• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/386

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

386 Cards in this Set

  • Front
  • Back
Mercury 3
05 MAY 1961 (Alan B. Shepard) – First U.S. manned space flight.

Gemini 3

23 MAR 1965 (John W. Young) - First U.S. two-man space mission; first spacecraft to maneuver from one orbit to another; 3 Earth orbits.

Apollo 11
16-24 JUL 1969 (Neil A. Armstrong) - First manned lunar landing.
Apollo 17
07-19 DEC 1972 (Eugene A. Cernan and Ronald E. Evans) - Seventh and final lunar landing mission.
STS-1
12-14 APR 1981 (John W. Young and Robert L. Crippen) - First orbital test flight of a Space Shuttle. All Navy crew.
The on the Roof Gang
In July, 1928, CNO announced the establishment of a school to instruct radio operators in intercept operations, particularly for Japanese kana. These classes were held in a wood structure set atop the Navy Headquarters Building in Washington.
The purple code
27 September 1940. The SIS had made their first solution to Japanese diplomatic messages enciphered in the Purple Code. The Purple machine was first used by Japan in June 1938. U.S. and British crypto-analysts had broken some of its messages well before the attack on Pearl Harbor.
Attack on the USS LIBERTY
Israeli Air Force jet fighter aircraft and motor torpedo boats of the Israeli Navy attacked USS Liberty in international waters. Attack killed 34 and injured 170 crew members. Ineffective message handling and routing, the CPA change messages were not received until after the attack.
The Capture of the USS PUEBLO
January 23, 1968. USS Pueblo is an ELINT and SIGINT Banner-class technical research ship (Navy intelligence) which was boarded and captured by the Democratic People’s Republic of Korea (DPRK). North Korea claimed the vessel had strayed into their territorial waters, and U.S. claimed that shipped remained in international waters. Pueblo is still held by DPRK today; officially remains a commissioned vessel of the US Navy. It is located in DPRK’s Wonsan Harbor and used as a museum ship. It is the only US ship currently being held captive.
The Attack on the USS STARK
In 1987 during the Iran-Iraq war, an Iraqi jet fighter fired missiles at the USS Stark; killing 37, wounding 21. It is the only successful anti-ship missile attack on a U.S. Navy warship.
Discuss the National Security Act of 1947
Signed by President Truman on July 26, 1947; realigned and reorganized the US Armed Forces, foreign policy, and the Intelligence Community after the Cold War.
a. Merged the Department of War and the Department of the Navy into the National Military Establishment (later known as DoD) headed by the SECDEF.
b. Established the Joint Chiefs of Staff
c. Eventually unified the Army, Navy and Air Force into a federated structure.
State RADM Grace Hopper’s contribution to the U.S. Navy
The invention, in 1953, of the compiler, the intermediate program that translates English language Instructions into the language of the target computer.
Discuss ARPANET and when it was developed
(Advanced Research Projects Agency Network) created by a small research team at the head of the MIT and the Defense Advanced Research Projects Agency (DARPA) of the United States DoD. World's first operational packet switching network and the predecessor of the contemporary global Internet. The first message transmitted over the ARPANET was sent by UCLA student programmer Charley Kline, on October 29, 1969. Kline transmitted from the university's Host computer to the Stanford Research Institute's Host computer. The first permanent ARPANET link was established on November 21, 1969, between the IMP at UCLA and the IMP at the Stanford Research Institute.
Explain the impact of the John walker espionage case
is a retired United States Navy Chief Warrant Officer and communications specialist convicted of spying for the Soviet Union from 1968 to 1985. CWO Walker helped the Soviets decipher more than a million encrypted naval messages. This is what initiated the requirement of Two-Person Integrity (TPI) when handling classified information.
Location, mission and component commands of PACOM.
Camp Smith, HI, U.S. Pacific Command protects and defends, in concert with other U.S. Government agencies, the territory of the United States, its people, and its interests. With allies and partners, U.S. Pacific Command is committed to enhancing stability in the Asia-Pacific region by promoting security cooperation, encouraging peaceful development, responding to contingencies, deterring aggression, and, when necessary, fighting to win.
Location, mission and component commands of EUCOM
Stuttgart, Germany, The mission of the U.S. European Command is to conduct military operations, international military partnering, and interagency partnering to enhance transatlantic security and defend the United States forward.
Location, mission and component commands of JFCOM
Norfolk, VA, The United States Joint Forces Command provides mission-ready Joint capable forces and supports the development and integration of Joint, Interagency, and Multinational capabilities to meet the present and future operational needs of the Joint Force.
Location, mission and component commands of SOUTHCOM
Miami, FL, ready to conduct joint and combined full-spectrum military operations and support whole-of-government efforts to enhance regional security and cooperation.
Location, mission and component commands of CENTCOM
MacDill, AFB, FL, U.S. Central Command promotes cooperation among nations, responds to crises, and deters or defeats state and non-state aggression, and supports development and, when necessary, reconstruction in order to establish the conditions for regional security, stability, and prosperity.
Location, mission and component commands of NORTHCOM
Peterson AFB CO , anticipates and conducts Homeland Defense and Civil Support operations within the assigned area of responsibility to defend, protect, and secure the United States and its interests.
Location, mission and component commands of SOCOM
Tampa, FL. Provide fully capable Special Operations Forces to defend the United States and its interests. All Military Components.
Location, mission and component commands of TRANSCOM
Galveston, TX. Develop and direct the Joint Deployment and Distribution Enterprise to globally project strategic national security capabilities; accurately sense the operating environment; provide end-to-end distribution process visibility; and responsive support of joint, U.S. government and Secretary of Defense-approved multinational and non-governmental logistical requirements. All Military Components.
Location, mission and component commands of STRATCOM
Offutt AFB, NE. The missions of US Strategic Command are: to deter attacks on US vital interests, to ensure US freedom of action in space and cyberspace, to deliver integrated kinetic and non-kinetic effects to include nuclear and information operations in support of US Joint Force Commander operations, to synchronize global missile defense plans and operations, to synchronize regional combating of weapons of mass destruction plans, to provide integrated surveillance and reconnaissance allocation recommendations to the SECDEF, and to advocate for capabilities as assigned. All military Components.
Location, mission and component commands of AFRICOM
Stuttgart-Moehringen, Germany. United States Africa Command, in concert with other U.S. government agencies and international partners, conducts sustained security engagement through military-to-military programs, military-sponsored activities, and other military operations as directed to promote a stable and secure African environment in support of U.S. foreign policy. All Military Components.
Location, mission and component commands of USCYBERCOM
Direct the operations and security of the Navy's portion of the Global Information Grid (GIG). Deliver reliable and secure Net-Centric and Space war fighting capabilities in support of strategic, operational, and tactical missions across the Navy.

2ND FLEET

(Disestablished 30Sep11, merged into US Fleet Forces Command): Norfolk, VA; Operates in the Atlantic Ocean

3RD FLEET

San Diego; CA; Operates in the Eastern Pacific Area

4TH FLEET

Mayport, FL; Operates in the Caribbean, Central and South America and surrounding waters

5TH FLEET

Manama, Bahrain; Operates in the Arabian Gulf/Indian Ocean/Persian Gulf

6TH FLEET

Gaeta, Italy; Operates in the MED and Black Sea areas

7TH FLEET

Yokosuka, Japan; Operates in the Western Pacific/Indian Ocean

10TH FLEET

Ft. Meade, Maryland; Operates Globally.
Location, mission and component commands of NCTAMS PAC
Location: Wahiawa, HI Mission: Deliver and operate a reliable, secure and battle-ready Navy Network, providing sustained information superiority to Navy, Joint and Coalition war fighters in the Pacific and Indian Ocean areas of responsibility.
Location, mission and component commands of NCTAMS LANT
Location: Norfolk, VA. Mission: provide classified and unclassified voice, messaging, data and video to ships, submarines, aircraft and ground forces operating worldwide in support of Naval and joint missions.
What does C4ISR stand for?
Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance
Define C4ISR
Encompasses the gathering, processing, and distribution of information vital to the conduct of military planning and operations. It forms the foundation of unity of command and is essential to the decision process at all levels. In peacetime, command, control and surveillance systems permit us to monitor situations of interest, giving us indications and warnings that allow us to position our forces when necessary. In humanitarian relief and other support operations, our command and control system becomes part of the overall network by tying together diverse government and non-government agencies, as well as the many international and inter-service forces that may join the operation.
Explain the mission of the DISA (Defense Information Systems Agency)
A Combat Support Agency, engineers and provides command and control capabilities and enterprise infrastructure to continuously operate and assure a global net-centric enterprise in direct support to joint war fighters, National level leaders, and other mission and coalition partners across the full spectrum of operations.
State the mission of the NCDOC (Naval Cyber Defense Operations Comman)
To organize and prioritize, training, modernization, and maintenance, requirements, and capabilities of command and control architecture/networks, cryptologic and space-related systems and intelligence and information operations activities, and to coordinate with Type Commanders, to deliver interoperable, relevant and ready forces at the right time at the best cost, today and in the future.
Define Information Assurance
Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.
Certification
Certification is a comprehensive evaluation of the technical and non-technical security features of an IT system and other safeguards, made in support of the Accreditation process, to establish the extent that a particular design and implementation meets a set of specified security requirements.
Accreditation
Accreditation is the formal declaration by the Designated Approving Authority (DAA) that an Information Technology (IT) system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk.
Designated Approving Authority
The official with the authority to formally assume responsibility for operating a system (or network) at an acceptable level of risk.
Authority to Operate
The formal declaration by the DAA that an Information System is approved to operate in a particular security mode using a prescribed set of safeguards. Good for 3 years.
Interim Authority to Operate
may be issued when the requirements for full Accreditation cannot be met. Must include a milestone plan with dates to achieve full Accreditation. Good for 180 days.
Confidentiality
Authorized restrictions on information access and disclosures, including means for protecting personal privacy and proprietary information.
Integrity
information and programs are changed only in a specified and authorized manner
Availability
timely and reliable access to data and information services for authorized users.
Non-repudiation
An authentication that with high assurance can be asserted to be genuine, and that cannot subsequently be refuted.
Authentication
a measure of confidence that users or processes that access information are who they say they are and have the appropriate rights to access that information.
IAVA (Information Assurance Vulnerability Alert)
High priority network vulnerability with an associated date by which that vulnerability must be eradicated from the network.
IAVB (Information Assurance Vulnerability Bulletin)
Medium priority, associated with vulnerabilities that do not pose an immediate threat to the infrastructure.
IAVT (Information Assurance Vulnerability Technical Advisory)
Technical notes on network vulnerabilities, without remediation urgency. Low priority, no known exploit, or no available patch to load.
CTO (Computer Tasking Order)
Record message issued to components and or supporting organizations of all Armed Services to implement required actions in order to operate and defend the Global Information Grid. Normally comes with reporting requirements.
NTD (Naval Telecommunications Directive)
Record message coordinated by NNWC establishing Navy policies and procedures with regard to communications.
Service Pack
A collection of updates, fixes and/or enhancements to a software program delivered in the form of a single installable package.

Vulnerability

Intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To be vulnerable, an attacker must have at least one applicable tool or technique that can connect to a system weakness.
Threat
Circumstances, events, or people with the potential to cause harm to a system.
Responsibilities of The Information Assurance Manager
is responsible for the information assurance program within a command, site, system, or enclave. The IAM is responsible to the local IA command authority and Designated Approving Authority (DAA) for ensuring the security of an IT system, and that it is approved, operated, and maintained throughout its life cycle in accordance with IT system security certification and accreditation documentation.
Host/ client
Describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request.
Hub
A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets. Operates at Layer 1 (Physical Layer) of the OSI model.
Switch
A small hardware device that joins multiple computers together within one LAN. Switches appear nearly identical to hubs, but a switch generally contains more intelligence than a hub. Unlike hubs, network switches are capable of inspecting data packets as they are received, determining the source and destination device of each packet, and forwarding them appropriately. By delivering messages only to the connected device intended, a network switch conserves network bandwidth and offers generally better performance than a hub. Operates at Layer two (Data Link Layer) of the OSI model.
d. Router
Device that forwards data packets between networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When data comes in on one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey or drops the packet. A data packet is typically forwarded from one router to another through networks that constitute the internetwork until it gets to its destination node. Operates at Layer three (Network Layer) of the OSI model, because the wired/wireless router connects multiple networks (as gateways do).

Topology

BUS/AIR/RING/MESH

Bus
A network architecture in which a set of clients are connected via a shared communications line, called a bus. Bus networks are the simplest way to connect multiple clients, but may have problems when two clients want to transmit at the same time on the same bus. Thus systems which use bus network architectures normally have some scheme of collision handling or collision avoidance for communication on the bus, quite often using Carrier Sense Multiple Access or the presence of a bus master which controls access to the shared bus resource.

Star

One of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub or computer, which acts as a conduit to transmit messages.

Ring

network architecture in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet. Because a ring topology provides only one pathway between any two nodes, ring networks may be disrupted by the failure of a single link. A node failure or cable break might isolate every node attached to the ring. FDDI networks overcome this vulnerability by sending data on a clockwise and a counterclockwise ring: in the event of a break data is wrapped back onto the complementary ring before it reaches the end of the cable, maintaining a path to every node along the resulting "C-Ring".

Mesh

Network architecture wherein each node in the network may act as an independent router, regardless of whether it is connected to another network or not. It allows for continuous connections and reconfiguration around broken or blocked paths by “hopping” from node to node until the destination is reached. A mesh network whose nodes are all connected to each other is a fully connected network. Mesh networks differ from other networks in that the component parts can all connect to each other via multiple hops, and they generally are not mobile.

LAN (Local Area Network)

A group of computers and associated devices that share a common communications line or wireless link. Typically, connected devices share the resources of a single processor or server within a small geographic area (for example, within an office building).

WAN (Wide Area Network)

Spans a large geographic area, such as a state, province or country. WANs often connect multiple smaller networks, such as local area networks (LANs) or metro area networks (MANs). The world's most popular WAN is the Internet.

MAN (Metropolitan Area Network)

Usually interconnects a number of Local Area Networks (LANs) using a high-capacity backbone technology, such as fiber-optical links, and provides up-link services to Wide Area Networks and the Internet. A MAN is a large computer network that usually spans a city or a large campus.

GAN (Global Area Network)

Refers to any network that is composed of different interconnected computer networks (WANs) and also covers an unlimited geographical area.
Open Systems Interconnection (OSI) Model (7 Layers)
A way of sub-dividing a communications system into smaller parts called layers. Similar communication functions are grouped into logical layers. A layer provides services to its upper layer while receiving services from the layer below.
Open Systems Interconnection: Layer 1 (Physical Layer
Media, signal and binary transmission
Open Systems Interconnection: Layer 2 (Data Link Layer)
Physical addressing
Open Systems Interconnection: Layer 3 (Network Layer)
Path determination and logical addressing
Open Systems Interconnection: Layer 4 (Transport Layer)
End-to-end connections and reliability, flow control
Open Systems Interconnection: Layer 5 (Session Layer)
Inter host communication.
Open Systems Interconnection: Layer 6 (Presentation Layer)
Data representation, encryption and decryption, convert machine dependent data to machine independent data.
Open Systems Interconnection: Layer 7 (Application Layer)
Network process to application.
Transmission Control Protocol and Internet Protocol (TCP/IP) Model (4 Layers)
Is the most used network protocol . TCP/IP is not just one protocol, but a set of protocols (a protocol stack). Protocol is like a language used to make two computers to talk to each other.
Transmission Control Protocol and Internet Protocol: Layer 1 (Network Interface Layer)
Receives packets from the network to be sent over the Internet Layer. On this layer packets are called frames.
Transmission Control Protocol and Internet Protocol: Layer 2 (Internet Layer)
IP (Internet Protocol), which gets the packets received from the Transport layer and adds virtual address information, i.e., adds the address of the computer that is sending data and the address of the computer that will receive this data. On this layer packets are called datagrams.
Transmission Control Protocol and Internet Protocol: Layer 3 (Transport Layer)
Usually the TCP protocol. This layer is in charge of getting data sent by the upper layer, dividing them into packets and sending them to the Internet layer. During data reception, this layer is in charge of putting the packets received from the network in order (because they can be received out-of-order) and also checking if the contents of the packets are intact.
Transmission Control Protocol and Internet Protocol: Layer 4 (Application Layer)
Programs talk to the Application Layer. On this layer you will find Application protocols such as SMTP (for e-mail), FTP (for file transfer) and HTTP (for web browsing). Each kind of program talks to a different Application protocol, depending on purpose of program.
Internet Protocol version 4 (IPv4)
The fourth revision in the development of the Internet Protocol (IP) and it is the first version of the protocol to be widely deployed. IPv4 defined an IP address as a 32-bit number (consisting of 4 octets). In IPv4 an address consists of 32 bits which limits the address space to 4294967296 (232) possible unique addresses. IPv4 reserves some addresses for special purposes such as private networks (~18 million addresses) or multicast addresses (~270 million addresses). Due to the enormous growth of the Internet and the predicted depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995.
Internet Protocol version 6 (IPv6)
The rapid exhaustion of IPv4 address space, despite conservation techniques, prompted the Internet Engineering Task Force (IETF) to explore new technologies to expand the Internet's addressing capability. The permanent solution was deemed to be a redesign of the Internet Protocol itself. IPv6 defined an IP address as a 128-bit number (consisting of 16 octets). Mathematically, the new address space provides the potential for a maximum of 2128, or about 3.403×1038 unique addresses.
Unclassified but Sensitive Internet Protocol (IP) Router Network (NIPRNet)
i. A global long-haul IP based network to support unclassified IP data communications services for combat support applications to the Department of Defense (DoD), Joint Chiefs of Staff (JS), Military Departments (MILDEPS), and Combatant Commands (COCOM).
Secret IP Router Network (SIPRNet)
DoD's largest interoperable Command and Control (C2) data network.

SIPRNet supports

1. Global Command and Control System (GCCS)
2. Defense Message System (DMS)
3. Collaborative planning
4. And numerous other classified warfighter applications.
Joint Worldwide Intelligence Communications System (JWICS)
Operated by the Defense Intelligence Agency (DIA) as a secure global network designed to meet the requirements for TS/SCI multimedia intelligence communications worldwide. It provides users an SCI-level high-speed multimedia network using high-capacity communications to handle data, voice, imagery, and graphics.
Primary uses of JWICS by afloat users
1. Secure e-mail
2. Chat rooms
3. Point-to-point and multipoint VTCs
4. Broadcast of the DIN
5. Website accesses are the primary uses of JWICS by afloat users.
Virus
Computer program that can copy itself and infect a computer. Spreads from one computer to another (in some form of executable code) when its host is taken to the targeted infected computer.
Worms
Self-replicating malware computer programs. They use a computer network to send copies of their selves to other nodes (computers on the network) and may do so without any user intervention.
Describe the functionality of PKI
Set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.
ADNS - (Automated Digital Networking System)
The primary function of the ADNS is to connect Navy shipboard networks to other ship and shore networks for transferring Internet Protocol (IP) data of various classification levels.
CUDIXS (Common User Digital Information Exchange Subsystem)
CUDIXS provides a 2400 baud full duplex interface, over a satellite link with mobile platforms, for the receipt and transmission of narrative message traffic between FMX and mobile platforms equipped with afloat automated systems.
Discuss GINGERBREAD
Warning sent over the net to alert operators that hostile forces are attempting to intrude on the net by Imitative Communications Deceptions (ICD)
When an operator recognizes or suspects that net is being subject to ICD, they will....
• Announce GINGERBREAD on the net
• Give the call sign of the suspected deception station
• Authenticate the stations on the net
• Notify the radio supervisor and make an entry on the circuit log
• Notify the Communications Officer and request further instructions
How many types of disclosures of EEFI (Essential Elements of Friendly Information) are there?

5

EEFI POSITION 01
Friendly or enemy position, movement or intended movement: position; course; speed; altitude; or destination of any air, sea or ground element unit or force.

EEFI CAPABILITIES 02

Friendly or enemy capabilities or limitations: force composition or identity; capabilities, limitations or significant casualties to special equipment, weapon systems, sensors, units or personnel; percentages of fuels or ammunition remaining.

EEFI OPERATIONS 03

Friendly or enemy operations, intentions, progress or results: operational or logistic intentions; assault objectives; mission participants; flying programs; mission situation report results of friendly or enemy operations.

EEFI ELECTRONIC WARFARE 04

Friendly or enemy EW/EMCON intentions, progress or results: intention to employ EMC; results of friendly or enemy ECM objectives of ECM; results of friendly or enemy ECCM; results of ESM; present or intended EMCON policy; equipment effected by EMCON policy.
EEFI PERSONNEL 05
Friendly or enemy key personnel: movement or identity of friendly or enemy flag officers; distinguished visitors; unit commanders; movements of key maintenance personnel indicating equipment limitations.
Define RIVER CITY and state when is utilized
An OPSEC tool that limits communications is River City. River Cityconditions provide procedures to control outgoing paths from ships and shoresystems (e-mail, web browsing, POTS, cell phones) for the purpose of OPSEC andforceprotection.

R - Routine

6 hours

P - Priority

3 hours

O - Immediate

30 minutes

Z - Flash

Asfast as possible with an objective of less than 10 minutes

W - Flash override

3 minutes

State the purpose of Emission Control (EMCON)
controlof all electromagnetic and acoustic radiations, including communications,radar, EW and sonar. During its imposition, no electronic emitting devicewithin designated bands, including personal communications devices, will beoperated unless absolutely essential to the mission. The OTC or his designatedsubordinate commander is responsible for imposing EMCON.
Explain the INCOFON (Information Operations Condition) system
athreat level system in the United States similar to that of FPCON. It is adefense system based primarily on the status of information systems and is amethod used by the military to defend against a computer network attack.

How many levels of INFOCON?

5

INFOCON 5

describes a situation where there is no apparent hostile activity against computernetworks.

INFOCON 4

describes an increased risk of attack.

INFOCON 3

describes when a risk has been identified.

INFOCON 2

describes when an attack has taken place but the Computer Network Defensesystem is not at its highest alertness.

INFOCON 1

describes when attacks are taking place and the Computer Network Defensesystem is at maximum alertness.
FLTNOC - Fleet Network Operations Centers
Provide a regional gateway from the various communication systems supporting ships tothe Defense Information Systems Network.
NCTS- Naval Computer and TelecommunicationsStation
Thereare a total of seven NCTS’ world-wide which are managed by and report to thetwo NCTAMS. They are strategically located around the world in customerconcentration areas for ease in providing C4I support. Their primary mission isto provide the Navy Information Technology infrastructure and support servicesrequired for rapid and reliable voice and data communications within aspecified Area of Responsibility (AOR).gment--��0�Bߨ
HTTP (Hypertext transfer protocol)
Asystem for transmitting and receiving information across the Internet. Httpserves as a request and response procedure that all agents on the Internetfollow so that information can be rapidly, easily, and accurately disseminatedbetween servers, which hold information, and clients, who are trying to accessit. Default port is 80.
HTTPS (Secure Hypertext transfer protocol)
in many ways HTTPS is identical to HTTP because it follows the same basicprotocols. HTTPS works by transmitting normal http interactions through anencrypted system, so that in theory, the information cannot be accessed by anyparty other than the client and end server. Default port is 443.
Define and state the purpose of a VLAN (VIRTUALLOCAL AREA NETWORK)
alogical local area network (or LAN) that extends beyond a single traditionalLAN to a group of LAN segments, given specific configurations. Since a VLAN isa logical entity, its creation and configuration is done completely insoftware. A VLAN solution can alleviate both, relocating personnel and physicaldisjoined locations, by permitting the same broadcast domain to extend beyond asingle segment.
Define and state the purpose of RAID REDUNDANTARRAY OF INDEPENDENT
A way of storing the same data in different places (thus, redundantly) onmultiple hard disks. By placing data on multiple disks, I/O (input/output)operations can overlap in a balanced way, improving performance. There are atleast nine types of RAID plus a non-redundant array (RAID-0).

Penetration

The unauthorized act of gaining access to a machine or resource.

Electronic Spillage

An Electronic Spillage (ES) is defined as data that is placed on aninformation system possessing insufficient security controls to protect thedata at the required classification, which poses a risk to National Security(example: SCI onto Secret, Secret onto Unclass). This process also applies tosituations where Unclassified Naval Nuclear Propulsion Information (U-NNPI) isintroduced to Non-U-NNPI hardware. However, U-NNPI ES are not subject toreporting requirements.

HBSS

Host Based Security System

Purpose of HBSS

1. HBSSprovides host based security through behavioral, signature, desktop firewall,and application blocking protections.

2. Behavioral rules are established toidentify a profile of network activity. Deviation from an established activityprofile results in a system alert.


3. TheHost Intrusion Prevention System (HIPS) is used to provide signatureprotection. HIPS agents work by cross-checking host activities against adatabase of signature rules to assess whether or not activity is malicious. Ifmalicious activity is detected, an alert (event) is sent to the ePolicyOrchestrator (ePO) console. 4. HBSS provides desktop firewallprotection by establishing a filter between the host system and the network orInternet. All network traffic to and from the host is scanned at the packetlevel and compared against a list of firewall rules.


5. Application blocking prevents thelaunching of certain executable files on the host system and is provided for bythe Data Loss Prevention (DLP) module. This module also blocks the installationof USB devices on the computer and when a USB device is plugged into acomputer, an alert (event) is sent to the ePO console.

State the responsibilities of a NECOS- Net Controller Station
1. Directand control the flow of messages and other matters during their assigned nets.

2. Exercise strict circuit discipline atall times.


3. Ensurethat the Net is operating within tolerance of the assigned frequency andimmediately notify any station that is out of tolerance.


4. Keep the State Director and/or NetManager informed of Net Activities and make recommendations for changes orimprovements concerning net operations.


5. Provide "on-the-job"training to any member having difficulties transmitting, relaying or requestingrepetitions of a message during their net.

JFTOC -24-7
One stop shop for C5I Needs (C5I = command, control, communications, computers, collaboration, intelligence). JFTOC interacts with the fleet and joint customers via message traffic (service advisories, COMSPOTS, OPREP-3), SIPR chat, phone, and/or VTC. Support customers in the PAC and IO AOR’s – third, seventh, and fifth fleets and associated units.
Define and explain the concept of DAMA
Demand Assigned Multiple Access(DAMA) one channel with multiple users sequentially at different times. Thistechnology is mainly useful with sparsely used networks of transient clients.By using DAMA technology the number of separate nodes that can use a limitedpool of circuits can be greatly increased at the expense of no longer beingable to provide simultaneous access for all possible pairs of nodes.

EHF

The use of EHF frequencies offers a number of advantages--assurance of reliable communications in a nuclear environment, minimal susceptibility to enemy jamming and eavesdropping, and the ability to achieve smaller secure beams with modest-sized antennas.

SHF

Thisrange offers significantly increased bandwidths (hundreds of MHz) for high datarates or increased use of spread-spectrum techniques, together withlocalized coverage and adaptive antenna techniques for nulling unwanted signalsor interference (weather).
CBSP Commercial Broadband Satellite Program
Thepurpose of the CBSP services acquisition is to provide satellite capacity in C,Commercial X, Ku, and possibly other bands as well as terrestrial andsupporting requirements this is the main spectrum (SHF) that supports voice,video, and imagery.
DSCS: Defense Satellite Communication System
Militarycommunications to support globally distributed military users. This is the mainspectrum (SHF) that, (like CBSP – except on a larger scale) supports voice,video, and imagery. DSCS will be replaced by the Wideband Global SATCOM system.
State the Purpose of the EKMS
Anindividual designated in writing by the CO to manage COMSEC material issued toan EKMS account. The EKMS Manager is the CO's primary advisor on mattersconcerning the security and handling of COMSEC material and the associatedrecords, reports, and audits.

What is a COMSEC Incident?

when accountability with crypto or cryptographic items havebeen lost.

How many different types of COMSEC Incidents are there?

3

COMSEC Incident 1: Cryptographic

Useof COMSEC keying material that is compromised, superseded, defective, orpreviously used and not authorized for reuse

COMSEC Incident 2: Personnel

Defection,espionage, capture by enemy

COMSEC Incident 3: Physical

Physicalloss of COMSEC material, unauthorized access to COMSEC material, COMSECmaterial found outside of required accountability or physical control, failureto maintain TPI

Describe the 2 types of PDS

1. ReportablePDS outside the Command. Premature or out-of-sequence use of keying materialbefore its effective date 2. Non-reportablePDS Up to the CO. Late Destruction of a local account crypto.

HERO

Hazards from electromagnetic radiation to ordnance

HERP

Hazards of electromagnetic radiation to personnel

HERF

Hazards of electtromagnetic radiation to fuels

Subcategory "A" of mishap probability

likely to occur

Subcategory "D" of mishap probability

unlikely to occur

Subcategory "C" of mishap probability

may occur

Subcategory "B" of mishap probability

probably will occur

OPREP-3 PINNACLE

used to report incidents that is of national level interest to the National Military Command Center

OPREP-3 NAVY BLUE

used to provide the CNO and other naval commanders notification of incidents that are of high Navy, as opposed to nation-level interest

OPREP-3 NAVY UNIT SITREP

used to inform the operational commander, or appropriate higher authority, of incidents not meeting OPREP-3 NAVY BLUE criteria

6 programs of Brilliant on the Basics

Career Developement Boards


Sponsorship


Mentorship


Sailor Recognition


Command Indoctrination


Command Ombudsmen support

AIRFOR

provide the proper air assets and manning for CVN and squadrons

SURFOR

manage the manning of personnel and schools

CYBERFOR

manage the information dominance portion of missions

TAC # RADIO

03-108-0-C

TAC # ADP

4-180-1-Q

TAC # EW MODULE

03-165-2-C

TAC # MSI

03-119-2-C

TAC # METOC

06-165-3-C

TAC # SIAC

03-133-0-Q

N1

Admiral and his aides

N2

Administration and legal department

N4

Supply Department

N5

Planning Department

HUMINST

Human Intelligence

IMINT

Imagery Intelligence

OSINT

Open Source Intelligence

(OPT) Operation Planning

the process of setting for the mission

(BWC) Battle Watch Commander

the watch that maintains the overall picture of situation

(CLF) Commander Landing Forces

in charge of getting landing forces ashore

(NGO) Non Government Organization

any organization that is not government related

6 area which comprise Naval Doctrine

Warfare


Intelligence


Operations


Logistics


Planning


Command & Control

Importance of Battle of Coral Sea

7-8 May 1942; the world's first carrier verse carrier battle

Importance of the Great White Fleet

16 December 1907; Roosevelt dispatched 16 U.S. Navy battleships of the Atlantic Fleet for world cruise to demonstrate the strength of the U.S. Navy

Importance of Battle of Normandy

6 June 1944; largest amphibious operation in history

Importance of Battle of Midway

4-7 June 1942; turning point of the pacific war

3 classes of Naval Vessels that existed at inception of the U.S. Navy

Ships of the line


Frigates


Sloops of war

7 areas which comprise Naval logistics

Responsiveness


Simplicity


Flexibility


Economy


Attainability


Sustainability


Survivability

3 levels of war

tactical


operational


strategic

Keel was laid

3 November 1984

ship was launched

13 February 1988

ship was christened

11 November 1989

LT Kara Hultgreen first female Tomcat pilot died when her plane crashed due to engine failure and pilot error

25 October 1994

Lincoln and Sacremento collide during an UNREP

5 June 1995

Abraham Lincoln's Birthday

12 February 1809

Lincoln became the Republican nominee for President

6 Novermber 1860

Forces of South Carolina began a bombardment of Ft. Sumter in Charleston Harbor.

12 April 1861

The Emancipation Proclamation was issued

22 September 1862

Gettysburg address was delivered

19 November 1863

Lincoln inaugurated for his second term

4 March 1865

Death of Abraham Lincoln

15 April 1865

TOP SECRET

ORANGE; EXPECTED TO CAUSE EXCEPTIONALLY GRAVE DAMAGE TO NATIONAL SECURITY

SECRET

RED; EXPECTED TO CAUSE SERIOUS DAMAGE TO NATIONAL SECURITY

CONFIDENTIAL

BLUE; EXPECTED TO CAUSE DAMAGE TO NATIONAL SECURITY

UNCLASSIFIED

GREEN; EXPECTED TO CAUSE NO DAMAGE TO NATIONAL SECURITY

NEED TO KNOW

RESTRICTION OF DATA WHICH IS CONSIDERED VERY SENSATIVE

SF-700

SECURITY CONTAINER INFORMATION

SF-701

ACTIVITY SECURITY CHECKLIST

SF-702

SECURITY CONTAINER CHECK SHEET

SF-703

TOP SECRET COVER SHEET

WHEN SHOULD SAFE COMBINATIONS BE CHANGED

ANUALLY


SAFE HAS BEEN COMPROMISED


INDIVIDUAL WHO HOLDS THE COMBINATION TRANSFERS FROM THE COMMAND

THREATCON LEVEL NORMAL

NO KNOWN THREAT INDICATED

THREATCON LEVEL ALPHA

GENERAL THREAT OF POSSIBLE TERRORIST ACTIVITY AGAINST INSTALLATIONS AND PERSONNEL

THREATCON LEVEL BRAVO

AN INCREASED AND MORE PREDICTABLE THREAT OF TERRORIST ACTIONQ

THREATCON LEVEL CHARLIE

INCIDENT HAS OCCURED AND SOME FORM OF TERRORIST ACTION IS IMMINENT

THREATCON LEVEL DELTA

TERRORIST ATTACK HAS OCCURED AND IS NORMALLY DECLARED AS A LOCALIZED WARNING

STEP 1 PLANNING PROCESS

IDENTIFY CRITICAL INFORMATION

STEP 2 PLANNING PROCESS

THREAT ASSESSMENT

STEP 3 PLANNING PROCESS

VULNERABILITY ANALYSIS

STEP 4 PLANNING PROCESS

RISK ASSESSMENT

STEP 5 PLANNING PROCESS

MEASURES/COUNTERMEASURES

BLUE TEAM

MUST DEFEND AGAINST REAL OR SIMULATED ATTACKS

RED TEAM

PERFORMS REAL OR SIMULATED ATTACKS

TRANSPORTING TOP SECRET INFORMATION

WILL BE COMPLETED THROUGH THE DEFENSE COURIER SERVICE

TRANSPORTING SECRET AND BELOW INFORMATION

CAN BE COMPLETED THROUGH THE U.S. POST OFFICE OR FEDEX

CCOP

CRYPTOLOGIC CARRY-ON PROGRAM

NITES

NAVY INTEGRATED TACTICAL ENVIRONMENT

JDISS

JOINT DEPLOYABLE INTELLIGENCE SUPPORT SYSTEM

(ASW) ANTI-SUBMARINE WARFARE

OPERATIONS CONDUCTED WITH THE INTENTION OF DENYING THE ENEMY THE EFFECTIVE USE OF SUBMARINES

(SUW) SURFACE WARFARE

OPERATIONS CONDUCTED TO DESTROY OR NUETRALIZE ENEMY NAVAL SURFACE FORCES AND MERCHANT VESSELS

(IW) INFORMATION WARFARE

CONDUCTED DURING TIME OF CRISIS OR CONFLICT TO ACHIEVE OR PROMOTE SPECIFIC OBJECTIVES OVER A SPECIFIC ADVERSARY OR ADVERARIES

(AW) AIR WAREFARE; OR AIR DEFENSE

DEFENSIVE MEASURES TO DESTROY ATTACKING ENEMY AIRCRAFT OR MISSILES.

(STW) STRIKE WARFARE

OPERATIONS TO DESTROY OR NUETRALIZE ENEMY TARGETS ASHORE

(NSW) NAVAL SPECIAL WARFARE

OPERATIONS ARE CHARACTERIZED BY STEALTH, SPEED AND PRECISE VIOLENT APPLICATION OF FORCE

SF-86

APPLICATION FOR SECURITY CLEARANCE

COMSEC

COMMUNICATIONS SECURITY

INFOSEC

INFORMATION SECURITY

COMPUSEC

COMPUTER SECURITY

PSP

PERSONNEL SECURITY PROGRAM

ATFP

ANTI-TERRORISM FORCE PROTECTION

AT

DEFENSE MEASURES USED TO REDUCE THE VULNERABILITY OF INDIVIDUALS AND PROPERTY TO TERRORIST ACTS

FP

ACTIONS TAKEN TO PREVENT OR MITIGATE HOSTILE ACTIONS AGAINST DOD PERSONNEL RESOURCES, FACILITIES AND CRITICAL INFORMATION

TIME SENSITIVE TARGET

TARGETS REQUIRING IMMEDIATE RESPONSE BECAUSE THEY POSE, OR WILL SOON POSE A DANGER TO FREINDLY FORCES OR ARE HIGHLY LUCRATIVE

NO-STRIKE LIST

MOSQUES


SCHOOLS


HOSPITALS


CEMETARIES


HISTORICAL SITES

3 PHASES OF BATTLE DAMAGE ASSESSMENT

PHYSICAL DAMAGE ASSESSMENT PHASE


FUNCTIONAL DAMAGE ASSESSMENT PHASE


WEAPON SYSTEM ASSESSMENT PHASE

INFORMATION OPERATIONS

ACTIONS TO CONTROL FREINDLY FORCE'S USE OF INFORMATION AND THE ACTIONS TO MITIGATE THE EFFECTS OF ADVERSARY USE OF INFORMATION AND INFORMATION SYSTEMS

EW

ELECTRONIC WARFARE

MILDEC

TACTICAL MILITARY DECEPTION

MISO

MILITARY INFORMATION SUPPORT OPERATIONS

CND

COMPUTER NETWORK DEFENSE

CNA

COMPUTER NETWORK ATTACK

CNE

COMPUTER NETWORK EXPLOITATION

ROLE OF SSN

GATHER SIGINT IN AREAS NOT ACCESSIBLE BY NORMAL PLATFORMS

ROLE OF SSGN

GATHER SIGINT IN AREAS NOT ACCESSIBLE BY NORMAL PLATFORMS

ROLE OF EA-6B PROWLER

TACTICAL EW IN THE FORM OF RADAR & COMMS EA

ROLE OF E-2C HAWKEYE

AIR EARLY WARNING AND COMMAND AND CONTROL

ROLE OF P-3 ORION

C4ISR

ROLE OF EP-3E

NEAR REAL TIME TACTICAL SIGINT

ROLE OF RC-135 COBRA BALL

AIRBORNE BALLISTIC MISSILE SIGNATURE AND COLLECTION SYSTEM

ROLE OF MQ-1A PREDATOR

UAVs & ISR

ROLE OF EC-130H COMPASS CALL

COMMS EA, TACTICAL COMMAND, CONTROL & COMMUNICATION COUNTERMEASURES

ROLE OF U-2

ELECTRO OPTICAL IMAGING AND SIGINT

ROLE OF EA-18G

ALQ-99, EA & SEAD

ROLE OF CVN AIRCRAFT CARRIER

E2-C, EA-6B, EA-18G, SLQ-32, CVIC, SSES

ROLE OF CG GUIDED MISSILE CRUISER

LAMPS HELO, SLQ-32, SSES OR TSCIF

ROLE FFG GUIDED MISSILE FRIGATE

LAMPS HELO, SLQ-32, SSES OR TSCIF

ROLE OF LCC AMPHIBIOUS COMMAND SHIP

COMMAND PLATFORMS

ROLE OF LHA/LHD AMPHIBIOUS ASSAULT SHIPS

JIC, EXPLOT, SLQ-32, SSES

ROLE OF LPD AMPHIBIOUS TRANSPORT DOCK

SLQ-32, SSES OR TSCIF

ROLE OF LSD DOCK LANDING SHIP

SLQ-32, SSES OR TSCIF

ROLE OF PC PATROL COASTAL SHIP

SLQ-32 AND POSSIBLE TSCIF

6 PRINCIPLES OF MILITARY DECEPTION

FOCUS


OBJECTIVE


CENTRALIZED CONTROL


SECURITY


TIMELINESS


INTEGRITY



5 PHASES OF MILITARY DECEPTION PLANNING PROCESS

INITIATION


CONCEPT DEVELOPMENT


PLAN DEVELOPMENT


PLAN REVIEW


SUPPORT PLANS

3 CATEGORIES OF MEANS OF DECEPTION

PHYSICAL


TECHNICAL


ADMINISTRATIVE

4 CATEGORIES OF DECEPTION TACTICS

ACOUSTIC


VISUAL


ELECTROMAGNETIC


COMMUNICATION

NOST

NAVAL OPSEC SUPPORT TEAM

IOSS

INTERAGENCY OPSEC SUPPORT STAFF

JCMA

JOINT COMSEC MONITOR ACTIVITY

NCIS

NAVAL CRIMINAL INVESTIGATIVE SERVICE

IAVA

INFORMATION ASSURANCE VULNERABILITY ALERT; HIGH PRIORITY

IAVB

INFORMATION ASSURANCE VULNERABILITY BULLETIN; MEDIUM PRIORITY

IAVT

INFORMATION ASSURANCE VULNERABILITY TECHNICAL ADVISORY; LOW PRIORITY

CTO

COMPUTER TASKING ORDER

SAAR

SYSTEM AUTHORIZATION ACCESS REQUEST

ZOMBIE

ANY SYSTEM TAKING DIRECTIONS FROM A MASTER CONTROL COMPUTER

BOT

AUTOMATED SOFTWARE PROGRAM THAT COLLECTS INFORMATION ON THE WEB

ZERO DAY EXPLOIT

COMPUTER THREAT THAT TRIES TO EXPLOIT COMPUTER APPLICATION VULNERABILITIES

SPYWARE

PROGRAMS THAT WORK ON BEHALF OF A THIRD PARTY

LOGIC BOMB

ANY CODE THAT IS HIDDEN WITHIN AN APPLICATION AND CAUSES SOMETHING UNEXPECTED TO HAPPEN BASED ON SOME CRITERIA BEING MET

IDS

INTRUSION DETECTION SYSTEM

2 TYPES OF IDS

ACTIVE


PASSIVE

PROXY SERVER

ACTS AS AN INTERMEDIARY FOR REQUESTS FROM CLIENTS SEEKING RESOURCES FROM OTHER SERVERS

FIREWALL

DESIGNED TO PERMIT OR DENY NETWORK TRANSMISSIONS BASED ON A SET OF RULES

VIRTUAL PRIVATE NETWORK CONCENTRATOR

DEVICE THAT INCORPORATES THE MOST ADVANCED INCRYPTION AND AUTHENTICATION TECHNIQUES AVAILABLE

BACK-UP

MAKING COPIES OF DATA

NETWORK REPEATER

REGENERATES INCOMING ELECTRICAL, WIRELESS OR OPTICAL SIGNALS

VIRUS

PROGRAM THAT CAN COPY ITSELF AND INFECT A COMPUTER

WORMS

SELF-REPLICATING MALWARE COMPUTER PROGRAMS

BACKDOOR

BYPASSES NORMAL AUTHENTICATION WHILE ATTEMPTING TO REMAIN UNDETECTED

TROJANS

APPEARS TO PERFORM A DESIREABLE FUNCTION FOR THE USER PRIOR TO RUN OR INSTALL BUT INSTEAD FACILITATES UNAUTHORIZED ACCESS OF THE USER'S COMPUTER SYSTEM

PHISHING

CRIMINALLY FRAUDULENT PROCESS OF ATTEMPTING TO ACQUIRE SENSATIVE INFORMATION BY MASQUERADING AS A TRUSTWORTHY ENTITY

IMAGE PRODUCT LIBRARY

IMAGERY RECEIVED WILL BE ARCHIVED TO THE IPL AND MADE AVAILABLE TO REMOTE USERS VIA ALLOCATED COMMUNICATIONS BANDWIDTH

JSIPS

JOINT SERVICE IMAGERY PROCESSING SYSTEM

VANTAGE

SOFTWARE SUITE THAT PROVIDES IMAGE PROCESSING, DISPLAY AND DATABASE STORAGE FOR NITF IMAGERY

DCRS

DIGITAL CAMERA RECEIVING STATION

VIG

VIDEO INTERFACE GROUP

CENTRIX

SIPR SYSTEM THAT ALLOWS THE EXCHANGE OF DATA BETWEEN US AND COALITION ASSETS

DOMAIN CONTROLLER

STORES ONE DOMAIN DIRECTORY PARTITION CONSISTING OF INFORMATION ABOUT THE DOMAIN IN WHICH IT IS LOCATED

EXCHANGE SERVER

PROCESS EMAIL MESSAGES FROM A SENDER TO RECIPIENTS IN A SECURE AND TIMELY WAY

NIAPS

UNCLASSIFIED SERVER THAT PROVIDES ONBOARD CAPABILITY FOR THE SAILOR TO ACCESS APPLICATIONS FOR PERSONAL AND PROFESSIONAL DEVELOPMENT

BEWT

ALLOWS FOR THE RUNNING OF SIMULATION ON THE SLQ-32 TO PROVIDE REAL WORLD TRAINING TO OPERATORS

GEOSTATIONARY ENVIRONMENTAL SATELLITES

THE BACKBONE TO SHORT TERM FORCASTINGPO

POLAR OPERATIONAL ENVIRONMENTAL SATELLITES

ABLE TO COLLECT GLOBAL DATA ON A DAILY BASIS FOR A VARIETY OF LAND, OCEAN AND ATMOSPHERIC APPLICATIONS

DEFENSE METEOROLOGICAL SATELLITE PROGRAM

SEES CLOUDS, BODIES OF WATER, SNOW, FIRE AND POLLUTION IN THE VISUAL AND INFRARED SPECTRA

NATIONAL POLAR ORBITING OPERATIONAL ENVIRONMENTAL SATELLITE SYSTEM

IS THE NEXT GENERATION OF LOW EARTH ORBITING SATELLITES CIRCLING THE EARTG APPROXIMATELY ONCE EVERY 100 MINUTES

TROPICAL RAINFALL MEASURING MISSION

A RESEARCH SATELLITE DESIGNED TO HELP UNDERSTAND THE WATER CYCLE OF THE ATMOSPHERE COVERING THE TROPICAL AND SEMI-TROPICAL REGIONS

VISIBILITY

OFFENSE-CONCEAL MOVEMENT OF MILITARY FORCES


DEFENSE- HINDERS RECONNAISSANCE

PRECIPITATION

AFFECTS VISIBILITY AND THE FUNCTIONING OF MANY INFRARED AND ELECTRO-OPTICAL SENSORS, RADAR, AND COMMUNICATION SYSTEMS

WINDS

WINDBLOWN SAND, DUST, RAIN OR SNOW CAN REDUCE THE EFFECTIVENESS OF RADARS AND COMMUNICATION SYSTEMS

CLOUD COVER

DEGRADES THE EFFECTIVENESS OF MANY TARGET ACQUISITION AND SURVEILLANCE SYSTEMS

TEMPERATURE AND HUMIDITY

EXTREMES OF TEMPERATURE AND HUMIDITY HAVE DEBILITATING EFFECTS ON PERSONNELE AND REDUCE EQUIPMENT CAPABILITIES AND THE EFFECTIVENESS OF CHEMICAL AND BIOLOGICAL WEAPONS

OCEAN SURFACE

RELATIVE SEAT STATE IS A MAJOR FACTOR IN DETERMINING THE FEASIBILITY OF NAVAL OPERATIONS AND THE FUNCTIONALITY OF MARITIME WEAPONS PLATFORMS

OCEAN SUBSURFACE

CRUCIAL TO THE CONDUCT OF SUBMARINE, ANTISUBMARINE AND MINING OPERATIONS

LITTORAL

CHARACTERISTICS SUCH AS LITTORAL GRADIENT AND COMPOSITION, COASTAL TERRAIN FEATURES AND TRANSPORTATION INFRASTRUCTURE

3 THERMAL LAYERS WITHIN THE OCEAN

MIXED LAYER


THERMO CLINE


DEEP LAYER

METOC FUNCTIONS PERTAINING TO FLEET OPERATIONS

COLLECT


ANALYZE


PREDICT


TAILOR


INTEGRATE

5 ENVIRONMENTAL CONDITIONS THAT EXISTS IN LITTORAL MINE WARFARE

BOTTOM MAPPING


TIDES


CURRENTS


OPTICS


SALINITY

SPACE MISSION AREAS

SPACE FORCE ENHANCEMENT'


SPACE SUPPORT


SPACE CONTROL


SPACE FORCE APPLICATION

APOGEE

A POINT ON THE SATELLITES ORBIT FARTHEST FROM THE CENTER OF THE EARTH

PERIGEE

A POINT ON THE SATELLITES ORBIT CLOSEST TO THE CENTER OF THE EARTH

LOW EARTH ORBIT

150-800 MILES ABOUT THE EARTHS SURFACE

MEDIUM EARTH ORBIT

ABOVE EARTH LEO AND BELOW GEOSTATIONARY ORBIT

HIGHLY ELLIPTICAL ORBIT

USED TO OBTAIN COMMUNICATIONS IN THE NORTHERN AND SOUTHERN HEMISPHERE

GEOSYNCHRONOUS ORBIT

19,300 NAUTICAL MILES

POLAR ORBIT

PASSES OVER THE ENTIRE SURFACE OF THE EARTH AND HAS AN INCLINATION OF 90 DEGREES AND IS USUALLY CIRCULAR

SPACE LAUNCH FACILITIES

VANDENBURG AIR FORCE BASE


NASA'S KENNEDY SPACE CENTER


CAPE CANAVERAL AIR FORCE STATION

ASTROMETRY

THE SCIENTIFIC MEASUREMENT OF THE POSITIONS AND MOTIONS OF CELESTIAL BODIES

EARTH ORIENTATION PARAMETERS

THE IRREGULARITIES OF THE EARTH'S ROTATIONS. MEASURES THE EARTH'S ROTATION

DEPARTURE/ARRIVAL WX

WEATHER COULD POTENTIALLY IMPACT LAUNCH/RECOVERY OF AIRCRAFT

TARGET WEATHER

CLOUDS AND PRECIPITATION HINDER TARGET IDENTIFICATION AND WEAPONS DEPLOYMENT

FLIGHT LEVEL WINDS

STRONG WINDS COULD POTENTIALLY IMPACT TRAJECTORY OF WEAPONS

ABSOLUTE HUMIDITY

CAUSES DEGRADATION TO SENSORS AND ULTIMATELY IMPACTS DEPLOYMENT OF WEAPONS

THERMAL CROSSOVER

IMPACTS SENSOR PERFORMANCE DUE TO LOSS OF TARGET/BACKGROUND DIFFERENTIATION

LINCOLN'S HEAVY WEATHER CONDITION 4

18+ FT SEAS AND OR 50+ KNOT WINDS POSSIBLE WITHIN 72 HOURS

LINCOLN'S HEAVY WEATHER CONDITION 3

18+ FT SEAS AND OR 50+ KNOT WINDS POSSIBLE WITHIN 48 HOURS

LINCOLN'S HEAVY WEATHER CONDITION 2
18+ FT SEAS AND OR 50+ KNOT WINDS POSSIBLE WITHIN 24 HOURS

LINCOLN'S HEAVY WEATHER CONDITIONS

18+ FT SEAS AND OR 50+ KNOT WINDS POSSIBLE WITHIN 12 HOURS OR ARE OCCURING

THUNDERSTORM CONDITION 1

THUNDERSTORMS EXPECTED WITHIN 6 HOURS AND/OR 25 NM

THUNDERSTORM CONDITION 2

THUNDERSTORMS EXPECTED WITHIN 1 HOUR AND/OR 10 NM

6 STEPS OF INTELLIGENCE

PLANNING & DIRECTION


COLLECTION


PROCESSING & EXPLOITATION


ANALYSIS & PRODUCTION


DISSEMINATION & INTEGRATION


EVALUATION & FEEDBACK

3 CATEGORIES OF INTELLIGENCE

STRATEGIC


OPERATIONAL


TACTICAL

STRATEGIC INTELLIGENCE

NATIONAL-LEVEL ACTIVITIES AND ASSETS SUPPORT THE PRESIDENT AND NATIONAL-LEVEL POLITICAL AND MILITARY LEADERSHIP

OPERATIONAL INTELLIGENCE

INTELLIGENCE REQUIRED FOR PLANNING AND CONDUCTING CAMPAIGNS AND MAJOR OPERATIONS TO ACCOMPLISH STRATEGIC OBJECTIVES WITHIN THEATERS OR OPERATIONAL AREAS

TACTICAL INTELLIGENCE

REQUIRED FOR THE PLANNING AND CONDUCT OF TACTICAL OPERATIONS

HUMINT

HUMAN INTELLIGENCE

OSINT

OPEN SOURCE INTELLIGENCE

MASINT

MEASUREMENT AND SIGNATURE INTELLIGENCE

SIGINT

SIGNALS INTELLIGENCE

COMINT

COMMUNICATIONS INTELLIGENCE

FISINT

FOREIGN INSTRUMENT SIGNALS INTELLIGENCE

ELINT

ELECTRONIC INTELLIGENCE

IMINT

IMAGERY INTELLIGENCE

ACINT

ACOUSTIC INTELLIGENCE

8 CATEGORIES OF CULTURAL AWARENESS

PERSISTENCE


AWARENESS


CLIMATE


COMMITMENT


LEVELS OF INCLUSION


LEVELS OF TOLERANCE AND UNDERSTANDING


DEGREE OF EMPATHY


DEGREE OF ADAPTION AND CHANGE

4 TYPES OF AMPHIBIOUS OPERATIONS

ASSUALT


RAID


DEMONSTRATION


WITHDRAWAL

6 PLANNING PHASES OF AN AMPHIBIOUS OPERATION

MISSION ANALYSIS


COA DEVELOPMENT


COA WAR-GAME


COA COMPARE AND DECIDE


ORDERS AND OPGEN DEVELOPMENT


TRANSITION

OPERATIONAL PLANNING

SHORT TERM WAYS OF ACHIEVING MILESTONES AND EXPLAINS HOW, OR WHAT PORTION OF, A STRATEGIC PLAN WILL BE PUT INTO OPERATION DURING A GIVEN OPERATIONAL PERIOD

OPERATIONS ORDER

SITUATION FACING THE UNIT, THE MISSION OF THE UNIT, AND WHAT ACTIVITIES THE UNIT WILL CONDUCT TO ACHIEVE THE MISSION GOALS

WARNING ORDER

PRELIMINARY NOTICE OF AN ORDER OR ACTION WHICH IS TO FOLLOW

PLANNING ORDER

PLANNING DIRECTIVE THAT PROVIDES ESSENTIAL PLANNING GUIDANCE AND DIRECTS THE INITIATION OF EXECUTION PLANNING BEFORE THE DIRECTING AUTHORITY APPROVES A MILITARY COURSE OF ACTION

EXECUTE ORDER

ORDER TO INITIATE MILITARY OPERATIONS AS DIRECTED

CONCEPT PLAN

ABBREVIATED FORMAT THAT MAY REQUIRE CONSIDERABLE EXPANSION OR ALTERATION TO CONVERT IT INTO A COMPLETE OPERATION PLAN OR OPERATION ORDER

AGENCY RESPONSIBLE FOR HUMAN INTELLIGENCE

DEFENSE INTELLIGENCE AGENCY

AGENCY RESPONSIBLE FOR SIGNAL INTELLIGENCE

NATIONAL SECURITY AGENCY

AGENCY RESPONSIBLE FOR IMAGERY INTELLIGENCE

NATIONAL GEOSPATIAL AGENCY

CVN CAN COLLECT WHICH TYPES OF INTELLIGENCE

SIGINT, ELINT, COMINT, IMINT, HUMINT, OSINT & ACINT

SUPPORTING ARMS COORDINATOR

PLANS, COORDINATES AND CONTROLS ALL ORGANIC AND NONORGANIC FIRES WITHIN THE OPERATIONAL AREA IN SUPPORT OF THE ASSAULT FORCE

NAVAL GUNFIRE SECTION

MONITORS THE NAVAL GUNFIRE CONTROL, SUPPORT AND OTHER NETS

AIR SUPPORT SECTION

CONTROL OF ALL AIRCRAFT IN THE OBJECTIVE AREA ASSIGNED FOR TACTICAL AIR OPERATIONS, INCLUDING OFFENSIVE AND DEFENSIVE AIR SUPPORT

TARGET INFORMATION CENTER

TARGETING INFORMATION AND INTELLIGENCE

LANDING FORCE FIRE SUPPORT COORDINATOR

FIRE SUPPORT FOR THE LANDING FORCE

FORWARD AIR CONTROLLER

CONTROLS ALL AIRCRAFT IN SUPPORT OF THE LANDING FORCE

AMPHIBIOUS TASK FORCE TARGET INTELLIGENCE OFFICER

PROVIDES INTELLIGENCE SUPPORT FOR UNITS ASSIGNED TO THE AMPHIBIOUS TASK FORCE

LANDING FORCE TARGET INTELLIGENCE OFFICER

PROVIDES INTELLIGENCE SUPPORT TO LANDING FORCES

JOINT SERVICE IMAGERY PROCESSING SYSTEM-NAVY (JSIPS-N)

PRIMARY IMAGERY SYSTEM FOR CVN

CORONA

THE FIRST IMAGING SYSTEM TO PROVIDE ALL WEATHER, NEAR REAL-TIME IMAGERY

IMAGERY THAT RADAR PROVIDES

DAY/NIGHT, ALL WEATHER

IMAGERY THAT ELECTRO-OPTICAL PROVIDES

DAY, HIGH RESOLUTION, AFFECTED BY WEATHER

IMAGERY THAT INDFRARED PROVIDES

DAY/NIGHT, INFRARED LOW RESOLUTION, AFFECTED BY WEATHER

IPIR

INITIAL PHASE INTERPRETATION REPORT

IPL

IMAGE PRODUCT LIBRARY

JCA

JOINT CONCENTRATOR ARCHITECTURE

PTW

PRECISION TARGETING WORKSTATION

DCGS-N

DISTRIBUTIVE COMMON GROUND STATION-NAVY