, South America, Africa
-backbone of short term weather forecasting
POES
Polar Operational Environmental Satellite
DMSP
Defense Meteorological Satellite Program
-6 in the orbit
NPOESS
National Polar-Orbiting Operational Environmental Satellite System
-POES & DMSP replacement
TRMM
Tropical Rainfall Measuring Mission
-joint mission between US & Japan
Without humidity & wind chill
Ambiant Air
felt air temp on the exposed skin due to wind
Wind chill
All forms of moisture that fall to the Earth’s surfaces, such as rain, drizzle, snow, and hail
Precipitation
cloud that is in contact with the ground
Fog
Lunar illumination is measured in
Percentage
tornadoes that form over water
Waterspouts
rotating column of wind but not reaching the ground or a water surface
Funnel Cloud
Cold Eddies & Warm Eddies
-Cold Eddies are cold water surrounded by warm water.
-Warm Eddies are warm water surrounded by cold water.
Bioluminescence
emission of light by living organisms
-Blue/Green in Color
currents flow towards the shore
Flood
currents flow away from the shore
Ebb
occur with gentle and flat beach slopes
Spilling breakers
occur with a moderate to steep beach slope
Plunging breakers
very steep beach slope
Surging breakers
Composition of Ocean Bottom
terrigenous, pelagic, glacial marine, and volcanic.
Affects on sound in water
Temperature
Density
Salinity
115 NAVY SPACE
115 NAVY SPACE

Next set of slides
Space support
operations to deploy and sustain military and intelligence systems in space
Space control
freedom of action in space for friendly forces and denies an adversary
has the biggest effect on the space environment
SUN
Two by-products of the fusion process that impact space systems are
Electromagnetic radiation
Electrically charged particles
Solar Cycle
- 11-year cycle which is called the Solar Cycle.
- 4-year rise to solar maximum
- 7-year decline to solar minimum.
Van Allen Radiation Belts
charged particles held in place around the Earth by Earth’s magnetic field
Atmospheric Drag
Low orbiting objects, below 1000km, are slowed by the atmosphere
LEO
MEO
LEO - Low earth orbit
MEO- Medium earth orbit
HEO
Highly elliptical orbit - Satellite slows down at apogee, point furthest away from the earth and speeds up at perigee, point closet to Earth.
Geosynchronous orbit
satellite revolution period approximately equal to one day
orbit is used extensively by imagery satellites
Polar Orbit
Apogee
point on the orbit farthest from the center of the Earth
Perigee
point closest to the center of the Earth
2 main space launch facilities in the U.S.
Cape Canaveral
Vandenberg
Navy UHF Follow-on
The Navy has procured a new satellites to replace aging FLTSATs
DSCS
Defense Satellite Communications System
GBS
Global Broadcast Service
WGS
Wideband Global Satellite Communications
advantages of Space-based ISR
warning, current intelligence, order of battle, scientific and technical intelligence assessments, targeting, and combat assessments
disadvantages of Space-based ISR
atmospheric disturbances such as fog, smoke, electrical storms, and precipitation and clouds
Branch of astronomy that relates to measurements, positions and movements of stars and other celestial bodies
Astrometry
provides network time synchronization service. This service provides accuracy on NIPR and SIPR.
US Naval Observatory
201 ADMINISTRATION
201 ADMINISTRATION

Next set of slides
Adjudication Process
1) Investigation
2) SAER
3) Appeals
4) LOI
5) LOD
6) JCAVS
SAER
Security Access Eligibility Report
LOI
LOD
LOI - Letters of Intent
LOD - Letters of Denial
DONCAF
DEPARTMENT OF THE NAVY CENTRAL AJUDIFICATION FACILITY
purpose of a SF 86
method of requesting to start INVESTIGATION
202 INFORMATION OPERATIONS
202 INFORMATION OPERATIONS

Next set of slides
IO
Information Operations
SSN
SHIP SUBMERSIBLE NUCLEAR
SSGN
SHIP SUBMERSIBLE GUIDED MISSLE
LCC
LHA/LHD
LPD
LSD
PC
Amphibious Command Ships (LCC)
Amphibious Assault Ships (LHA/LHD)
Amphibious Transport Dock (LPD)
Dock Landing Ships (LSD)
Patrol Craft(PC)
CVN
CG
DDG
FFG
Aircraft Carrier (CVN)
Guided Missile Cruiser (CG)
Guided Missile Destroyer (DDG)
Guided Missile Frigate (FFG)
Provide protection for strike aircraft, ground troops & ships by jamming enemy radar, electronic data links & communications
EA-6B Prowler
Provides early warning, threat analysis against potentially hostile air and surface targets.
E-2C Hawkeye
Conduct anti-submarine warfare and maritime surveillance
P-3C Orion
Land-based signals intelligence (SIGINT) reconnaissance aircraft
EP-3E Aries
203 INTEL OVERSIGHT
203 INTEL OVERSIGHT

Next set of slides
Intelligence Oversight
To implement policies, procedures, and governing regulations regarding the conduct of intelligence activities
Questionable Intelligence Activities
Intelligence that may violate Federal law or Executive Order
Special activities
Support of national foreign policy objectives which are planned and executed so the role of the U.S. Government is not acknowledged publicly
3 Intelligence Oversight Publications
USSID SP0009
USSID SP0018
USSID CR1610
Intelligence Oversight reporting & training requirements
Reporting-Quarterly
Training- Annually
Intelligence Oversight reports goes to..
Navy Inspector General (IG)
204 COLLECTION MANAGEMENT
204 COLLECTION MANAGEMENT

Next set of slides
IN
IN- Information Needed
Time Criticality of INs
Routine – 30 days
Time Sensitive – 4 to 29 days
Time Critical – 3 days or less
Types of IN
Research IN
Limited Duration IN – 0 to 89 days
Standing IN – 90 days to 2 years
LOE
-Level of Effort
-SIGINT system’s ability to respond to an intelligence need
NIPF
National Intelligence Priority Framework
Areas of NIPF
Topic
Subtopic
Geopolitical
SURREY
National Security Agency’s (NSA) collection requirement database.
USSID SP Series
SIGINT Fundamental Policy
USSID CR Series
Customer Relationships
USSID SE 2000 Series
SIGINT Enterprise – Maritime
USSID SE 5000 Series
SIGINT Enterprise – NSA-Joint, NSA-Combined, NSA-Collaborating
SIGINT IN process
Step 1. Creation
Step 2. Sponsorship
Step 3. Validation
Step 4. UCS
Step 5. Assignment Rules Base
Step 6. CSMG Action
Step 7. LOE
Step 8. Review – All validated INs are reviewed every two
205 TECHNICAL FUNDAMENTALS
205 TECHNICAL FUNDAMENTALS

Next set of slides
RADAR
Radio detection and ranging
Movement through a medium
PROPAGATION
The number of cycles that occur in one second. Usually expressed in hertz
Frequency
Wave that goes through an object
Refraction
Wave that bends around an object
Diffraction
Wave that bounces off another object
Reflection
Diminishing signal power
Attenuation
3 Basic Characteristics of Sound
Pitch, Intensity, Quality
206 REPORTING
206 REPORTING

Next set of slides
Routine
Priority
Immediate
Flash
Flash Override
Routine – (R) 6 hours
Priority – (P) 3 hours
Immediate – (O) 30 minutes
Flash – (Z) 10 minutes
Flash Override – (W)
CRITIC message
-information of foreign threats to U.S. national security
-needs to leave ship within 3 mins and to the President in 10mins
KLIEGLIGHT (KL)
- used to forward time-sensitive SIGINT technical information to NSO
IGRAM
Integrated Graphics and Multimedia Report

-contain hyperlinks
STRUM
Standard Technical Report Using Modules
GCCS-M
Global Command and Control System-Maritime

-primary field c2 system of US NAVY
IBS
Integrated Broadcast Service
INTELINK
Groups of secured Intranet
Application that retrieves NSA reports using keywords and other search terms
ANCHORY
NSA general processing computing facility
CARILLON
SEALINK
integrates ship movement information, characteristics, images
GALE Lite
Generic Area Limitation Environment-Lite
Air Force version of GCCS-M, a high-resolution, geographic-based graphics system used to display real-time and historical data over a map background.
OILSTOCK
301 HISTORY
301 HISTORY

Next set of slides
NIOC SD established
July 27, 2005
FIWC
FLEET INFORMATIONWARFARE CENTER
- 1995
NSGA
NAVAL SECURITY GROUP ACTIVITY
-1998
4 Departments during inception of NIOC
N3
N4
N5
N10
Lineage: Beach Jumpers
UNITS: Navy's tactical cover and deception units
Founded by: LT FAIRBANKS JUNIOR during WWII
Consisted of 180 officers and 300 enlisted men
Initial action in Operation Husky in Sicily 1943
Nomenclature for Wullenweber Antenna
AN/FRD-10
-Utilized for (DF) Direction finding
Where is Wullenweber Antenna located
Imperial Beach
COMMAND LOGO:
BLACK, RED, GOLD, BLUE, FIERCE OWL, TRIDENT, BLACK/STARS, GREEN GRID, LIGHTING BOLT, 10
BLACK: secrecy
RED: blood
GOLD: excellence
BLUE: Navy tradition
FIERCE OWL: diligence, courage, wisdom
TRIDENT: King Neptune’s Domain.
BLACK/STARS: Cyber space
GREEN GRID: global reach
LIGHTING BOLT: SIGINT and Electronic Warfare
10: 10th Fleet
302 N1- ADMINISTRATION
302 N1- ADMINISTRATION

Next set of slides
Command Ombudsman
Jennifer Cataloglu
CMEO/ Command managed Equal Opportunity
Chief Thomas
Safety Officer
CTNC Mendoza
DAPA / Drug & Alcohol Program Advisor
CTTCS (IDW/SW) Young
OPSEC Officer
Mr. Rutter
ISSM/ Information System Security Manager
Brad Stein
ISSO JWICS/ NSA
Mr. Boulrice and Mr. Brown
CSM/Command Security Manager
XO
CMAA
Chief Mcgrath
SSO/Special Security Officer
Glen Gregoire
Security Badge
Blue – TS/SCI
Orange – Reserve TS/SCI
Green – Contractor
Black U – Unclear
Blue T – TS/SCI NIOC Temp badge
Green T – Contractor attached TS/SCI
Black E – Command Escort
Blue V- Visitor, TS/SCI
Red V- Visitor, Secret
303 N2 INTELLIGENCE
303 N2 INTELLIGENCE

Next set of slides
FICM
FLEET INTELLIGENCE COLLECTION MANUAL
NGA
National Geosphical-intelligence Agency
RFI
Request For Information
give 2 CYBER ORGANIZATIONS
DHS, PENCIRT, NSA, NCDOC, CNOC, NCIS, CIA DIA
ONI SEALINK
Jane’s Book, Information on ships
EX. cargo, hull, capacity
WHISSL
World-Wide High-Interest Shipping List
NHISL
National High Interest Shipping List
Yellow Peril
Created by 10th Fleet
used to be a SUBMARINE WAREFARE FLEET
10th Fleet
304 N3- OPERATIONS
304 N3- OPERATIONS

Next set of slides
IO Core Competency
EW
OPSEC
MILDEC
PSYOP
CNO
305 FLEET ELECTRONIC SUPPORT
305 FLEET ELECTRONIC SUPPORT

Next set of slides
Cryptologic Carry-On Program (CCOP)
Quick response, cost effective alternative to permanent Cryptologic systems
give 3 FES Carry-On systems
ACCES D4, HITS, PAC-V, GALE-Lite, DRT, Turbulent Wave, SCI Networks, PREVENT, TRDF, Sting-Ray, Mudcat
give 2 FES Classes of Ships
Frigates, Cruisers, DDG Flight 1, DDG Flight 2, Carriers, LHA, LHD, LPD
Non-Navy class of ship
Coastguard Cutters
DF
Direction Finding
AS-2867
AS-2867A
AS-2867B
AS-2867 – 30MHz – 1.8GHz
AS-2867A - 30MHz – 3GHz
AS-2867B – 30MHz-3GHz. Has an added GPS for HITS capability
AS-4293
AS-4293A
AS-4293 - 30MHz – 1.3GHz
AS-4293A – 30MHz – 3GHz/Back-up AS-2867B
HF Range antennas:
AS-141
AS-145
AS-3202
AS-141 – 500KHz-30MHz
AS-145 - 500KHz-30MHz
AS-3202 – 150KHz-30MHz Deck edge antenna
HK-014
HK-014 – 100MHz – 1.3GHz. Used w/PREVENT system
Difference between TSCI and SESS
TSCI- Temporary space left empty until tasked
SSES: Permanent SIGINT Space on ship
SSES
Ships Signal Exploitation Space
306 N4 FACILITIES
306 N4 FACILITIES

Next set of slides
Preventive Maintenance
maintenance done before it breaks
Corrective maintenance
maintenance done after something broke
contacted when on-site facilities personnel lack the resources, tools, and/or technical skills to complete a required task
NAVFAC San Diego Trouble desk
OPNAVIST 11010.20G
Facilities Project Manual Instruction
-Provides detailed guidance for the administration of facilities projects at shore installations
It conserves energy and water and making a facility resource efficient, while meeting the comfort, health, and safety requirements of the building occupants
Sustainability
Executive Order 13423
improve energy efficiency and reduce greenhouse gas emissions through reduction of energy intensity
-3% annually through the end of FY2015
-30% by the end of FY2015
Types of Fire extinguishing agents in NIOC
-CO2 bottles in electronic spaces
-ABC extinguishers
-Overhead Sprinklers
Actions taken upon discovery of a fire
– Pull nearest fire alarm
– Spread word verbally
– Call fire department
– Ensure word is passed between BLDG 335 and BLDG 3141
– As safety allows, personnel will close doors and take all reasonable safety measures to combat small, confined fires using portable fire extinguishers
Unified Facilities Criteria 3-600-01 Manual
establishes fire protection engineering policy and criteria for DOD facilities
Micro Purchase Worksheet
Used for Open Purchases
DD-1149
transfer
DD-1348-1A
DRMO
SF 200
Survey
Command process for ordering HAZMAT
HAZMAT free issue center
Pilferable Personal Property Program- PPP
small items easily converted for personal use
Pilferable Personal Property Manager-PPM
CTM2 Lenahan
DRMO
Defense Reutilization Marketing Office
Key information on the document being sent to DRMO
quantity, value, unit of issue, part # , NSN
308 N5/N9 PLANS & INNOVATIONS
308 N5/N9 PLANS & INNOVATIONS

Next set of slides
Lead of Plans/ innovations
John Phillips
LT Cataloglue
N3 Department--- IO Planning
Supports 3rd, 7th & 5th FLEET
309 N6 IT
309 N6 IT

Next set of slides
ISSM
Information Systems Security Manager
ISSO
Information Systems Security Officers
NIPRnet
NIPRnet- Non-secure Internet Protocol Router Network
SIPRnet
SIPRnet- Secure Internet Protocol Router Network
JWICS
Joint Worldwide Intelligence Communication System
Command VTC capabilities and locations
Unclassified and Secret in the class room / 108
Rm 107 Top Secret (JWICS)/ NSA
Over all responsible for the EKMS program
CO
EKMS Alternate Manager
IT1 Little
ET1 Holt
IT2 Davis
310 N7 TRAINING
310 N7 TRAINING

Next set of slides
Survey:
Assessment:
Survey: outside/external: every 3 years
Assessment: internally: annually
OPSEC
Operations Security
OSCAR
Operations Security Collaboration Architecture
Command Indoctrination Program
introducing new command members to the missions and functions of NAVIOCOM San Diego, familiarization with other military bases, and the greater area of San Diego
Operations Security (OPSEC)
Two day course
Deputy Information Operations Warfare Commander Course (DIWC)
Two day course
Navy Information Warfare Tactics and Officers Course (NIWTOC)
Five day course
Surface Electronic Warfare Tactics Course (SEWTAC)
Three day course
Maritime Military Deception (MILDEC)
Two day course
Information Warfare Training Lab (IWTL)
The IWTL is available to provide training on applications used in IO planning
Computer Network Team Trainer(CNTT)
Five day course
NOST
Naval OPSEC Support Team
-Provides program development, training, assessments, surveys, and readiness training
311 N10 CND
311 N10 CND

Next set of slides
Circuit Switched cable
Fiber Optic
Packet Switched cable
Ethernet Cable
routers internal to the network
Internal Routers
attach networks to backbones
Area Border Routers
move data without being a part of an autonomous system
Backbone Routers
ARP
Address Resolution Protocol

-resolves MAC address and IP address
Telnet
Port 23
FTP
File Transfer Protocol
-Port 21
SSH
Secure Shell
-Port 22
SNMP
Simple Network Management Protocol
-Port 161
POP3
Post Office Protocol
-Port 110
DNS
Domain Name Server
-Port 53
SMTP
Simple Mail transfer Protocol
-Port 25
Type 7 Router Password
Easily broken password
new exploit that no patch has been created for
zero day exploit
BLUE TEAM ASSESMENT
Full scope assessment that highlight access and evaluate vulnerabilities of Navy Networks
Bluescope
NSA tool suite that performs all BLUE TEAM scans
Multiverse
is the database/ interface that holds Bluescope results
USB
Universal Serial Bus
CTO 07-05
Lanman Hashes
CTO 08-08
Removal of ALL USB Devices from Navy Networks
CTO 09-08
Navy Networks must use VRAM (Vulnerability Remediation Asset Manager)
CTO 10-15
Password complexity policy