• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/780

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

780 Cards in this Set

  • Front
  • Back
101 SAFETYFUNDAMENTALS

101

Operational Risk Management

It is a decision making tool used at all levels to increase operational effectiveness

five steps of ORM

Identifying hazards


Assessing hazards


Making risk decisions


Implementing controls


Supervising

instruction that governs safety and mishap reporting

OPNAVINST 5102.1D

Define hazard severity and discuss the 4 categories of hazard severity

Assessment of the worst credible consequence that can occur as a result of a hazard.


Category I – May cause death


Category II – may cause severe injury, illness, property damage


Category III – may cause minor injury, illness, or property damage


Category IV – hazard presents a minimal threat

Define mishap probability and the 4 subcategories of mishap

the probability that a hazard will result in a mishap or loss


Sub-category A – likely to occur immediately


Sub-category B – probably will occur in time


Sub-category C – may occur in timed


Sub-category D – unlikely to occur

Risk Assessment Code and 5 RACs

Expression of risk that combines the elements of hazard severity and mishap probability




Critical Risk


Serious risk


Moderate risk


Minor risk


Negligible Risk

Timeline and means for filing mishap investigations

Reports must be submitted within 8 hours of incident via OPREP-3

Name the 4 required mishap reportable items

Class A - $1 million + DoD aircraft is destroyed


Class B - $200,000 + less than $1mil, permanent partial disability or when 3 or more personnel are hospitalized


Class C - $20,000 + less 200,000 1-3 days away from work


Class D - $2,000 + less than 20,000 no personal injury

State the purpose of a HAZREP message

Discovering a hazardous condition or near-mishap to alert COMNAVSAFECEN and HQMC

3 Objectives of First Aid

Save life


Prevent further injury


Limit infection

3 Methods of Controlling Bleeding

Direct pressure


Pressure points


Constricting band

11 Pressure Points

Temporal (temple)


Facial (jaw)


Common carotid(neck)


Subclavian(clavicle)


Brachial (arm above/below elbow)


Radial/Ulna (hand)


Iliac(groin)


Femoral(thigh)


Popliteal(knee)


Tibial(ankle)

Symptoms of shock

Pulse is weak and rapid


Sweating is likely to be very noticeable


The pupils of the eyes are usually dilated


Weakness, faintness, or dizziness


Very pale

Treatment for shock

Make victim as comfortable as possible
Fracture should be immobilized
Body heat needs conserved (blanket)
Wet clothing needs removed, replaced with dry covering


Elevate feet to promote blood flow to the brain

Open vs Closed fracture

Open fracture – one in which the bone protrudes from the skin



Closed fracture – one in which the skin remains intact

electrical shock victim

don't touch


secure power supply


administer CPR
Get victim to medical facility ASAP

Describe methods of clearing an obstructed airway

Standing abdominal thrust


Reclining abdominal thrust


Standing chest thrust


Reclining chest thrust

Hypothermia

occurs when exposed to subnormal temperatures. Minimize heat loss and assume fetal position or huddle in close

Frostbite

affected body part turns stiff and numb. Place warm body part over affected area. DO NOT RUB FROSTBITE!!!

Heat Stress

combination of air temperature, thermal radiation, humidity, air flow, and workload that places stress on body. Move person to cool location and apply a cool compress.

Heat exhaustion

caused by working or exercising in hot spaces, disrupts blood flow to the brain, heart, and lungs. Dizziness, weakness, headache, loss of appetite, and nausea

Heat exhaustion symptoms

Victim will appear ashen gray


Skin cold, moist, and clammy


Pupils dilated


Weak pulse


Rapid and shallow breathing

Heat Stroke

Victim will be flushed, very dry, constricted pupils, and a rapid strong pulse. Breathing will be deep and rapid at first, but shallow and absent later. Move person to cool location, apply a cool compress and seek medical attention.

HERO/HERP/HERF

Condition should be set during on-loading or off-loading of ammunition


HERO– Hazards of Electromagnetic Radiation to Ordinance


HERP- Personnel


HERF- Fuels

HAZMAT and storage

Hazardous Material


Store HAZMAT IAW the MSDS (Material Safety Data Sheet)

potential risks of improperly labeled/stored HAZMAT

Mixture of chemicals could lead to fires, poisonous gases, chemical burns, etc...

MSDS

Technical bulletins that contain information about HAZMAT and by law; manufacturers must provide this data to HAZMAT users.They tell users how to use, store, and dispose of HAZMAT

Info on MSDS

Identify / Hazardous ingredients / Physical/chemical characteristics / Physical hazards/ Reactivity/ Health hazards/ Precautions for safe handling and use/ Control measures/ Routes of entry into the body/ Emergency and first-aid procedures for exposure/ Date of preparation of the MSDS or last change/ Name,address, and phone number of a responsible party who can provide additional information on the HAZMAT and appropriate emergency procedures

Personnel Protective Equipment (PPE)

Respirators
Hand protection
Foot protection
Eye protection
Face protection
Skin/body protection


Hearing protection

Hearing Conservation Program

prevent occupational hearing loss and assure auditory fitness for duty

102 HERITAGE AND DOCTRINE

102

Six areas that comprise Naval Doctrine

COWLIP



Command & Control
Operations


Warfare


Logistics


Intelligence


Planing

7 principles of Naval Logistics

FEARSSS




Flexibility


Economy


Attainability


Responsiveness


Simplicity


Sustainability


Survivability

First Navy ship named after an enlisted man

USS Osmond Ingram (DD-255)



GM1Osmond Ingram was the first sailor killed in WW1. Was jettisoning ordinance to try to stop incoming torpedoes.

Conditions that led to the formation of USN

The Second Continental Congress authorized the purchase of two vessels to strengthen the fight against the British thus creating the Continental Navy


The U.S. Navy was born on 13 October 1775

3 classes of Naval vessels

Ships-of-the-line: 64-100 guns


Frigates: 28-44 guns


Sloops-of-war: 10-20 guns

Article 1007

Hand Salute


Saluting the Ensign


Dipping the Ensign


Gun Salute

Gun salute

national salute of 21 guns is fired on Washington’s birthday, Memorial Day, Independence Day, to honor the President of the U.S., and heads of foreign states
Admiral– 17 guns
Vice Admiral – 15 guns
Rear Admiral Upper Half – 13 guns
Rear Admiral Lower Half – 11 guns
Salutes are fired at intervals of 5 seconds, and ALWAYS in odd numbers

Battle of Coral Sea

7-8 May 1942:
First carrier to carrier battle;
Carrier Lexington sunk, and Carrier Yorktown was damaged.
Yorktown was nicknamed “Ghost ship” by the Japanese

Great White Fleet

16 DEC 1907:


U.S. President Theodore Roosevelt ordered 16 Battleships (painted white) to circumnavigate the globe. Left Hampton Roads, Virginia for a round the world cruise to show the flag


Demonstrated the strength of the U.S. Navy and blue-water capabilities

Battle of Normandy D-Day

06 JUNE 1944


Largest Amphibious operation in history

Midway

4-7 June 1942


turning point of the Pacific war
U.S. broke Japanese naval code jn-25


four Japanese carriers sunk and USS YORKTOWN was lost.

Guadalcanal

13-15 NOV 1942


U.S.S. Juneau was sunk and thus the 5 Sullivan brothers were killed. A ship was later named in their honor

Battle of Leyte Gulf

23 OCT 1944



Final blow to the Japanese Navy


Largest Naval battle in history


U.S. Navy's first use of ELINT; allowed Navy to discern between Japaneses decoys and actual movements

Mercury

05 MAY 1961:


Alan B. Shepard, USN Commander


First U.S. manned space flight

Gemini 3

23 MAR 1965:




First U.S. two-man space mission CDR John Young.

Apollo 11

16-24 JUL 1969:


Neil A. Armstrong, 1st manned lunar landing

Apollo 17

07-19 DEC 1972:


7th and final lunar landing

STS-1

12-14 APR 1981


(Columbia): 1st orbital test flight of Space Shuttle. Cdr John Young. Completed 36 orbits and landed at Edwards AFB, California

On-the-roof Gang

01 OCT 1928


Naval Cryptologic group


176 enlisted radio intercept operators (150 Navy & 26 Marines)

Purple Code

27 September 1940


The SIS first solution to Japanese diplomatic messages enciphered in the Purple Code, was able to break some of its messages before the attack on Pearl Harbor

Attack on U.S.S. Liberty

08 JUN 1967:



Arab-Israeli Six-Day War, Liberty was attacked by Israeli torpedo boats at 1400 accidentally and ensued in the loss of 34 men. The largest loss of life in a single event in American cryptologic history.

Capture of U.S.S. Pueblo

23 JAN 1968:



While in international waters off of the Korean Coast, N. Koreans attacked. 82 crewmen were held for 11 months before being released. Pueblo remains in N. Korea to this day, constituted as the largest single loss of sensitive material

Landing at Inchon

16-19 SEP 1950


A joint CIA-military intelligence reconnaissance effort, placed a team in Incheon. Amphibious assault on inchon with 32 ft tidal changes, during Korean War

Hainan Island EP-3 incident

01APR 2001:


U.S. recon plane carrying a crew of 24 collided with a Chinese fighter, forcing EP-3 to emergency land in the People’s Republic of China.

Bletchley Park

The Enigma cypher was broken here

Navajo Code talkers

1942-1945


Code talkers transmitted messages over military telephone and radio nets using their native language during WW2; a code that the Japanese never broke

Attack on U.S.S. Stark

17 MAY 1987:


Stark was hit by two EXOCET cruise missiles launched by a single Iraqi F1 “mirage” fighter aircraft

EC-121 Shoot down

15 APR 1969:


Worst loss in the history of American aerial recon. 31 men on board for training purposes. EC-121 was shot down by at least one N.Korean MiG and was downed over the Sea of Japan

What are the qualities that characterize the Navy/Marine Corps team?

Readiness


Flexibility


Self-Sustainability


Mobility

3 levels of war

Tactical– involves details of individual engagements


Operational– concerns forces in a theater


Strategic– focuses on supporting national globe

National Security Act of 1947

War Dept/Navy Dept merged into DoD and created the CIA, DIA, AF, and National Security Council (NSC). SecDef was granted more power over the Secretaries of the services

Navy Core Values

Adopted in 1992 in wake of the 1991 Tailhook sexual assault scandal

Sailor’s Creed

Written by a “Blue Ribbon Recruit Training Panel” in 1993 at the direction of Chief of Naval Ops. Admiral Frank Kelso

RADM Grace Hopper’s contribution to the USN

co-inventor of COBOL


Grand Lady of Software


coined the term “bug”

1st computer

Atanasoff-Berry Computer (ABC).



Started being developed by Professor John Vincent Atanasoff and graduate student Cliff Berryin 1937 and continued to be developed until 1942 at the Iowa State College (now Iowa State University).

ARPANET

Advanced Research Projects Agency Network


ARPA started in 1958 by Eisenhower in response to the Russian sputnik


World's first operational packet switching network started 1966


1972 - 1st email

John Walker

He was a retired CWO and a spy for the Soviet Union from 1968 to 1985 He helped Soviets decipher more than a million encrypted naval messages


This is what initiated the requirement of Two-Person Integrity when handling classified information

Oldest intelligence organization in USN

Office of Naval Intelligence (ONI) founded in 1882

First CIO/DNI

Chief of Intelligence Officer


Director of National Intelligence
22 APR 2005: John D. Nogroponte as Director National Intelligence and Ger. Micheal V. Hayden as Deputy

2 departments that were combined to form ONI

The Department Library was combined with the "Office of Intelligence"




Executive order (EO) No. 292 23 MAR 1882

103 ORGANIZATION

103

the mission of USN

Maintain, train, and equip combat ready Naval Forces capable of winning wars, deterring aggression and maintain freedom of seas

Discuss NCA and its functions

National Command Authority - ultimate lawful source of military orders


President and SECDEF and their successors, vice president and deputy secdef

OPCON and ADCON

OPCON - operational control; provides organization of commands and forces




ADCON - administration control; provides authority over subordinates

COCOM

Combatant Command


established by title 10 (“Armed Forces”)

Navy COCOM

Commander Naval Expeditionary combatant Command


Atlantic Fleet, Naval Forces Europe, Pacific Fleet, Naval Forces Central Command

FLTCOM

Fleet Commander


In charge or specific fleet AOR

TYCOM

Type Commander (platform specific)

PACOM

Camp H.M Smith, Hawaii: From San Diego past Hawaii

EUCOM

Stuttgart. Germany: Europe and Eurasia

JFCOM

Suffolk, Virginia


Joint Forces Command


Provides mission ready joint capable forces

SOUTHCOM

Miami, Florida

CENTCOM

MacDil AFB, Tampa, Florida


Promotes cooperation among nations

NORTHCOM

Peterson AFB, Colorado Springs


Homeland defense and civil support operations

SOCOM

MacDil AFB, Tampa, Florida


Special operation forces

TRANSCOM

Scott AFB, Illinois


US Transportation Command

STRATCOM

US Strategic Command


Offutt AFB, Omaha, Nebraska


Promotes global security for America

AFRICOM

Kelley Barracks, Stuttgart-Moehringen, Germany

USCYBERCOM

Ft. George G. Meade, Maryland – Cyber Realms

CNO N2/N6

Pentagon


CNO N2 - DNI


CNO N6 - Deputy CNO, leads Navy Space Team


(CNO(N2))and N6 (Computer Network)

CNMOC

Commander, Naval Meteorology and Oceanography command, Stennis space center, Mississippi

NNWC

Naval Network Warfare Command, Virginia Beach, Virginia

Commander, Reserve Space and Network Warfare Program

responsible for sponsoring the reserve Space Cadre and supporting the Navy Space Team

Commander, USSTRATCOM

Offutt AFB, Omaha,Nebraska

JSOC

Joint Space Operation Center


Vandenberg AFB, CA


C2 capabilities to conduct space operations on a 24/7 basis

NOAA

National Oceanic and Atmospheric Administration, National Weather Service



Washington DC

NAVSOC

Naval Satellite Operations Center



NAVCYBERFOR

Virginia Beach, Virginia

ONI

Office of Naval Intelligence:


Suitland, Maryland.


Provide intelligence necessary to plan, build, train, equip, and maintain U.S. Maritime forces

Office of the Oceanographer/Navigator of the Navy

US Naval Observatory, Washington DC


Maximize America's sea power by applying relevant oceanographic knowledge across the full spectrum of warfare

3rd Fleet

San Diego, California: International dateline to E. Pacific

4th Fleet

Mayport,Florida: Caribbean and Central and South America

5th Fleet

Manama, Bahrain


Arabian Gulf, Red Sea, Gulf of Oman, and parts of the Northern Indian Ocean

6th Fleet

Naples, Italy: Approximately half of the Atlantic Ocean

7th Fleet

Yokosuka, Japan;


from Kuril Islands in the North to the Antarctic in the South

10th Fleet

FT.George G. Meade, Maryland: Cyber realm and Information Domains

US Fleet Forces, 2nd Fleet

Norfolk, Virginia: N. Pole to just South of the Tropic of Cancer

TF / TG / TU / TE

Task Force (TF) – Subdivision of a Fleet


Task Group (TG) – Division of TF


Task Unit (TU) - Division of TG


Task Element (TE) – Division of TU

AG

Aerographers Mate: Observe, collect, and record weather data(METOC)

CTI

Cryptographic Technician (Interpretive):Collect, analyze, and exploit foreign language communications signals of interest to monitor worldwide threats. (Language)

CTM

Cryptographic Technician (Maintenance): Monitor, track, electronic attack, and physical security. Troubleshoot, repair, or replace Cryptologic networks

CTN

Cryptographic Technician (Networks): Monitor, ID, collects and analyzes information and conduct CNO ops worldwide to support DoD national and theater level missions (Red & Blue Teams)

CTR

Cryptographic Technician (Collections): Collect and exploit signals of interest to ID, locate and report worldwide threats; provide SIGINT, technical guidance, and information warfare support to various units

CTT

Cryptographic Technician (Technical): Provide ELINT, indications and warning (I&W), and Anti-Ship Missile Defense (ASMD)

IS

Intelligence Specialists: Assist in every phase of the planning, collection, processing, analysis, and dissemination of intelligence. Assemble briefings, reporting and analytical programs. (Power Point Warriors)

IT

Information System Technicians – Provide network administration and security. Additionally work with Communications operations and message processing

Naval and Computer Telecommunication Area Master Stations (NCTAMS):

NCTAMS Lant – Norfolk, Virginia: operate and maintain responsive information transfer systems providing real time C4I to support Atlantic Fleet.




NCTAMS Pac – Wahiawa, Hawaii

Define C4ISR

Command, Control, Communications, Computers, and Intelligence, Surveillance and Reconnaissance


encompasses the gathering, processing, and distribution of information vital to the conduct of military planning and operations

Explain the mission of the Defense Information Support Agency (DISA):

Combat support agency that provides a global net-centric enterprise in direct support to joint war fighters

Explain the mission of NASIC

National Air and Space Intelligence Center HQ at Wright-Patterson AFB, OH Primary DoD producer of foreign aerospace intel

State the mission of NCDOC

Navy Cyber Defense Operations Command



Coordinate, monitor, and oversee the defense of Navy Computer networks and systems and establish CND for Joint Task Force

ODNI

Office of the Director of National Intelligence: serves as the head of the Intelligence community

DIA

Defense Intelligence Agency: MASINT


external intelligence service of the US specializing in defense and military intelligence

NSA

National Security Agency/ Central Security Service: SIGINT, Title-50

CIA

Central Intelligence Agency


civilian foreign intelligence service tasked with gathering, processing and analyzing national security information from around the world, primarily through the use of HUMINT

NGA

National Geospatial-Intelligence Agency: GEOINT


primary mission of collecting, analyzing, and distributing geospatial intelligence in support of national security

DHS

Department of Homeland Security: Analyzes the vulnerabilities of U.S. critical infrastructure, assesses the scope of terrorist threats to U.S. homeland security (ex: Coast Guard)

FBI

Federal Bureau of Investigation: Counter-Intelligence and counter terrorism operations in the U.S.

DEA

Drug Enforcement Administration: Enforces laws and regulations governing narcotics and controlled substances, chemical diversion,and trafficking

DOE

Department of Energy: Analyze foreign information relevant to U.S. energy policies and nonproliferation issues.

DOS

Department of State: Performs intelligence analysis and produces studies on a wide range of political and economic topics

DOT

Department of Treasury: Analyzes foreign intelligence related to U.S. economic policy

NASA

National Aeronautic and Space Administration: Space projects and more recently UAVs (Unmanned Aerial Vehicles)

NRO

National Reconnaissance Office: Integrates unique and innovate space based recon technologies. Provides I&W support

Five Branches of Military

USAF


USA


USMC


USN


USCG

104 ADMINISTRATION

104

Discuss the responsibilities of the following: Commander in Chief

POTUS Mr. Obama. The head of the Armed Forces as mandated by the Constitution. He is responsible for initiating military action in support of our national interests

Discuss the responsibilities of the following: SECDEF

Ash Carter, Senior advisor on military affairs. Principal defense advisor to President. Responsible for the formulation of general defense policy and policy related to Department of Defense (DOD)

Discuss the responsibilities of the following:


SECNAV

Ray Mabus, Responsible to the President for all matters pertaining to the operations and readiness of Navy Forces.

Discuss the responsibilities of the following:


CNO

ADM. John Richardson, Responsible to the SecNav and Chairman of the Joint Chiefs of Staff for operational commitments and readiness of the Navy. Issues Navy-wide order relating to Navy Operations and Administrative functions of the Navy.

Discuss the responsibilities of the following: FLEET COMMANDER IN CHARGE

Overall responsible for assets within their respective Area of Readiness (AOR).

Discuss the responsibilities of the following: TYCOM

Overall responsible for the operations of their specific platform

Discuss the role of the following: MCPON

MCPON Steven S. Giordano


Senior Enlisted Sailor in the Navy, the direct representative to the CNO on all Enlisted matters.

Discuss the role of the following: FLTCM, FLEET MASTER CHIEF

Senior Enlisted Sailor in the Fleet who is the direct representative to the Fleet Admiral on all Enlisted matters

Discuss the role of the following: FORCM, FORCE MASTER CHIEF

Senior Enlisted Sailor who is the direct representative to the Force Admiral on all Enlisted matters.

Discuss the role of the following: CMC, COMMAND MASTER CHIEF

Senior Enlisted Sailor in the Command who is the direct representative to the CO on all Enlisted matters.


CMC Nagle

Define CCRI

Command Cyber Readiness Inspection.


A formal inspection conducted under the direction of USCYBERCOM's Enhanced Inspection Program. Making sure all NIPR and SIPR systems work

State NAVIDFOR's role in an CCRI

Office of Designation Approving Authority (ODAA) for all cyber networks

EDVR Enlisted Distribution Verification Report

12 sections


Section 6 contains Distribution Navy Enlisted Classification code (DNEC) management
Section 7 contains NEC billet and personnel inventory


Section 8 contains a list of individuals who are qualified in Navy Enlisted Classification codes (NECs)

ODCR


Officer Distribution Control Report

monthly statement of officer manpower accounts for pertinent Navy activities

AMD


Activity Manpower Document

Displays the qualitative and quantitative manpower and an official statement of organizational manning and billets authorized

Evaluation Report

Used as a counseling worksheet. Records are maintained on naval personnel "which reflect their fitness for the service and performance of duties." EVALs are for enlisted personnel (E1-E6), the CHIEFEVAL is for E7-E9 personnel.

What is a FITREP

Used as a counseling worksheet. Records are maintained on naval personnel "which reflect their fitness for the service and performance of duties." FITREPs are for officers.

What is a Concurrent Report

Concurrent reports provide a record of significant performance in an additional duty (ADDU) or temporary additional duty (TEMADD) status.

Page 2

Dependency application/record of emergency data.

Page 4

Navy Occupation/Training and Awards History.

SGLI

SGLI (Service members’ Group Life Insurance). Low cost life insurance to Uniformed Service Members.

Page 13

Administrative Remarks.

OPREP-3 PINNACLE

National


Used to report incidents that are of national-level interest to the National Military Command Center (NMCC).

OPREP-3 NAVY Blue

Used to provide the CNO and other naval commanders notification of incidents that are of high Navy, as opposed to national-level, interest.

OPREP-3 Unit SITREP

CO


Used to inform the operational commander, or appropriate higher authority, of incidents not meeting OPREP-3 NAVY BLUE criteria.

What is the Importance of an IG

Naval Inspector General Conduct, supervise, monitor, and initiate audits, evaluations, and investigations relating to programs and operations of the Department of Defense activities.

What is the purpose of the Navy Correspondence Manual

uniform standards for the management and preparation of correspondence and is applicable to all commands and activities of the Department of the Navy.


(how to write memos)

Career Waypoints (C-Way) program

Long term force shaping tool that aids in leveling ratings overmanned and undermanned

officer accession programs

U.S. Naval Academy
Officer Candidate School (OCS) Program


Medical Enlisted Commissioning Program
Medical Service Corps In-service Procurement Program (MSC IPP)


Limited Duty Officer (LDO)\Chief Warrant Officer (CWO) programs
Seaman to Admiral-21 (STA-21) Program

Defense Language Proficiency Test (DLPT)

Used to determine proficiency in a foreign language




CTIs need to score at least a L2, R2 in order to maintain their rate

Educational Services Officer (ESO)

Coordination of officer and enlisted training and on duty education programs

What is the Purpose of the U.S. Navy's Drug Screening Program

Provides comprehensive drug abuse prevention and control policy and procedures for all Navy Military personnel, and to establish regulations to enforce that policy.

6 programs of Brilliant on the Basics

Career Development Board (CDB)
Ombudsman


Mentorship


Sponsorship


Indoctrination


Recognition programs

Purpose of Public Affairs Officers (PAO)

Handles all media matters and public inquiries relating to the command and/or its Sailors


LT Green

105 SUPPLY AND SUPPORT

105

3-M/PMS System

Navy ships’ Maintenance and Material Management (3-M) systems that will support in a manner that will ensure maximum equipment operational readiness




OPNAVINST4790.4B volumes I, II, and III. (Protective and Corrective)

Explain how Defense Property Accountability System (DPAS) is used to track equipment

DPAS is used to track physical accountability.
Provides data to the DON Financial Statements for inclusion into the Plant, Property, and Equipment (PP&E)

Discuss the purpose of the MOV program


Material Obligation Validation

commitment for future issue of an item that's not immediately available for issue (back order)

Discuss the DLRs Program

Depot Level Repair - Repairs that happen at a depot level. Additionally may be repaired at the organization or intermediate levels.

AVDLRs

Aviation Depot Level Repairable: Naval Inventory Control Point- Philadelphia &Mechanicsburg (NAVICP-PM) & (NAVICP-Mech)

Non-AVDLRs

DLRs under the management of the Naval Inventory Control Point-Mechanicsburg (NAVICP-Mech)

NRFI DLRs in Regard to TURN-IN and RIP

Turn-In: physically turn in property to nearest DRMO


RIP (Remain in Place): When DRMO is physically unable to accept property

Maintenance Assistance Modules (MAMs)

parts used for isolating faults within an avionics system or test set

Bulkhead mounted spares

material authorized for stowage in other departments.

CASREP

Casualty reporting - A system for requisitioning emergency replacement parts for equipment of components out of commission that are essential to the ships mission.

Four types of CASREP

INITIAL - Identifies status of a casualty


UPDATE- Provides updated information to the


CORRECT - Reports equipment has been repaired & is operational


CANCEL - When an outstanding casualty will be repaired during an availability period

NSN

National Stock Number - 13 digit number assigned to identify an item of material in the supply distribution system

COG

Cognizance Symbol


Identifies the inventory manager.

APL

Allowance Parts List


list of documents specifically tailored to an activity that identifies item/parts needed for support or maintenance. Should be stocked on board.

AEL

Allowance Equipage list - Contains on board allowance of equipage and supplies

NC

Not Carried - Material for which there is no storeroom allowance

NIS


Not in stock

Not in stock - Material that is normally stocked but supply is temporarily exhausted

SIM


Selected Item Management

Frequently request material

DD Form 1348-6

DoD SINGLE LINE ITEM REQUISITION SYSTEM DOCUMENT


Requisition material that cannot be identifiedby a NSN

NAVCOMPT 2276

Request for contractual procurement

NAVSUP 1250-2

7 part document for procuring Non-NSN material.

SF 44

Designed for on the spot, over the counter purchases, limit of $2500, exception is aviation fuel which limit is $25,000

DD Form 1155

Request for supplies & services from commercial vendors

SF 1449

Solicitation/Contract/Order for Commercial Items

SF 30

Amendment of Solicitation/ Modification of Contract

DD Form 200

Used to account for (survey) lost/stolen items

SF 364

Used to report discrepancies

SF 386

Used to report if a product has quality deficiency

CHRIMP

Consolidated Hazardous Material Reutilization and Inventory Management Program- serves as a fundamental element of the Navy’s life-cycle control and management of HAZMAT

DRMO

Defense Reutilization Marketing Office (DRMO) Deliver great performance to our customers for the reuse, transfer, donation, sale or disposal of excess/surplus property

ServMart

Self-service retail store operated by an ashore supply activity. Provides ready supply or relatively low-cost, frequently used items.

Discuss the Government Commercial Purchase Card (IMPAC) (VISA)

Government purchase card with a micro purchase threshold of $3,000

OPTAR

Operating Target: estimate of the amount of money that will be required by a unit to perform its assigned tasks. REPAIR/REPAIRABLE and CONSUMABLES!

Normal Power

Power supplied by the power company (commercial power)

Emergency Power

Power from generators or backup power source

Uninterrupted Power

UPS or battery backup, is an electrical apparatus that provides emergency power when the input power fails

106 SECURITY

106

Identify the directives that govern personnel security

DoD5105.21-M-1


SECNAVM-5510.30 series


DCID6/4 & 6/9


JOINTDODISS

TOP SECRET

Orange- exceptionally grave damage to National Security




Single Scope Background Investigation (SSBI), good for 7 years with a reinvestigate every 5 years

SECRET

Red- serious damage to National Security




Good for an entire career unless otherwise deemed necessary

CONFIDENTIAL

Blue - cause damage to National Security


Indefinite

UNCLASSIFIED

Green- No effect to National Security

Need to Know

Based on job description and/or requirements, not just having the appropriate clearance

SCI

Must be read into related SCI Caveats

What is a SAER and it purpose

Security Access Eligibility Report


used to explain issues that come up during SCI clearance

Event Reportable to SSO

Foreign Influence


Sexual Behavior


Unwillingness to comply with regulations


Change in marital status


Mental status

Who has overall authority of, and controls access to, a SCIF

Special Security Officer (SSO)

SF700

Security Container Information- Used to maintain combos

SF701

Activity Security Checklist- Ensure space is secure

SF702

Security Container Check Sheet- Sign off log for opening and securing a container

SF703

Top Secret Cover Sheet (Orange)- Cover sheet for TS document

SF704

Secret Cover sheet (Red)- Coversheet for secret document

SF705

Confidential Coversheet (Blue)- Coversheet for confidential document

SF312

NDA- Non-Disclosure Agreement

SF153

COMSEC Material Report- document receipt of all COMSEC material

When safe combos should be changed

When a combination lock is first installed or used


Combo has been subject to compromise


Other times deemed necessary by the CSA, mainly when an individual with access moved out of the office

What is an FDO


Foreign Disclosure Officer

Foreign Disclosure Officer - processes all foreign visit requests to the command


Only designated foreign disclosure officers (FDOs) may approve the disclosure of classified and controlled unclassified military information to foreign representatives

DCS

Defense Courier Service - transportation of sensitive classified materials that cannot be transported through private or public means

Describe the procedures for carrying hard copyclassified material

DCS- MUST BE DOUBLE WRAPPED, DCS label on inner and outer wrapping and classification markings must be placed on inner wrappings


Hand carry - double wrapped with address label on both inner/outer wrapping. MUST HAVE COURIER CARD at the level of material being carried!

State the responsibilities of the TSCO


Top Secret Control Officer

Top Secret Control Officer – control and inventory of all Collateral Top Secret material throughout the command

State the THREATCON recognition and Force Protection Levels (FPCON)

NORMAL-No current terrorist activity


ALPHA- increased general threat of possible terrorist activity


BRAVO- increased or more predictable threat of terrorist activity exists


CHARLIE- incident occurs or intelligence is received indicating some form of terrorist action or targeting is likely


DELTA- immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action is imminent

What is a RAM

Random Anti-Terrorism Measure, maximize the effectiveness deterrence value, implemented without a set pattern

Explain and state the purpose of an EAP

Emergency Action Plan: Plan for destroying classified material (Destroy TS material first)

Explain and state the purpose of Emergency Destruction Procedures (EDP)

Planning must consider natural disaster and hostile actions
EDP’s vary depending upon the commands mission and what COMSEC material they hold.

Who can initiate the Emergency Destruction:

Commanding Officer


Emergency Action Officer

Explain how and in what order, material is destroyed during Emergency destruction

Material that will cause more danger to national security will be destroyed first (SCI Material, Top Secret, COMSEC)

Define SCI

Sensitive Compartmented Information- requires special controls for restricted handling within compartmented intel systems

List the items prohibited in a SCIF

anything that transmits, receives, records or stores data is NOT authorized in the SCIF without SSO approval

Define the difference between security violation and practices dangerous to security

Practice Dangerous to Security (PDS) - incident that if not corrected could become a security violation


Security Violation - an incident when classified info has been compromised either through negligence or deliberate action

Explain the Security requirements of the following


SCIF

Must have one controlled entry point and emergency exit
Inspected every 2 years
Installed alarm systems tied in with base police


Completely closed space with no possibility of outside access

Explain the Security requirements of the following



T-SCIF

Must have clearly defined physical perimeter barrier and continuous physical security safeguards


Manned at all times or operations until no longer needed as SCIF

Explain vault recertification and recurring inspections

TOP SECRET- 6 months


SECRET-6 months


CONFIDENTIAL-9 months


All other facilities, 9 months

Two-person Integrity

Must have at least two people in the SCIF at all times, to monitor one another’s actions

Explain the DoD escort policy

Only command personnel, either military or civilian may be designated as escorts for a visitor

Procedures for sanitizing an area

Removal of information from the media or equipment, take down anything classified

COMSEC

Communications Security
Protective measures taken to deny unauthorized persons information derived from telecommunications of the U.S. Government concerning national security, and to ensure the authenticity of such telecommunications.

INFOSEC

Information Security


the practice of defending information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction

COMPUSEC

Computer Security

PSP

Personnel Security Program


ensure that only loyal, reliable, and trustworthy people are granted access to classified information or allowed to perform sensitive duties

ATFP

Anti-Terrorism/ Force Protection


defensive measures used to reduce the vulnerability of individuals and property to terrorist acts

Purpose of ICD (Intelligence Community Directive) system

DNI provides guidance, policy and direction to the Intelligence Community

Who is the SSO what is his/her job

Serves as the focal point for the receipt, control and accountability of SCI and oversees SCI security functions for subordinate SCIFS. The SSO will be a military commissioned officer, warrant officer, or civilian (GS-9 or above).


Ms. Orr

who can be a CSM

Must be a GS-11or officer, be appointed by the CO, and have an SSBI within the last 5 years

What is JPAS

Joint Personnel Adjudication System (JPAS): Automated system of record for personnel security management within the DoD, providing a means to record and document personnel security clearances

What is DONCAF

Department of the Navy Central Adjudication Facility


Adjudicate our clearance/revokes them

How long can a CO suspend access before DoNCAF revokes a clearance

90 days

INFOCON

Threat level system for IS


5-Normal readiness procedures


4-Increased military vigilance procedures


3-Enhanced readiness procedures


2-Greater readiness procedures


1-Maximum readiness procedures

Explain why the U.S. Navy only uses “.mil” email addresses on government systems.

U.S. Department of Defense has exclusive use of this domain.

107 INFORMATION ASSURANCE

107

Define IA

Program to protect and defend DoD information, info systems, and information networks

Certification

evaluation of the technical and non-technical security features of an IS

Accreditation

Formal declaration by the Designated Approving Authority (DAA) that an IT system is approved to operate in a particular security mode

DAA

official with authority to formally assume responsibility for operating a system at an acceptable level of risk. NAVIDFOR

System Security Plan/System Security Authorization Agreement

Planned security tasks required to meet system or network security requirements

ATO

AUTHORITY TO OPERATE




The formal declaration by the DAA that an Information System is approved to operate in a particular security mode - Good for 3 years.

IATO

INTERIM AUTHORITY TO OPERATE




May be issued when the requirements for full Accreditation cannot be met- Good for 180 days

Configuration Management

Assure physical and technical protection of backup and restoration hardware

Low-to-High Connections

Information being passed from low side will not have a confidentiality requirement

High-to-Low Connections

Must be sanitized of all classified information before being established on the low side

Risk Management

processthat allows IT manager to balance the operational and economic costs ofprotective measures


Ex: How much money do we need to spend to protect thisnetwork?

5 Attributes of IA

Confidentiality


Integrity


Availability


Non-repudiation


Authentication

List & Define 9 Categories of Computer Incidents

INCIDENT


- Root Level Intrusion
- User Level Intrusion
- Denial of Service
- Malicious Logic


EVENT
- Unsuccessful Activity Attempt
- Non-Compliance Activity
- Reconnaissance
- Investigating
- Explained Anomaly

Define the DoN World Wide Web Security Policy

All information, graphics, & photos posted on publicly accessible DON Websites must be carefully reviewed to ensure they meet the standards & requirements as published herein, including OPSEC considerations.
Define IAVA.
INFORMATION ASSURANCE VULNERABILITY ALERT-

high priority network vulnerability with an associated date by which that vulnerability must be eradicated from the network

Define IAVB

INFORMATION ASSURANCE VULNERABILITY BULLETIN-


Medium priority, associated with vulnerabilities that do not pose an immediate threat to the infrastructure.

Define IAVT

INFORMATION ASSURANCE VULNERABILITY TECHNICAL ADVISORY-


Technical notes on network vulnerabilities without remediation urgency- Low priority, no known exploit, or no available patch to load

CTO

COMPUTER TASKING ORDER -


Record message issued to components and/or supporting organizations of all Armed Services to implement required actions in order to operate & defend the GIG. - Normally comes with reporting requirements.

NTD

NAVAL TELECOMMUNICATIONS DIRECTIVE-


Record message coordinated by NNWC establishing Navy policies & procedures with regard to communications.

SERVICE PACK

A collection of updates, fixes and/or enhancements to a software program delivered in the form of a single package.

Vulnerability Assessment

Process of identifying, quantifying and prioritizing the vulnerabilities in a system

Explain the Difference Between Vulnerability & Threat.

VULNERABILITY - weakness in a system's security scheme




THREAT - circumstances, events, or people with the potential to cause harm to a system.

State the duties and responsibilities of the IAM

INFORMATION ASSURANCE MANAGER


Appointed by CO


Responsible for the IA program within a command, site, system or enclave- Responsible to the local IA command authority & DAA for ensuring the security of an IT system


Ex: Scott Czarsinski

108 NETWORKS

108 NETWORKS

Host/Client

A user computer connected to a network

Application Server
A server that houses “control applications” and software

Hub

A networking hardware device with one broadcast domain and works at the physical layer of the OSI model

Switch

hardware device which creates a separate collision domains for each switch port and works at the data-link layer of theOSI model

Router

A networking hardware device that forwards data packets between networks and works at the network layer of the OSI model

WAP

(Wireless Access Point) A networking hardware device that allows wireless devices to connect via a wireless communication standard

Proxy Server

acts as an intermediary for requests from clients seeking resources from other servers.

Firewall

Is a hardware device and/or software application that controls incoming and outgoing connections and packets, based on an applied rule set

VPN Concentrator

Establish, negotiates, assigns, and manages allVPN connections to and from a network.

Back-up

Is the coping or archiving of computer data

Repeater

A device that receives an electronic signal and retransmits the signal at a higher power. Works at the physical layer or the OSI model

layers of routing


Access

Acts as the point at which end stations connect to the network. Devices such as desktop computers and/or printers are found at this layer.

layers of routing



Distribution

intermediary between the Core and Access


Routers are used at this layer

layers of routing


Core

“backbone” of the network


The Core Provides high-speed connections, reliability, and fault tolerance. Switches are found at this layer

Bus topology

nodes are connected in a daisy chain by a linear sequence

Ring topology

each node connects to exactly two other nodes,forming a single continuous ring

Star topology

every node is connected to a central node

Mesh topology

each routing or switching device is connected

Point-to-Point topology

two nodes send networking traffic only to each other

Local Area Network (LAN)

a computer network covering a small physical area, like a home, office, or small group of buildings

Wide Area Network (WAN)

telecommunications network or computer network that extends over a large geographical distance

Metropolitan Area Network (MAN)

a large computer network that usually spans a city or a large campus


larger than LAN smaller than WAN

Global Area network (GAN)

network that is composed of different interconnected computer networks (WANs) and also covers an unlimited geographical area

OSI Model
Application
Presentation
Session
Transport
Network
Data Link
Physical

IPv4 and IPv6

IPv4 - 4 octet decimal notation 32bit



IPv6 - colon hexadecimal notation, 8 groups 128bit

NIPRNET


SIPRNET


JWICS

Non-classified Internet Protocol Router Network


Secret Internet Protocol Router Network


Joint Worldwide Intelligence Communications System

DoD Network Global Information Grid - DoDN(GIG)
U.S. DoD “globally interconnected, end-to-end set of info capabilities for war fighters
Defense Information Systems Network (DISN)
the DoD enterprise network for providing data, video, and voice services
NMCI
Navy/Marine Corps Intranet

ONENET

IT infrastructure for OCONUS NMCI

IT21

Shipboard network

Machine language

the low-level binary code executed by the processor

Assembly Language

low level programming language using the human readable instructions of the CPU

High-Level Language

language written in readable format. Ex: Python, C+, Perl

Operating System

software that manages computer hardware and provides common services

Virus

code that relies on another program to spread

Worm

code that can self-replicate

Trojan

Malicious program that takes on the appearance of another computer object but is actually malicious content or code

Backdoor

method of bypassing normal authentication

Phishing

is the attempt to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication

Network Enumeration

discovery of hosts/devices on a network

Buffer Overflow

an anomaly where a process stores data in a buffer outside the memory the programmer set aside for it

SQL Injection

malicious SQL statements are inserted into an SQL entry field for execution

Dictionary Attack

method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password

Privilege Escalation

act to gain elevated access in an operating system


usr > system

Brute Force Attack

systematically checking all possible keys or passwords until the correct one is found in order to gain access to a system

Social Engineering

anon-technical method of breaking into a network by psychological manipulation of people into performing actions or divulging confidential information

PKI

system for the creation, storage, and distribution of digital certificates which are used to verify credentials

DNS

name resolution to an IP address

109 COMMUNICATIONS

109 COMMUNICATIONS

Red Cross message

Rapidly deliver, up to immediate may be assigned AMCROSS messages concerning a death or serious illness

ADNS

Automated Digital Network System: creates a flexible networking environment


Of the shelf hardware and software

CUDIX

Common User Digital Information Exchange System: provides a full duplex interface over a satellite link, for receipt and transmission of narrative message traffic between NAVCOMPARS and mobile platforms

VERDIN

VLF DIGITAL INFORMATION NETWORK
Multi-channel Submarine Broadcast System

NOVA
NOVA is a store and forward switching system that provides automated re-addressal and quote functions for authorized users.

General Service (GENSER)

IBS

Integrated Broadcast System
Integrates several intelligence and information dissemination systems into a single system of broadcasts that will allow for the receipt of data via a single receiver (the joint tactical terminal)

INMARSAT

International Maritime Satellite
provide worldwide commercial maritime satellite services

DMS


Defense Message System

Defense Message System
handles individual messages and organizational messages

VTC

Video Teleconferencing
face-to-face meeting environment, dedicated desktop systems

DCO
Defense Connect Online
Defense Connect Online provides web conferencing and XMPP based instant messaging; portal for file-sharing on SIPR
GINGERBREAD
A term advising-net participants that there may be a possible intruder on the net.

types of disclosures afforded protection by the EEFI List

Position
Capabilities
Operations
Electronic Warfare
Personnel
COMSEC
Wrong Circuit
Memory Tool* Please Clean Our Elevator Pastor Cart Wright

BEADWINDOW

A real time procedure used to alert circuit operators that an unauthorized disclosure has occurred. Only proper response when receiving a beadwindow from another station is “Roger Out”.

RIVER CITY

An OPSEC tool used to prevent outbound communication
Used when electronic emissions need to be reduced.

JSIR
(Joint Spectrum Interference Resolution)

OCTOBER 1992


EMI detection & reporting for space systems


Address persistent and recurring interface problems


MEACONING


INTRUSION


JAMMING


SPECTRUM MANAGEMENT

Meaconing

intentional transmission of signals designed to deceive users of navigational aids

INTRUSION

is intentionally inserting electromagnetic energy into transmission paths

JAMMING

deliberately radiating, re radiating, or reflecting electromagnetic energy to impair the use of electronic devices, equipment, or systems

SPECTRUM MANAGEMENT

rationalizes and optimize the use of the RF spectrum

PLA

Plain Language Address: denote the command short title and geographic location used in message addressing

DTG

Date Time Group- uniquely describes a message for identification and file purpose only. DTGs have 2 parts: 1st is expressed in 6 digits, 2nd part includes a single-letter zone suffix

UTC

Universal Coordinated Time, aka ZULU

Standard Components of a NAVY message

Plain Language Address (PLA)


Heading Components
Collective Addresses
Security Classification
Subject


References


Point of Contact (POC)


Remarks
Declassification Instruction

MESSAGE PRECEDENCE/PROSIGN/OBJECTIVE

ROUTINE / R / 6HR


PRIORITY / P / 3HR


IMMEDIATE / O / 30 MIN


FLASH / Z / LESS THAN 10 MINUTES


FLASH OVERRIDE / W / PRIORITY

OPTASK COMMS

Communication-electronics guidance and requirements


means used by which the USN and Allied Navies distribute afloat communications plans

COMMPLAN

A living document to provide communication alignment and support the missions and desired state

TSO

Telecommunication Service Order-authorizes the start, change or discontinues circuits or trunks

TSR

Telecommunications Service Request- a valid, approved, and funded telecommunications requirement submitted to DISA or DISA activities for fulfillment.

COMSPOT

Communications Spot


Reports will be submitted by all ships & shore facilities at any time communication outages/ degradations are encountered.

Electronic Key Management System (EKMS)

NSA led program responsible for COMSEC key management, accounting and distribution.

OTAT/OTAR

Over the Air Transfer (OTAT)-electronically distributes key without changing the traffic encryption key


Over the Air Rekeying (OTAR)-changing traffic encryption key or transmission security key in remote equipment

TEMPEST

Code word used for unwanted electromagnetic/mechanical radiation

Emissions Control (EMCON)

Selective use of ships emissions to accomplish mission goals

110 OPERATIONS

110 OPERATIONS

ASW

Anti-Submarine Warfare (ASW) is the destruction or neutralization of enemy submarines

ASUW

Anti-Surface Warfare (ASUW) is the destruction or neutralization of enemy surface combatants and merchant ships

AD

Air Defense (AD) is the action required to destroy or reduce an enemy’s air and missile threat

IW

Information Warfare (IW) is the action taken to achieve information superiority over the adversary

STW

Strike Warfare (STW) is the destruction or neutralization of enemy land-based targets with conventional or nuclear missiles

NSW

A designated naval warfare specialty that conducts operations in the coastal, riverine, and maritime environments

Explain how the Reserve Component integrates with the Active Component

Navy will employ Reserve forces and personnel to relieve the stress on Active operating Tempo (OPTEMPO) by deploying

Explain the purpose of a mobile detachment

Provide direct/indirect support to an operational entity to further enhance/support that entity's operational/administrative capability.

Discuss the purpose of Direct Support Assets

Are deployable assets to meet quick reaction mission requirements

METOC teams

Mine Warfare UUV Platoon


Naval Oceanography ASW Team


Strike Group Oceanography Team


Mobile Environment Team

METOC teams



Mine Warfare UUV Platoon

Uses unmanned underwater vehicles instead of people to perform mine countermeasure warfare

METOC teams



Naval Oceanography ASW Team

meteorology and oceanography



Uses various tools to provide tactically relevant information to support ASW mission

METOC teams



Strike Group Oceanography Team

Provides strike groups with meteorological and oceanographic support



weather support for strike groups

METOC teams


Mobile Environment Team

a quick-reaction, mobile weather forecast group



Deployable METOC team

Electronic Warfare (EW)

use of EM spectrum to effectively deny the use of this medium by an adversary

Computer Network Operations (CNO)

Networked computers and supporting IT infrastructure systems to attack, exploit, and defend information (CNA, CND, CNE)

Military Information Support Operations (MISO)

planned operations to convey selected truthful information and indicators to foreign audiences

Military Deception (MILDEC)

actions to deliberately mislead the adversary decision makers as to friendly military operations

Operations Security (OPSEC)

process that identifies information that can be observed by adversary intelligence that may prove useful to them

Blue Team

Protection of the targeted assets and conducting training to local personnel

Red Team

Network intrusion testing and operational penetration testing and provides Computer Network Attack (CNA)

FES

Fleet Electronic Support


Install, remove, upgrade and report on CCOP CRYPTOLOGIC CARRY-ON PROGRAM

USC Title 10

outlines the role of armed forces in the U.S.Code (Subtitle C)

USC Title 50

outlines the role of War and National Defense

CRITIC

Critical Intelligence Communication




Message sent out for large events, something the president would need to know about.

Cryptologic Carry on Program (CCOP)

provides carry-on cryptologic exploitation capability by augmenting existing Ships Signal Exploitation Space (SSES) capabilities

NITES IV

used to provide METOC support at remote locations


automated METOC display and forecasting system that has the capability of receiving meteorological satellite data and interfacing with joint maritime communications systems and Fleet C4ISR

JDISS
Joint Deployable Intelligence Support System-program provides hardware and software capabilities that allow interoperability with intelligence systems supporting forces during peace, crisis, and war
Maritime Domain Awareness
effective understanding of anything associated with the Global Maritime Domain that could impact the security, safety, economy, or environment of a nation

Maritime Operation Center (MOC)

provides critical support in the execution of the nation's Maritime Strategy, giving commanders the processes, enabled by interoperable, networked systems, to enhance maritime capabilities.

Ship’s Signal Exploitation Space (SSES)

is to coordinate, monitor and oversee the defense of Navy computer networks and systems

Cryptologic Direct Support Element (CDSE)

team and their equipment subordinated to anoperational commander to provide cryptologic signal intelligence (SIGINT) direct support.
The Fourth Amendment
that protects all U.S. persons anywhere in theworld and all persons within the United States from unreasonable searches and seizures by any person or agency acting on behalf of the U.S. Government
CONOPS
verbal or graphic statement that clearly and concisely expresses what the joint force commander intends to accomplish
111 OPERATIONS SECURITY (OPSEC)
111 OPERATIONS SECURITY (OPSEC)
OPSEC
A systematic, proven process that identifies, controls & protects generally sensitive but unclassified information about a mission, operation or activity

5 step planning process

Identify Critical Information


Threat Assessment


Vulnerability Analysis


Risk Assessment


Measures/Countermeasures

responsibilities of the command OPSEC officer

Begin 5 step process


Disseminate CI throughout the command


Advertise through the posters, screen savers, and flyers


Analyze vulnerabilities


Assess Risk based on the threat


Conduct OPSEC training

OPSEC considerations regarding public affairs

The PAO and the OPSEC officer should coordinate the release of data relative to the mission

Web Risk Assessment

Assessments of all Navy websites that is conducted annually to ensure compliance with IA (information assurance) and security policy requirements

EEFI

Essential Elements of Friendly Information. Key information adversaries likely will inquire about regarding our intentions, capabilities and activities, in order to obtain answers critical to their own operational effectiveness

Critical Information (CI)

specific facts about friendly capabilities that is vital to plan effectively

Describe the components and functions of the command OPSEC program

CO appoints OPSEC officer in writing


ensures that command and family maintain an acute OPSEC awareness


OPSEC training

112 INTELLIGENCE

112 INTELLIGENCE

purpose of Naval Intelligence
Supporting the Commander
Identifying Centers of Gravity and Critical Vulnerabilities
Supporting Planning and Execution of Operations
Protecting the Force

5 steps of Intelligence cycle

Planning and Direction
Collection
Processing and Exploitation
Analysis and Production
Dissemination and Integration

Three Categories of Intelligence

Strategic


Operational


Tactical

National Level Intelligence Organizations

collection, processing, analysis, and dissemination activities


Ex: DNI, CIA, DIA, NGA, NSA, NRO, DHS, DEA

Theater Level Intelligence Organizations

non-Navy assets in Theater that can be utilized by CDR for a joint operation. Unit could be one of the National agencies or another service component.

Fleet Level Intelligence Organizations

produce intelligence assessments on nations of concern-particularly their military forces monitored by maritime movements

PIR

An priority intelligence requirement, stated as a priority for intelligence support, that the commander and staff need to understand a particular adversary or operational environment

CCIR

Commander’s Critical Intelligence Requirement is information critical to the CDRs management and decision making process that affect successful mission accomplishment

Intelligence Oversight and governing publications

Ensuring collection is conducted consistent with Constitution and applicable law.


EO 12333


DOD 5240.1-R


SECNAVINST 3820.3E


NSA Policy 1-23


USSID SP0018

Difference between U.S. citizen and U.S. person

U.S.citizen - an actual citizen of the US


US Person - US citizen or alien admitted for permanent residence in the US, and any corporation, partnership, or other organization organized under the laws of the US

Intelligence Preparation of the battle space environment

Defines battle space environment, battle space effects, evaluate the threat, determine threat courses of action


Important to Combat Planning

mission of Fleet Intelligence Office and its subordinate commands
Plan, manage and execute Fleet intelligence TYCOM functions

Subordinate commands are ONI and NMCI
Explain the ISR mission requirements and fundamentals
Intelligence, Surveillance and Reconnaissance.

Used for planning of operational missions
Intelligence Fusion Cell
the process of collecting and examining information from all available sources and intelligence disciplines to derive as complete an assessment as possible of detected activity
HUMINT
refers to intelligence gathering by means of interpersonal contact

OSINT

Open Source Intelligence
a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence

MASINT

Measurement and Signals Intelligence
technical intelligence obtained by quantitative and qualitative analysis of data (metric, angle, spatial, wavelength, time dependence, modulation, hydro-magnetic)

SIGNINT

Signals Intelligence
is a category of intelligence that includes transmissions associated with communications, radars, and weapons systems used by our adversaries

ELINT

Electronic Intelligence
electromagnetic radiation and geo-location intel

FISINT

Foreign Instrumentation Signals
technical information and intelligence derived from the intercept of foreign electromagnetic emissions associated with the testing and operational deployment of non-US aerospace, surface and subsurface systems

COMINT

Communications Intelligence
is intelligence gained through the interception of foreign communications, excluding open radio and television broadcasts

IMINT

Imagery Intelligence
visual photography, infrared sensors, lasers, electro-optics, and radar sensors such as synthetic aperture radar

ACINT
Acoustic Intelligence

collection and processing of acoustic phenomena
Give 3 examples of intelligence briefs
Intelligence Preparation of the Battlefield (IPB)
Country Overview (Country Study)
Order of Battle (OOB)
Pre-op
Post-op

Intelligence watch floor

To provide fused multi-sourced intelligence into products for National, Fleet, Tactical, and Joint Commanders

113 TECHNICALFUNDAMENTALS

113 TECHNICALFUNDAMENTALS

ELF

3-30 Hz


Extremely low frequencies


One way Sub Comms

SLF

30-300Hz


Super low frequencies


AC power grids

ULF

300-3000 Hz


Ultra low frequencies
used by military for secure communicationthrough the ground (Earth Mode)

VLF

3-30 kHz


Very low frequencies


Near Surface Comms


communications or navigation

LF

30KHz - 300KHz
Low Frequency
AM Broadcasting

MF

300KHz-3MHz


Medium Frequency


international distress frequencies

HF

3MHz-30MHz


High Frequency


point-to-point, ship-to-shore, ground-to-air, and fleet broadcast

VHF

30MHz-300Mhz


Very High Frequency


FM Radio Broadcast


Line of site and SATCOM. Ship to shore

UHF

300MHz - 3GHz


Ultra High Frequency


LOS - Tactical voice


Satcom - Tactical Voice\Data

SHF

3GHz - 30 GHZ


Super High Frequency


radar and satellite communications

EHF

30GHz-300GHz


Extremely High Frequency


experimental stages

Frequency

Measured in Hertz. Number of wave cycles per second.

Wavelength

distance in space occupied by one cycle of a radio wave at any given instant

Ducting

bending of the radar waves passing through the abnormal condition

Refraction

bending of electromagnetic waves caused by achange in the density of the medium

Multiplexing

simultaneous transmission of 2 or more signals over a common carrier wave

Modulation/Demodulation

Taking voice or sound and changing them into radio waves and back again

Bandwidth

difference between the highest usable frequency of a device and the lowest usable frequency of the device

Keying

Inserting noise or data onto a frequency

3 layers of the Earth’s atmosphere

Troposphere: Surface to 3.7miles; all weather occurs here




Stratosphere: 3.7miles to 31.1 miles; constant temperature




Ionosphere: 31.1miles to 250 miles; Long Distance comms

In Relation to the atmosphere: Frequency

For any given time, each ionosphere layer has a maximum frequency at which radio waves can be transmitted vertically and refracted back to earth’s surface

In Relation to the atmosphere: Radio Waves

2 principal ways in which EM energy travels from a transmitting antenna to areceiving antenna.


Ground waves - near the surface of the Earth


Sky waves - reflected back to Earth from the ionosphere

In Relation to the atmosphere: Propagation

transmissions of a wave through a medium




Radio waves can be reflected, refracted and diffracted like light and heat waves.

In Relation to the atmosphere: Azimuth Angle

Angle of an object above the horizontal plane between the object and true or relative north. Measured clockwise

Angle of an object above the horizontal plane between the object and true or relative north. Measured clockwise

In Relation to the atmosphere: Elevation Angle

Angle between the horizontal plane and the line of sight
(altitude)

Angle between the horizontal plane and the line of sight


(altitude)

USB

Upper side band

the SUM frequencies above the carrier

Upper side band


the SUM frequencies above the carrier

LSB

lower sideband

DIFFERENCE frequencies below thecarrier

lower sideband


DIFFERENCE frequencies below thecarrier

CW

“on-off” keying of a continuous wave (CW) carrier frequency

Amplitude Modulation (AM)

Varying amplitude of signal

Frequency Modulation (FM)

Varying Frequency of signal

PRI


Pulse Repetition Interval

Pulse Repetition Interval




interval between the start on one pulse and the start of the next pulse

PRF


Pulse Repetition Frequency

Pulse Repetition Frequency




the rate at which pulses are transmitted, given in Hz pulse per second

RF

Radio Frequency




Frequency at which radar operates

BW

Beam wdith




width of a radar beam measured between half points

RADAR: CW

Continuous Wave




Detects change in frequency reflecting from target. Determines velocity, can't determine range.

DOPPLER EFFECT

a shift and change in frequency




ex sound moving towards or away from you

PW


Pulse Width

Pulse Width




duration of time between the leading and trailing edges of a pulse

Scan

movement of a radar beam while searching for or tracking a target

Bearing

Angle from relative or true north of an object from one's own position and view.

Azimuth

the compass bearing, relative to true north, of a point on the horizon directly beneath an observed object

the compass bearing, relative to true north, of a point on the horizon directly beneath an observed object

Elevation angle
angle between the horizon and the line from the object to observer’s eye
angle between the horizon and the line from the object to observer’s eye

Air Search

determine the position, course, and speed of airtargets; radar can exceed 300 miles

Surface Search

the detection of surface objects; maintenance of a 360-degree search pattern of all objects within line-of-sight

Fire Control

Provides positional data on targets to a fire-control system in order to calculate a firing solution

OPELINT

Operational ELINT


determines the locations and readiness of target emitters


Location


Movement


Employment


Tactics

TECHELINT

Technical ELINT determines thecapabilities and limitations of target emitters and and the electronics or weapons systems withwhich they are associated with


Signal Characteristics, Modes, Functions, Capabilities, Limitations, Vulnerabilities

Half Duplex

send or receive one at a time

Full Duplex

communications take place simultaneously in both directions using two separate frequencies

Simplex

1 direction, uses a single channel to exchange information between 2 or more terminals

114 METOC

114 METOC

How does Naval Oceanography support the Information Dominance Mission

Predicts weather and ocean conditions thereby assisting in the foreseeable intelligence collection, capabilities of the adversary

METOC Products




U.S. Naval Observatory

USNO




Responsible for astronomical data and standard of time.

METOC Products




Joint Typhoon Warning Center

JTWC




Responsible for issuing tropical cyclone warnings for Pacific and Indian Oceans

METOC Products




Naval Oceanography Operations Command

NOOC




Responsible for advising the impact of ocean and atmospheric conditions in every theater and of every operation

METOC Products




Fleet Numerical Meteorology and Oceanography Center

FNMOC




Provides relevant and timely world wide meteorology and oceanography support to U.S. and coalition forces

METOC Products




Naval Oceanographic Office

NAVO




maximizes sea power by applying relevant oceanographic knowledge in support of U.S. national security

GOES

Geospatial Operational Environmental Satellites




Provides warning of thunderstorms, winter storms, flash floods and other severe weather.




4 in orbit GOES 10-13

POES

Polar Operational Environmental Satellite




Next generation circles 14 times a day, collect global data on a daily basis

Defense Meteorological Satellite Program




DMSP

low Earth orbiting satellites provide the military with important environmental information

National Polar Operational Environmental Satellite System (NPOESS)

next generation of low earth orbiting environmental satellites

Tropical Rainfall Measuring Mission (TRMM)

Satellite designed to help our understanding of the water cycle in the atmosphere, as well as “dissect” tropical cyclones at various levels by using microwave frequencies

Wind Direction/speed

Wind Direction- average direction from which the wind is blowing




Wind Speed- average rate of air motion, or the distance air moves in a specified unit of time

Ambient Air

aka dry-bulb temperature




temperature of surrounding air

Wind Chill

felt air temperature on exposed skin due to the wind

Heat Stress

measure of how hot the air feels based on temperature and humidity




excessive heat on the body

Precipitation

includes all forms of moisture that falls to the Earth’s surface, ex: rain, drizzle, snow and hail

Relative Humidity

Measure amount of water in the air

Sky Condition

state of the sky




how it looks, clouds etc.

Atmospheric pressure

refers to the pressure exerted by the column of air on any point of the Earth’s surface

Air Mass

large volume of air defined by its temperature and water vapor content

Cold / Warm / Occluded Front

when a cold front overtakes a warm front. When this occurs, the warm air is separated (occluded) from the cyclone center at the Earth's surface

Restricted Visibility

Limited visibility due to mist, fog, rain, snow

Fog

Water Droplets, ice crystals in air near surface




- NUMBER ONE inhibitor to military operations!

Sunrise/Sunset

the times when the upper edge of the sun is on the horizon

Moonrise/Moonset

First appearance/disappearance of moon over horizon

Lunar Illumination

the amount of light illuminated by the moon

Tropical Cyclones

storm that originates in tropical latitudes; they include tropical disturbances, depressions, storms, hurricanes, typhoons, and cyclones

Tropical Depression

winds less than 34 knots


first appearance of a lowered pressure and organized circulation in the center of the thunderstorm complex occurs

Tropical Storm

winds between 34-63 knots


a localized, very intense low-pressure wind system, forming over tropical oceans and with winds of hurricane force

Hurricane/Typhoon

winds of at least 64 knots


A large tropical storm system with high-powered circular winds

Thunderstorm

form of weather characterized by the presence of lightning and thunder

Tornado/Waterspout

Rotating column of air in contact with the earth

Funnel Cloud

Funnel shaped cloud of condensed water droplet, does not reach the ground/ water surface

Effects on military Operations - Visibility

biggest impacts are on shore and shipboard flight ops. as well as targeting and strike weather

Precipitation

precipitation also impacts radar performance (reactivity profile), and Electro-optical systems performance

Winds

Influences aircraft and artillery operations, can affect radar and comm systems

Cloud Cover

cloud cover can impact all major operations and/or the support to those operations

Temperature and humidity

has the biggest impacts on ground troop movement and special operations

Ocean Eddies - Cold

pocket of cold water breaks from cold current into warm ocean counter clockwise

Ocean Eddies - Warm

pocket of warm water breaks from warm current into cold ocean waters clockwise

Bathythermograph

The measurement and recording of subsurface water temperature at various depths

Bioluminescence

Luminescent bacteria that develops in great masses in the sea causing a general bluish green glow in the water

Sea Wave

wind waves, waves generated by the wind in the local area

Wave Height

the vertical distance, usually in feet, from the crest of a wave to the trough of the wave

Wave Period

the time, usually measured in seconds that it takes for a complete wave cycle to pass a given fixed point

Swell Wave

seas that have moved out and away from the area in which they were formed

SST


Sea surface temperature

the water temperature close to the surface

Ebb Tide

The period between high tide and low tide during which water flows away from the shore

Flood Tide

a current that flows toward the shore


The incoming or rising tide

High Tide

Sea level at its highest point

Low Tide

Sea level at its lowest point

Open Ocean current

a continuous, directed movement of ocean water generated by the forces acting upon this flow

Littoral current

currents occur in the surf zone and are caused by waves approaching the beach at an angle.

Rip current

caused by the return flow of water from the beach

Surf Zone

Where waves form

Spilling - Breaker Type

occur with gentle and flat beach slopes


wave crests gently

Plunging - Breaker Type

breakers occur with a moderate to steep beach slope




creates a pipe when cresting

Surging - Breaker Type

normally seen only with a very steep beach slope




wave does not crest

Ocean fronts

Boundaries between water masses of different density

Ocean Bottom Topography

studies the configuration of the sea floor and the ocean surface

Ocean Bottom Composition

The ocean bottom is covered by various types of sediments mixed with dissolved shells and bones of marine organisms

Ocean Layers Mixed Layer

Upper layer of ocean; warmer temperatures depths to max of 1500 feet.


2 processes are classified as mechanical and convective

Ocean Layers Thermocline

Central layer. Rapid decrease of water temperature with depth.

Ocean Layers Deep Layer

bottom of the layers; characterized by constant cold temperatures, generally less than 4° C

Effects on transmission of sound Temperature

Primary controller of sound speed increases 3.2 m/sec for ever 1 degree increase




speed of sound in water is 4 times greater than the speed of sound in air

Effects on transmission of sound: Pressure

pressure increases with depth and sound speed increases with higher pressure




1.7m/sec per 100 meters of depth

Effects on transmission of sound: Salinity

The speed of sound in water increases with increasing salinity

Relationship of METOC to GEOSPATIAL Intelligence

METOC is intelligence layer of GEOINT information base. Critical to joint ops during planning and ongoing operations

Impacts of environmental conditions Anti-submarine warfare operations (ASW)
sound propagation and detection effectiveness of both short/long range acoustic systems can be enhanced or degraded

Impacts of environmental conditions


Naval Special Warfare operations (NSW)

target restrictions due to time of day, terrain restrictions, adverse weather, seasonal and temperature effects

Impacts of environmental conditions


Mine Warfare operations

sound speed that is highly dependent upon salinity (MW is almost always conducted at near shore areas




surface winds, wave action, visibility, daylight hours

Impacts of environmental conditions


Air Defense Operations

ceiling, visibility, temperature and winds have the greatest effect

Impacts of environmental conditions to


Information Warfare

METOC forecasts will be generated at the lowest level possible within the battle group


METOC Support to warfare commanders

Humanitarian Assistance/ Disaster Relief Ops

natural geography and man made features affect how and where we can supply relief efforts

Chemical, Biological and Nuclear Warfare

CBRNE material may disperse chemicals, biological or radiological agents or toxic materials by wind

Strike Warfare

Visibility


Precipitation


Winds


Cloud Cover


Temperature and humidity

Impacts of atmospheric conditions on EM propagation of radar beam




Standard refraction

Refraction is the change in direction of a wave due to a change in its speed

Refraction is the change in direction of a wave due to a change in its speed

Impacts of atmospheric conditions on EM propagation of radar beam




Super-refraction

This is frequently caused by temperature inversions, bends the beam toward the earth and can cause the radar to detect ground returns from distances far exceeding the normal ground clutter area

Impacts of atmospheric conditions on EM propagation of radar beam




Sub-refraction

bends the beam away from the earth

Impacts of atmospheric conditions on EM propagation of radar beam




Trapping

ducting in evaporative ducts, surface-based ducts, and low-elevated ducts, provided the victim radar antennas are within the elevated duct




Extends radar ranges

Small craft

issued in harbors, inland waters and coast OPAREAS

Gale

wind speeds of 35 knots or higher

Storm

wind speeds of 50 knots or higher

Local Wind Advisory

winds exceeding 25 mph/40 kph over land

High Seas

issued every 12 hours whenever actual heights in an ocean area of N. Hemisphere equal/exceed 12ft

Severe Thunderstorm/Tornado

issued when weather is favorable for development of severe thunderstorms or tornados


64 knots or greater

Thunderstorm warning

issued when trained storm spotters or a Doppler weather radar indicate a strong thunderstorm

Hurricane/Typhoon warning

warning for land, harbor, inland waters, and ocean areas for winds 64 knots or greater

Extreme Temperature warning

warnings when the heat index and wind-chill are to the extreme

Heavy Snow warning

blizzards, heavy snow, freezing rain or drizzle and sleet

Flash flood

rapid flooding of low-lying areas, rivers, dry lakes, and basins

Hazardous Surf

national weather service bulletin advising hazardous wave conditions which could cause injury, death, or property damage

Tsunami

ocean wave generated by a submarine earthquake, volcano, or landslide - aka seismic sea wave

Earthquake

movement of the Earth’s crust cause by the release of stress accumulated along geologic faults or by volcanic activity

Cyclone Conditions of Readiness (COR)

COR5- destructive winds within 96 hours


COR4- 72 hours


COR3- 48 hours


COR2- 24 hours


COR1- 12 hours

Nautical Almanac

describes a selection of celestial bodies for the purpose of enabling navigators to use celestial navigation at sea

Astronomical Almanac

contains solar system ephemeris and catalogs or selected stellar and extra galactic objects

115 NAVY SPACE

115 NAVY SPACE

Space Force Enhancement

Increasing combat potential through ISR, missile warning, environmental monitoring, satcomms, and PNT (Positioning, Navigation, and Timing)

Space Support

Operations to deploy and sustain military and intel systems in space.

Space Control

protect space capabilities and deny freedom of use of space for the adversary

Space Force Application

Combat Operations in, through, and from space to influence the course and outcome of conflict by holding terrestrial targets at risk.


ex: ballistic missile defense and force projection

space entities and how they affect communications




The Sun

biggest effect on space environment


two by-products:


electromagnetic radiation


electrically charged particles

space entities and how they affect communications




Solar Wind

travels at one million mph, carrying various particles from the sun


atmospheric friction or drag on spacecraft, which can affect their orbit


disrupt electronic communication

space entities and how they affect communications




Solar Cycle

Solar activity follows an 11-year cycle.

space entities and how they affect communications




Van Allen Radiation Belts

belts of charged particles held in place around the Earth by the Earth’s magnetic field

space entities and how they affect communications




Atmospheric Drag

low orbiting objects, below 1000 km, are slowed by the atmosphere, resulting in the space craft not being where it is expected and to reduce the spacecraft’s altitude

Low Earth Orbit

150-800 miles above earth's surface.
 Period as low as ninety minutes

150-800 miles above earth's surface.


Period as low as ninety minutes

Medium Earth Orbit

altitude of 10,800 miles


period of 12 hours


Used by navigation satellites

Highly Elliptical Orbit

satellite slows down at apogee and speeds up at perigee


ex: communication satellites

Geosynchronous Orbit

altitude of 19,300 miles, satellite remains over the same area of the Earth

Polar Orbit

orbit that allows a satellite to travel around the earth, from pole to pole, in a short time to provide broad photo coverage of the planet; inclination of 90 degrees

Apogee

farthest point of orbit from the center of the Earth

Perigee

closest point of orbit to Earth

Identify the 3 main space launch facilities in the U.S

Vandenberg Air Force Base (VAFB),California




Kennedy Space Center (KSC)/ Cape Canaveral Air Force Station (CCAFS), Florida




Wallops Island, Virginia

Navy UHF Follow-on

Links ships, mobile units, and shore sights


together (Line of sight)


constellation of eight geosynchronous communications satellites that provides tactical narrow band UHF satellite communications to all of the Defense Department and other government agencies

Defense Satellite Communications System

Provides secure, jam-resistant communications for Command and Control, High Capacity SHF Satellite




GCCS / JDISS / JWICS / CTAPS / STEL / JMICS

GBS

Global Broadcast Service


provides high data rate broadcast of data and video information products to military tactical terminals

WGS

Wideband Global SATCOM (WGS) provides


flexible, high-capacity communications for the Nation’s war fighters through real world


operationalization

Global Positioning System (GPS)

broadcast navigation information on a


continuous basis


SPS- unencrypted civilian positioning


PPS- military positioning

advantages and disadvantages of space-based ISR

advantage: used to provide systematic focused coverage of an area of interest, sometimes


without detection.


Disadvantages: include predictable over-flight schedule, atmospheric disturbances (fog, rain, smoke, clouds)

Space Situational Awareness (SSA)

Key component for space control. Ensures space ops, safety, and international agreements

Astrometry

natural science that deals with the study of


celestial objects (ex: planets, comets, star


clusters, and galaxies)

Earth Orientation Parameters

Describes irregularities of the earths rotation; measures Earths rotation.

Role of precise time in the following- GPS

accurate time and location with the assistance of atomic clocks

Geo-location

greater emphasis on determining a meaningful location rather than just a set of geographic


coordinates

Network Synchronization

crucial to a variety of economic activities around the world

201ADMINISTRATION

201ADMINISTRATION

Explain the procedures for transmission and handling of Privacy Act Information

Transmitted via encrypted email


Shred documents which contain PII


Do not release without written consent

Explain the adjunction process to include:


Investigation

Process of interviewing and reviewing records performed by Office of Personnel Management (OPM)

Explain the adjudication process for a Security Access Eligibility Report (SAER)

Used to identify an incident or any change in


eligibility if an employee is still eligible for the


security clearance

Explain the adjunction process to include




Appeals

Process of appealing the decision of DoNCAF

LOI

Letter of Intent- used to notify a person their clearance is going to be revoked

LOD

Letter of Denial- used to notify that access has been officially denied to classified information

Explain the adjudication process for Joint Clearance Access Verification System (JCAVS)

used to verify access levels (clearance) of an


individual

State the purpose of an SF86

Used to compile information that OPM uses to investigate and recommend authorization to have a security clearance


Consist of past residence, employment, legal or criminal action, references and financial


information.

DD Form 1847-1

Non-Disclosure Statement, used to precisely identify individuals to certify their access to sensitive compartmented information


held for 99 years


legal document used for criminal prosecution

Adjunct Faculty Program

Uses subject matter experts to meet global training needs


Part time and full time instructors

minimum DLPT score standard for CTI

Listening 2 (L2) and Reading 2 (R2)


Pay grades E1 through E8 Test annually


Everyone is eligible

Name the languages associated with the following categories

Cat1 – MID-EAST/SW ASIA/AFRICA


Cat2 – EAST ASIA/PACIFIC


Cat3 – LATIN AMERICA


Cat4 – EASTERN EUROPE

emergency destruction priority assigned to


cryptologic equipment and documents

Priority One – All cryptographic equipment and documents


Priority Two – All operational SCI material


Priority Three – Less sensitive administrative SCI material and collateral material

202 INFORMATION OPERATIONS

202 INFORMATION OPERATIONS

Describe the Navy’s organizational structure as defined by annexes A & J of FLTCYBERCOM/ COMTENTHFLT OPORD 2000

Subordinate commands are organized by missions and functions in accordance with Annex A.


Annex J outlines command relationships and responsibilities.

USSTRATCOM

Deter attacks on U.S. vital interests, to ensure U.S. freedom of action in space and cyberspace

CYBERCOM

Plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified DoD information networks

JFCC-ISR

Joint Functional Component Command for Intelligence, Surveillance and Reconnaissance




serves as the epicenter for planning, execution and assessment of the U.S. military's global Intelligence, Surveillance, and Reconnaissance operations; a key enabler to achieving global situational awareness.

JFCC-Space

Joint Functional Component Command for Space




Continuously coordinates, plans, integrates, commands and controls space operations to provide tailored, responsive, localand on order, denies the enemy the same

JIOWC

Joint Information Operations Warfare Command




is responsible for the integration of Information Operations (IO) into military plans and operations across the spectrum of conflict.

Three formal categories CGS


(Cryptologic Support Group)

Permanent


Military Service Component


Expeditionary

Customer Relationship Functions

Provision of dedicated SIGINT services to a customer, using the capability of the entire US SIGINT System

SIGINT production functions

These elements formally delegated a mission to a CSG through the mission delegation process and are responsible for overseeing the analytic and reporting mission

SIGINT operational relationships

On behalf of DIRNSA, the SIGINT Director exercises SIGINT operational control of CSG’s through the NSA/CSS Representatives accredited to CSG’s supporting agency

Rules of engagement - ROE

are the means by which the President, SecDef, and operational commanders regulate the use of armed force in the context of applicable political and military policy, and domestic and international law

Law of War

or law of armed conflict


is a body of law concerning acceptable justifications to engage in war and the limits to acceptable wartime conduct

No-Strike List

A list of objects or entities characterized as protected from the effects of military operations under international law and/or rules of engagement

Restricted Target List

A list of restricted targets nominated by elements of the joint force and approved by joint force commander

Battle Damage Assessment

The purpose of BDA is to compare post-execution results with the projected results generated during target development

Information Operations (IO)

involve actions taken to affect adversary information and information’s systems while defending one’s own information and information systems

Information Warfare (IW)

Information operations conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries.

Describe Target Development

Based on what the commander wants to achieve and the measures and indicators used to evaluate their achievement rather than on the ways and means used to affect the target

Time Sensitive Targeting and six phases

targets requiring immediate response because they pose (or will soon pose) a danger to friendly forces or a highly lucrative, fleeting targets of opportunity.




Detect, Locate, Identify, Decide, Strike, and Assess

Describe how the five core capabilities of IO are applied during Offensive IO and Defensive IO

Intergrate and coordinate policies and procedures, operations, personnel, and technology to protect and defend information and information systems.

Destroy

To damage a system or entity so badly that it cannot perform any function or be restored to a usable condition without being entirely rebuilt

Disrupt

to break or interrupt the flow of information

degrade

To reduce the effectiveness or efficiency of adversary C2 or communications systems, and information collection efforts or means

Deny

to prevent the adversary from accessing and using critical information, systems and services

Deceive

To cause a person to believe what is not true. MILDEC seeks to mislead adversary decision makers by manipulating their perception of reality

Exploit

To gain access to adversary C2 systems to collect information or to plant false or misleading information

Influence

To cause others to behave in a manner favorable to US forces

Protect

To take action to guard against espionage or capture of sensitive equipment and information

Detect

To discover or discern the existence, presence, or fact of an intrusion into information systems

Restore

to bring information and information systemsback to their original state

Respond

To react quickly to an adversary’s or others’ IO attack or intrusion

SSN


SSGN

Nuclear Submarine


Guided Missile Nuclear Submarine

EA-6B




















Prowler 



















A twin-engine, mid-wing electronic

Prowler


A twin-engine, mid-wing electronic warfare

E-2C




















Hawkeye 



















Navy’s and Marine Corps airborne surveillance

Hawkeye


Navy’s and Marine Corps airborne surveillance

P-3C




















Orion






















maritime patrol aircraft used by numerous
navies and air forces around the world, primary for maritime patrol,
reconnaissance, anti-surface warfare and anti-submarine warfare

Orion maritime patrol aircraft used by numerous navies and air forces around the world, primary for maritime patrol, reconnaissance, anti-surface warfare and anti-submarine warfare

EP-3E




















JCC is the signals reconnaissance version of the
P-3 Orion

JCC is the signals reconnaissance version of theP-3 Orion

RC-135




















Rivet 



















Joint reconnaissance aircraft supports theater
and national level consumers with near real time on-scene intelligence
collection

Rivet


Joint reconnaissance aircraft supports the theater and national level consumers with near real time on-scene intelligence collection

MQ-1A




















Predator 



















Long endurance, medium altitude unmanned
aircraft system for a surveillance and reconnaissance missions

Predator


Long endurance, medium altitude unmanned aircraft system for a surveillance and reconnaissance missions



EC-130H




















Compass Call 



















Airborne tactical weapon system using a modified
version of the C-130 Hercules.

Compass Call


Airborne tactical weapon system using a modified version of the C-130 Hercules.



U-2




















Single - engine, very high-altitude
reconnaissance aircraft operated by the United States Air Force

Single - engine, very high-altitude reconnaissance aircraft operated by the United States Air Force

EA-18G




















A derivative of the Super Hornet project, is ultimately
destined to become the replacement for the venerable EA-6B Prowler

A derivative of the Super Hornet project, is ultimately destined to become the replacement for the venerable EA-6B Prowler

CVN




















Aircraft Carrier

Aircraft Carrier

CG




















Guided Missile Cruiser, a large combat vessel
with multiple target response capabilities

Guided Missile Cruiser, a large combat vessel with multiple target response capabilities

DDG




















Guided Missile Destroyer, multi-mission Anti-Air
Warfare, Anti-Submarine, and Anti-Surface Warfare surface combatant

Guided Missile Destroyer, multi-mission Anti-AirWarfare, Anti-Submarine, and Anti-Surface Warfare surface combatant



FFG




















Guided Missile Frigate 



















Anti-submarine warfare combatants with an
additional anti-air warfare capability

Guided Missile Frigate


Anti-submarine warfare combatants with an additional anti-air warfare capability



LCC

Amphibious Command Ships


Provide command and control for fleet commanders

LHA/LHD














 


















Amphibious Assault Ship




LHDs mission is to conduct prompt, sustained
combat operations at sea, as part of the Navy’s amphibious strategy

Amphibious Assault Ship


LHDs mission is to conduct prompt, sustained combat operations at sea, as part of the Navy’s amphibious strategy

LPD




















Amphibious Transport Dock 













 embarks, transports, and lands
elements of a landing force for expeditionary warfare missions

Amphibious Transport Dock


embarks, transports, and lands elements of a landing force for expeditionary warfare missions

LSD




















Dock Landing Ship 



















Transport load landing craft, amphibious
vehicles and troops into an amphibious landing area

Dock Landing Ship


Transport load landing craft, amphibious vehicles and troops into an amphibious landing area

PC

Patrol Costal Ship


The primary mission of PC ships is coastal patrol and surveillance

MARK V




















Special Operations Craft, medium range insertion and extraction support for Special Operations Forces personnel in a low to medium threat environment

Special Operations Craft, medium range insertion and extraction support for Special Operations Forces personnel in a low to medium threat environment

Discuss MILDEC to include the following means of deception: Physical

Activities and resources used to convey or deny selected information to a foreign power

Discuss MILDEC to include the following means of deception: Technical

Military material resources and their associated operating techniques used to convey or deny selected information to a foreign power through the deliberate radiation, reradiating, alteration, absorption or reflection of energy

Discuss MILDEC to include the following means of deception: Administrative

Resources, methods, and techniques to convey ordeny oral, pictorial, documentary, or other physical evidence of a foreignpower

the five phases of the MILDEC planning process

Deception Mission Analysis


Deception Planning Guidance


Staff Deception Estimate


Commander’s Deception Estimate


Deception Plan Development

Deception Mission Analysis

Deception mission analysis is conducted as partof the overall mission analysis that is done by a JFC following receipt of a new mission

Deception Planning Guidance

After completion of the mission analysis, the commander issues planning guidance to the staff. In addition to other guidance,the commander states the deception objective for the operation

Staff Deception Estimate

The deception estimate is conducted as part of the operations estimate. Working with the operational planners, the other C2W planners, and intelligence analysts, the deception planners gather and analyze information relating to the adversary

Commander’s Deception Estimate

Using the staff estimates as a basis, the JFC conducts an estimate. The JFC selects an operational COA for development into an operation plan or order and issues any necessary additional guidance. At the same time, the JFC selects the supporting deception COA.

Deception Plan Development

Developing a complete deception plan is the most time-consuming part of the planning process. There are five major actions in this step: complete the story, identify the means, develop the event schedule, identify feedback channels, and develop the termination concept

Discuss the difference between MISO and MILDEC

MISO: Concealing contradicting indicators while conveying selected information and indicators.

MILDEC: Degrading general situation information to enhance effect of observables. (Intentionally deceiving military officials)

Describe the following in relation to MISO




Organizational responsibilities

When directed by the SECDEF, the Commander, USSpecial Operations Command transfers MISO forces by attachment to geographic combatant commanders

Describe the following in relation to MISO




Command and Control

C4S are vital to planning, mounting and sustaining successful joint MISO

Describe how intelligence supports MISO through target analysis

The use of MISO forces and assets is predicated on political, military, economic, cultural, religious, and psychological orsocial conditions. MISO planners must possess a thorough and current knowledge of these conditions to develop MISO targeted at selected foreign groups to influence their objective and emotional reasoning

Primary responsibilities of a Information Operations Officer

to supervise the IO cell to ensure capabilities and activities are planned, coordinated and integrated within the joint force officer staff and with higher echelon, adjacent, subordinate, multinational staffs




The J-3 normally will designate an IO officer

Warfare Commander Relationships

The IWC tasks and directs force personnel, surveillance and reconnaissance

TACSIT

IWC is responsible for maintaining a favorable Tactical Situation

Describe the following area of COMSEC:


Cryptosecurity

the provision of technically sound cryptosystems and their proper use

Describe the following area of COMSEC:


Transmission security

application of measures designed to protecttransmissions from interception and exploitation by means other thancryptanalysis.

Describe the following area of COMSEC:


Emission security

all measures taken to deny unauthorized persons information of value that might be derived from intercept and analysis of compromising emanations from crypto equipment and telecommunications systems

Describe the following area of COMSEC:


Physical security

all physical measures necessary to safeguard classified equipment, material and documents from access there to or observation thereof by unauthorized persons

Advantages/disadvantagesof EMCON

Advantage: Harder to find.


Disadvantage: Harder to communicate.

Discuss the authority to impose/break EMCON

Strike group commander

EMCONconditions

1. Radio silence; per EMCON bill


2. Hide from satellites


3. Reduces ability of enemies to target


4. Essential equipment is authorized

EEFI

Key questions likely to be asked by adversary officials and intelligence systems about specific friendly intentions, capabilities, and activities, so they can obtain answers critical to their operational effectiveness

BEADWINDOW

serves to alert other operators on the net of the EEFI disclosure and thus acts as an educational aid, producing increased security awareness among operators and an overall improvement in the security of insecure voice communications


Roger-Out is the only authorized reply to BEADWINDOW

JCMA

Provide COMSEC monitoring services to the Department of Defense and other U.S. Government departments and agencies

205 Technical Fundamentals

205 Technical Fundamentals

Discuss the basic concept of how RADAR works

Radio Detection and Ranging




RF energy is transmitted to and reflects from the reflecting objects

Discuss the Doppler Effect

is the apparent change in frequency or pitch when a sound source moves towards or away from the listener, or when the listener moves toward or away from the sound source

Echo

The reflection of the original sound wave as it bounces off a distant surface.

Sea Return

Energy radiated by a radar striking the surface of the sea near the ship

Clutter

Confusing, unwanted echoes that interfere with the observation of desired signals on a radar indicator

Ground Clutter

Unwanted echoes from surrounding land masses

Sea Clutter

Unwanted echoes from the irregular surface of the sea

Range

The length of a straight line between a radar set and a target

Amplitude

The portion of a cycle measured from a referenceline to a maximum value above the line

Wavelength

The distance in space occupied by 1 cycle of a radio wave at any given instant

Cycle

One complete alternation of a sine wave that has a maximum value above and below the reference line

Frequency

The number of cycles that occur in one second, usually in HERTZ

Ground Wave

Radio waves traveling near the surface of the ground

Sky Wave

Radio waves that are reflected back to earth from the ionosphere

Space Wave

Radio wave that travels directly from the transmitter to the receiver and remains in the troposphere

Natural Horizon

The line of sight horizon

Radio Horizon

Boundary beyond the natural horizon which radiowaves cannot be propagated of the earth’s surface

Refraction

The changing of direction as a wave leaves onmedium and enters another medium of a different density

Diffraction

The bending of the paths of waves when the waves meet some form of obstruction

Reflection

Waves that are neither transmitted nor absorbed, but are reflected from the surface of the medium of a different density

Absorption

Atmospheric absorption of RF energy with no reflection or refraction

Attenuation

The scattering and absorption of energy as it passes through a medium

three basic characteristics of sound

The source or transmitter


The Medium for carrying sound (air, water, metal, etc)


The detector or receiver

Antenna Reciprocity

The property of interchangeability of the same antenna for transmitting and receiving

Antenna Gain

Characteristic of a given antenna that remains the same whether the antenna is used for transmitting or receiving

Polarization

The electrical field determines the direction of polarization of the wave. In a vertical polarized wave, the electrical lines of force line in a vertical direction

Radiation Resistance

An assumed loss of resistance or loss of energy equal to the amount of energy needed by the antenna

Virus

a malicious code needing other files to replicate

Trojan

Non-replicating program masquerading as one type of program with its real intent hidden from users

Worm

Self-replicating malicious code without user interaction

Naming Convention/Prefixes

Family name


Group name


Major variant


Minor variant Modifier




Computer Antivirus Researchers Organization (CARO) established standard naming scheme made up of multiple parts and standard rules

Active X

interactive technology used to run programs over internet; can do almost anything, full access to your system, ability to grant access to a computer's hard drive and system functions

Macro Virus

virus that is written in a language built into a word processing document (i.e. Microsoft Word); most common type of virus and cost companies the most money, when infected document is opened copies itself into default template allowing it spread as other documents are opened

Hoax Virus

A computer virus hoax is a message warning the recipient of a non-existent computer virus threat

206 REPORTING

206 REPORTING

message precedence

Routine (R) – 6 hours


Priority (P) – 3 hours


Immediate (O) – 30 minutes


Flash (Z) – 10 minutes or less


FlashOverride (W) – Immediate


Emergency (Y) – Immediate

CRITIC

Critical Information – information of such importance it needs to be sent within tenminutes

KLIEGLIGHT

Time sensitive tactical data, released in a timely manner

TACREP

Principal reporting vehicle used by the United States SIGINT System (USSS) to keep NSA, tactical commanders and national, theater, local and tactical-level non-SIGINT organizations advised of the status of continuing or potential threats and other events of high interest

Activation/Deactivation

this is in regards to a CDSE and will include a USSID SP0200 notification to request a SIGAD or to deactivate one

TACELINT

MSG for EW contacts that contains parameters of contact of interest

IGRAM

Integrate Graphics and Multimedia Reports (IGRAM) – uses attached media, connected via hyperlinks, to enhance or clarify the information in the original serialized reports

STRUM

general-purpose reporting vehicle for collection covers a 24 hour period

STI

Significant Technical Interest – something happening out of the normal parameters

Explain the implications of Minimize

Hold routine message traffic on station. Anything higher than routine can continue as normal.

DAG

are assigned, promulgated, and controlled by NSA, five-letter groups used in the address component of the message to obviate the necessity for listing each address separately

AIG

Address indicating groups (AIGs) represent 16 or more specific and frequently recurring combinations of action and/or information addressees. Used to increase speed of message handling

Producer Designator Digraph

Two character designator assigned by NSA toidentify a specific SIGINT producer

SIGAD

SIGINT Activity Designator – Designate a SIGINT site, used for reporting purposes instead of having to include the Command Name in every correspondence in regards to reporting

DF Station Identification

Two character designator assigned by NSA to identify a specific DF capable site/platform

GENSER Plain Language Address

used when address cannot be reached by Defense Special Communications Systems

Special Intelligence Plain Language Address

Used for SCI correspondence

Routing Indicators

Consist of six letters. Made up of letters that identify mode, geographical area and the rest are used for computer language to prevent message drop or misroute.

DOI-101

Assignment and usage of DSSCS Address Groups (DAG)

DOI-102

Operating Instruction Routing Indicators

DOI-103

Operating procedures and practices applicable to Special Security

JDISS

Joint Deployable Intelligence Support System mobile JWICS


As a tactical extension of the DODIIS network, provides interoperability and compatibility for intelligence dissemination and communication throughout the DoD

GCCS-M

Global Command and Control System Maritime




updates in near-realtime


rcv's, processes, displays, and manages data on neutral, friendly, and hostile forces

NRTD

Supplies a combined near-real-time intelligence picture derived from SIGINT and other sources to operational and intelligence customers at all levels

S-TRED

Standard Tactical Receive Equipment Display – atactical display processor that parses and displays intelligence reports for situational awareness, wide area surveillance, indications and warning, and cueing for organic sensors

IBS

Integrated Broadcast Service


Simplex: Near real time Information and Warning (I&W) info to customers with limited bandwidth


Interactive: Near real time picture of the battlefield delivered via SATCOM


Network: NRTI and BINOCULAR – provides a global architecture with theater focused capabilities

INTELINK

a suit of web-based applications, tools and services provided by intelink enterprise collaboration center. (On JWICS, SIPRNET and UNCLASSIFIED Networks)

ANCHORY

database; Keyword search for NSA and 1st party reports within last 3 years.

CARILLON

NSA General processing computing facilitycomposed of four large scale state-of-the-art IBM z/OS computer systems, providing more than 10,000 direct NSA Intelligence Community customers withservices in support of SIGINT, ELINT and NSA corporate missions

WRANGLER

ELINT Database that provides characteristics of non-communications emitters




databases OPELINT data.

VINTAGE HARVEST

world-wide web based analytic tool offering comprehensive information about signals to the U.S. intelligence community and Second Party partners

SEALINK

provides on-demand access to Office of Naval Intelligence real-time maritime database to include SeaWatch, NID, MSC, AMIDSHIPS and more




Used to track high interest vessels

OILSTOCK

A high-resolution, geographic based graphics system used to display real-time and historical data over a map background




Provides near real time graphical display of battlefield

ARCGIS mapping tools

allows you to author, analyze, map, manage, share and publish geographic information

GALE Lite

Generic Area Limitation Environment




is a suite of tools and automated services designed to support a wide range of intelligence analysis functions