Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
205 Cards in this Set
- Front
- Back
Five Steps of ORM
"IAMIS" |
1) Identify Hazards
2) Assess Hazards 3) Make Risk Decisions 4) Implement Controls 5) Supervise |
|
Objectives of First Aid
|
1) Save Life
2) Prevent Further Injury 3) Limit Infection |
|
Difference Between Open and Closed Fractures
|
- Open (AKA Compound): bone protrudes from skin
- Closed (AKA Simple): break is internal |
|
Methods to Control Bleeding
|
1) Direct Pressure
2) Pressure Points 3) Tourniquet |
|
11 Pressure Points
|
1) Jaw
2) Neck 3) Collarbone 4) Wrist 5) Inner-Upper Arm 6) Inner Elbow 7) Upper Thigh 8) Ankle 9) Knee 10) Groin 11) Temple |
|
Symptoms of Shock
|
1) Dilated Pupils
2) Pale/Clammy Skin 3) Shallow Breaths |
|
MSDS
|
Material Safety Data Sheet - document used for HAZMAT
|
|
HERO
HERF HERP |
- Hazards of electromagnetic radiation to ordinance
- Hazards of electromagnetic radiation to fuel - Hazards of electromagnetic radiation to personnel |
|
Levels of War
|
- Tactical
- Operational - Strategic |
|
Battle of Midway
|
- Turning point of war
- Cryptology role: broke Japanese code (PURPLE CODE) |
|
Coral Sea
|
First air to air only battle (ships never saw each other)
|
|
On the Roof Gang
|
Enlisted Navy personnel who laid cornerstone for Navy cryptology
|
|
First Navy Ship Named After an Enlisted Man
|
USS Osmand Ingram (DD 255)
|
|
Classes of Vessels at the Navy's Inception
|
- Sloops of war
- Frigates - Ships of the line |
|
Six Areas of Naval Doctrine
"COWLIP" |
1) Command and Control
2) Operations 3) Warfare 4) Logistics 5) Intelligence 6) Planning |
|
Seven Principles of Logistics
"FEARSSS" |
1) Flexibility
2) Economy 3) Attainability 4) Readiness 5) Sustainability 6) Survivability 7) Simplicity |
|
Created by the National Security Act
|
- National Security Council (NSC)
- Central Intelligence Agency (CIA) |
|
Gun Salutes
|
- Presidents' Day
- Memorial Day - Independence Day - Admiral gets 17 - VIce Admiral gets 15 - Rear Admiral gets 13 - Commodore gets 11 |
|
ONI
|
Office of Naval Intelligence
- Established in 1882 - Oldest intelligence organization in the Navy - LT Theodorous Bailey Myers Mason was first director |
|
Sailors Creed
|
Written by the Blue Ribbon Recruit Training Panel in 1993
|
|
2nd Fleet
|
Atlantic; Norfolk
|
|
3rd Fleet
|
East/Central Pacific; San Diego
|
|
4th Fleet
|
South/Central America & Caribbean; Mayport
|
|
5th Fleet
|
Middle East/Gulf; Bahrain
|
|
6th Fleet
|
Mediterranean; Gaeta, Italy
|
|
7th Fleet
|
West Pacific/Indian Ocean; Yokosuka, JP
|
|
10th Fleet
|
Worldwide; Ft Meade
- NETWARCOM falls under 10th Fleet |
|
IDC Core Ratings
|
- AG
- CT - IT - IS |
|
NCDOC
|
Navy Cyber Defense Operations Command
- Provides 24/7 protection of Navy's cyber systems |
|
Navy Mission
|
Train, maintain, and equip combat readiness capable personnel when in war and maintain freedom of the seas
|
|
NCTAMS
|
Naval Computer Telecommunication Area Master Stations
-Two Locations: Norfolk and Hawaii |
|
NGA
|
National Geospatial Intelligence Agency
|
|
NSA
|
National Security Agency
- Produce foreign signals intelligence information |
|
EDVR
|
Enlisted Distribution Verification Report
- Sections: 1 - gains 2 - losses 3 - persons on board TEMDU in deserter status 4 - alpha roster |
|
Page 4
|
Qualifications/Awards
|
|
Page 2
|
Dependents/Emergency Data
|
|
Page 13
|
Administrative Remarks
|
|
OPREP-3 Reports
|
- Navy SITREP
- Navy Blue - Pinnacle |
|
Chain of Command:
- Commander, 10th Fleet - Commander, NETWARCOM - Commander, NAVCYBERFORCOM - Commander, FLTCYBERCOM - Commander, USCYBERCOM - FLTCYBERCOM, Force Master Chief - FLTCYBERCOM, Fleet Master Chief - DIRNSA |
- RADM Rodgers
- Captain Chandler - VADM Herbert - RADM Rodgers - General Alexander - Master Chief Powers - Master Chief Welch - General Alexander |
|
Brilliant on the Basics
"MICROS" |
- Mentorship
- Comman Indoctrination - CDBs - Sailor Recognition - Ombudsman support - Sponsorship |
|
DPAS
|
Defense Property Accountability System
- Track lifecycle of property from receipt to disposition |
|
MOV
|
Material Obligation Validation
- Contains: - Julian Date - Nomenclature - Balance (running) |
|
DLR
|
Depot Level Repair
- Manage high cost items that cannot be repaired or reused - Two Types: turn-in and remain in place |
|
CASREP
|
Casualty Report
- Equipment malfunction or deficiency cannot be corrected within 48 hours - Training commands cannot perform - 4 Categories |
|
NSN
|
National Stock Number
- 13 digits used to identify an item in the system |
|
APL
|
Allowance Parts List
- List of equipment on board |
|
OPTAR
|
Operating Target
- Money required for unit to perform mission; "operating budget or checkbook" |
|
When to Change Safe Combos
|
- First Install
- Compromise - Personnel Transfers |
|
SF 700
SF 701 SF 702 SF 703 |
- Security Container Envelope
- Activity Security Checklist - Security Container Checklist - TS Cover Sheet |
|
Directives that Govern Personnel Security
|
- ICD 704
- ICPD 704.1 - 704.5 - SECNAVINST 5510.30 - DOD 5105.21 - M - 1 |
|
Emergency Destruction Priorities
|
Priority 1: Crypto/COMSEC/EKMS
Priority 2: SCI Codeword, Targeting Materials/Projects Priority 3: Less sensitive administrative and collateral |
|
SAER
|
Security Access Eligibility Report
- Reasons for SAER: drugs, debt, compromise, arrest, DUI, mental health |
|
.mil Email Address
|
- DOD has exclusive use of this domain, restricted to use by US entities
|
|
SCI
|
Sensitive Compartmented Information
|
|
Agency that Conducts Clearance Interviews
|
OPM (Office of Personnel Management)
|
|
Agency Responsible for Adjudicating
|
DONCAF (Department of the Navy Central Adjudication Facility)
|
|
Can the CO Administratively Suspend a Clearance/How Long?
|
Yes/90 Days
|
|
Manual that Governs SCI Facilities (SCIF)
|
- ICD 705
|
|
IA
|
Information Assurance
- Basic security practices all users, operators, managers follow to keep information systems in security standards |
|
Five Attributes of IA
"CIANA" |
1) Confidentiality
2) Integrity 3) Availability 4) Non-repudiation 5) Authentication |
|
ATO
|
Authority/Approval to Operate
|
|
IATO
|
Interim Authority/Approval to Operate
- Good for 180 days and can be extended an additional 180 days |
|
Certification
|
Evaluation of technical and non-technical security features of a system
|
|
Accreditation
|
Decision to operate in a special environment; Designated Approving Authority (DAA)'s acceptance of responsibility
|
|
Requirements to be an Information Assurance Manage (IAM)
|
- US citizen
- Assigned in writing - Not a collateral - Attend DAA school - Cleared to same level as system |
|
Vulnerability vs. Threat
|
- Vulnerability is actual threat
- Threat is how bad the vulnerability will affect the system. "Cupcake vs. Fat Boy" |
|
3 Levels of Information Assurance Vulnerabilities
|
1) IAVA: Information Assurance Vulnerability Alert - used for immediate action
2) IAVB: Information Assurance Vulnerability Bulletin - medium; not immediate but will be a problem 3) IAVT: Information Assurance Vulnerability Technical Advisory - general issues |
|
SSP
|
System Security Plan
- Aid in certification process; required settings and postures to be maintained listed |
|
Malicious Mobile Codes
|
- Virus
- Worm - Trojan Horse - Rootkit - Spyware - Mobile code |
|
NIPRnet
SIPRnet JWICS NMCI NSAnet |
- Nonsecure Internet Protocol Router network (unclassified)
- Secret Internet Protocol Router network (secret) - Joint Worldwide Intelligence Communications System - Navy and Marine Corps Internet (unclassified/secret) - NSA infrastructure (TS/SCI) |
|
PKI
|
Public Key Infrastructure
- Used for User ID |
|
LAN
MAN WAN |
- Local Area Network
- Metropolitan Area Network - Wide Area Network |
|
7 Layers of OSI Model
"People Don't Need To See Paula Abdul" |
1) Physical
2) Datalink 3) Network 4) Transport 5) Session 6) Presentation 7) Application |
|
Router
|
A physical device that joins multiple wired or wireless networks
|
|
IPv6
IPv4 |
- 128 bytes
- 32 bytes |
|
Dictionary Attack
|
Cycles through known words in the dictionary to crack passwords
|
|
4 Types of Topology
|
1) Bus
2) Ring 3) Star 4) Mesh |
|
Social Engineering
|
Practice of tricking a user into giving sensitive information
|
|
Phishing
|
Attack that uses email or a malicious website to get personal information
|
|
Hub
|
Common connection point for devices in a network
|
|
Message Precedence
|
R: Routine
P: Priority O: Immediate Z: Flash |
|
INMARSAT
|
Commercial satellite system used for voice and data IP communications from ships at sea
|
|
Gingerbread
|
Codeword used when an intruder is on the net
|
|
Beadwindow
|
Said when EEFI has been disclosed on a circuit
|
|
River City
|
Communication restriction tool used to prevent disclosure of mission information
River City 1: Most Restricted; CO, XO, key personnel River City 2: Dept Heads River City 3: Chiefs and above River City 4: Normal Access |
|
MIJI
|
Meaconing, Intrusion, Jamming, and Interference
|
|
PLA
|
Plain Language Address
- command short title Example is NIOC Hawaii |
|
COMSPOT
|
Communications Spot Report
- GENSER message that reports communications outages; sent at immediate precedence after 30 minutes of outage |
|
OTAT
|
Over-the-Air Transfer
|
|
OTAR
|
Over-the-Air Rekey
|
|
EKMS
|
COMSEC handling guides
|
|
TEMPEST
|
Used to analyze and measure unwanted signal leakage due to equipment radiation
|
|
EMCON
|
Emissions Control
- Control emissions from ship to change the signature to who is looking, tracking, or listening |
|
5 Core Capabilities of Intelligence Operations
|
1) CNO (Computer Network Operations)
2) OPSEC (Operations Security) 3) MISO (Military Intelligence Surveillance Operations) 4) MILDEC (Military Deception) 5) EW (Electronic Warfare) |
|
FES
|
Fleet Electronic Support
- They do the installation, removal, maintenance, and repair of all crypto for DIRSUP. |
|
CCOP
|
Cryptologic Carry On Plan
- Specialized equipment for fleet based cryptologic requirements. |
|
MOC
|
Maritime Operations Center
|
|
ASW
|
Anti Submarine Warfare
|
|
STW
|
Strike Warfare
|
|
AW
|
Air Warfare
|
|
NSW
|
Special Warfare
|
|
USC Title Outlines the Role of War and National Defense in the US
|
USC Title 50
|
|
Red Team
|
Unannounced assessments of security and readiness by an unfamiliar team of operators
|
|
Blue Team
|
Assist in protection of target assets and conduct training to local personnel
|
|
NITES
|
Navy Integrated Environment Support System
|
|
METOC
|
Meteorology and Oceanography Center
- Forecast database tailored to a specific platform |
|
Who is the OPSEC Officer?
|
LTJG Blaukamp
|
|
FIve Step Planning for OPSEC
"ICCCA" |
1) Identify Critical Information
2) Conduct Threat Analysis 3) Conduct Vulnerability Analysis 4) Conduct Risk Assessment 5) Apply Countermeasures |
|
Web Risk Assessment (WRA)
|
Conducted on DON websites to report OPSEC vulnerabilities
|
|
Who is on Command OPSEC Team?
|
- CO
- XO - Dept Head - OPSEC Officer - Dept/Div Reps |
|
Goal of Intelligence
|
Provide commanders the intelligence support needed to win in combat
|
|
Six Steps of Intelligence
"PCPADE" |
1) Planning and Direction
2) Collection 3) Processing and Exploitation 4) Analysis and Production 5) Dissemination and Integration 6) Evaluation and Feedback |
|
Three Categories of Intelligence
|
1) Tactical
2) Operational 3) Strategic |
|
Organization Responsible for HUMINT
|
CIA
|
|
Organization Responsible for SIGINT
|
NSA
|
|
Examples of Intelligence Briefings
|
- Deployment briefs
- Debriefings - Port brief |
|
Continuous Wave (CW)
|
Wave with constant amplitude and frequency
|
|
ELF
SLF ULF VLF LF MF HF VHF UHF SHF EHF |
3 - 30HZ
30 - 300Hz 300Hz - 3kHz 3 - 30kHz 30 - 300kHz 300kHz - 3MHz 3 - 30MHz 30 - 300MHz *Bridge to Bridge* 300MHz - 3GHz 3 - 30GHz 30 - 300GHz |
|
Direction Finding
|
Procedure for obtaining lines of bearings (LOBs)
|
|
Propagation
|
Ability to transmit freely through space
|
|
Pulse Duration
|
Duration between leading and trailing edge of a pulse
|
|
PRI
|
Pulse Repetition Interval
- Duration of time from the leading edge of one pulse to the leading edge of another pulse |
|
Frequency
|
Number of cycles that occur in one second
|
|
Characteristics of a Modulated Wave
|
Carrier wave impressed data is in upper and lower side bands
|
|
OPELINT vs. TECHELINT
|
- OPELINT is reporting on emitter activity, disposition and movement; provides COP (Common Operational Picture)
- TECHELINT is manual analysis of characteristics and parameters; in depth pulse analysis |
|
Primary Difference between Air Search and Surface Search
|
- 2D v. 3D Air is usually 3D (bearing, range, altitude)
- Surface is 2D (bearing and range) |
|
Different Modulation Types
|
- Phase
- Frequency - Amplitude - Pulse |
|
Ducting
|
Temperature and moisture in the atmosphere that allows greater bending and can extend the radio wave
|
|
Multiplexing
|
Simultaneous transmission of two or more signals over a common carrier wave
|
|
Tornado
|
Wind storm over land with funnel shaped cloud that extends toward the ground
|
|
Hurricane
|
Tropical cyclone with heavy rain and winds 73-136 knots
|
|
Tropical Storm
|
Heavy winds and rain 34-63 knots
|
|
Tropical Storm and Cyclone Conditions (TYCON)
|
Condition I: 12 hours
Condition II: 24 hours Conditon III: 48 hours Condition IV: 72 hours Condition V: More than 72 hours |
|
Wind Chill
|
Air temperature felt on exposed skin due to wind
|
|
Sky Condition
|
The appearance of the sky
|
|
Restricted Visibility
|
Limited visibility due to mist, fog, rain, and snow
|
|
Precipitation
|
All forms of water that falls from clouds and reach ground
|
|
Fog
|
Collection of ice crystals suspended in air near the surface of the earth
|
|
Atmospheric Pressure
|
Pressure exerted by the atmosphere
|
|
Sunrise
|
Daily appearance of the sun over east horizon because of the earth's rotation
|
|
Sunset
|
Daily disappearance of the sun below west horizon
|
|
3 Layers of Atmosphere
|
1) Troposphere
2) Stratosphere 3) Ionosphere |
|
2 Major Launch Facilities
|
1) Kennedy Space Center, Florida
2) Vandenberg Air Force Base, California |
|
Apogee vs. Perigee
|
Apogee - point of orbit farthest from earth
Perigee - point of orbit closest to earth |
|
Types of Orbit
|
Low Earth Orbit (LEO): 150 - 800 miles above earth
High Elliptical Orbit (HEO) Geosynchronous (GEO) |
|
GPS
|
Global Positioning System
- Space based radio positioning systems that provides 24hr 3D positioning, velocity, and time information |
|
Defense Satellite Communications System (DSCS)
|
Provides worldwide, jam resistant, secure voice for C2, crisis management, and Intel data transfer service
|
|
Length of Solar Cycle
|
11 Years
|
|
Van Allen Belts
|
Radiation belts are hazardous to satellites around earth
|
|
DLPT
|
Defense Language Proficiency Test
|
|
Minimum DLPT scores for CTI
|
L2/R2
|
|
Category Four Languages
|
- Chinese
- Arabic - Korean - Japanese |
|
DD Form 1847-1
|
SCI Non-disclosure Agreement
|
|
LOI
|
Letter of Intent - deny/revoke eligibility
- 15 days to respond - CO can extend 45 days |
|
LOD
|
Letter of Denial - unfavorable eligibility made
- 30 days to respond - CO can extend 15 days |
|
PSAB
|
Personnel Security Appeals Board
- Has final authority on appeals for unfavorable determinations |
|
Operational Control (OPCON) of FLTCYBERCOM
|
USCYBERCOM
|
|
Administrative Control (ADCON) of FLTCYBERCOM
|
CNO
|
|
CSG (3 Categories)
|
Cryptologic Service Group
1) Permanent 2) Service Component 3) Expeditionary |
|
NSL
RTL BDA |
- No Strike List
- Restricted Target List - Battle Damage Assessment |
|
MILDEC vs. MISO (PSYOP)
|
- MILDEC uses deliberate deception methods to mislead.
- MISO uses selected truths to influence adversaries. |
|
3 Types of MILDEC
|
1) Physical: inflatables
2) Technical: deceptive communications 3) Administrative: pictures |
|
TACSIT (3 Levels)
|
Tactical Situation
TACSIT 1: Enemy knows exact location of strike group TACSIT 2: Enemy knows general location of strike group TACSIT 3: Enemy does not know location of strike group |
|
EP-3E
EA-6B Prowler E-2 Hawkeye EA-18G Growler |
- Signals Intel Recon Aircraft
- Electronic Warfare (EW) jamming - Early Warning - Electronic Attack (EA) |
|
Ships with temporary SSES
|
- DDG Flight (FLT) I
- LPD |
|
4 Conditions of EMCON
|
A - radio silence
B - hide from satellites C - reduce ability of enemy to target D - essential equipment authorized |
|
Who can impose and/or break EMCON?
|
IWC (Information Warfare Commander)
|
|
JCMA
|
Joint COMSEC Monitoring Agency
|
|
Who is the IO Officer?
|
Mr. Cory Sparks
|
|
Who is the Assistant IO Officer?
|
CTRC Braden
|
|
How often is IO training required?
|
Annually
|
|
Define a US person.
|
- US Citizen
- Alien lawfully admitted for permanent residence - A corporation that is incorporated in the US |
|
Publication that governs collection on US persons.
|
SP0018
|
|
Manual that governs intelligence oversight reporting and training.
|
SECNAVINST 3320.2E
|
|
Publication that governs collection on host nations.
|
SP0009
|
|
Publication that governs Intelligence Oversight.
|
E. O. 12333
|
|
NSRP (3 Types)
|
National SIGINT Requirements Process
1) Research 2) Limited Duration 3) Standing |
|
NSRP (Time Criticality of INs)
|
- Time Critical: 3 days or less
- Time Sensitive: 4 - 29 days - Routine: more than 30 days |
|
RASIN Manual
|
Manual used by USSS for COMINT signal classification
|
|
SURREY
|
NSA database for collection requirements that allows SIGINT analysts and collection management authorities to originate, retrieve, and track collection
|
|
RADAR
|
Radio Detection and Ranging
|
|
Natural Horizon v. Radio Horizon
|
- Natural Horizon is line of sight
- Radio Horizon is approximately 1/3 greater because of space wave being slightly reflected from ground to receiving antenna |
|
Range
|
Length of a straight line from the radar to the target
|
|
Doppler Effect
|
Apparent change in frequency and pitch when a sound source moves closer or farther away
|
|
Echo
|
Energy reflected from the target
|
|
Diffraction
|
Bending of a wave around an object
|
|
Attenuation
|
Loss of intensity through a medium
|
|
Absorption
|
Energy is absorbed by matter
|
|
3 Characteristics of Sound
|
1) Pitch
2) Intensity 3) Clarity |
|
Reporting Criteria Examples for CRITIC
|
- Intel on imminent attack
- Threat to US forces or attack on any US asset - POTUS is kidnapped - Hostile acts/terrorist acts - Political disruption - Crisis (Hurricanes, Tsunami) |
|
Timelines for CRITIC
|
- 10 minutes to send
- 30 minutes for followup - 6 hours for summary - Sent at WW (Flash Override) |
|
Message Precedences
|
RR: Routine; within 6 hours
PP: Priority; 3 hours OO: Immediate; 30 minutes ZZ: Flash; 10 minutes |
|
TACREP vs. KL
|
- TACREP: does not have the COMTECH line like a KL
|
|
IGRAM
|
Use of multimedia to expand information of original SIGINT report
|
|
STRUM
|
Standard Technical Report Using Modules
|
|
Why would you need to MINIMIZE?
|
During emergency situations, minimize to reduce the volume of message traffic.
|
|
NIOC Hawaii PDDG
|
F2
|
|
SIGAD
|
USJ-750; Used because it is a shorter title
|
|
GCCS-M
|
Global Command and Control System Maritime
-Displays COP for blue and red forces |
|
GALELITE
|
Generic Area Limitation Environment
- Provides COP and operational planning in a single picture...near real time |
|
VINTAGE HARVEST
|
World wide web based signals database
|
|
WRANGLER
|
ELINT database
|
|
Date that Navy was established
|
13 October 1775
|
|
Year that National Security Act was signed
|
1947
|
|
Year that Central Security Service was established
|
1972
|