Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
780 Cards in this Set
- Front
- Back
101 SAFETYFUNDAMENTALS
|
101 |
|
Operational Risk Management |
It is a decision making tool used at all levels to increase operational effectiveness |
|
five steps of ORM |
Identifying hazards Assessing hazards Making risk decisions Implementing controls Supervising |
|
instruction that governs safety and mishap reporting |
OPNAVINST 5102.1D |
|
Define hazard severity and discuss the 4 categories of hazard severity |
Assessment of the worst credible consequence that can occur as a result of a hazard. Category I – May cause death Category II – may cause severe injury, illness, property damage Category III – may cause minor injury, illness, or property damage Category IV – hazard presents a minimal threat |
|
Define mishap probability and the 4 subcategories of mishap |
the probability that a hazard will result in a mishap or loss Sub-category A – likely to occur immediately Sub-category B – probably will occur in time Sub-category C – may occur in timed Sub-category D – unlikely to occur |
|
Risk Assessment Code and 5 RACs |
Expression of risk that combines the elements of hazard severity and mishap probability Critical Risk Serious risk Moderate risk Minor risk Negligible Risk |
|
Timeline and means for filing mishap investigations |
Reports must be submitted within 8 hours of incident via OPREP-3 |
|
Name the 4 required mishap reportable items |
Class A - $1 million + DoD aircraft is destroyed Class B - $200,000 + less than $1mil, permanent partial disability or when 3 or more personnel are hospitalized Class C - $20,000 + less 200,000 1-3 days away from work Class D - $2,000 + less than 20,000 no personal injury |
|
State the purpose of a HAZREP message |
Discovering a hazardous condition or near-mishap to alert COMNAVSAFECEN and HQMC |
|
3 Objectives of First Aid |
Save life Prevent further injury Limit infection |
|
3 Methods of Controlling Bleeding |
Direct pressure Pressure points Constricting band |
|
11 Pressure Points |
Temporal (temple) Facial (jaw) Common carotid(neck) Subclavian(clavicle) Brachial (arm above/below elbow) Radial/Ulna (hand) Iliac(groin) Femoral(thigh) Popliteal(knee) Tibial(ankle) |
|
Symptoms of shock |
Pulse is weak and rapid Sweating is likely to be very noticeable The pupils of the eyes are usually dilated Weakness, faintness, or dizziness Very pale |
|
Treatment for shock |
Make victim as comfortable as possible Elevate feet to promote blood flow to the brain |
|
Open vs Closed fracture |
Open fracture – one in which the bone protrudes from the skin
Closed fracture – one in which the skin remains intact |
|
electrical shock victim |
don't touch secure power supply administer CPR |
|
Describe methods of clearing an obstructed airway |
Standing abdominal thrust Reclining abdominal thrust Standing chest thrust Reclining chest thrust |
|
Hypothermia |
occurs when exposed to subnormal temperatures. Minimize heat loss and assume fetal position or huddle in close |
|
Frostbite |
affected body part turns stiff and numb. Place warm body part over affected area. DO NOT RUB FROSTBITE!!! |
|
Heat Stress |
combination of air temperature, thermal radiation, humidity, air flow, and workload that places stress on body. Move person to cool location and apply a cool compress. |
|
Heat exhaustion |
caused by working or exercising in hot spaces, disrupts blood flow to the brain, heart, and lungs. Dizziness, weakness, headache, loss of appetite, and nausea |
|
Heat exhaustion symptoms |
Victim will appear ashen gray Skin cold, moist, and clammy Pupils dilated Weak pulse Rapid and shallow breathing |
|
Heat Stroke |
Victim will be flushed, very dry, constricted pupils, and a rapid strong pulse. Breathing will be deep and rapid at first, but shallow and absent later. Move person to cool location, apply a cool compress and seek medical attention. |
|
HERO/HERP/HERF |
Condition should be set during on-loading or off-loading of ammunition HERO– Hazards of Electromagnetic Radiation to Ordinance HERP- Personnel HERF- Fuels |
|
HAZMAT and storage |
Hazardous Material Store HAZMAT IAW the MSDS (Material Safety Data Sheet) |
|
potential risks of improperly labeled/stored HAZMAT |
Mixture of chemicals could lead to fires, poisonous gases, chemical burns, etc... |
|
MSDS |
Technical bulletins that contain information about HAZMAT and by law; manufacturers must provide this data to HAZMAT users.They tell users how to use, store, and dispose of HAZMAT |
|
Info on MSDS |
Identify / Hazardous ingredients / Physical/chemical characteristics / Physical hazards/ Reactivity/ Health hazards/ Precautions for safe handling and use/ Control measures/ Routes of entry into the body/ Emergency and first-aid procedures for exposure/ Date of preparation of the MSDS or last change/ Name,address, and phone number of a responsible party who can provide additional information on the HAZMAT and appropriate emergency procedures |
|
Personnel Protective Equipment (PPE) |
Respirators Hearing protection |
|
Hearing Conservation Program |
prevent occupational hearing loss and assure auditory fitness for duty |
|
102 HERITAGE AND DOCTRINE |
102 |
|
Six areas that comprise Naval Doctrine |
COWLIP Command & Control Warfare Logistics Intelligence Planing |
|
7 principles of Naval Logistics |
FEARSSS Flexibility Economy Attainability Responsiveness Simplicity Sustainability Survivability |
|
First Navy ship named after an enlisted man |
USS Osmond Ingram (DD-255)
GM1Osmond Ingram was the first sailor killed in WW1. Was jettisoning ordinance to try to stop incoming torpedoes. |
|
Conditions that led to the formation of USN |
The Second Continental Congress authorized the purchase of two vessels to strengthen the fight against the British thus creating the Continental Navy The U.S. Navy was born on 13 October 1775 |
|
3 classes of Naval vessels |
Ships-of-the-line: 64-100 guns Frigates: 28-44 guns Sloops-of-war: 10-20 guns |
|
Article 1007 |
Hand Salute Saluting the Ensign Dipping the Ensign Gun Salute |
|
Gun salute |
national salute of 21 guns is fired on Washington’s birthday, Memorial Day, Independence Day, to honor the President of the U.S., and heads of foreign states |
|
Battle of Coral Sea |
7-8 May 1942: |
|
Great White Fleet |
16 DEC 1907: U.S. President Theodore Roosevelt ordered 16 Battleships (painted white) to circumnavigate the globe. Left Hampton Roads, Virginia for a round the world cruise to show the flag Demonstrated the strength of the U.S. Navy and blue-water capabilities |
|
Battle of Normandy D-Day |
06 JUNE 1944 Largest Amphibious operation in history |
|
Midway |
4-7 June 1942 turning point of the Pacific war four Japanese carriers sunk and USS YORKTOWN was lost. |
|
Guadalcanal |
13-15 NOV 1942 U.S.S. Juneau was sunk and thus the 5 Sullivan brothers were killed. A ship was later named in their honor |
|
Battle of Leyte Gulf |
23 OCT 1944 Final blow to the Japanese Navy Largest Naval battle in history U.S. Navy's first use of ELINT; allowed Navy to discern between Japaneses decoys and actual movements |
|
Mercury |
05 MAY 1961: Alan B. Shepard, USN Commander First U.S. manned space flight |
|
Gemini 3 |
23 MAR 1965: First U.S. two-man space mission CDR John Young. |
|
Apollo 11 |
16-24 JUL 1969: Neil A. Armstrong, 1st manned lunar landing |
|
Apollo 17 |
07-19 DEC 1972: 7th and final lunar landing |
|
STS-1 |
12-14 APR 1981 (Columbia): 1st orbital test flight of Space Shuttle. Cdr John Young. Completed 36 orbits and landed at Edwards AFB, California |
|
On-the-roof Gang |
01 OCT 1928 Naval Cryptologic group 176 enlisted radio intercept operators (150 Navy & 26 Marines) |
|
Purple Code |
27 September 1940 The SIS first solution to Japanese diplomatic messages enciphered in the Purple Code, was able to break some of its messages before the attack on Pearl Harbor |
|
Attack on U.S.S. Liberty |
08 JUN 1967:
Arab-Israeli Six-Day War, Liberty was attacked by Israeli torpedo boats at 1400 accidentally and ensued in the loss of 34 men. The largest loss of life in a single event in American cryptologic history. |
|
Capture of U.S.S. Pueblo |
23 JAN 1968:
While in international waters off of the Korean Coast, N. Koreans attacked. 82 crewmen were held for 11 months before being released. Pueblo remains in N. Korea to this day, constituted as the largest single loss of sensitive material |
|
Landing at Inchon |
16-19 SEP 1950 A joint CIA-military intelligence reconnaissance effort, placed a team in Incheon. Amphibious assault on inchon with 32 ft tidal changes, during Korean War |
|
Hainan Island EP-3 incident |
01APR 2001: U.S. recon plane carrying a crew of 24 collided with a Chinese fighter, forcing EP-3 to emergency land in the People’s Republic of China. |
|
Bletchley Park |
The Enigma cypher was broken here |
|
Navajo Code talkers |
1942-1945 Code talkers transmitted messages over military telephone and radio nets using their native language during WW2; a code that the Japanese never broke |
|
Attack on U.S.S. Stark |
17 MAY 1987: Stark was hit by two EXOCET cruise missiles launched by a single Iraqi F1 “mirage” fighter aircraft |
|
EC-121 Shoot down |
15 APR 1969: Worst loss in the history of American aerial recon. 31 men on board for training purposes. EC-121 was shot down by at least one N.Korean MiG and was downed over the Sea of Japan |
|
What are the qualities that characterize the Navy/Marine Corps team? |
Readiness Flexibility Self-Sustainability Mobility |
|
3 levels of war |
Tactical– involves details of individual engagements Operational– concerns forces in a theater Strategic– focuses on supporting national globe |
|
National Security Act of 1947 |
War Dept/Navy Dept merged into DoD and created the CIA, DIA, AF, and National Security Council (NSC). SecDef was granted more power over the Secretaries of the services |
|
Navy Core Values |
Adopted in 1992 in wake of the 1991 Tailhook sexual assault scandal |
|
Sailor’s Creed |
Written by a “Blue Ribbon Recruit Training Panel” in 1993 at the direction of Chief of Naval Ops. Admiral Frank Kelso |
|
RADM Grace Hopper’s contribution to the USN |
co-inventor of COBOL Grand Lady of Software coined the term “bug” |
|
1st computer |
Atanasoff-Berry Computer (ABC).
Started being developed by Professor John Vincent Atanasoff and graduate student Cliff Berryin 1937 and continued to be developed until 1942 at the Iowa State College (now Iowa State University). |
|
ARPANET |
Advanced Research Projects Agency Network ARPA started in 1958 by Eisenhower in response to the Russian sputnik World's first operational packet switching network started 1966 1972 - 1st email |
|
John Walker |
He was a retired CWO and a spy for the Soviet Union from 1968 to 1985 He helped Soviets decipher more than a million encrypted naval messages This is what initiated the requirement of Two-Person Integrity when handling classified information |
|
Oldest intelligence organization in USN |
Office of Naval Intelligence (ONI) founded in 1882 |
|
First CIO/DNI |
Chief of Intelligence Officer Director of National Intelligence |
|
2 departments that were combined to form ONI |
The Department Library was combined with the "Office of Intelligence" Executive order (EO) No. 292 23 MAR 1882 |
|
103 ORGANIZATION |
103 |
|
the mission of USN |
Maintain, train, and equip combat ready Naval Forces capable of winning wars, deterring aggression and maintain freedom of seas |
|
Discuss NCA and its functions |
National Command Authority - ultimate lawful source of military orders President and SECDEF and their successors, vice president and deputy secdef |
|
OPCON and ADCON |
OPCON - operational control; provides organization of commands and forces ADCON - administration control; provides authority over subordinates |
|
COCOM |
Combatant Command established by title 10 (“Armed Forces”) |
|
Navy COCOM |
Commander Naval Expeditionary combatant Command Atlantic Fleet, Naval Forces Europe, Pacific Fleet, Naval Forces Central Command |
|
FLTCOM |
Fleet Commander In charge or specific fleet AOR |
|
TYCOM |
Type Commander (platform specific) |
|
PACOM |
Camp H.M Smith, Hawaii: From San Diego past Hawaii |
|
EUCOM |
Stuttgart. Germany: Europe and Eurasia |
|
JFCOM |
Suffolk, Virginia Joint Forces Command Provides mission ready joint capable forces |
|
SOUTHCOM |
Miami, Florida |
|
CENTCOM |
MacDil AFB, Tampa, Florida Promotes cooperation among nations |
|
NORTHCOM |
Peterson AFB, Colorado Springs Homeland defense and civil support operations |
|
SOCOM |
MacDil AFB, Tampa, Florida Special operation forces |
|
TRANSCOM |
Scott AFB, Illinois US Transportation Command |
|
STRATCOM |
US Strategic Command Offutt AFB, Omaha, Nebraska Promotes global security for America |
|
AFRICOM |
Kelley Barracks, Stuttgart-Moehringen, Germany |
|
USCYBERCOM |
Ft. George G. Meade, Maryland – Cyber Realms |
|
CNO N2/N6 |
Pentagon CNO N2 - DNI CNO N6 - Deputy CNO, leads Navy Space Team (CNO(N2))and N6 (Computer Network) |
|
CNMOC |
Commander, Naval Meteorology and Oceanography command, Stennis space center, Mississippi |
|
NNWC |
Naval Network Warfare Command, Virginia Beach, Virginia |
|
Commander, Reserve Space and Network Warfare Program |
responsible for sponsoring the reserve Space Cadre and supporting the Navy Space Team |
|
Commander, USSTRATCOM |
Offutt AFB, Omaha,Nebraska |
|
JSOC |
Joint Space Operation Center Vandenberg AFB, CA C2 capabilities to conduct space operations on a 24/7 basis |
|
NOAA |
National Oceanic and Atmospheric Administration, National Weather Service
Washington DC |
|
NAVSOC |
Naval Satellite Operations Center |
|
NAVCYBERFOR |
Virginia Beach, Virginia |
|
ONI |
Office of Naval Intelligence: Suitland, Maryland. Provide intelligence necessary to plan, build, train, equip, and maintain U.S. Maritime forces |
|
Office of the Oceanographer/Navigator of the Navy |
US Naval Observatory, Washington DC Maximize America's sea power by applying relevant oceanographic knowledge across the full spectrum of warfare |
|
3rd Fleet |
San Diego, California: International dateline to E. Pacific |
|
4th Fleet |
Mayport,Florida: Caribbean and Central and South America |
|
5th Fleet |
Manama, Bahrain Arabian Gulf, Red Sea, Gulf of Oman, and parts of the Northern Indian Ocean |
|
6th Fleet |
Naples, Italy: Approximately half of the Atlantic Ocean |
|
7th Fleet |
Yokosuka, Japan; from Kuril Islands in the North to the Antarctic in the South |
|
10th Fleet |
FT.George G. Meade, Maryland: Cyber realm and Information Domains |
|
US Fleet Forces, 2nd Fleet |
Norfolk, Virginia: N. Pole to just South of the Tropic of Cancer |
|
TF / TG / TU / TE |
Task Force (TF) – Subdivision of a Fleet Task Group (TG) – Division of TF Task Unit (TU) - Division of TG Task Element (TE) – Division of TU |
|
AG |
Aerographers Mate: Observe, collect, and record weather data(METOC) |
|
CTI |
Cryptographic Technician (Interpretive):Collect, analyze, and exploit foreign language communications signals of interest to monitor worldwide threats. (Language) |
|
CTM |
Cryptographic Technician (Maintenance): Monitor, track, electronic attack, and physical security. Troubleshoot, repair, or replace Cryptologic networks |
|
CTN |
Cryptographic Technician (Networks): Monitor, ID, collects and analyzes information and conduct CNO ops worldwide to support DoD national and theater level missions (Red & Blue Teams) |
|
CTR |
Cryptographic Technician (Collections): Collect and exploit signals of interest to ID, locate and report worldwide threats; provide SIGINT, technical guidance, and information warfare support to various units |
|
CTT |
Cryptographic Technician (Technical): Provide ELINT, indications and warning (I&W), and Anti-Ship Missile Defense (ASMD) |
|
IS |
Intelligence Specialists: Assist in every phase of the planning, collection, processing, analysis, and dissemination of intelligence. Assemble briefings, reporting and analytical programs. (Power Point Warriors) |
|
IT |
Information System Technicians – Provide network administration and security. Additionally work with Communications operations and message processing |
|
Naval and Computer Telecommunication Area Master Stations (NCTAMS): |
NCTAMS Lant – Norfolk, Virginia: operate and maintain responsive information transfer systems providing real time C4I to support Atlantic Fleet. NCTAMS Pac – Wahiawa, Hawaii |
|
Define C4ISR |
Command, Control, Communications, Computers, and Intelligence, Surveillance and Reconnaissance encompasses the gathering, processing, and distribution of information vital to the conduct of military planning and operations |
|
Explain the mission of the Defense Information Support Agency (DISA): |
Combat support agency that provides a global net-centric enterprise in direct support to joint war fighters |
|
Explain the mission of NASIC |
National Air and Space Intelligence Center HQ at Wright-Patterson AFB, OH Primary DoD producer of foreign aerospace intel |
|
State the mission of NCDOC |
Navy Cyber Defense Operations Command
Coordinate, monitor, and oversee the defense of Navy Computer networks and systems and establish CND for Joint Task Force |
|
ODNI |
Office of the Director of National Intelligence: serves as the head of the Intelligence community |
|
DIA |
Defense Intelligence Agency: MASINT external intelligence service of the US specializing in defense and military intelligence |
|
NSA |
National Security Agency/ Central Security Service: SIGINT, Title-50 |
|
CIA |
Central Intelligence Agency civilian foreign intelligence service tasked with gathering, processing and analyzing national security information from around the world, primarily through the use of HUMINT |
|
NGA |
National Geospatial-Intelligence Agency: GEOINT primary mission of collecting, analyzing, and distributing geospatial intelligence in support of national security |
|
DHS |
Department of Homeland Security: Analyzes the vulnerabilities of U.S. critical infrastructure, assesses the scope of terrorist threats to U.S. homeland security (ex: Coast Guard) |
|
FBI |
Federal Bureau of Investigation: Counter-Intelligence and counter terrorism operations in the U.S. |
|
DEA |
Drug Enforcement Administration: Enforces laws and regulations governing narcotics and controlled substances, chemical diversion,and trafficking |
|
DOE |
Department of Energy: Analyze foreign information relevant to U.S. energy policies and nonproliferation issues. |
|
DOS |
Department of State: Performs intelligence analysis and produces studies on a wide range of political and economic topics |
|
DOT |
Department of Treasury: Analyzes foreign intelligence related to U.S. economic policy |
|
NASA |
National Aeronautic and Space Administration: Space projects and more recently UAVs (Unmanned Aerial Vehicles) |
|
NRO |
National Reconnaissance Office: Integrates unique and innovate space based recon technologies. Provides I&W support |
|
Five Branches of Military |
USAF USA USMC USN USCG |
|
104 ADMINISTRATION |
104 |
|
Discuss the responsibilities of the following: Commander in Chief |
POTUS Mr. Obama. The head of the Armed Forces as mandated by the Constitution. He is responsible for initiating military action in support of our national interests |
|
Discuss the responsibilities of the following: SECDEF |
Ash Carter, Senior advisor on military affairs. Principal defense advisor to President. Responsible for the formulation of general defense policy and policy related to Department of Defense (DOD) |
|
Discuss the responsibilities of the following: SECNAV |
Ray Mabus, Responsible to the President for all matters pertaining to the operations and readiness of Navy Forces. |
|
Discuss the responsibilities of the following: CNO |
ADM. John Richardson, Responsible to the SecNav and Chairman of the Joint Chiefs of Staff for operational commitments and readiness of the Navy. Issues Navy-wide order relating to Navy Operations and Administrative functions of the Navy. |
|
Discuss the responsibilities of the following: FLEET COMMANDER IN CHARGE |
Overall responsible for assets within their respective Area of Readiness (AOR). |
|
Discuss the responsibilities of the following: TYCOM |
Overall responsible for the operations of their specific platform |
|
Discuss the role of the following: MCPON |
MCPON Steven S. Giordano Senior Enlisted Sailor in the Navy, the direct representative to the CNO on all Enlisted matters. |
|
Discuss the role of the following: FLTCM, FLEET MASTER CHIEF |
Senior Enlisted Sailor in the Fleet who is the direct representative to the Fleet Admiral on all Enlisted matters |
|
Discuss the role of the following: FORCM, FORCE MASTER CHIEF |
Senior Enlisted Sailor who is the direct representative to the Force Admiral on all Enlisted matters. |
|
Discuss the role of the following: CMC, COMMAND MASTER CHIEF |
Senior Enlisted Sailor in the Command who is the direct representative to the CO on all Enlisted matters. CMC Nagle |
|
Define CCRI |
Command Cyber Readiness Inspection. A formal inspection conducted under the direction of USCYBERCOM's Enhanced Inspection Program. Making sure all NIPR and SIPR systems work |
|
State NAVIDFOR's role in an CCRI |
Office of Designation Approving Authority (ODAA) for all cyber networks |
|
EDVR Enlisted Distribution Verification Report |
12 sections Section 6 contains Distribution Navy Enlisted Classification code (DNEC) management Section 8 contains a list of individuals who are qualified in Navy Enlisted Classification codes (NECs) |
|
ODCR Officer Distribution Control Report |
monthly statement of officer manpower accounts for pertinent Navy activities |
|
AMD Activity Manpower Document |
Displays the qualitative and quantitative manpower and an official statement of organizational manning and billets authorized |
|
Evaluation Report |
Used as a counseling worksheet. Records are maintained on naval personnel "which reflect their fitness for the service and performance of duties." EVALs are for enlisted personnel (E1-E6), the CHIEFEVAL is for E7-E9 personnel.
|
|
What is a FITREP |
Used as a counseling worksheet. Records are maintained on naval personnel "which reflect their fitness for the service and performance of duties." FITREPs are for officers. |
|
What is a Concurrent Report |
Concurrent reports provide a record of significant performance in an additional duty (ADDU) or temporary additional duty (TEMADD) status. |
|
Page 2 |
Dependency application/record of emergency data. |
|
Page 4 |
Navy Occupation/Training and Awards History. |
|
SGLI |
SGLI (Service members’ Group Life Insurance). Low cost life insurance to Uniformed Service Members. |
|
Page 13 |
Administrative Remarks. |
|
OPREP-3 PINNACLE |
National Used to report incidents that are of national-level interest to the National Military Command Center (NMCC). |
|
OPREP-3 NAVY Blue |
Used to provide the CNO and other naval commanders notification of incidents that are of high Navy, as opposed to national-level, interest. |
|
OPREP-3 Unit SITREP |
CO Used to inform the operational commander, or appropriate higher authority, of incidents not meeting OPREP-3 NAVY BLUE criteria. |
|
What is the Importance of an IG |
Naval Inspector General Conduct, supervise, monitor, and initiate audits, evaluations, and investigations relating to programs and operations of the Department of Defense activities. |
|
What is the purpose of the Navy Correspondence Manual |
uniform standards for the management and preparation of correspondence and is applicable to all commands and activities of the Department of the Navy. (how to write memos) |
|
Career Waypoints (C-Way) program |
Long term force shaping tool that aids in leveling ratings overmanned and undermanned |
|
officer accession programs |
U.S. Naval Academy Medical Enlisted Commissioning Program Limited Duty Officer (LDO)\Chief Warrant Officer (CWO) programs |
|
Defense Language Proficiency Test (DLPT) |
Used to determine proficiency in a foreign language CTIs need to score at least a L2, R2 in order to maintain their rate |
|
Educational Services Officer (ESO) |
Coordination of officer and enlisted training and on duty education programs |
|
What is the Purpose of the U.S. Navy's Drug Screening Program |
Provides comprehensive drug abuse prevention and control policy and procedures for all Navy Military personnel, and to establish regulations to enforce that policy. |
|
6 programs of Brilliant on the Basics |
Career Development Board (CDB) Mentorship Sponsorship Indoctrination Recognition programs |
|
Purpose of Public Affairs Officers (PAO) |
Handles all media matters and public inquiries relating to the command and/or its Sailors LT Green |
|
105 SUPPLY AND SUPPORT |
105 |
|
3-M/PMS System |
Navy ships’ Maintenance and Material Management (3-M) systems that will support in a manner that will ensure maximum equipment operational readiness OPNAVINST4790.4B volumes I, II, and III. (Protective and Corrective) |
|
Explain how Defense Property Accountability System (DPAS) is used to track equipment |
DPAS is used to track physical accountability. |
|
Discuss the purpose of the MOV program Material Obligation Validation |
commitment for future issue of an item that's not immediately available for issue (back order)
|
|
Discuss the DLRs Program |
Depot Level Repair - Repairs that happen at a depot level. Additionally may be repaired at the organization or intermediate levels. |
|
AVDLRs |
Aviation Depot Level Repairable: Naval Inventory Control Point- Philadelphia &Mechanicsburg (NAVICP-PM) & (NAVICP-Mech) |
|
Non-AVDLRs |
DLRs under the management of the Naval Inventory Control Point-Mechanicsburg (NAVICP-Mech) |
|
NRFI DLRs in Regard to TURN-IN and RIP |
Turn-In: physically turn in property to nearest DRMO RIP (Remain in Place): When DRMO is physically unable to accept property |
|
Maintenance Assistance Modules (MAMs) |
parts used for isolating faults within an avionics system or test set |
|
Bulkhead mounted spares |
material authorized for stowage in other departments. |
|
CASREP |
Casualty reporting - A system for requisitioning emergency replacement parts for equipment of components out of commission that are essential to the ships mission. |
|
Four types of CASREP |
INITIAL - Identifies status of a casualty UPDATE- Provides updated information to the CORRECT - Reports equipment has been repaired & is operational CANCEL - When an outstanding casualty will be repaired during an availability period |
|
NSN |
National Stock Number - 13 digit number assigned to identify an item of material in the supply distribution system |
|
COG |
Cognizance Symbol Identifies the inventory manager. |
|
APL |
Allowance Parts List list of documents specifically tailored to an activity that identifies item/parts needed for support or maintenance. Should be stocked on board. |
|
AEL |
Allowance Equipage list - Contains on board allowance of equipage and supplies |
|
NC |
Not Carried - Material for which there is no storeroom allowance |
|
NIS Not in stock |
Not in stock - Material that is normally stocked but supply is temporarily exhausted |
|
SIM Selected Item Management |
Frequently request material |
|
DD Form 1348-6 |
DoD SINGLE LINE ITEM REQUISITION SYSTEM DOCUMENT Requisition material that cannot be identifiedby a NSN |
|
NAVCOMPT 2276 |
Request for contractual procurement |
|
NAVSUP 1250-2 |
7 part document for procuring Non-NSN material. |
|
SF 44 |
Designed for on the spot, over the counter purchases, limit of $2500, exception is aviation fuel which limit is $25,000 |
|
DD Form 1155 |
Request for supplies & services from commercial vendors |
|
SF 1449 |
Solicitation/Contract/Order for Commercial Items |
|
SF 30 |
Amendment of Solicitation/ Modification of Contract |
|
DD Form 200 |
Used to account for (survey) lost/stolen items |
|
SF 364 |
Used to report discrepancies |
|
SF 386 |
Used to report if a product has quality deficiency |
|
CHRIMP |
Consolidated Hazardous Material Reutilization and Inventory Management Program- serves as a fundamental element of the Navy’s life-cycle control and management of HAZMAT |
|
DRMO |
Defense Reutilization Marketing Office (DRMO) Deliver great performance to our customers for the reuse, transfer, donation, sale or disposal of excess/surplus property |
|
ServMart |
Self-service retail store operated by an ashore supply activity. Provides ready supply or relatively low-cost, frequently used items. |
|
Discuss the Government Commercial Purchase Card (IMPAC) (VISA) |
Government purchase card with a micro purchase threshold of $3,000 |
|
OPTAR |
Operating Target: estimate of the amount of money that will be required by a unit to perform its assigned tasks. REPAIR/REPAIRABLE and CONSUMABLES! |
|
Normal Power |
Power supplied by the power company (commercial power) |
|
Emergency Power |
Power from generators or backup power source |
|
Uninterrupted Power |
UPS or battery backup, is an electrical apparatus that provides emergency power when the input power fails
|
|
106 SECURITY |
106 |
|
Identify the directives that govern personnel security |
DoD5105.21-M-1 SECNAVM-5510.30 series DCID6/4 & 6/9 JOINTDODISS |
|
TOP SECRET |
Orange- exceptionally grave damage to National Security Single Scope Background Investigation (SSBI), good for 7 years with a reinvestigate every 5 years |
|
SECRET |
Red- serious damage to National Security Good for an entire career unless otherwise deemed necessary |
|
CONFIDENTIAL |
Blue - cause damage to National Security Indefinite |
|
UNCLASSIFIED |
Green- No effect to National Security |
|
Need to Know |
Based on job description and/or requirements, not just having the appropriate clearance |
|
SCI |
Must be read into related SCI Caveats |
|
What is a SAER and it purpose |
Security Access Eligibility Report used to explain issues that come up during SCI clearance |
|
Event Reportable to SSO |
Foreign Influence Sexual Behavior Unwillingness to comply with regulations Change in marital status Mental status |
|
Who has overall authority of, and controls access to, a SCIF |
Special Security Officer (SSO) |
|
SF700 |
Security Container Information- Used to maintain combos |
|
SF701 |
Activity Security Checklist- Ensure space is secure |
|
SF702 |
Security Container Check Sheet- Sign off log for opening and securing a container |
|
SF703 |
Top Secret Cover Sheet (Orange)- Cover sheet for TS document |
|
SF704 |
Secret Cover sheet (Red)- Coversheet for secret document |
|
SF705 |
Confidential Coversheet (Blue)- Coversheet for confidential document |
|
SF312 |
NDA- Non-Disclosure Agreement |
|
SF153 |
COMSEC Material Report- document receipt of all COMSEC material |
|
When safe combos should be changed |
When a combination lock is first installed or used Combo has been subject to compromise Other times deemed necessary by the CSA, mainly when an individual with access moved out of the office |
|
What is an FDO Foreign Disclosure Officer |
Foreign Disclosure Officer - processes all foreign visit requests to the command Only designated foreign disclosure officers (FDOs) may approve the disclosure of classified and controlled unclassified military information to foreign representatives |
|
DCS |
Defense Courier Service - transportation of sensitive classified materials that cannot be transported through private or public means |
|
Describe the procedures for carrying hard copyclassified material |
DCS- MUST BE DOUBLE WRAPPED, DCS label on inner and outer wrapping and classification markings must be placed on inner wrappings Hand carry - double wrapped with address label on both inner/outer wrapping. MUST HAVE COURIER CARD at the level of material being carried! |
|
State the responsibilities of the TSCO Top Secret Control Officer |
Top Secret Control Officer – control and inventory of all Collateral Top Secret material throughout the command |
|
State the THREATCON recognition and Force Protection Levels (FPCON) |
NORMAL-No current terrorist activity ALPHA- increased general threat of possible terrorist activity BRAVO- increased or more predictable threat of terrorist activity exists CHARLIE- incident occurs or intelligence is received indicating some form of terrorist action or targeting is likely DELTA- immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action is imminent |
|
What is a RAM |
Random Anti-Terrorism Measure, maximize the effectiveness deterrence value, implemented without a set pattern |
|
Explain and state the purpose of an EAP |
Emergency Action Plan: Plan for destroying classified material (Destroy TS material first) |
|
Explain and state the purpose of Emergency Destruction Procedures (EDP) |
Planning must consider natural disaster and hostile actions
EDP’s vary depending upon the commands mission and what COMSEC material they hold. |
|
Who can initiate the Emergency Destruction: |
Commanding Officer Emergency Action Officer |
|
Explain how and in what order, material is destroyed during Emergency destruction |
Material that will cause more danger to national security will be destroyed first (SCI Material, Top Secret, COMSEC) |
|
Define SCI |
Sensitive Compartmented Information- requires special controls for restricted handling within compartmented intel systems |
|
List the items prohibited in a SCIF |
anything that transmits, receives, records or stores data is NOT authorized in the SCIF without SSO approval |
|
Define the difference between security violation and practices dangerous to security
|
Practice Dangerous to Security (PDS) - incident that if not corrected could become a security violation Security Violation - an incident when classified info has been compromised either through negligence or deliberate action |
|
Explain the Security requirements of the following SCIF |
Must have one controlled entry point and emergency exit Completely closed space with no possibility of outside access |
|
Explain the Security requirements of the following T-SCIF |
Must have clearly defined physical perimeter barrier and continuous physical security safeguards Manned at all times or operations until no longer needed as SCIF |
|
Explain vault recertification and recurring inspections |
TOP SECRET- 6 months SECRET-6 months CONFIDENTIAL-9 months All other facilities, 9 months |
|
Two-person Integrity |
Must have at least two people in the SCIF at all times, to monitor one another’s actions |
|
Explain the DoD escort policy |
Only command personnel, either military or civilian may be designated as escorts for a visitor |
|
Procedures for sanitizing an area |
Removal of information from the media or equipment, take down anything classified |
|
COMSEC |
Communications Security |
|
INFOSEC |
Information Security the practice of defending information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction |
|
COMPUSEC |
Computer Security |
|
PSP |
Personnel Security Program ensure that only loyal, reliable, and trustworthy people are granted access to classified information or allowed to perform sensitive duties |
|
ATFP |
Anti-Terrorism/ Force Protection defensive measures used to reduce the vulnerability of individuals and property to terrorist acts |
|
Purpose of ICD (Intelligence Community Directive) system |
DNI provides guidance, policy and direction to the Intelligence Community |
|
Who is the SSO what is his/her job |
Serves as the focal point for the receipt, control and accountability of SCI and oversees SCI security functions for subordinate SCIFS. The SSO will be a military commissioned officer, warrant officer, or civilian (GS-9 or above). Ms. Orr |
|
who can be a CSM |
Must be a GS-11or officer, be appointed by the CO, and have an SSBI within the last 5 years |
|
What is JPAS |
Joint Personnel Adjudication System (JPAS): Automated system of record for personnel security management within the DoD, providing a means to record and document personnel security clearances |
|
What is DONCAF |
Department of the Navy Central Adjudication Facility Adjudicate our clearance/revokes them |
|
How long can a CO suspend access before DoNCAF revokes a clearance |
90 days |
|
INFOCON |
Threat level system for IS 5-Normal readiness procedures 4-Increased military vigilance procedures 3-Enhanced readiness procedures 2-Greater readiness procedures 1-Maximum readiness procedures |
|
Explain why the U.S. Navy only uses “.mil” email addresses on government systems. |
U.S. Department of Defense has exclusive use of this domain. |
|
107 INFORMATION ASSURANCE |
107 |
|
Define IA |
Program to protect and defend DoD information, info systems, and information networks |
|
Certification |
evaluation of the technical and non-technical security features of an IS |
|
Accreditation |
Formal declaration by the Designated Approving Authority (DAA) that an IT system is approved to operate in a particular security mode |
|
DAA |
official with authority to formally assume responsibility for operating a system at an acceptable level of risk. NAVIDFOR |
|
System Security Plan/System Security Authorization Agreement |
Planned security tasks required to meet system or network security requirements |
|
ATO |
AUTHORITY TO OPERATE The formal declaration by the DAA that an Information System is approved to operate in a particular security mode - Good for 3 years. |
|
IATO |
INTERIM AUTHORITY TO OPERATE May be issued when the requirements for full Accreditation cannot be met- Good for 180 days |
|
Configuration Management |
Assure physical and technical protection of backup and restoration hardware |
|
Low-to-High Connections |
Information being passed from low side will not have a confidentiality requirement |
|
High-to-Low Connections |
Must be sanitized of all classified information before being established on the low side |
|
Risk Management |
processthat allows IT manager to balance the operational and economic costs ofprotective measures Ex: How much money do we need to spend to protect thisnetwork? |
|
5 Attributes of IA |
Confidentiality Integrity Availability Non-repudiation Authentication |
|
List & Define 9 Categories of Computer Incidents |
INCIDENT - Root Level Intrusion EVENT |
|
Define the DoN World Wide Web Security Policy |
All information, graphics, & photos posted on publicly accessible DON Websites must be carefully reviewed to ensure they meet the standards & requirements as published herein, including OPSEC considerations.
|
|
Define IAVA.
|
INFORMATION ASSURANCE VULNERABILITY ALERT-
high priority network vulnerability with an associated date by which that vulnerability must be eradicated from the network |
|
Define IAVB |
INFORMATION ASSURANCE VULNERABILITY BULLETIN- Medium priority, associated with vulnerabilities that do not pose an immediate threat to the infrastructure. |
|
Define IAVT |
INFORMATION ASSURANCE VULNERABILITY TECHNICAL ADVISORY- Technical notes on network vulnerabilities without remediation urgency- Low priority, no known exploit, or no available patch to load |
|
CTO |
COMPUTER TASKING ORDER - Record message issued to components and/or supporting organizations of all Armed Services to implement required actions in order to operate & defend the GIG. - Normally comes with reporting requirements. |
|
NTD |
NAVAL TELECOMMUNICATIONS DIRECTIVE- Record message coordinated by NNWC establishing Navy policies & procedures with regard to communications. |
|
SERVICE PACK |
A collection of updates, fixes and/or enhancements to a software program delivered in the form of a single package. |
|
Vulnerability Assessment |
Process of identifying, quantifying and prioritizing the vulnerabilities in a system |
|
Explain the Difference Between Vulnerability & Threat. |
VULNERABILITY - weakness in a system's security scheme THREAT - circumstances, events, or people with the potential to cause harm to a system. |
|
State the duties and responsibilities of the IAM |
INFORMATION ASSURANCE MANAGER Appointed by CO Responsible for the IA program within a command, site, system or enclave- Responsible to the local IA command authority & DAA for ensuring the security of an IT system Ex: Scott Czarsinski |
|
108 NETWORKS |
108 NETWORKS |
|
Host/Client |
A user computer connected to a network |
|
Application Server
|
A server that houses “control applications” and software
|
|
Hub |
A networking hardware device with one broadcast domain and works at the physical layer of the OSI model |
|
Switch |
hardware device which creates a separate collision domains for each switch port and works at the data-link layer of theOSI model |
|
Router |
A networking hardware device that forwards data packets between networks and works at the network layer of the OSI model |
|
WAP |
(Wireless Access Point) A networking hardware device that allows wireless devices to connect via a wireless communication standard |
|
Proxy Server |
acts as an intermediary for requests from clients seeking resources from other servers. |
|
Firewall |
Is a hardware device and/or software application that controls incoming and outgoing connections and packets, based on an applied rule set |
|
VPN Concentrator |
Establish, negotiates, assigns, and manages allVPN connections to and from a network. |
|
Back-up |
Is the coping or archiving of computer data |
|
Repeater |
A device that receives an electronic signal and retransmits the signal at a higher power. Works at the physical layer or the OSI model |
|
layers of routing Access |
Acts as the point at which end stations connect to the network. Devices such as desktop computers and/or printers are found at this layer. |
|
layers of routing
Distribution |
intermediary between the Core and Access Routers are used at this layer |
|
layers of routing Core |
“backbone” of the network The Core Provides high-speed connections, reliability, and fault tolerance. Switches are found at this layer |
|
Bus topology |
nodes are connected in a daisy chain by a linear sequence |
|
Ring topology |
each node connects to exactly two other nodes,forming a single continuous ring |
|
Star topology |
every node is connected to a central node |
|
Mesh topology |
each routing or switching device is connected |
|
Point-to-Point topology |
two nodes send networking traffic only to each other |
|
Local Area Network (LAN) |
a computer network covering a small physical area, like a home, office, or small group of buildings |
|
Wide Area Network (WAN) |
telecommunications network or computer network that extends over a large geographical distance
|
|
Metropolitan Area Network (MAN) |
a large computer network that usually spans a city or a large campus larger than LAN smaller than WAN |
|
Global Area network (GAN) |
network that is composed of different interconnected computer networks (WANs) and also covers an unlimited geographical area |
|
OSI Model
|
Application
Presentation Session Transport Network Data Link Physical |
|
IPv4 and IPv6 |
IPv4 - 4 octet decimal notation 32bit
IPv6 - colon hexadecimal notation, 8 groups 128bit |
|
NIPRNET SIPRNET JWICS |
Non-classified Internet Protocol Router Network Secret Internet Protocol Router Network Joint Worldwide Intelligence Communications System |
|
DoD Network Global Information Grid - DoDN(GIG)
|
U.S. DoD “globally interconnected, end-to-end set of info capabilities for war fighters
|
|
Defense Information Systems Network (DISN)
|
the DoD enterprise network for providing data, video, and voice services
|
|
NMCI
|
Navy/Marine Corps Intranet
|
|
ONENET |
IT infrastructure for OCONUS NMCI |
|
IT21 |
Shipboard network |
|
Machine language |
the low-level binary code executed by the processor |
|
Assembly Language |
low level programming language using the human readable instructions of the CPU |
|
High-Level Language |
language written in readable format. Ex: Python, C+, Perl |
|
Operating System |
software that manages computer hardware and provides common services |
|
Virus |
code that relies on another program to spread |
|
Worm |
code that can self-replicate |
|
Trojan |
Malicious program that takes on the appearance of another computer object but is actually malicious content or code |
|
Backdoor |
method of bypassing normal authentication |
|
Phishing |
is the attempt to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication |
|
Network Enumeration |
discovery of hosts/devices on a network |
|
Buffer Overflow |
an anomaly where a process stores data in a buffer outside the memory the programmer set aside for it |
|
SQL Injection |
malicious SQL statements are inserted into an SQL entry field for execution |
|
Dictionary Attack |
method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password |
|
Privilege Escalation |
act to gain elevated access in an operating system usr > system |
|
Brute Force Attack |
systematically checking all possible keys or passwords until the correct one is found in order to gain access to a system |
|
Social Engineering |
anon-technical method of breaking into a network by psychological manipulation of people into performing actions or divulging confidential information |
|
PKI |
system for the creation, storage, and distribution of digital certificates which are used to verify credentials |
|
DNS |
name resolution to an IP address |
|
109 COMMUNICATIONS |
109 COMMUNICATIONS |
|
Red Cross message |
Rapidly deliver, up to immediate may be assigned AMCROSS messages concerning a death or serious illness
|
|
ADNS |
Automated Digital Network System: creates a flexible networking environment Of the shelf hardware and software |
|
CUDIX |
Common User Digital Information Exchange System: provides a full duplex interface over a satellite link, for receipt and transmission of narrative message traffic between NAVCOMPARS and mobile platforms |
|
VERDIN |
VLF DIGITAL INFORMATION NETWORK |
|
NOVA
|
NOVA is a store and forward switching system that provides automated re-addressal and quote functions for authorized users.
General Service (GENSER) |
|
IBS |
Integrated Broadcast System |
|
INMARSAT |
International Maritime Satellite |
|
DMS Defense Message System |
Defense Message System |
|
VTC |
Video Teleconferencing |
|
DCO
Defense Connect Online |
Defense Connect Online provides web conferencing and XMPP based instant messaging; portal for file-sharing on SIPR
|
|
GINGERBREAD
|
A term advising-net participants that there may be a possible intruder on the net.
|
|
types of disclosures afforded protection by the EEFI List |
Position |
|
BEADWINDOW |
A real time procedure used to alert circuit operators that an unauthorized disclosure has occurred. Only proper response when receiving a beadwindow from another station is “Roger Out”. |
|
RIVER CITY |
An OPSEC tool used to prevent outbound communication |
|
JSIR |
OCTOBER 1992 EMI detection & reporting for space systems Address persistent and recurring interface problems MEACONING INTRUSION JAMMING SPECTRUM MANAGEMENT |
|
Meaconing |
intentional transmission of signals designed to deceive users of navigational aids |
|
INTRUSION |
is intentionally inserting electromagnetic energy into transmission paths |
|
JAMMING |
deliberately radiating, re radiating, or reflecting electromagnetic energy to impair the use of electronic devices, equipment, or systems |
|
SPECTRUM MANAGEMENT |
rationalizes and optimize the use of the RF spectrum |
|
PLA |
Plain Language Address: denote the command short title and geographic location used in message addressing |
|
DTG |
Date Time Group- uniquely describes a message for identification and file purpose only. DTGs have 2 parts: 1st is expressed in 6 digits, 2nd part includes a single-letter zone suffix |
|
UTC |
Universal Coordinated Time, aka ZULU |
|
Standard Components of a NAVY message |
Plain Language Address (PLA) Heading Components References Point of Contact (POC) Remarks |
|
MESSAGE PRECEDENCE/PROSIGN/OBJECTIVE |
ROUTINE / R / 6HR PRIORITY / P / 3HR IMMEDIATE / O / 30 MIN FLASH / Z / LESS THAN 10 MINUTES FLASH OVERRIDE / W / PRIORITY |
|
OPTASK COMMS |
Communication-electronics guidance and requirements means used by which the USN and Allied Navies distribute afloat communications plans |
|
COMMPLAN |
A living document to provide communication alignment and support the missions and desired state |
|
TSO |
Telecommunication Service Order-authorizes the start, change or discontinues circuits or trunks |
|
TSR |
Telecommunications Service Request- a valid, approved, and funded telecommunications requirement submitted to DISA or DISA activities for fulfillment. |
|
COMSPOT |
Communications Spot Reports will be submitted by all ships & shore facilities at any time communication outages/ degradations are encountered. |
|
Electronic Key Management System (EKMS) |
NSA led program responsible for COMSEC key management, accounting and distribution. |
|
OTAT/OTAR |
Over the Air Transfer (OTAT)-electronically distributes key without changing the traffic encryption key Over the Air Rekeying (OTAR)-changing traffic encryption key or transmission security key in remote equipment |
|
TEMPEST |
Code word used for unwanted electromagnetic/mechanical radiation |
|
Emissions Control (EMCON) |
Selective use of ships emissions to accomplish mission goals |
|
110 OPERATIONS |
110 OPERATIONS |
|
ASW |
Anti-Submarine Warfare (ASW) is the destruction or neutralization of enemy submarines |
|
ASUW |
Anti-Surface Warfare (ASUW) is the destruction or neutralization of enemy surface combatants and merchant ships |
|
AD |
Air Defense (AD) is the action required to destroy or reduce an enemy’s air and missile threat |
|
IW |
Information Warfare (IW) is the action taken to achieve information superiority over the adversary |
|
STW |
Strike Warfare (STW) is the destruction or neutralization of enemy land-based targets with conventional or nuclear missiles |
|
NSW |
A designated naval warfare specialty that conducts operations in the coastal, riverine, and maritime environments |
|
Explain how the Reserve Component integrates with the Active Component |
Navy will employ Reserve forces and personnel to relieve the stress on Active operating Tempo (OPTEMPO) by deploying |
|
Explain the purpose of a mobile detachment |
Provide direct/indirect support to an operational entity to further enhance/support that entity's operational/administrative capability.
|
|
Discuss the purpose of Direct Support Assets |
Are deployable assets to meet quick reaction mission requirements |
|
METOC teams |
Mine Warfare UUV Platoon Naval Oceanography ASW Team Strike Group Oceanography Team Mobile Environment Team |
|
METOC teams
Mine Warfare UUV Platoon |
Uses unmanned underwater vehicles instead of people to perform mine countermeasure warfare |
|
METOC teams
Naval Oceanography ASW Team |
meteorology and oceanography Uses various tools to provide tactically relevant information to support ASW mission |
|
METOC teams Strike Group Oceanography Team |
Provides strike groups with meteorological and oceanographic support weather support for strike groups |
|
METOC teams Mobile Environment Team |
a quick-reaction, mobile weather forecast group Deployable METOC team |
|
Electronic Warfare (EW) |
use of EM spectrum to effectively deny the use of this medium by an adversary |
|
Computer Network Operations (CNO) |
Networked computers and supporting IT infrastructure systems to attack, exploit, and defend information (CNA, CND, CNE) |
|
Military Information Support Operations (MISO) |
planned operations to convey selected truthful information and indicators to foreign audiences |
|
Military Deception (MILDEC) |
actions to deliberately mislead the adversary decision makers as to friendly military operations |
|
Operations Security (OPSEC) |
process that identifies information that can be observed by adversary intelligence that may prove useful to them |
|
Blue Team |
Protection of the targeted assets and conducting training to local personnel |
|
Red Team |
Network intrusion testing and operational penetration testing and provides Computer Network Attack (CNA) |
|
FES |
Fleet Electronic Support Install, remove, upgrade and report on CCOP CRYPTOLOGIC CARRY-ON PROGRAM |
|
USC Title 10 |
outlines the role of armed forces in the U.S.Code (Subtitle C) |
|
USC Title 50 |
outlines the role of War and National Defense |
|
CRITIC |
Critical Intelligence Communication Message sent out for large events, something the president would need to know about. |
|
Cryptologic Carry on Program (CCOP) |
provides carry-on cryptologic exploitation capability by augmenting existing Ships Signal Exploitation Space (SSES) capabilities |
|
NITES IV |
used to provide METOC support at remote locations automated METOC display and forecasting system that has the capability of receiving meteorological satellite data and interfacing with joint maritime communications systems and Fleet C4ISR |
|
JDISS
|
Joint Deployable Intelligence Support System-program provides hardware and software capabilities that allow interoperability with intelligence systems supporting forces during peace, crisis, and war
|
|
Maritime Domain Awareness
|
effective understanding of anything associated with the Global Maritime Domain that could impact the security, safety, economy, or environment of a nation
|
|
Maritime Operation Center (MOC) |
provides critical support in the execution of the nation's Maritime Strategy, giving commanders the processes, enabled by interoperable, networked systems, to enhance maritime capabilities. |
|
Ship’s Signal Exploitation Space (SSES) |
is to coordinate, monitor and oversee the defense of Navy computer networks and systems |
|
Cryptologic Direct Support Element (CDSE) |
team and their equipment subordinated to anoperational commander to provide cryptologic signal intelligence (SIGINT) direct support.
|
|
The Fourth Amendment
|
that protects all U.S. persons anywhere in theworld and all persons within the United States from unreasonable searches and seizures by any person or agency acting on behalf of the U.S. Government
|
|
CONOPS
|
verbal or graphic statement that clearly and concisely expresses what the joint force commander intends to accomplish
|
|
111 OPERATIONS SECURITY (OPSEC)
|
111 OPERATIONS SECURITY (OPSEC)
|
|
OPSEC
|
A systematic, proven process that identifies, controls & protects generally sensitive but unclassified information about a mission, operation or activity
|
|
5 step planning process |
Identify Critical Information Threat Assessment Vulnerability Analysis Risk Assessment Measures/Countermeasures |
|
responsibilities of the command OPSEC officer |
Begin 5 step process Disseminate CI throughout the command Advertise through the posters, screen savers, and flyers Analyze vulnerabilities Assess Risk based on the threat Conduct OPSEC training |
|
OPSEC considerations regarding public affairs |
The PAO and the OPSEC officer should coordinate the release of data relative to the mission |
|
Web Risk Assessment |
Assessments of all Navy websites that is conducted annually to ensure compliance with IA (information assurance) and security policy requirements |
|
EEFI |
Essential Elements of Friendly Information. Key information adversaries likely will inquire about regarding our intentions, capabilities and activities, in order to obtain answers critical to their own operational effectiveness |
|
Critical Information (CI) |
specific facts about friendly capabilities that is vital to plan effectively |
|
Describe the components and functions of the command OPSEC program |
CO appoints OPSEC officer in writing ensures that command and family maintain an acute OPSEC awareness OPSEC training |
|
112 INTELLIGENCE |
112 INTELLIGENCE |
|
purpose of Naval Intelligence
|
Supporting the Commander
Identifying Centers of Gravity and Critical Vulnerabilities Supporting Planning and Execution of Operations Protecting the Force |
|
5 steps of Intelligence cycle |
Planning and Direction |
|
Three Categories of Intelligence |
Strategic Operational Tactical |
|
National Level Intelligence Organizations |
collection, processing, analysis, and dissemination activities Ex: DNI, CIA, DIA, NGA, NSA, NRO, DHS, DEA |
|
Theater Level Intelligence Organizations |
non-Navy assets in Theater that can be utilized by CDR for a joint operation. Unit could be one of the National agencies or another service component. |
|
Fleet Level Intelligence Organizations |
produce intelligence assessments on nations of concern-particularly their military forces monitored by maritime movements |
|
PIR |
An priority intelligence requirement, stated as a priority for intelligence support, that the commander and staff need to understand a particular adversary or operational environment |
|
CCIR |
Commander’s Critical Intelligence Requirement is information critical to the CDRs management and decision making process that affect successful mission accomplishment |
|
Intelligence Oversight and governing publications |
Ensuring collection is conducted consistent with Constitution and applicable law. EO 12333 DOD 5240.1-R SECNAVINST 3820.3E NSA Policy 1-23 USSID SP0018 |
|
Difference between U.S. citizen and U.S. person |
U.S.citizen - an actual citizen of the US US Person - US citizen or alien admitted for permanent residence in the US, and any corporation, partnership, or other organization organized under the laws of the US |
|
Intelligence Preparation of the battle space environment |
Defines battle space environment, battle space effects, evaluate the threat, determine threat courses of action Important to Combat Planning |
|
mission of Fleet Intelligence Office and its subordinate commands
|
Plan, manage and execute Fleet intelligence TYCOM functions
Subordinate commands are ONI and NMCI |
|
Explain the ISR mission requirements and fundamentals
|
Intelligence, Surveillance and Reconnaissance.
Used for planning of operational missions |
|
Intelligence Fusion Cell
|
the process of collecting and examining information from all available sources and intelligence disciplines to derive as complete an assessment as possible of detected activity
|
|
HUMINT
|
refers to intelligence gathering by means of interpersonal contact
|
|
OSINT |
Open Source Intelligence |
|
MASINT |
Measurement and Signals Intelligence |
|
SIGNINT |
Signals Intelligence |
|
ELINT |
Electronic Intelligence |
|
FISINT |
Foreign Instrumentation Signals |
|
COMINT |
Communications Intelligence |
|
IMINT |
Imagery Intelligence |
|
ACINT
|
Acoustic Intelligence
collection and processing of acoustic phenomena |
|
Give 3 examples of intelligence briefs
|
Intelligence Preparation of the Battlefield (IPB)
Country Overview (Country Study) Order of Battle (OOB) Pre-op Post-op |
|
Intelligence watch floor |
To provide fused multi-sourced intelligence into products for National, Fleet, Tactical, and Joint Commanders
|
|
113 TECHNICALFUNDAMENTALS |
113 TECHNICALFUNDAMENTALS |
|
ELF |
3-30 Hz Extremely low frequencies One way Sub Comms |
|
SLF |
30-300Hz Super low frequencies AC power grids |
|
ULF |
300-3000 Hz Ultra low frequencies |
|
VLF |
3-30 kHz Very low frequencies Near Surface Comms communications or navigation |
|
LF |
30KHz - 300KHz |
|
MF |
300KHz-3MHz Medium Frequency international distress frequencies |
|
HF |
3MHz-30MHz High Frequency point-to-point, ship-to-shore, ground-to-air, and fleet broadcast |
|
VHF |
30MHz-300Mhz Very High Frequency FM Radio Broadcast Line of site and SATCOM. Ship to shore |
|
UHF |
300MHz - 3GHz Ultra High Frequency LOS - Tactical voice Satcom - Tactical Voice\Data |
|
SHF |
3GHz - 30 GHZ Super High Frequency radar and satellite communications |
|
EHF |
30GHz-300GHz Extremely High Frequency experimental stages |
|
Frequency |
Measured in Hertz. Number of wave cycles per second. |
|
Wavelength |
distance in space occupied by one cycle of a radio wave at any given instant |
|
Ducting |
bending of the radar waves passing through the abnormal condition |
|
Refraction |
bending of electromagnetic waves caused by achange in the density of the medium |
|
Multiplexing |
simultaneous transmission of 2 or more signals over a common carrier wave |
|
Modulation/Demodulation |
Taking voice or sound and changing them into radio waves and back again |
|
Bandwidth |
difference between the highest usable frequency of a device and the lowest usable frequency of the device |
|
Keying |
Inserting noise or data onto a frequency |
|
3 layers of the Earth’s atmosphere |
Troposphere: Surface to 3.7miles; all weather occurs here Stratosphere: 3.7miles to 31.1 miles; constant temperature Ionosphere: 31.1miles to 250 miles; Long Distance comms |
|
In Relation to the atmosphere: Frequency |
For any given time, each ionosphere layer has a maximum frequency at which radio waves can be transmitted vertically and refracted back to earth’s surface |
|
In Relation to the atmosphere: Radio Waves |
2 principal ways in which EM energy travels from a transmitting antenna to areceiving antenna. Ground waves - near the surface of the Earth Sky waves - reflected back to Earth from the ionosphere |
|
In Relation to the atmosphere: Propagation |
transmissions of a wave through a medium Radio waves can be reflected, refracted and diffracted like light and heat waves. |
|
In Relation to the atmosphere: Azimuth Angle |
Angle of an object above the horizontal plane between the object and true or relative north. Measured clockwise |
|
In Relation to the atmosphere: Elevation Angle |
Angle between the horizontal plane and the line of sight (altitude) |
|
USB |
Upper side band the SUM frequencies above the carrier |
|
LSB |
lower sideband DIFFERENCE frequencies below thecarrier |
|
CW |
“on-off” keying of a continuous wave (CW) carrier frequency |
|
Amplitude Modulation (AM) |
Varying amplitude of signal |
|
Frequency Modulation (FM) |
Varying Frequency of signal |
|
PRI Pulse Repetition Interval |
Pulse Repetition Interval interval between the start on one pulse and the start of the next pulse |
|
PRF Pulse Repetition Frequency |
Pulse Repetition Frequency the rate at which pulses are transmitted, given in Hz pulse per second |
|
RF |
Radio Frequency Frequency at which radar operates |
|
BW |
Beam wdith width of a radar beam measured between half points |
|
RADAR: CW |
Continuous Wave Detects change in frequency reflecting from target. Determines velocity, can't determine range. |
|
DOPPLER EFFECT |
a shift and change in frequency ex sound moving towards or away from you |
|
PW Pulse Width |
Pulse Width duration of time between the leading and trailing edges of a pulse |
|
Scan |
movement of a radar beam while searching for or tracking a target |
|
Bearing |
Angle from relative or true north of an object from one's own position and view. |
|
Azimuth |
the compass bearing, relative to true north, of a point on the horizon directly beneath an observed object |
|
Elevation angle
|
angle between the horizon and the line from the object to observer’s eye
|
|
Air Search |
determine the position, course, and speed of airtargets; radar can exceed 300 miles |
|
Surface Search |
the detection of surface objects; maintenance of a 360-degree search pattern of all objects within line-of-sight |
|
Fire Control |
Provides positional data on targets to a fire-control system in order to calculate a firing solution |
|
OPELINT |
Operational ELINT determines the locations and readiness of target emitters Location Movement Employment Tactics |
|
TECHELINT |
Technical ELINT determines thecapabilities and limitations of target emitters and and the electronics or weapons systems withwhich they are associated with Signal Characteristics, Modes, Functions, Capabilities, Limitations, Vulnerabilities |
|
Half Duplex |
send or receive one at a time |
|
Full Duplex |
communications take place simultaneously in both directions using two separate frequencies |
|
Simplex |
1 direction, uses a single channel to exchange information between 2 or more terminals
|
|
114 METOC |
114 METOC |
|
How does Naval Oceanography support the Information Dominance Mission |
Predicts weather and ocean conditions thereby assisting in the foreseeable intelligence collection, capabilities of the adversary |
|
METOC Products U.S. Naval Observatory |
USNO Responsible for astronomical data and standard of time. |
|
METOC Products Joint Typhoon Warning Center |
JTWC Responsible for issuing tropical cyclone warnings for Pacific and Indian Oceans |
|
METOC Products Naval Oceanography Operations Command |
NOOC Responsible for advising the impact of ocean and atmospheric conditions in every theater and of every operation |
|
METOC Products Fleet Numerical Meteorology and Oceanography Center |
FNMOC Provides relevant and timely world wide meteorology and oceanography support to U.S. and coalition forces |
|
METOC Products Naval Oceanographic Office |
NAVO maximizes sea power by applying relevant oceanographic knowledge in support of U.S. national security |
|
GOES |
Geospatial Operational Environmental Satellites Provides warning of thunderstorms, winter storms, flash floods and other severe weather. 4 in orbit GOES 10-13 |
|
POES |
Polar Operational Environmental Satellite Next generation circles 14 times a day, collect global data on a daily basis |
|
Defense Meteorological Satellite Program DMSP |
low Earth orbiting satellites provide the military with important environmental information |
|
National Polar Operational Environmental Satellite System (NPOESS) |
next generation of low earth orbiting environmental satellites |
|
Tropical Rainfall Measuring Mission (TRMM) |
Satellite designed to help our understanding of the water cycle in the atmosphere, as well as “dissect” tropical cyclones at various levels by using microwave frequencies |
|
Wind Direction/speed |
Wind Direction- average direction from which the wind is blowing Wind Speed- average rate of air motion, or the distance air moves in a specified unit of time |
|
Ambient Air |
aka dry-bulb temperature temperature of surrounding air |
|
Wind Chill |
felt air temperature on exposed skin due to the wind |
|
Heat Stress |
measure of how hot the air feels based on temperature and humidity excessive heat on the body |
|
Precipitation |
includes all forms of moisture that falls to the Earth’s surface, ex: rain, drizzle, snow and hail |
|
Relative Humidity |
Measure amount of water in the air |
|
Sky Condition |
state of the sky how it looks, clouds etc. |
|
Atmospheric pressure |
refers to the pressure exerted by the column of air on any point of the Earth’s surface |
|
Air Mass |
large volume of air defined by its temperature and water vapor content |
|
Cold / Warm / Occluded Front |
when a cold front overtakes a warm front. When this occurs, the warm air is separated (occluded) from the cyclone center at the Earth's surface
|
|
Restricted Visibility |
Limited visibility due to mist, fog, rain, snow |
|
Fog |
Water Droplets, ice crystals in air near surface - NUMBER ONE inhibitor to military operations! |
|
Sunrise/Sunset |
the times when the upper edge of the sun is on the horizon |
|
Moonrise/Moonset |
First appearance/disappearance of moon over horizon |
|
Lunar Illumination |
the amount of light illuminated by the moon |
|
Tropical Cyclones |
storm that originates in tropical latitudes; they include tropical disturbances, depressions, storms, hurricanes, typhoons, and cyclones |
|
Tropical Depression |
winds less than 34 knots first appearance of a lowered pressure and organized circulation in the center of the thunderstorm complex occurs |
|
Tropical Storm |
winds between 34-63 knots a localized, very intense low-pressure wind system, forming over tropical oceans and with winds of hurricane force |
|
Hurricane/Typhoon |
winds of at least 64 knots A large tropical storm system with high-powered circular winds |
|
Thunderstorm |
form of weather characterized by the presence of lightning and thunder |
|
Tornado/Waterspout |
Rotating column of air in contact with the earth |
|
Funnel Cloud |
Funnel shaped cloud of condensed water droplet, does not reach the ground/ water surface |
|
Effects on military Operations - Visibility |
biggest impacts are on shore and shipboard flight ops. as well as targeting and strike weather |
|
Precipitation |
precipitation also impacts radar performance (reactivity profile), and Electro-optical systems performance |
|
Winds |
Influences aircraft and artillery operations, can affect radar and comm systems |
|
Cloud Cover |
cloud cover can impact all major operations and/or the support to those operations |
|
Temperature and humidity |
has the biggest impacts on ground troop movement and special operations |
|
Ocean Eddies - Cold |
pocket of cold water breaks from cold current into warm ocean counter clockwise |
|
Ocean Eddies - Warm |
pocket of warm water breaks from warm current into cold ocean waters clockwise |
|
Bathythermograph |
The measurement and recording of subsurface water temperature at various depths |
|
Bioluminescence |
Luminescent bacteria that develops in great masses in the sea causing a general bluish green glow in the water |
|
Sea Wave |
wind waves, waves generated by the wind in the local area |
|
Wave Height |
the vertical distance, usually in feet, from the crest of a wave to the trough of the wave |
|
Wave Period |
the time, usually measured in seconds that it takes for a complete wave cycle to pass a given fixed point |
|
Swell Wave |
seas that have moved out and away from the area in which they were formed |
|
SST Sea surface temperature |
the water temperature close to the surface |
|
Ebb Tide |
The period between high tide and low tide during which water flows away from the shore |
|
Flood Tide |
a current that flows toward the shore The incoming or rising tide |
|
High Tide |
Sea level at its highest point |
|
Low Tide |
Sea level at its lowest point |
|
Open Ocean current |
a continuous, directed movement of ocean water generated by the forces acting upon this flow |
|
Littoral current |
currents occur in the surf zone and are caused by waves approaching the beach at an angle. |
|
Rip current |
caused by the return flow of water from the beach |
|
Surf Zone |
Where waves form |
|
Spilling - Breaker Type |
occur with gentle and flat beach slopes wave crests gently |
|
Plunging - Breaker Type |
breakers occur with a moderate to steep beach slope creates a pipe when cresting |
|
Surging - Breaker Type |
normally seen only with a very steep beach slope wave does not crest |
|
Ocean fronts |
Boundaries between water masses of different density |
|
Ocean Bottom Topography |
studies the configuration of the sea floor and the ocean surface |
|
Ocean Bottom Composition |
The ocean bottom is covered by various types of sediments mixed with dissolved shells and bones of marine organisms |
|
Ocean Layers Mixed Layer |
Upper layer of ocean; warmer temperatures depths to max of 1500 feet. 2 processes are classified as mechanical and convective |
|
Ocean Layers Thermocline |
Central layer. Rapid decrease of water temperature with depth. |
|
Ocean Layers Deep Layer |
bottom of the layers; characterized by constant cold temperatures, generally less than 4° C |
|
Effects on transmission of sound Temperature |
Primary controller of sound speed increases 3.2 m/sec for ever 1 degree increase speed of sound in water is 4 times greater than the speed of sound in air |
|
Effects on transmission of sound: Pressure |
pressure increases with depth and sound speed increases with higher pressure 1.7m/sec per 100 meters of depth |
|
Effects on transmission of sound: Salinity |
The speed of sound in water increases with increasing salinity |
|
Relationship of METOC to GEOSPATIAL Intelligence |
METOC is intelligence layer of GEOINT information base. Critical to joint ops during planning and ongoing operations |
|
Impacts of environmental conditions Anti-submarine warfare operations (ASW)
|
sound propagation and detection effectiveness of both short/long range acoustic systems can be enhanced or degraded
|
|
Impacts of environmental conditions Naval Special Warfare operations (NSW) |
target restrictions due to time of day, terrain restrictions, adverse weather, seasonal and temperature effects |
|
Impacts of environmental conditions Mine Warfare operations |
sound speed that is highly dependent upon salinity (MW is almost always conducted at near shore areas surface winds, wave action, visibility, daylight hours |
|
Impacts of environmental conditions Air Defense Operations |
ceiling, visibility, temperature and winds have the greatest effect |
|
Impacts of environmental conditions to Information Warfare |
METOC forecasts will be generated at the lowest level possible within the battle group METOC Support to warfare commanders |
|
Humanitarian Assistance/ Disaster Relief Ops |
natural geography and man made features affect how and where we can supply relief efforts |
|
Chemical, Biological and Nuclear Warfare |
CBRNE material may disperse chemicals, biological or radiological agents or toxic materials by wind |
|
Strike Warfare |
Visibility Precipitation Winds Cloud Cover Temperature and humidity |
|
Impacts of atmospheric conditions on EM propagation of radar beam Standard refraction |
Refraction is the change in direction of a wave due to a change in its speed |
|
Impacts of atmospheric conditions on EM propagation of radar beam Super-refraction |
This is frequently caused by temperature inversions, bends the beam toward the earth and can cause the radar to detect ground returns from distances far exceeding the normal ground clutter area |
|
Impacts of atmospheric conditions on EM propagation of radar beam Sub-refraction |
bends the beam away from the earth |
|
Impacts of atmospheric conditions on EM propagation of radar beam Trapping |
ducting in evaporative ducts, surface-based ducts, and low-elevated ducts, provided the victim radar antennas are within the elevated duct Extends radar ranges |
|
Small craft |
issued in harbors, inland waters and coast OPAREAS |
|
Gale |
wind speeds of 35 knots or higher |
|
Storm |
wind speeds of 50 knots or higher |
|
Local Wind Advisory |
winds exceeding 25 mph/40 kph over land |
|
High Seas |
issued every 12 hours whenever actual heights in an ocean area of N. Hemisphere equal/exceed 12ft |
|
Severe Thunderstorm/Tornado |
issued when weather is favorable for development of severe thunderstorms or tornados 64 knots or greater |
|
Thunderstorm warning |
issued when trained storm spotters or a Doppler weather radar indicate a strong thunderstorm |
|
Hurricane/Typhoon warning |
warning for land, harbor, inland waters, and ocean areas for winds 64 knots or greater |
|
Extreme Temperature warning |
warnings when the heat index and wind-chill are to the extreme |
|
Heavy Snow warning |
blizzards, heavy snow, freezing rain or drizzle and sleet |
|
Flash flood |
rapid flooding of low-lying areas, rivers, dry lakes, and basins |
|
Hazardous Surf |
national weather service bulletin advising hazardous wave conditions which could cause injury, death, or property damage |
|
Tsunami |
ocean wave generated by a submarine earthquake, volcano, or landslide - aka seismic sea wave |
|
Earthquake |
movement of the Earth’s crust cause by the release of stress accumulated along geologic faults or by volcanic activity |
|
Cyclone Conditions of Readiness (COR) |
COR5- destructive winds within 96 hours COR4- 72 hours COR3- 48 hours COR2- 24 hours COR1- 12 hours |
|
Nautical Almanac |
describes a selection of celestial bodies for the purpose of enabling navigators to use celestial navigation at sea |
|
Astronomical Almanac |
contains solar system ephemeris and catalogs or selected stellar and extra galactic objects |
|
115 NAVY SPACE |
115 NAVY SPACE |
|
Space Force Enhancement |
Increasing combat potential through ISR, missile warning, environmental monitoring, satcomms, and PNT (Positioning, Navigation, and Timing) |
|
Space Support |
Operations to deploy and sustain military and intel systems in space. |
|
Space Control |
protect space capabilities and deny freedom of use of space for the adversary |
|
Space Force Application |
Combat Operations in, through, and from space to influence the course and outcome of conflict by holding terrestrial targets at risk. ex: ballistic missile defense and force projection |
|
space entities and how they affect communications The Sun |
biggest effect on space environment two by-products: electromagnetic radiation electrically charged particles |
|
space entities and how they affect communications Solar Wind |
travels at one million mph, carrying various particles from the sun atmospheric friction or drag on spacecraft, which can affect their orbit disrupt electronic communication |
|
space entities and how they affect communications Solar Cycle |
Solar activity follows an 11-year cycle. |
|
space entities and how they affect communications Van Allen Radiation Belts |
belts of charged particles held in place around the Earth by the Earth’s magnetic field |
|
space entities and how they affect communications Atmospheric Drag |
low orbiting objects, below 1000 km, are slowed by the atmosphere, resulting in the space craft not being where it is expected and to reduce the spacecraft’s altitude |
|
Low Earth Orbit |
150-800 miles above earth's surface. Period as low as ninety minutes |
|
Medium Earth Orbit |
altitude of 10,800 miles period of 12 hours Used by navigation satellites |
|
Highly Elliptical Orbit |
satellite slows down at apogee and speeds up at perigee ex: communication satellites |
|
Geosynchronous Orbit |
altitude of 19,300 miles, satellite remains over the same area of the Earth |
|
Polar Orbit |
orbit that allows a satellite to travel around the earth, from pole to pole, in a short time to provide broad photo coverage of the planet; inclination of 90 degrees
|
|
Apogee |
farthest point of orbit from the center of the Earth |
|
Perigee |
closest point of orbit to Earth |
|
Identify the 3 main space launch facilities in the U.S |
Vandenberg Air Force Base (VAFB),California Kennedy Space Center (KSC)/ Cape Canaveral Air Force Station (CCAFS), Florida Wallops Island, Virginia |
|
Navy UHF Follow-on |
Links ships, mobile units, and shore sights together (Line of sight) constellation of eight geosynchronous communications satellites that provides tactical narrow band UHF satellite communications to all of the Defense Department and other government agencies |
|
Defense Satellite Communications System |
Provides secure, jam-resistant communications for Command and Control, High Capacity SHF Satellite GCCS / JDISS / JWICS / CTAPS / STEL / JMICS |
|
GBS |
Global Broadcast Service provides high data rate broadcast of data and video information products to military tactical terminals |
|
WGS |
Wideband Global SATCOM (WGS) provides flexible, high-capacity communications for the Nation’s war fighters through real world operationalization |
|
Global Positioning System (GPS) |
broadcast navigation information on a continuous basis SPS- unencrypted civilian positioning PPS- military positioning |
|
advantages and disadvantages of space-based ISR |
advantage: used to provide systematic focused coverage of an area of interest, sometimes without detection. Disadvantages: include predictable over-flight schedule, atmospheric disturbances (fog, rain, smoke, clouds) |
|
Space Situational Awareness (SSA) |
Key component for space control. Ensures space ops, safety, and international agreements |
|
Astrometry |
natural science that deals with the study of celestial objects (ex: planets, comets, star clusters, and galaxies) |
|
Earth Orientation Parameters |
Describes irregularities of the earths rotation; measures Earths rotation. |
|
Role of precise time in the following- GPS |
accurate time and location with the assistance of atomic clocks |
|
Geo-location |
greater emphasis on determining a meaningful location rather than just a set of geographic coordinates |
|
Network Synchronization |
crucial to a variety of economic activities around the world |
|
201ADMINISTRATION |
201ADMINISTRATION |
|
Explain the procedures for transmission and handling of Privacy Act Information |
Transmitted via encrypted email Shred documents which contain PII Do not release without written consent |
|
Explain the adjunction process to include: Investigation |
Process of interviewing and reviewing records performed by Office of Personnel Management (OPM) |
|
Explain the adjudication process for a Security Access Eligibility Report (SAER) |
Used to identify an incident or any change in eligibility if an employee is still eligible for the security clearance |
|
Explain the adjunction process to include Appeals |
Process of appealing the decision of DoNCAF |
|
LOI |
Letter of Intent- used to notify a person their clearance is going to be revoked |
|
LOD |
Letter of Denial- used to notify that access has been officially denied to classified information |
|
Explain the adjudication process for Joint Clearance Access Verification System (JCAVS) |
used to verify access levels (clearance) of an individual |
|
State the purpose of an SF86 |
Used to compile information that OPM uses to investigate and recommend authorization to have a security clearance Consist of past residence, employment, legal or criminal action, references and financial information. |
|
DD Form 1847-1 |
Non-Disclosure Statement, used to precisely identify individuals to certify their access to sensitive compartmented information held for 99 years legal document used for criminal prosecution |
|
Adjunct Faculty Program |
Uses subject matter experts to meet global training needs Part time and full time instructors |
|
minimum DLPT score standard for CTI |
Listening 2 (L2) and Reading 2 (R2) Pay grades E1 through E8 Test annually Everyone is eligible |
|
Name the languages associated with the following categories |
Cat1 – MID-EAST/SW ASIA/AFRICA Cat2 – EAST ASIA/PACIFIC Cat3 – LATIN AMERICA Cat4 – EASTERN EUROPE |
|
emergency destruction priority assigned to cryptologic equipment and documents |
Priority One – All cryptographic equipment and documents Priority Two – All operational SCI material Priority Three – Less sensitive administrative SCI material and collateral material |
|
202 INFORMATION OPERATIONS |
202 INFORMATION OPERATIONS |
|
Describe the Navy’s organizational structure as defined by annexes A & J of FLTCYBERCOM/ COMTENTHFLT OPORD 2000 |
Subordinate commands are organized by missions and functions in accordance with Annex A. Annex J outlines command relationships and responsibilities. |
|
USSTRATCOM |
Deter attacks on U.S. vital interests, to ensure U.S. freedom of action in space and cyberspace |
|
CYBERCOM |
Plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified DoD information networks |
|
JFCC-ISR |
Joint Functional Component Command for Intelligence, Surveillance and Reconnaissance serves as the epicenter for planning, execution and assessment of the U.S. military's global Intelligence, Surveillance, and Reconnaissance operations; a key enabler to achieving global situational awareness. |
|
JFCC-Space |
Joint Functional Component Command for Space Continuously coordinates, plans, integrates, commands and controls space operations to provide tailored, responsive, localand on order, denies the enemy the same |
|
JIOWC |
Joint Information Operations Warfare Command is responsible for the integration of Information Operations (IO) into military plans and operations across the spectrum of conflict. |
|
Three formal categories CGS (Cryptologic Support Group) |
Permanent Military Service Component Expeditionary |
|
Customer Relationship Functions |
Provision of dedicated SIGINT services to a customer, using the capability of the entire US SIGINT System |
|
SIGINT production functions |
These elements formally delegated a mission to a CSG through the mission delegation process and are responsible for overseeing the analytic and reporting mission |
|
SIGINT operational relationships |
On behalf of DIRNSA, the SIGINT Director exercises SIGINT operational control of CSG’s through the NSA/CSS Representatives accredited to CSG’s supporting agency |
|
Rules of engagement - ROE |
are the means by which the President, SecDef, and operational commanders regulate the use of armed force in the context of applicable political and military policy, and domestic and international law |
|
Law of War |
or law of armed conflict is a body of law concerning acceptable justifications to engage in war and the limits to acceptable wartime conduct |
|
No-Strike List |
A list of objects or entities characterized as protected from the effects of military operations under international law and/or rules of engagement |
|
Restricted Target List |
A list of restricted targets nominated by elements of the joint force and approved by joint force commander |
|
Battle Damage Assessment |
The purpose of BDA is to compare post-execution results with the projected results generated during target development |
|
Information Operations (IO) |
involve actions taken to affect adversary information and information’s systems while defending one’s own information and information systems |
|
Information Warfare (IW) |
Information operations conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries. |
|
Describe Target Development |
Based on what the commander wants to achieve and the measures and indicators used to evaluate their achievement rather than on the ways and means used to affect the target |
|
Time Sensitive Targeting and six phases |
targets requiring immediate response because they pose (or will soon pose) a danger to friendly forces or a highly lucrative, fleeting targets of opportunity. Detect, Locate, Identify, Decide, Strike, and Assess |
|
Describe how the five core capabilities of IO are applied during Offensive IO and Defensive IO |
Intergrate and coordinate policies and procedures, operations, personnel, and technology to protect and defend information and information systems.
|
|
Destroy |
To damage a system or entity so badly that it cannot perform any function or be restored to a usable condition without being entirely rebuilt |
|
Disrupt |
to break or interrupt the flow of information |
|
degrade |
To reduce the effectiveness or efficiency of adversary C2 or communications systems, and information collection efforts or means |
|
Deny |
to prevent the adversary from accessing and using critical information, systems and services |
|
Deceive |
To cause a person to believe what is not true. MILDEC seeks to mislead adversary decision makers by manipulating their perception of reality |
|
Exploit |
To gain access to adversary C2 systems to collect information or to plant false or misleading information |
|
Influence |
To cause others to behave in a manner favorable to US forces |
|
Protect |
To take action to guard against espionage or capture of sensitive equipment and information |
|
Detect |
To discover or discern the existence, presence, or fact of an intrusion into information systems |
|
Restore |
to bring information and information systemsback to their original state |
|
Respond |
To react quickly to an adversary’s or others’ IO attack or intrusion |
|
SSN SSGN |
Nuclear Submarine Guided Missile Nuclear Submarine |
|
EA-6B |
Prowler A twin-engine, mid-wing electronic warfare |
|
E-2C |
Hawkeye Navy’s and Marine Corps airborne surveillance |
|
P-3C |
Orion maritime patrol aircraft used by numerous navies and air forces around the world, primary for maritime patrol, reconnaissance, anti-surface warfare and anti-submarine warfare |
|
EP-3E |
JCC is the signals reconnaissance version of theP-3 Orion |
|
RC-135 |
Rivet Joint reconnaissance aircraft supports the theater and national level consumers with near real time on-scene intelligence collection |
|
MQ-1A |
Predator Long endurance, medium altitude unmanned aircraft system for a surveillance and reconnaissance missions |
|
EC-130H |
Compass Call Airborne tactical weapon system using a modified version of the C-130 Hercules. |
|
U-2 |
Single - engine, very high-altitude reconnaissance aircraft operated by the United States Air Force |
|
EA-18G |
A derivative of the Super Hornet project, is ultimately destined to become the replacement for the venerable EA-6B Prowler |
|
CVN |
Aircraft Carrier |
|
CG |
Guided Missile Cruiser, a large combat vessel with multiple target response capabilities |
|
DDG |
Guided Missile Destroyer, multi-mission Anti-AirWarfare, Anti-Submarine, and Anti-Surface Warfare surface combatant |
|
FFG |
Guided Missile Frigate Anti-submarine warfare combatants with an additional anti-air warfare capability |
|
LCC |
Amphibious Command Ships Provide command and control for fleet commanders |
|
LHA/LHD |
Amphibious Assault Ship LHDs mission is to conduct prompt, sustained combat operations at sea, as part of the Navy’s amphibious strategy |
|
LPD |
Amphibious Transport Dock embarks, transports, and lands elements of a landing force for expeditionary warfare missions |
|
LSD |
Dock Landing Ship Transport load landing craft, amphibious vehicles and troops into an amphibious landing area |
|
PC |
Patrol Costal Ship The primary mission of PC ships is coastal patrol and surveillance |
|
MARK V |
Special Operations Craft, medium range insertion and extraction support for Special Operations Forces personnel in a low to medium threat environment |
|
Discuss MILDEC to include the following means of deception: Physical |
Activities and resources used to convey or deny selected information to a foreign power |
|
Discuss MILDEC to include the following means of deception: Technical |
Military material resources and their associated operating techniques used to convey or deny selected information to a foreign power through the deliberate radiation, reradiating, alteration, absorption or reflection of energy |
|
Discuss MILDEC to include the following means of deception: Administrative |
Resources, methods, and techniques to convey ordeny oral, pictorial, documentary, or other physical evidence of a foreignpower |
|
the five phases of the MILDEC planning process |
Deception Mission Analysis Deception Planning Guidance Staff Deception Estimate Commander’s Deception Estimate Deception Plan Development |
|
Deception Mission Analysis |
Deception mission analysis is conducted as partof the overall mission analysis that is done by a JFC following receipt of a new mission |
|
Deception Planning Guidance |
After completion of the mission analysis, the commander issues planning guidance to the staff. In addition to other guidance,the commander states the deception objective for the operation |
|
Staff Deception Estimate |
The deception estimate is conducted as part of the operations estimate. Working with the operational planners, the other C2W planners, and intelligence analysts, the deception planners gather and analyze information relating to the adversary |
|
Commander’s Deception Estimate |
Using the staff estimates as a basis, the JFC conducts an estimate. The JFC selects an operational COA for development into an operation plan or order and issues any necessary additional guidance. At the same time, the JFC selects the supporting deception COA. |
|
Deception Plan Development |
Developing a complete deception plan is the most time-consuming part of the planning process. There are five major actions in this step: complete the story, identify the means, develop the event schedule, identify feedback channels, and develop the termination concept |
|
Discuss the difference between MISO and MILDEC |
MISO: Concealing contradicting indicators while conveying selected information and indicators.
MILDEC: Degrading general situation information to enhance effect of observables. (Intentionally deceiving military officials) |
|
Describe the following in relation to MISO Organizational responsibilities |
When directed by the SECDEF, the Commander, USSpecial Operations Command transfers MISO forces by attachment to geographic combatant commanders |
|
Describe the following in relation to MISO Command and Control |
C4S are vital to planning, mounting and sustaining successful joint MISO |
|
Describe how intelligence supports MISO through target analysis |
The use of MISO forces and assets is predicated on political, military, economic, cultural, religious, and psychological orsocial conditions. MISO planners must possess a thorough and current knowledge of these conditions to develop MISO targeted at selected foreign groups to influence their objective and emotional reasoning |
|
Primary responsibilities of a Information Operations Officer |
to supervise the IO cell to ensure capabilities and activities are planned, coordinated and integrated within the joint force officer staff and with higher echelon, adjacent, subordinate, multinational staffs The J-3 normally will designate an IO officer |
|
Warfare Commander Relationships |
The IWC tasks and directs force personnel, surveillance and reconnaissance |
|
TACSIT |
IWC is responsible for maintaining a favorable Tactical Situation |
|
Describe the following area of COMSEC: Cryptosecurity |
the provision of technically sound cryptosystems and their proper use |
|
Describe the following area of COMSEC: Transmission security |
application of measures designed to protecttransmissions from interception and exploitation by means other thancryptanalysis.
|
|
Describe the following area of COMSEC: Emission security |
all measures taken to deny unauthorized persons information of value that might be derived from intercept and analysis of compromising emanations from crypto equipment and telecommunications systems |
|
Describe the following area of COMSEC: Physical security |
all physical measures necessary to safeguard classified equipment, material and documents from access there to or observation thereof by unauthorized persons |
|
Advantages/disadvantagesof EMCON |
Advantage: Harder to find. Disadvantage: Harder to communicate. |
|
Discuss the authority to impose/break EMCON |
Strike group commander |
|
EMCONconditions |
1. Radio silence; per EMCON bill 2. Hide from satellites 3. Reduces ability of enemies to target 4. Essential equipment is authorized |
|
EEFI |
Key questions likely to be asked by adversary officials and intelligence systems about specific friendly intentions, capabilities, and activities, so they can obtain answers critical to their operational effectiveness |
|
BEADWINDOW |
serves to alert other operators on the net of the EEFI disclosure and thus acts as an educational aid, producing increased security awareness among operators and an overall improvement in the security of insecure voice communications Roger-Out is the only authorized reply to BEADWINDOW |
|
JCMA |
Provide COMSEC monitoring services to the Department of Defense and other U.S. Government departments and agencies |
|
205 Technical Fundamentals |
205 Technical Fundamentals |
|
Discuss the basic concept of how RADAR works |
Radio Detection and Ranging RF energy is transmitted to and reflects from the reflecting objects |
|
Discuss the Doppler Effect |
is the apparent change in frequency or pitch when a sound source moves towards or away from the listener, or when the listener moves toward or away from the sound source |
|
Echo |
The reflection of the original sound wave as it bounces off a distant surface. |
|
Sea Return |
Energy radiated by a radar striking the surface of the sea near the ship |
|
Clutter |
Confusing, unwanted echoes that interfere with the observation of desired signals on a radar indicator |
|
Ground Clutter |
Unwanted echoes from surrounding land masses |
|
Sea Clutter |
Unwanted echoes from the irregular surface of the sea |
|
Range |
The length of a straight line between a radar set and a target |
|
Amplitude |
The portion of a cycle measured from a referenceline to a maximum value above the line |
|
Wavelength |
The distance in space occupied by 1 cycle of a radio wave at any given instant |
|
Cycle |
One complete alternation of a sine wave that has a maximum value above and below the reference line |
|
Frequency |
The number of cycles that occur in one second, usually in HERTZ |
|
Ground Wave |
Radio waves traveling near the surface of the ground |
|
Sky Wave |
Radio waves that are reflected back to earth from the ionosphere |
|
Space Wave |
Radio wave that travels directly from the transmitter to the receiver and remains in the troposphere |
|
Natural Horizon |
The line of sight horizon |
|
Radio Horizon |
Boundary beyond the natural horizon which radiowaves cannot be propagated of the earth’s surface |
|
Refraction |
The changing of direction as a wave leaves onmedium and enters another medium of a different density |
|
Diffraction |
The bending of the paths of waves when the waves meet some form of obstruction |
|
Reflection |
Waves that are neither transmitted nor absorbed, but are reflected from the surface of the medium of a different density |
|
Absorption |
Atmospheric absorption of RF energy with no reflection or refraction |
|
Attenuation |
The scattering and absorption of energy as it passes through a medium |
|
three basic characteristics of sound |
The source or transmitter The Medium for carrying sound (air, water, metal, etc) The detector or receiver |
|
Antenna Reciprocity |
The property of interchangeability of the same antenna for transmitting and receiving |
|
Antenna Gain |
Characteristic of a given antenna that remains the same whether the antenna is used for transmitting or receiving |
|
Polarization |
The electrical field determines the direction of polarization of the wave. In a vertical polarized wave, the electrical lines of force line in a vertical direction |
|
Radiation Resistance |
An assumed loss of resistance or loss of energy equal to the amount of energy needed by the antenna |
|
Virus |
a malicious code needing other files to replicate |
|
Trojan |
Non-replicating program masquerading as one type of program with its real intent hidden from users |
|
Worm |
Self-replicating malicious code without user interaction |
|
Naming Convention/Prefixes |
Family name Group name Major variant Minor variant Modifier Computer Antivirus Researchers Organization (CARO) established standard naming scheme made up of multiple parts and standard rules |
|
Active X |
interactive technology used to run programs over internet; can do almost anything, full access to your system, ability to grant access to a computer's hard drive and system functions |
|
Macro Virus |
virus that is written in a language built into a word processing document (i.e. Microsoft Word); most common type of virus and cost companies the most money, when infected document is opened copies itself into default template allowing it spread as other documents are opened |
|
Hoax Virus |
A computer virus hoax is a message warning the recipient of a non-existent computer virus threat |
|
206 REPORTING |
206 REPORTING |
|
message precedence |
Routine (R) – 6 hours Priority (P) – 3 hours Immediate (O) – 30 minutes Flash (Z) – 10 minutes or less FlashOverride (W) – Immediate Emergency (Y) – Immediate |
|
CRITIC |
Critical Information – information of such importance it needs to be sent within tenminutes |
|
KLIEGLIGHT |
Time sensitive tactical data, released in a timely manner |
|
TACREP |
Principal reporting vehicle used by the United States SIGINT System (USSS) to keep NSA, tactical commanders and national, theater, local and tactical-level non-SIGINT organizations advised of the status of continuing or potential threats and other events of high interest |
|
Activation/Deactivation |
this is in regards to a CDSE and will include a USSID SP0200 notification to request a SIGAD or to deactivate one |
|
TACELINT |
MSG for EW contacts that contains parameters of contact of interest |
|
IGRAM |
Integrate Graphics and Multimedia Reports (IGRAM) – uses attached media, connected via hyperlinks, to enhance or clarify the information in the original serialized reports |
|
STRUM |
general-purpose reporting vehicle for collection covers a 24 hour period |
|
STI |
Significant Technical Interest – something happening out of the normal parameters |
|
Explain the implications of Minimize |
Hold routine message traffic on station. Anything higher than routine can continue as normal. |
|
DAG |
are assigned, promulgated, and controlled by NSA, five-letter groups used in the address component of the message to obviate the necessity for listing each address separately |
|
AIG |
Address indicating groups (AIGs) represent 16 or more specific and frequently recurring combinations of action and/or information addressees. Used to increase speed of message handling |
|
Producer Designator Digraph |
Two character designator assigned by NSA toidentify a specific SIGINT producer |
|
SIGAD |
SIGINT Activity Designator – Designate a SIGINT site, used for reporting purposes instead of having to include the Command Name in every correspondence in regards to reporting |
|
DF Station Identification |
Two character designator assigned by NSA to identify a specific DF capable site/platform |
|
GENSER Plain Language Address |
used when address cannot be reached by Defense Special Communications Systems |
|
Special Intelligence Plain Language Address |
Used for SCI correspondence |
|
Routing Indicators |
Consist of six letters. Made up of letters that identify mode, geographical area and the rest are used for computer language to prevent message drop or misroute. |
|
DOI-101 |
Assignment and usage of DSSCS Address Groups (DAG) |
|
DOI-102 |
Operating Instruction Routing Indicators |
|
DOI-103 |
Operating procedures and practices applicable to Special Security |
|
JDISS |
Joint Deployable Intelligence Support System mobile JWICS As a tactical extension of the DODIIS network, provides interoperability and compatibility for intelligence dissemination and communication throughout the DoD |
|
GCCS-M |
Global Command and Control System Maritime updates in near-realtime rcv's, processes, displays, and manages data on neutral, friendly, and hostile forces |
|
NRTD |
Supplies a combined near-real-time intelligence picture derived from SIGINT and other sources to operational and intelligence customers at all levels |
|
S-TRED |
Standard Tactical Receive Equipment Display – atactical display processor that parses and displays intelligence reports for situational awareness, wide area surveillance, indications and warning, and cueing for organic sensors |
|
IBS |
Integrated Broadcast Service Simplex: Near real time Information and Warning (I&W) info to customers with limited bandwidth Interactive: Near real time picture of the battlefield delivered via SATCOM Network: NRTI and BINOCULAR – provides a global architecture with theater focused capabilities |
|
INTELINK |
a suit of web-based applications, tools and services provided by intelink enterprise collaboration center. (On JWICS, SIPRNET and UNCLASSIFIED Networks) |
|
ANCHORY |
database; Keyword search for NSA and 1st party reports within last 3 years. |
|
CARILLON |
NSA General processing computing facilitycomposed of four large scale state-of-the-art IBM z/OS computer systems, providing more than 10,000 direct NSA Intelligence Community customers withservices in support of SIGINT, ELINT and NSA corporate missions |
|
WRANGLER |
ELINT Database that provides characteristics of non-communications emitters databases OPELINT data. |
|
VINTAGE HARVEST |
world-wide web based analytic tool offering comprehensive information about signals to the U.S. intelligence community and Second Party partners |
|
SEALINK |
provides on-demand access to Office of Naval Intelligence real-time maritime database to include SeaWatch, NID, MSC, AMIDSHIPS and more Used to track high interest vessels |
|
OILSTOCK |
A high-resolution, geographic based graphics system used to display real-time and historical data over a map background Provides near real time graphical display of battlefield |
|
ARCGIS mapping tools |
allows you to author, analyze, map, manage, share and publish geographic information |
|
GALE Lite |
Generic Area Limitation Environment is a suite of tools and automated services designed to support a wide range of intelligence analysis functions |