• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/221

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

221 Cards in this Set

  • Front
  • Back
101.1 - Discuss the Concept of ORM
System used by all levels in order to reduce the possibility of risk by identifying potential hazards and taking the appropriate steps to minimize their impact.
101.2 - Explain the following
a. ID Hazards
b. Assessing hazards
c. Making risk decisions
d. implementing controls
e.supervising
a. recognize the hazard
b. decide what its impact will be
c. Decide whether or not the benefits outweigh the risks.
d. If so, put in place controls that will minimize the risk
e. make sure everything is being handled properly
101.3 - State the instruction that governs safety and mishap reporting.
OPNAVINST 5102.1D Navy and Marine Corps Mishap & Safety Investigation, Reporting and Record Keeping Manual.
101.4a - Define hazard severity
Hazard severity is the amount of damage that a hazard could potentially have.
101.4b - Discuss the 4 categories of hazard severity.
I. Death or permanent debilitating disability or grave damage
II. severe injury, damage or inefficiencies
III. minor injury, damage or inefficiencies
IV. minimal threat to personnel or equipment
101.5a - Define Mishap probability
Gives the probability in given situations of a mishap occurring in the workplace.
101.5b - Four subcategories of Mishap Probability
A - Likely to occur immediately
B - probably will occur in time
C - may occur in time
D - unlikely to occur
101.6 - Define RAC and list the 5 RAC's
Risk Assessment Code
1 - Critical
2 - Serious
3 - Moderate
4 - Minor
5 - Negligible
101.7 Discuss the timeliness and means for filing mishap investigation reports.
Notify their CoC and COMNAVSAFECEN by telephone for Class A within 8 hours. Can also use electronic means if mishap is not as severe.
101.8 - Name the 4 required mishap reportable items
1 - Class A, B and C government property damage mishaps.
2 - Class A, B, and C on-duty DoD civilian mishaps and military
on/off-duty mishaps.
3 - Any other work-related illness or injury that involves medical treatment beyond first aid.
4 - Other incidents of interest to the Navy and Marine Corps
101.9 - State the purpose of a HAZREP message
on significant hazardous conditions or near-mishaps that have the
potential to affect other commands but do not warrant submission
of a Safety Investigation Report (SIREP).
101.10 - State the three objectives of First Aid
Save life, prevent further injury, and prevent infection.
101.11 - State the three methods of controlling bleeding.
Direct Pressure
Pressure Points
Tourniquet
101.12 - Identify the 11 pressure points
Facial artery.....jaw
Superficial temporal artery.....temple
Subclavian artery.....collar bone
Common carotid artery.......neck
Brachial artery......inner upper arm
Brachial artery......inner elbow
Radial/Ulnar artery.....wrist
Femoral artery.....upper thigh
Iliac artery.....groin
Popliteal artery.....knee
Anterior/posterior tibial artery.....ankle
101.13 - Describe the symptoms and treatment for shock
A rapid, weak, thready pulse due to decreased blood flow combined with tachycardia
Cool, clammy skin due to vasoconstriction and stimulation of vasoconstriction
Rapid and shallow respiration due to sympathetic nervous system stimulation and acidosis
Hypothermia due to decreased perfusion and evaporation of sweat
Thirst and dry mouth, due to fluid depletion
Fatigue due to inadequate oxygenation
Cold and mottled skin (cutis marmorata), especially extremities, due to insufficient perfusion of the skin
Distracted look in the eyes or staring into space, often with pupils dilated
Treating shock: call an ambulance, keep victim warm and stop bleeding as fast as you can. If needed perform rescue breathing.
101.14 - State the difference between an open and closed fracture
An open fracture involves a break that punctures through the skin.
A closed fracture is a break that happens within the skin.
101.15 - Describe the procedures necessary for the following as applied to electrical shock:
a. personnel rescue
b. treatment
First thing to do is make sure the victim is clear of electrical source by using an inanimate object to break the connection. then use basic first aid to assist the victim. Never use moist gauze pads, they should always be dry and don't try to remove clothing from burned areas.
101.16 - Describe the methods for clearing an obstructed airway.
Your first action upon encountering a victim with this problem is to clear the mouth of any food particles, foreign objects, or loose dentures. If this fails to clear the object, use the standing or reclining abdominal thrust.
101.17 - Describe the effects and treatment of the following temperature related injuries:
a. hypothermia
a. extended exposure to cold or rapidly cooling temperatures. Whole body cools down. The victim may appear pale and unconscious, and may even be taken for dead. Breathing is slow and shallow, pulse faint or even undetectable. The body tissues feel semi-rigid, and the arms and legs may feel stiff.
b. frostbite
b. Treatment is to get the victim indoors, rewarm the area by placing them in warm water or with hot water bottles. Other methods include placing them under the armpits, against the abdomen, or between the legs of a buddy.
c. heat stress
c. this is an encompassing issue that involves heat exhaustion and heat stroke.
d. heat exhaustion
d. Heat exhaustion is the body's response to an excessive loss of the water and salt, usually through excessive sweating. Workers most prone to heat exhaustion are those that are elderly, have high blood pressure, and those working in a hot environment.
Heavy sweating
Extreme weakness or fatigue
Dizziness, confusion
Nausea
Clammy, moist skin
Pale or flushed complexion
Muscle cramps
Slightly elevated body temperature
Fast and shallow breathing
e. heat stroke
e. Heat stroke is the most serious heat-related disorder. It occurs when the body becomes unable to control its temperature: the body's temperature rises rapidly, the sweating mechanism fails, and the body is unable to cool down. When heat stroke occurs, the body temperature can rise to 106 degrees Fahrenheit or higher within 10 to 15 minutes. Heat stroke can cause death or permanent disability if emergency treatment is not given.
Hot, dry skin or profuse sweating
Hallucinations
Chills
Throbbing headache
High body temperature
Confusion/dizziness
Slurred speech
101.18 - Define the following:
a. HERO
b. HERP
c. HERF
a. Hazards of electromagnetic radiation to ordnance.
b. Hazards of electromagnetic radiation to personnel
c. Hazards of electromagnetic radiation to fuel
101.19 - Define HAZMAT
Hazardous material: are solids, liquids, or gases that can harm people, other living organisms, property, or the environment.
101.20 - Discuss how to store HAZMAT
In order to properly store HAZMAT, you should refer to the MSDS and follow the manufacturing companies recommendations.
101.21 - Describe the potential risks of improperly labeled and stored HAZMAT.
Item could be toxic to breath and if it is labeled as something that is non-toxic to breath the person who opens the container could potentially die from the toxicity.
101.22 - Describe what an MSDS is and the information it provides.
Material Safety Data Sheet- provides information about certain HAZMAT such as:
identity; Hazardous ingredients;
Physical and chemical characteristics; Physical hazards;
Reactivity; Health hazards;
Precautions for safe handling and use; Control measures; Routes of entry into the body; Emergency and first-aid procedures for exposure; Date of preparation of theMSDS or last change; Name, address, and phone number of a responsible party who can provide additional information on the hazardous material and
appropriate emergency procedure
101.23 - Describe the general characteristics if the following PPE.
a. respirators
b. hand protection
c. foot protection
d. eye protection
e. face protection
f. skin/body protection
g. hearing protection
a. used to filter breathing when conditions do not provide for clean air.
b. used for handling hazardous materials or for hand protection while handling rope or line.
c. used during loading and unloading cargo, or lifting and carrying heavy loads so that your feet are protected.
d. used so that your eyes are protected from chemical splashes or debris from worksites impacting your eyes.
e. used for protecting your face while welding for example or against chemical splashes.
f. Suits used to protect skin from heat, cold, or chemical reactions
g. used to protect your hearing while working in machine rooms or on a flight deck.
101.24 - State the goal of the USNs Hearing Conservation Program.
Prevent occupational hearing loss and ensure auditory fitness for duty in the military and civilian workforce.
Prevent noise exposure that has been recognized as an occupational hazard related to certain trades or operations.
Preventing hearing loss has been and continues to be a source of concern within the Navy.
Periodic hearing testing shall be conducted to monitor the effectiveness of the Hearing Conservation Program.
Education is vital to the overall success of a Hearing Conservation Program.
102.1 - State and discuss the six areas that comprise the naval doctrine
COMMAND AND CONTROL
OPERATIONS
WARFARE
LOGISTICS
INTELLIGENCE
PLANNING

(COWLIP)
102.2 - State the seven principles of Naval Logistics
Responsiveness - Providing the right support at the right time,
at the right place.
Simplicity. Avoiding unnecessary complexity in preparing,
planning and conducting logistic operations.
Flexibility. Adapting logistic support to changing conditions.
Economy. Employing logistic support assets effectively.
Attainability. Acquiring the minimum essential logistic support
to begin combat operations.
Sustainability. Providing logistic support for the duration of
the operation.
Survivability. Ensuring that the logistic infrastructure prevails
in spite of degradation and damage.
102.3 - State the first navy ship named after an enlisted man, and why?
USS Osmond Ingram (DD 255)It was launched 28 Feb 1919. Ingram was the first enlisted man killed in action in World War I, lost when the destroyer Cassin (DD 43) was torpedoed in October 1917.
102.4 - Discuss the conditions that led to the formation of the USN
The United States Navy traces its origins to the Continental Navy, which the Continental Navy established on 13 October 1775 by authorizing the procurement, fitting out, manning, and dispatch of two armed vessels to cruise in search of munitions ships supplying the British Army in America. The legislation also established a Naval Committee to supervise the work. All together, the Continental Navy numbered some fifty ships over the course of the war, with approximately twenty warships active at its maximum strength. After the American War of Independence, Congress sold the surviving ships of the Continental Navy released the seamen and officers. The
Constitution of the United States, ratified in 1789, empowered Congress “to provide and maintain a navy.” Acting on this authority, Congress ordered the construction and manning of six frigates in 1794, and the War Department administered naval affairs from that year until Congress established the Department of the Navy on 30 April 1798.
102.5 - What three classes of naval vessels existed at the inception of the USN?
Ships of the Line
Sloops of War
Frigates
102.6 - Discuss the following military customs and courtesies.
a. hand salute
b. Saluting the Ensign
c. Dipping the Ensign
d. Gun Salute
a. The hand salute is centuries old, and probably originated when men in armor raised their helmet visors so they could be identified.
b. Each person in the naval service, upon coming on board a ship of the Navy, shall salute the national ensign. He shall stop on reaching the upper platforms of the accommodation ladder, or the shipboard end of the brow, face the national ensign, and render the salute, after which he shall salute the officer of the deck. On leaving the ship, he shall render the salutes in inverse order. The officer of the deck shall return both salutes in each case.
c. Merchant ships "salute" Navy ships by dipping their ensigns. When a merchant ship of any nation formally recognized by the U.S. salutes a ship of the U.S. Navy, it lowers its national colors to half-mast. The Navy ship, at its closest point of approach, lowers the ensign to half-mast for a few seconds, then closes it up, after which the merchant ship raises its own flag. If the salute is made when the ensign is not displayed, the Navy ship will hoist her colors, dip for the salute, close them up again, and then haul them down after a suitable interval. Naval vessels dip the ensign only to answer a salute; they never salute first.
d. In olden days it took as much as 20 minutes to load and fire a gun, so that a ship that fired her guns in salute did so as a friendly gesture, making herself powerless for the duration of the salute. The gun salutes prescribed by Navy Regs are fired only by ships and stations designated by the Secretary of the Navy. A national salute of 21 guns is fired on Washington's Birthday, Memorial Day, and Independence Day, and to honor the President of the United States and heads of foreign states. Salutes for naval officers are: Admiral: 17 guns Vice Admiral: 15 guns Rear Admiral: 13 guns Commodore: 11 guns
Salutes are fired at intervals of 5 seconds, and always in odd numbers.
102.7 - Discuss the importance of the following events as they relate to Naval history.
a. Battle of Coral Sea.
b. Voyage of the Great White Fleet
c. Battle of Normandy
d. Midway
e. Guadalcanal
f. Battle of Leyte Gulf
a. 7-8May 1942 - On May 7, the Japanese planes sank two minor ships, while U.S. planes sank an isolated enemy carrier. The next day, both sides launched all their planes against the other. The aircraft passed each other unseen in the clouds, in the world's first carrier verses carrier battle. One Japanese carrier was damaged. The U.S. carrier Lexington was sunk, and the carrier Yorktown was damaged.
b. On December 16, 1907, the Great White Fleet left Hampton Roads, Virginia, for a round-the-world cruise to show the flag. The exercise demonstrated the strength of the U.S. Navy.
c. June 6, 1944 invasion of Normandy-the largest amphibious operation in history
d. 3-5 June 1942: turning point in the war in the Pacific. We broke their code and were able to gain strategic advantages because of this. As the Japanese carriers launched their planes to assault the Midway defenses, the U.S. planes headed for the enemy carriers. It took attack after attack, but finally the U.S. crews got through and sank 3 Japanese carriers. The next day the fourth carrier was sunk. Japanese planes sank the Yorktown. In one day Japan lost its bid for control of the Pacific.
e. 13-15 November 1942:Navy policy was to place members of the same family on different ships, but the five Sullivan brothers,
from Waterloo, Iowa, insisted on staying together. An exception was made and they all became crewmen onboard the Juneau. The Juneau was damaged during the battle in a close-range night encounter. As it limped off for repairs, it was torpedoed. The Sullivans along with 700 others were lost. Because of this tragedy, Navy policy concerning family member separations was reinstated. A ship
was later named in their honor. With the fall of the island, the southern Solomons came under Allied control and Australia was in less danger of attack.
f. October 23, 1944: In a last-chance effort to salvage the Phillippines, the Japanese sent a naval force to Leyte Gulf to attack the U.S. Fleet. Their plan backfired and the operation was a complete failure-the deciding catastrophe for their navy. The loss of the Phillippines severed their empire, and the homeland was cut off from its main source of supply from the south. With the losses at Okinawa and Iwo Jima, the war in the Pacific was approaching its final days.
102.8- Discuss the following events, their impact on history, and the Sailors that were involved.
a. 5MAY1961 - Alan Sheapard
b. 23MAR1965 - John Young participated in the first two man space launch
c. 16-24JUL1969 - Neil Armstrong and the US were the first to complete a lunar landing.
d. 7-19DEC1972 - Eugene Cernan and Ronald Evans participated in the 7th and final lunar landing
e. 1APR1981 - John Young and Robert Crippen participated in the first shuttle flight the Columbia.
102.9 - Describe the historical significance of the following events as they relate to Information Dominance.
a. The on the roof gang
b. the purple code
c. Battle of Midway
d. Attack on USS Liberty
e. Capture of the Pueblo
f. D-Day landing
g. Landing at Inchon
h. Hainan Island EP3 incident
i. Bletchly Park
j. Navajo Code talkers
k. Attack on USS Stark
l. EC-121 Shoot down
a. in July, the CNO announced the establishment of a school to instruct radio operators in intercept operations, particularly for Japanese kana. The first class would begin on October 1, 1928, and instructors were to be two of the self-taught radiomen from the Asiatic fleet.
b. The code that Japan used in WWII. We were able to break the code in order to help us win at coral sea and midway.
c. We broke the Japan code and then sent a false message in order to prompt an attack. We were able to gain strategic positions and then defeat the Japanese.
d. 8JUN67 - two Israeli Fighters orbited the Liberty just before they attacked the ship, soon after there were two helicopters that circled the ship, the next day the ship was torpedoed.
e. on 20 and 22 JAN the pueblo saw two N Korean vessels and then on the 23rd a sub chaser with torpedo boats came to and after a chase captured the pueblo. We were late in destroying classified materials and equipment.
f. 6JUN1944 - US, Canada and Britain stormed the beaches at Normandy, the operation was called Neptune and the beaches that the US were responsible for were Utah and Omaha.
g. 15SEP1950 - GEN MacArthur had planned and executed a landing at Inchon, a very difficult assault and was aided by very accurate intelligence gathering. The planners knew that accurate intelligence was critical to the success of an operation as complex as an amphibious assault. Consequently, in late August, the FECOM acted to gather more information about the waterways leading to Inchon. On 19 August, the Canadian destroyer HMCS Athabaskan (DDE 219) escorted a ROK navy vessel to Yonghung Do, an island only 14 miles from Inchon.
h. APR2001 a PRC fighter pilot collided with an EP-3E and was killed, he was conducting aggressive maneuvers in order to intimidate the aircraft. The EP-3E was supposed to crash-land in the ocean, however it overshot the landing and landed behind China's borders.
i. JUL1939 the knowledge if the Enigma machine was given to the Brits by the Poles. They were able to break the machine codes daily changing keys by exploiting the machines electrical components by the Bombe invented by Michael Turing.
j.Guadalcanal, Tarawa, Peleliu, Iwo Jima: the Navajo code talkers took part in every assault the U.S. Marines conducted in the Pacific from 1942 to 1945. They served in all six Marine divisions, Marine Raider battalions and Marine parachute units, transmitting messages by telephone and radio in their native language a code that the Japanese never broke.The idea to use Navajo for secure communications came from Philip Johnston, the son of a missionary to the Navajos and one of the few non-Navajos who spoke their language fluently.
k. The ship was struck on May 17, 1987, by two Exocet antiship missiles fired from an Iraqi Mirage F1. The first penetrated the port-side hull and failed to detonate, but left flaming rocket fuel in its path. The second entered at almost the same point, and left a 3-by-4-meter gash, exploding in crew quarters. 37 sailors were killed and 21 were injured
l. 1969 - departed with a double crew for a mission that would land them at Osan. At about 1330, as the mission was nearing the topmost portion of its last orbit, two
North Korean MIG-21s scrambled from the training school at Hoemun.
102.10 - State the qualities that characterize the Navy/Marine Corps team as instruments to support national policies
Readiness
Flexibility
Self-sustainability
Mobility
102.11 - State the three levels of war.
tactical, operational, and strategic
102.12 - Discuss the National Security Act of 1947.
The majority of the provisions of the Act took effect on September 18, 1947, the day after the Senate confirmed James Forrestal as the first Secretary of Defense. The Act merged the Department of War and the Department of the Navy into the National Military Establishment, headed by the Secretary of Defense. It was also responsible for the creation of a Department of the Air Force separate from the existing Army Air Forces. Aside from the military reorganization, the act established the National Security Council, a central place of coordination for national security policy in the executive branch, and the Central Intelligence Agency, the U.S.'s first peacetime intelligence agency. The function of the council was to advise the president on domestic, foreign, and military policies so that they may cooperate more tightly and efficiently. Departments in the government were encouraged to voice their opinions to the council in order to make a more sound decision.
102.13 - State when and why the current Navy Core Values were developed.
Adopted by CNO Admiral Kelso in 1992... a product of the Core Values Initiative (CVI) established by the Chief of Naval Education and Training (CNET).
102.14 - Discuss when and why the Sailor's Creed was developed.
The"Sailors Creed" was written by a "Blue Ribbon Recruit Training Panel" in 1993 at the direction of Chief of Naval Operations Admiral Frank Kelso.
* All personnel of Naval Service are SAILORS FIRST and in addition, they are officers, chiefs, petty officers - aviators, Seabees, surface warriors and submariners.
102.15 - State RADM Grace Hopper's contributions to the USN.
RADM Hopper joined the USN in 1943, retired in 1966, recalled and then retired again in 1986. She died in 1992.

She was many things, to include a computer programmer, pioneer; created COBAL, coined the term computer bug... has "Amazing Grace" DDG-70 USS HOPPER named after her.
102.16 - State the name of the first computer and where it was located.
Electronic Numerical Integrator and Computer (ENIAC) the world's first operational, general purpose, electronic digital computer, developed at the Moore School of Electrical Engineering, University of Pennsylvania.
102.17 - Discuss ARPANET and when it was developed.
Advanced Research Projects Agency Network (ARPANET) of the U.S. DoD.

Dr. J.C.R. Licklider was chosen to head this effort...precursor to modern internet.

ARPANET connected UCLA to the Stanford Research Institute, UC Santa Barbara, and the University of Utah; there were three things that users could do: log into a remote computer, print to a remote printer, and transfer files between computers.
102.18 - Explain the impact of the John Walker espionage case.
A retired warrant officer, John walker spied for the Russians from 1968-1985; allowed the Soviet Union to make SIGNIFICANT gains in naval warfare.

His arrest was a catalyst for a huge investigation within the Intel Community that uncovered other spies as well.

A later result was the creation of the Director of Counterintelligence (CI) on the National Security Council (NSC).
102.19 - State the oldest intelligence organization in the USN.
The Office of Naval Intelligence (ONI) was established in the United States Navy in 1882.

ONI was established to "seek out and report" on the advancements in other nations' navies. Its headquarters are at the National Maritime Intelligence Center in Suitland, Maryland.

ONI is the oldest member of the United States Intelligence Community.
102.20 - Explain when the ONI was established and by whom it was founded.
The Office of Naval Intelligence (ONI) was established in the United States Navy in 1882.

ONI was founded by the Secretary of the Navy, William H. Hunt with General Order 292, dated March 23, 1882.
102.21 - State the first CIO/DNI
Theodorus Bailey Myers Mason ...

was the founder and first head of the USA Office of Naval Intelligence, with the post of Chief Intelligence Officer (prior to it being re-designated as Director of Naval Intelligence in 1911).
102.22 - Name the two departments that were merged to form the ONI.
The Department Library was combined with the "Office of Intelligence" .
103.1 - State the mission of the USN
The mission of the Navy is to maintain, train and equip combat-ready Naval forces capable of winning wars, deterring aggression and maintaining freedom of the seas.
103.2 - Discuss the NCA, its members and functions.
National Command Authority- The National Security Council (NSC) is the President's principal forum for considering national security and foreign policy matters with his senior national security advisors and cabinet officials.The NSC is chaired by the President. Its regular attendees (both statutory and non-statutory) are the Vice President, the Secretary of State, the Secretary of the Treasury, the Secretary of Defense, and the Assistant to the President for National Security Affairs.
103.3 - Discuss the difference between OPCON and ADCON.
OPCON is Operational Control and its primary purpose is to plan and carry out military operations within the US Military.
ADCON is Administrative control and its primary purpose is to assure that the operations side has the manpower and supplies to carry out their operations.
103.4 - Describe the function of the following:
a. COCOM
b. Navy COCOM
c. FLTCOM
d. TYCOM
a. Combatant Command
b. Navy Combatant Command
c. Fleet Combatant Command
d. Type Command
103.5 - State the location, mission and component commands for the following:
a. PACOM
b. EUCOM
c. JFCOM
d. SOUTHCOM
e. CENTCOM
f. NORTHCOM
g. SOCOM
h. TRANSCOM
i. STRATCOM
j. AFRICOM
k. USCYBERCOM
a. Pacific Command
- Located in Pearl Harbor, HI. U.S. Pacific Command (USPACOM), together with other U.S. Government agencies, protects and defends the United States, its territories, Allies, and interests; alongside Allies and partners, promotes regional security and deters aggression; and, if deterrence fails, is prepared to respond to the full spectrum of military contingencies to restore Asia-Pacific stability and security.
b. European Command
- Located in Stutgart, Germany. The mission of the U.S. European Command is to conduct military operations, international military engagement, and interagency partnering to enhance transatlantic security and defend the United States forward. We do this by establishing an agile military organization with a "whole of government" approach seeking to support enduring stability and peace in Europe and Eurasia.
U.S. Army Europe
U.S. Naval Forces Europe
U.S. Marine Corps Forces Europe
The United States Air Forces Europe
Special Operations Command Europe
c. Joint Forces Command
- disestablished, rolled into USCYBERFOR
d. Southern Command
- Located in Miami, FL. We are ready to conduct joint and combined full-spectrum military operations and support whole-of-government efforts to enhance regional security and cooperation.
e. Central Command
- Located in Tampa, FL. With national and international partners, U.S. Central Command promotes cooperation among nations, responds to crises, and deters or defeats state and nonstate aggression, and supports development and, when necessary, reconstruction in order to establish the conditions for regional security, stability, and prosperity.
f. Northern Command
- Located in Colorado Springs, CO. Conducts homeland defense, civil support and security cooperation to defend and secure the United States and its interests.
Joint Force Headquarters National Capital Region Joint Task Force Alaska; Joint Task Force Civil Support; Joint Task Force North; Army North; Air Force North ;U.S. Fleet Forces Command
g. Special Operations Command
- Located in Tampa, FL.Provide fully capable Special Operations Forces to defend the United States and its interests. Synchronize planning of global operations against terrorist networks.
h. Transportation Command
- Located at Scott AFB, IL. Develop and direct the Joint Deployment and Distribution Enterprise to globally project strategic national security capabilities; accurately sense the operating environment; provide end-to-end distribution process visibility; and responsive support of joint, U.S. government and Secretary of Defense-approved multinational and non-governmental logistical requirements.
i. Strategic Command
- Located in Omaha, Nebraska. Detect, deter, and prevent attacks against the United States and our allies - join with the other combatant commands to defend the nation should deterrence fail.
j. Africa Command
- Located in Stuttgart Germany. Africa Command protects and defends the national security interests of the United States by strengthening the defense capabilities of African states and regional organizations and, when directed, conducts military operations, in order to deter and defeat transnational threats and to provide a security environment conducive to good governance and development.
k. US Cyber Command
- Located at Ft. Meade Maryland.
USCYBERCOM plans, coordinates, integrates, synchronizes, and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full-spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.
103.6 - State the location, mission and component commands for the following:
a. CNO N2/N6
b. CNMOC
c. NNWC
d. Commander, Reserve Space and Network Warfare Program
e. Commander, USSTRATCOM
f. Joint Space Operations Center
g. NOAA
h. Naval Space Operations Center
i. NAVCYBERFOR
j. ONI
k. Office of the Oceanographer/Navigator of the Navy
a. Located in the Pentagon, advocacy/ articulating space ISR.
b. John Stennis Space Center, St. Louis, MO. METOC Command and Management
c. Virginia Beach. Direct the operations and security of the navy positions in the Global Information Grid (GIG).
d. Virginia, supports the Navy Space team.
e. Omaha, Nebraska, deter attacks on US vital interests.
f. Vandenburg, California.
g. D.C. understand and predict changes on US vital interests.
h. Dahlgren, Virginia.provide space-related operational intelligence to de-ployed Navy and Marine Corps forces through a number of tactical communi-cations channels.
i. To organize and prioritize, training, modernization, and maintenance, requirements, and capabilities of command and control architecture/networks, cryptologic and space-related systems and intelligence and information operations activities, and to coordinate with Type Commanders, to deliver interoperable, relevant and ready forces at the right time at the best cost, today and in the future.
j. Office of Naval Intelligence- ONI is a core element of the Navy’s Information Dominance Corps whose goal is to gain and hold a decisive information advantage over America’s potential adversaries.
ONI produces meaningful maritime intelligence and moves that intelligence rapidly to key strategic, operational, and tactical decision makers. Our integrated workforce of active duty and Reserve naval and civilian professionals supports combat operations and provides vital information for planning America’s defense against maritime threats at home and around the world. We produce maritime intelligence on weapons and technology proliferation and smuggling and illicit maritime activities that directly supports the U.S. Navy, joint warfighters and national decision makers and agencies.
k. “PROVIDE THE WARFIGHTERS WITH THE RIGHT METEOROLOGICAL AND
OCEANOGRAPHIC INFORMATION,
DELIVERED AT THE RIGHT TIME,
IN THE RIGHT FORMAT TO GIVE THEM THE DECISIVE EDGE IN COMBAT.”
103.7 - Define the operating areas of the following numbered fleets:
a. 2nd FLT
b. 3rd FLT
c. 4th FLT
d. 5th FLT
e. 6th FLT
f. 7th FLT
g. 10th FLT
a. Home base is Norfolk, VA
b. Home base is San Diego, CA
c. Home base is Mayport, FL
d. Home base is Bahrain, Manama
e. Home base is Gaeta, Italy
f. Home base is Yakuska, Japan
g. Home base is Ft. Meade
103.8 - Define the following:
a. TF
b. TG
c. TU
d. TE
The first digit was originally the number of the fleet, while the second historically differentiated between task forces from the same fleet. It was typically abbreviated, so references like TF 11 are commonly seen. In addition, a task force could be broken into several task groups,[2] identified by decimal points, as in TG 11.2, and finally task units, as in TU 11.2.1. Individual ships are task elements, for example TE 11.2.1.2 would be the second ship in TU 11.2.1
103.9 - Describe the following IDC ratings:
a. AG
b. CTI
c. CTM
d. CTN
e. CTR
f. CTT
g. IS
h. IT
a. navy weatherman
b. navy linguist
c. maintenance personnel that help with installation hardware.
d. network analyst
e. collection specialist
f. technician
g. intelligence specialist
h. information technologist
103.10 - State the location, mission and component commands of the following Naval and Computer Telecommunication Area Master Stations (NCTAMS)
a. NCTAMS LANT
b. NCTAMS PAC
a. based in Norfolk, VA
b. based in Kunea, HI
deal with video, voice and data communications.
103.11 - Define C4ISR
Command, Control, Computers and Communications Intelligence, Surveillance and Reconnaissance.
103.12 - Explain the Mission of DISA
Defense Information Systems Agency - DISA, a Combat Support Agency, engineers and provides command and control capabilities and enterprise infrastructure to continuously operate and assure a global net-centric enterprise in direct support to joint warfighters, National level leaders, and other mission and coalition partners across the full spectrum of operations.
103.13 - Explain the Mission of NASIC
National Air & Space Intelligence Center - The National Air and Space Intelligence Center, with headquarters at Wright-Patterson Air Force Base, Ohio, is the primary Defense Department producer of foreign aerospace intelligence. NASIC develops its products by analyzing all available data on foreign aerospace forces and weapons systems to determine performance characteristics, capabilities, vulnerabilities and intentions. The center's assessments are also an important factor in shaping national security and defense policies. As the DoD expert on foreign aerospace system capabilities, the center historically has also been involved in supporting American weapons treaty negotiations and verification.
103.14 - State the Mission of NCDOC
Navy Cyber Defense Operations Command - Monitor and defend our networks against outside attacks. Work to make our systems more secure.
103.15 - Identify and discuss the following organizations and their roles in the Intelligence community.
a. ODNI
b. DIA
c. NSA
d. CIA
e. NGA
f. DHS
g. FBI
h. DEA
i. DOE
j. DOS
k. DOT
l. NASA
m. NRO
n. USAF
o. USA
p. USMC
q. USN
r. USCG
a. Office of Director of Naval Intelligence
b.Defense Intelligence Agency
c. National Security Agency
d. Central Intelligence Agency
e. National Geospatial intelligence agency
f. Department of Homeland Security
g. Federal Bureau of Investigation
h. Drug Enforcement Agency
i. Department of Energy
j. Department of State
k. Department of Transportation
l. National Aeronautical Space Administration
m. National Reconnaissance Office
n. Air Force
o. Army
p. Marines
q. Navy
r. Coast Guard
104.1 - Discuss the responsibilities of the following:
a. Commander in Chief
b. SECDEF
c. SECNAV
d. CNO
e. FLT commander in charge
f. TYCOM
a. President of the US, is the leader of our country and with advisers he makes decisions that impact us in every way.
b. In charge of all branches of the military, assures that all work together to support and defend the US
c. In charge of the Navy mostly dealing with policy and administrative purposes.
d. In charge of the everyday operations of the USN.
e. Their role is to be in charge of a specific fleet (i.e. 2nd, 10th)
f. In charge of a specific type command within a fleet or force.
104.2 - Discuss the role of the following.
a. MCPON
b. FLT Master Chief
c. Force Master Chief
d. CMDMC
a. The senior enlisted person in the USN.
b. Senior enlisted person in charge within a certain flt.
c. Senior enlisted person in charge within a force.
d. liaison between the enlisted personnel and the CO.
104.3 - Define CCRI
Command Cyber Readiness Inspectors - they are responsible for inspecting commands and their networks to assure they are up to date with all required standards.
104.4 - State NAVCYBERFOR's role in a CCRI
they assure that the CCRI teams are trained and that subsequent commands are being inspected.
104.5 - State the purpose and contents of the following
a. EDVR
b. ODCR
c. AMD
a. Enlisted distribution verification report - Current prospective losses Future prospective losses Expired EAOSs Current EAOSs Future EAOSs EAOSs (with extensions) less than PRDs Expired and blank PRDs Current PRDs Future PRDs HYTs
b. Officer distribution control report - is a report of all officer and enlisted personnel who are absent on sailing, embarked, or assigned to the activity for TAD to augment normal manning.
c. Activity manpower document - Single authorative source of manpower requirements and authorizations for a naval activity
104.6 - State the purpose of the following
a. Evaluation Report
b. Fitness Report
c. Concurrent Report
a. Enlisted personnel evaluation form, to show progress or deficiencies in Sailor
b. Officer personnel evaluation report, shows progress or deficiencies.
c. Report that provides additional information if person is TAD for an extended period of time during eval or fitrep cycle.
104.7 - State what is found in the following portions of a service record
a. page 2
b. page 4
c. SGLI
d. page 13
a. dependent information
b. education, awards, quals
c. life insurance details, beneficiaries.
d. administrative marks and miscellaneous entries.
104.8 - Describe the purpose and categories of a SITREP
The purpose of a SITREP is to get pertinent information out to the proper authorities in a timely manor.
OPREP-3 Pinnacle
OPREP-3 Navy Blue
Unit SITREP
104.9 - Discuss the importance of the IG
The Inspector General is an important entity because they will inspect and hold commands accountable for their actions and progress.
104.10 - State the purpose of the Navy Correspondence Manual.
The main purpose of the manual is to teach personnel how to compose any sort of correspondence so that it will be the most appropriate for the reader.
104.11 - Explain the Purpose of the PTS program
Perform to Serve- tool that evaluates navy personnel and will decide whether or not they are going to be worth keeping in their Navy
104.12 - List the officer accession programs that are available to enlisted personnel
Officer Candidate School
STA-21
LDO
CWO
MECP
E5 to CWO
104.13 - Explain what the DLPT is.
Defense Language Proficiency Test
104.14 - State the duties and responsibilities of the Command ESO
Education Services Officer - provide assistance and guidance and act as a liaison for personnel interested in certs and education
104.15 - Explain the purpose of the USN drug screening program
To properly screen a certain percentage of personnel each month in order to effectively keep drugs out of the Navy.
104.16 - Describe the six programs of Brilliant on the Basics.
Mentorship
Recognition Programs
Sponsorship
Indoctrination
Career Development Boards
Ombudsmen
104.17 - Explain the purpose of the PAO
Public Affairs Officer - they relay information to the media about issues or events that pertain to navy personnel or commands.
105.1 - Discuss the 3-M/PMS System
Material Maintenance Management Program and Preventative Maintenance Program - the purpose of these programs are to maintain equipment by doing preventative maintenance on them so that they can prevent breakdown.
105.2 - Explain how DPAS is used to track equipment
Defense Property Accountability System - Is the Navy's way to keep track of property owned by the Navy from its inception all the way through its destruction.
105.3 - Discuss the purpose of the MOV program
Material Obligation Validation - The MOV program first compares supply source obligations with requisitioner’s due-in to produce an accurate MOV listing. The supply source then transmits an MOV Request to a requisitioner/control office to validate that its outstanding requisitions are still required. The purpose is twofold: (1) validation of need and (2) reconciliation of supply source obligation records with the due-in records of requisitioning activities.
105.4 - Discuss the DLRs program
Depot Level Repairable - Cheaper to have someone come fix the part rather than someone replace the part. So personnel have to be called in to fix the malfunctioning part.
105.5 - Explain the procedures for NRFI DLRs in regard to the following situations:
a. Turn-in
b. RIP
Not Ready for Issue Depot Level Repairable
a. This means simply that you must show up with the part you wish to replace before they will issue you the new one.
b. The part they have to fix cannot be removed without inhibiting the equipment. Critical piece of the machinery.
105.6 - Define the purpose of the following
a. MAMs
b. Bulkhead mounted spares
Maintenance Assistance Modules (MAMs) Replaceable assemblies (modules) needed to perform an approved maintenance plan which calls for indentifying the fault of failed module through progressive and/or selective module substitution. MAMs are found in the COSAL Edit summary Minor Changes Bulkhead Mounted Spares The spare assembly is mounted right alongside the service equipment for easy use. In addition, a storeroom for a ship may not be readily accessable when needed.
105.7 - define the CASREP and explain the four categories
Casualty Report - used in the event of an equipment malfunction or deficiency. Four categories: I. Used only @ training commands II. Deficiency exists - minor degradation III. Deficiency exists - major degradation IV. Deficiency exists - loss to at least one primary mission.
105.8 - Define the following acronyms
a. NSN
b. COG
c. APL
d. AEL
e. NC
f. NIS
g. SIM
a. National Stock Number, a 13 digit number assigned by Defense Logistics Agency to identify an item in the supply distribution system
b. Cognizance is a two character symbol that designates the stores account in which a type of material is carried and the responsible inventory control point.
c. Allowance Part List, a technical document prepared for individual equipment/components which are on board. It lists all the repair parts installed on the equip/components to which it applies (9digits)
d. Allowance Equipment List - a technical document prepared for various categories of 3-M equipage. Contains the onboard allowance of equipage and supplies to support the ships mission
e. Not Carried, no storeroom allowance for material
f. Not in Stock, usually stocked in storeroom.
g. Selected Item Maintenance - inventory control system by which maximum attention is given to those items experiencing a high rate of usage.
105.9 - State the purpose of the following forms
a. DD form 1348-6
b. NAVCOMPT 2276
c. NAVSUP 1250-2
d. DD form 448
e. SF 44
f. DD form 1155
g. SF 1449
h. SF 30
i. DD form 200
j. SF 364
k. SF386
a. MILSTRIP requisitioning form
b. Request for Contractual Procurement
c. MILSTRIP Requisitioning form
d. Military Interdepartmental Purchase Request (MIPR)
e. Purchase Order/Invoice/Voucher
f. Order for supplies or services
g. Solicitation/contract/order for commercial items
h. Amendment for solicitation/modification of contract
i. Financial liability investigation of property loss (FLIPL)
j. Report of Discrepancy (ROD)
k. Product Quality Deficiency Report (PQRD)
105.10 - Discuss the following
a. CHRIMP
b. DRMS
c. ServMart
a. Consolidated Hazardous Material Reutilization and Inventory Management Program is a successful method to achieve life-cycle control and management of Hazardous Material(HM) and Hazardous Waste(HW)
b. Defense Reutilization and Marketing Service is the Department of Defense agency dedicated to the disposition of excess and surplus military equipment and supplies.
c. A warehouse designed store which carries NSN items to be bought with a government purchase card.
105.11 - Discuss the uses of the Government commercial purchase card (IMPAC) (VISA)
This card is used by the supply department to make purchases at Servmarts for shipboard needs. $10,000 limit.
105.12 - Explain OPTAR and its components
Operating Target is the estimate of how much money it will cost to complete a certain mission
105.13 - State the difference between the following
a. Normal Power
b. Emergency Power
c. Uninterrupted Power
a. Normal Power is what everything runs on when all conditions are normal and no back up power is needed.
b. Requirement for emergency power backup is based on criticality of EOC and the need for the EOC to remain operational after a power failure or event that affects the EOC.
c. Critical equipment and systems that cannot risk loss of data or performance should be placed on uninterruptible power supply to assure continued performance during a power outage or allow time to transfer of function to an alternate EOC. Typically, provide UPS with the equipment.
106.1 - State the directives that govern personnel security
SECNAVINST 5510.30 series
106.2 - Define the following classification categories, how they differ, and the color codes used to identify each one
a. TS
b. S
c. C
d. U
a. if leaked, could cause grave damage - orange
b. if leaked, could cause serious damage - red
c. if leaked it could cause damage - blue
d. would have no impact
106.3 - Explain what is meant by 'need to know'
describes the restriction of data which is considered very sensitive. Under need-to-know restrictions, even if one has all the necessary official approvals (such as a security clearance) to access certain information, one would not be given access to such information, or read into a clandestine operation, unless one has a specific need to know; that is, access to the information must be necessary for the conduct of one's official duties.
106.4 - State the type of investigation and how often it is updated for access to the following classification levels.
a. TS
b. S
c. C
d. SCI
a. Single Scope Background Investigation and is updated every 5 yrs
b. National Agency Check (NACLC) every 10 yrs
c. NACLC every 15 years
d. requires a prenomination and interview
106.5 - Identify what a SAER is and its purpose
Security Access Eligibility Report - If something happens to an individual with a clearance the SSO has to submit this report stating all the facts and they decide whether or not the individual can still hold a clearance.
106.6 - Identify the events that should be reported to the SSO
crimes, security breach (phones, pagers, cameras, electronics, flash drives) marriage, financial struggles, alcohol related incidences.
106.7 - Identify who has overall authority of and controls access to a SCIF
The Commanding Officer
106.8 - Identify the following forms
a. SF700
b. SF701
c. SF702
d. SF703
e. SF153
f. SF312
a. Security container information (passwords)
b. Activity Security CheckLIst
c. Security Container CheckSheet
c. TS cover sheet
d. COMSEC material report
e. classified non-disclosure report
106.9 - State when safe combinations should be changed
every two years or when personnel are moved to another division and no longer have the need to know.
106.10 - What is an FDO and state their responsibilities
Foreign Disclosure Officer - They deal with anything related to foreign issues to keep personnel informed of the happenings wherever they are going.
106.11 - State the purpose of a DCS
Defense Courier Service provides a secure transit of classified materials.
106.12 - Describe the procedures for preparing hard copy classified material for transportation via
a. DCS
b. Handcarry
a. Make sure item is double enveloped and has proper handling markings on the envelope.
b. When it will be hand-carried, the person needs a courier card and they must hold material at an embassy or SCIF if overnight travel is required.
106.13 - State the responsibilities of the TSCO
Top Secret Control Officer - The TSCO is responsible to the security manager (if not the same person) for Top Secret materials in the command. This responsibility includes the receipt, custody, accounting for, and disposition of Top Secret materials
106.14 - State the THREATCON recognition and Force Protection levels and discuss what each represents
I. FPCON Normal - no terror activity
II. FPCON Alpha - small and general and not predictable.
III. FPCON Bravo - Situation that is somewhat predictable-may affect local law enforcement and general public
IV. FPCON Charlie - Terrorist activity is imminent
V. FPCON Delta - Terrorist attack has occurred or is taking place
106.15 - Explain what RAM is
Random Anti-terrorism Measures - The measures taken to protect and secure base so that there is no pattern to how we provide security.
106.16 - Explain the purpose of EAP
Emergency Action Plan - provides guidance and policy for planning, protecting and destroying classified material during emergency conditions
106.17 - Explain and state the order to initiate Emergency Destruction
Prescribes what classified information should be destroyed and in what order it should be destroyed in an emergency situation
106.18 - State who can give the order to initiate Emergency Destruction
Whomever is designated the destruction officer/ or if in last minute situation, the most senior person.
106.19 - Explain how, and in what order, material is destroyed during emergency destruction
I. Priority One - Destroy First
a. Yellow Label: SCI material
b. Orange Label: TS material
c. Crypto Label: COMSEC material
II. Priority Two - Destroy w/after Pone
a. Red Label: S Material
III. Priority Three - Destroy w/ after Ptwo
a. Blue Label: C material
IV. Priority Four - Destroy Last
a. Green Label: UNCLAS
106.20 - Define SCI
Sensitive Compartmented Information
106.21 - List the items prohibited in a SCIF and the security risks associated with them
personally owned electronic devices, weapons, re-writable cds, bombs,
106.22 - Define the difference between a security violation and a practice dangerous to security
A violation occurs when someone brings in a prohibited item or they take out classified material.
A practice dangerous to security is someone that forgets to leave their phone in their car until they get to the front door of the building. They will eventually bring that phone in.
106.23 - Explain the security requirements for the following
a. SCIF
b. T-SCIF
a. non-mobile, secure building with limited accesses and security measures in place.
b. temporary, mobile and should not be used for permanent storage of classified material. this building has less security features.
106.24 - Explain vault re-certification and recurring inspections
Basic inspections of vault doors occur to maintain their working status. They get inspected on an annual basis.
106.25 - Discuss the need for access lists, required documentation logs, and two person integrity
access lists give guidance on who is allowed access to certain parts of the building. the documentation logs are there to show who accessed spaces and who their escorts were. TPI is used so that there will not be any discrepancies and personnel are held accountable for their actions.
106.26 - Explain the DoD Escort Policy
They need to be escorted but if they are flag officers they do not need to be signed in or flash identification. We escort uncleared visitors as such: 1 escort for every two visitors.
106.27 - Discuss the procedures for sanitizing an area
Take anything out of the area and place it in a safe if it has anything to do with operations. If the document is classified that needs to be properly store, turn computer screens off.
106.28 - Discuss each of the following and the purpose of each
a. COMSEC
b. INFOSEC
c. COMPUSEC
d. PSP
d. ATFP
a. Communication Security - program to keep our communications secure
b. Information security - program to make sure our information that we share between agencies stays secure
c. computer security - protecting networks
d. Personnel Security Program - personnel follow security savvy measures to protect themselves
e. Ant-Terrorism Force Protection - To keep important areas secure from terrorist activities.
106.29 - State the purpose of the ICD system
Intelligence Community Directive - To provide the intel community direction.
106.30 - Identify SSO Navy
The Director, Security and Corporate Services (ONI-05) as Special Security Officer for the DON
106.31 - List the duties and responsibilities of the SSO
The SSO is
responsible for the operation (e.g., security, control, use,
etc.) of all command Sensitive Compartmented Information
Facilities (SCIFs).
106.32 - Identify who can be CSM
must be an officer or a civilian
employee, GS-11 or above, with sufficient authority and staff to
manage the program for the command.
106.33 - State the duties and responsibilities of a CSM
a. Serve as the principal advisor and representative to the
commanding officer in matters pertaining to the classification,
safeguarding, transmission, and destruction of classified
information.
b. Develop a written command security instruction (see
exhibit 2A), to include provisions for safeguarding classified
information during military operations or emergency situations.
c. Ensure that personnel in the command who perform security
duties are kept abreast of changes in policies and procedures,
and provide assistance in problem solving.
d. Formulate, coordinate, and conduct the command security
education program.
e. Ensure that threats to security and other security
violations are reported, recorded, and when necessary
investigated. Ensure that incidents described in chapter 12 of
this policy manual are immediately referred to the nearest NCIS
office.
f. Ensure that all security violations or incidents
involving the possible compromise of classified information, to
include those involving information technology (IT) systems, are
investigated and reported in accordance with chapter 12 of this
policy manual. Coordinate after-incident responses involving
classified information processed on IT systems with the command
Information Assurance Manager (IAM).
106.34 - Explain and state the purpose of JPAS
Joint Personnel Adjudication System - responsible for holding clearance levels of personnel in order to keep track and transfer information on them
106.35 - Explain and state the responsibilities of DONCAF
Department of the Navy Central Adjudication Facility (DONCAF), a Naval Criminal Investigative Service (NCIS) organization, is responsible for determining who within the Department of the Navy is eligible to hold a security clearance, to have access to Sensitive Compartmented Information (SCI), or to be assigned to sensitive duties.
106.36 - Discuss how long a CO can administratively suspend access before DONCAF revokes a clearance
90 days
106.37 - state the levels of INFOCON and what each signifies
INFOCON 5 describes a situation where there is no apparent hostile activity against computer networks. Operational performance of all information systems is monitored, and password systems are used as a layer of protection.

INFOCON 4 describes an increased risk of attack. Increased monitoring of all network activities is mandated, and all Department of Defense end users must make sure their systems are secure. Internet usage may be restricted to government sites only, and backing up files to removable media is ideal.

INFOCON 3 describes when a risk has been identified. Security review on important systems is a priority, and the Computer Network Defense system's alertness is increased. All unclassified dial-up connections are disconnected.

INFOCON 2 describes when an attack has taken place but the Computer Network Defense system is not at its highest alertness. Non-essential networks may be taken offline, and alternate methods of communication may be implemented.

INFOCON 1 describes when attacks are taking place and the Computer Network Defense system is at maximum alertness. Any compromised systems are isolated from the rest of the network.
106.38 - Discuss the security rules and procedures for magnetic and electronic media
Removable IS storage media and devices shall have external labels clearly indicating the classification of the information and applicable associated markings (e.g., digraphs, trigraphs). Labeling exemption for operational security (OPSEC) requirements may be granted within local policy with DAA/DAA Rep/SCO concurrence.� Examples include magnetic tape reels, cartridges, cassettes; removable discs, disc cartridges, disc packs, diskettes, magnetic cards and electro-optical (e.g., CD) media.� All removable information storage media and devices will be marked with the appropriate Standard Form (SF) 700-series classification and descriptor labels. To ensure data integrity and protection, information storage media must be administratively labeled and appropriately protected to prevent the loss of information through poor security practices. Likewise, to prevent security compromises, all output products must be appropriately protected.
106.39 - Explain why the navy only uses '.mil' email addresses on govt systems.
the DoD has exclusive use of this domain and it makes it more secure on government systems because we know we are dealing with a DoD email.
107.1 - Define IA
Protect and defend data and information systems by ensuring their availability, integrity, authentication, confidentiality and non repudiation.
107.2 - Define the Following:
a. Certification
b. Accreditation
c. DAA
d. System Security Plan
e. System Security Authorization Agreement
f. ATO
g. IATO
h. Configuration Management
a. Certification is the comprehensive evaluation of the technical and non-technical security features of an IS and other safeguards, made as part of and in support of the accreditation process, to establish the extent to which a particular design and implementation meet a specified set of security requirements.
b. The accreditation of an IS is the official management decision to operate an IS in a specified environment
c. The DAA is the official with the authority to formally assume responsibility for operating a system at an acceptable level of risk.
d. plan that is laid out in a SSAA
e. A formal document that fully describes the planned security tasks required to meet system or network security requirements
f. formal approval to operate after your plan has been submitted and approved
g. this is an interim approval of 90 days or less
h. Configuration management identifies, controls, accounts for, and audits all changes
to a site or information system during its design, development, and operational lifecycle.
107.3 - Discuss security procedures involved when performing cross-domain transfers
Human review is a process of validating the classification of data (classification level, compartments, sub-compartments, caveats, control markings or special handling marking) when it is stored or moved from an IS.� Human review may be required for validating data classification for hardcopy prints (from systems with less than PL-4 labeling functionality), data being transferred to media, or manual transfers between security domains.

18.3.1.1. (U) Human review of information has to meet two criteria to be sufficient: a review of the information content to validate the actual classification level of the data, and a review of embedded or hidden information that is part of the data.

18.3.1.2. (U) Human review requires an individual who is knowledgeable of the subject matter to inspect the contents and provide validation of the data classification. This individual has to be able to see the information in its presentation form to make this determination.
107.4 - Discuss risk management
Risk management is the process that allows IT
managers to balance the operational and economic costs of protective measures and achieve
gains in mission capability by protecting the IT systems and data that support their organizations’
missions.
107.5 - Define the five attributes of IA
a. Confidentiality
b. Integrity
c. Availability
d. Non-repudiation
c. Authentication
a. maintain the privacy of the information
b. maintain the whole of the information from being tainted
c. make sure it is available at request
d. simply means person cannot claim to have not seen information
e. maintain validity of information
107.6 - List and define 9 categories of computer incidents
I. Root Level
II. User Level
III. Unsuccessful
IV. Denial of Service
V. Non-compliance
VI. Recon
VII. malicious logic
VIII. investigating - case cannot be closed on this category
IX. explained
107.7 - Describe the DoN World Wide Web Security Policy
Ensure all information currently residing on the command/activity Web site is reviewed by the command/activity public affairs representative, is accurate, and is appropriate for viewing by a worldwide audience, friend and foe alike. Information not suitable for a publicly accessible Web site must either be removed or placed on a restricted-access site. Per Assistant Secretary of Defense (ASD) C3I guidance, domain restriction alone is not sufficient.
107.8 - Define the following:
a. IAVA
b. IAVB
c. IAVT
d. CTO
e. NTD (Navy Telecommunications Directive)
f. Service Pack
a. Vulnerability Alert - high
b. Vulnerability Broadcast - medium
c. Vulnerability Technical advisory - low
d. Computer Tasking Order
e.
f. collection of updates, fixes and/or enhancements
107.9 - Define vulnerability assessment
I. Conduct Assessment of USN and USMC sites annually
II. Notify the responsible Echelon II or MEF about non-compliance
III. Maintain overall cognizance
IV. Establish and maintain central website registration
V. establish mechanism for receiving and reviewing waivers
107.10 - Explain the difference between vulnerability and threat
Vulnerability is something that can be exploited by another entity or individual
Threat is something that can exist with or without an actual vulnerability
107.11 - State the duties of the Information Assurance Manager
They make sure the IT department has a program and ensures security as an IT system as well as site accreditation.
109.1 - Discuss the purpose of a red cross message
AMCROSS messages contain information very personal to the
intended recipient. Therefore, communications personnel will not
discuss the contents of such a message with anyone and will limit
the message distribution to the executive officer or an appointed
alternate only. Local command policy will dictate filing procedures for AMCROSS messages.
109.2 - describe the following systems and their function
a. ADNS
b. CUDIXS
c. VERDIN
d. NOVA
e. IBS
f. INMARSAT
g. DMS/NREMS/AMHS
h. VTC
i. DCO
a.Automated Digital Networking System The primary function of the ADNS is to connect Navy shipboard
networks to other ship and shore networks for transferring Internet Protocol (IP) data of various classification levels.
b. Common User Digital Information exchange Subsystems
provides a 2400 baud full duplex interface, over a satellite link
with mobile platforms, for the receipt and transmission of
narrative message traffic between FMX and mobile platforms
equipped with afloat automated systems.
c.Very Low Frequency Digital Information Network - broadcast system provides a highly reliable and secure system for worldwide
delivery of operational, tactical, and administrative messages from the Fleet Submarine Broadcast System (FSBS) and Minimum Essential Emergency Communications Network (MEECN).
d. AUTOMATED MESSAGE STORE AND FORWARD - UNIX based, base-level Mode 1 store and forward terminal dependent on the worldwide switching functions of the DTH to relay messages to other commands outside the immediate area of responsibility, services and agencies.
e.Integrated Broadcast System has integrated several existing intelligence and information
dissemination systems into a single system of broadcasts that
will allow for the receipt of data via a single receiver (the joint tactical terminal).
f. International Maritime Satellites - provide for high speed communication and tracking of maritime vessels.
g. defense messaging system/Navy Regional Enterprise Message System/Automatic Message Handling System employs the messaging and directory services using internationally recognized COTS-based X.400 and X.500 messaging and directory products.
h.Video Telecommunications Conference is an extension of traditional telephony technologies with the added feature of being able to see the person or persons with whom one is talking.
i.Defense connect online - enables a secure venue for communication
109.3 - Discuss GINGERBREAD and explain the procedures involved
Voice imitative deception is suspected on this net.
109.4 - Discuss the type of disclosures afforded protection by the EEFI list.
POSITION 01
Friendly or enemy position, movement or intended
movement: position; course; speed; altitude; or
destination of any air, sea or ground element unit
or force.
CAPABILITIES 02
Friendly or enemy capabilities or limitations: force composition or identity; capabilities, limitations or significant casualties to special
equipment, weapon systems, sensors, units or personnel; percentages of fuels or ammunition remaining.
OPERATIONS 03
Friendly or enemy operations, intentions, progress or results: operational or logistic intentions; assault objectives; mission participants; flying programs; mission situation reports; results of
friendly or enemy operations.
ELECTRONIC WARFARE 04
Friendly or enemy EW/EMCON intentions, progress or results: intention to employ EMC; results of friendly or enemy ECM objectives of ECM; results of friendly or enemy ECCM; results of ESM; present or intended EMCON policy; equipment effected by EMCON policy.
PERSONNEL 05
Friendly or enemy key personnel: movement or identity of friendly or enemy flag officers; distinguished visitors; unit commanders; movements of key maintenance personnel indicating equipment
limitations.
COMSEC 06
Friendly or enemy COMSEC breaches: linkage of codes
or code words with plain language; compromise of changing frequencies or linkage with line numbers/circuit designators; linkage of changing call signs with previous call signs or units;
compromise of encrypted/classified call signs; incorrect authentication procedure.
WRONG CIRCUIT 07
Inappropriate transmission: information requested,
transmitted or about to be transmitted which should
not be passed on the subject circuit because it either requires greater security protection or is not appropriate to the purpose for which the circuit is provided.
08 For NATO assignment as required.
09 For NATO assignment as required.
10 For NATO assignment as required.
11-29 Reserved for COMUSNAVEUR.
30-49 Reserved for OMUSFLTFORCOM.
50-69 Reserved for COMPACFLT.
109.5 - Discuss BEAD WINDOW and explain the procedures involved
real-time procedure which brings to the immediate attention of circuit operators the fact that an EEFI (Essential Elements of Friendly Information) disclosure has (or may have) occurred. Proper response for a net member receiving a BEADWINDOW will be "ROGER OUT" using proper net call signs.
109.6 - Define RIVER CITY and state when it is utilized
ship-wide blackout of COMMS
109.7 - Discuss the JSIR to include the following
a. Meaconing
b. Intrusion
c. Jamming
d. Spectrum Management
a. intentional deceitful signals transmission to users of a navigational system to make them think you are somewhere other than where you are.
b. insertion of false information into communication circuits
c. deliberate radiation, re-radiation or reflection in order to block communications
d. planning, coordinating and managing joint use of electromagnetic spectrum
109.8 - Define and state the purpose of the following
a. PLA
b. DTG
c. UTC(ZULU)
a. Plain Language Address The activity designator used in
message addressing.
b. Date Time Group
c. Universal Time Code
109.9 - List the components of a standard navy message
procedure
prefix
address
preamble
text
procedure
109.10 - Define the following message precedences.
a. R
b. P
c. O
d. Z
e. W
a. routine - 6 hours
b. priority - 3 hours
c. immediate - 30 minutes
d. flash - As fast as possible with an objective of less than 10 minutes.
e. Flash override - means to clear the lines in order to get this message out without any issues.
109.11 - State the purpose of OPTASK COMMS
The OPTASK COMMS message is the means used by which the United States Navy and Allied Navies distribute afloat communications plans.

1. Customize the workspace by adding the units and hull numbers of participants.
2. Verify the communications equipment installed on each platform and update the database with current information.
4. Establish a list of required nets.
5. Establish priorities for the nets by frequency band.
6. Determine the guard requirements.
7. Write and Transmit a Frequency Request Message to obtain frequencies.
8. When received, import the Frequency Assignment Message, populating the nets with their assigned frequencies.
9. Verify that the assigned frequencies meet required minimum separation criteria and are free of IMI.
10. Establish Frequency Guard Bands for frequencies that are not available.
11. Import Standard Frequency Action Format files from a standard frequency management database, such as FRRS.
12. Develop Aircraft Channelization Plans and DAMA
Channelization Plans.
13. Generate and Transmit the OPTASK COMMS.
14. Publish the AESOP Spectrum Report for use by the IWC.
109.12 - State the purpose of a COMMPLAN
Communication Plan - The AFLOAT ELECTROMAGNETIC SPECTRUM OPERATIONS PROGRAM supports the multi-step process of developing a COMPLAN and promulgating it to appropriate
recipients.
109.13 - State the purpose of a TSO
Telecommunication Service Order - authorization from DCA circuit allocation and engineering activity to start change or discontinue circuits, trunks, links or systems.
109.14 - State the purpose of a TSR
Telecommunication Service Request- request to activate, discontinue or change existing services
109.15 - Stae the purpose of a COMSPOT/communications service advisory
Communications Spot (COMSPOT) reports will be submitted by all
ships and shore facilities at any time communication outages or
degradations are encountered.
109.16 - State the purpose of Electronic Key Management System (EKMS)
The primary reason for the development of EKMS centers on the security and logistics problems that plagued the COMSEC Material Control System (CMCS), which replaced the Registered Publications System (RPS) in the 1970s. The CMCS was a very labor-intensive operation that had been stretched to capacity. The most serious, immediate concern was the human threat associated with access to and exploitation of paper key throughout its life cycle.
109.17 - State the purpose of OTAT/OTAR
Over-The-Air Transfer - Electronically distributing key without changing the traffic
encryption key used on the secured communications path
over which the transfer is accomplished.
over-the-air rekeying - Changing traffic encryption key or transmission security key in remote crypto-equipment by sending new key directly to the remote crypto-equipment over the
communications path it secures.
109.18 - Describe TEMPEST
is the code name given to the investigation, study, and control of compromising emanations from telecommunications and automated information processing systems.
109.19 - State the purpose of Emissions Control (EMCON)
EMCON is control of all electromagnetic and acoustic
radiations, including communications, radar, EW and sonar.
110.1 - Describe the mission of the following
a. ASW
b. SUW
c. IW
d. AW
e. STW
f. NSW
a. anit-submarine warfare
b. surface warfare
c. information warfare
d. air warfare
e. strike warfare
f. special warfare
110.2 - Explain how the reserve component integrates with the Active Component
Provides trained units and qualified personnel available upon request when needed in times of war.
110.3 - Explain the purpose of a mobile detachment
uniquely capable of performing specific missions on short notice.
110.4 - Discuss the purpose of Direct Support Assets
Provide support for our fleets by filling billets not needed full time on ships.
110.5 - Discuss the primary services provided by the following deployable METOC teams
a. Mine Warfare UUV platoon
b. Naval Oceanography ASW Team
c. Strike Group Oceanography Team
d. Mobile Environmental Team
e. Fleet Survey Team
a. unmanned subsurface vessel used to detect mines
b. used for anti submarine warfare operations
c. usedfor surface special warfare support
d. support maritime specops by providing a mobile environmental center in order to predict weather and conditions.
e. prepare, plan and execute surveys
110.6 - Discuss the IO Core Capabilities
Information Operations Core Capablilities:
PSYOPS - Psychological Operations
MILDEC - Military Deception
OPSEC - Operations Security
EW - Electronic Warfare
CNO - Computer Network Operations
110.7 - Define the roles of the US Navy Blue and Red Teams
Red team identifies and exploits vulnerabilities in our defense networks and the Blue team comes through and figures out how to fix them.
110.8 - Explain the purpose of FES
Fleet Electronic Support - personnel that can come out to repair crypto equipment
110.9 - Explain the difference between
a. USC Title 10
b. USC Title 50
a. Title outlining the US Armed Forces and their roles and responsibilities.
b. War and National Defense - lays out how were handle our armed forces in war situations to include reporting
110.10 - Define CRITIC
Critical Intelligence Communication - Specific facts about friendly intentions, capabilities, and activities vitally needed by adversaries for them to plan and act effectively so as to guarantee failure or unacceptable consequences for friendly mission accomplishment.
110.11 - State the purpose of the following:
a. CCOP
b. NITES
c. JDISS
a. Crypto carry on program - provides specialized equipment for the Fleet
b. Navy integrated environment subsystem - provide METOC support
c. Joint deployable intelligence support system -
110.12 - Discuss Maritme Domain Awareness
It is important to understand the maritime domain in order to maintain dominance out in the open seas.
110.13 - State the purpose of a MOC
Maritime Operations Center - Central location for keeping maritime activity under watch
111.1 - Define OPSEC
analytical process that focuses on adversary capability and intent and emphasizes the value of unclass information - when used effectively it will deny or mitigate an adversaries ability to gain information.
111.2 - Discuss the five step planning process
I. ID critical information
II. analyze threat
III. analyze vulnerabilities
IV. assess risk
V. apply countermeasures
111.3 - Discuss the reponsibilities of the command OPSEC officer
Train and provide guidance to command members on operational security awareness.
111.4 - Describe the OPSEC considerations regarding public affairs
In order to assure that information doe not get released to the public that should not be released, the Public Affairs officer has to be cognizant of what he/she is sharing with the public.
111.5 - Define WRA
Web Risk Assessment - applying OPSEC fundamentals to the internet.
111.6 - Define the following terms
a. EEFI
b. Critical information
a. Essential Elements of Friendly information
b. Specific facts about friendly intentions, capabilities, and
activities vitally needed by adversaries for them to plan and act effectively so as
to guarantee failure or unacceptable consequences for friendly mission
accomplishment.
111.7 - Describe the components and functions of the command OPSEC program
appointed by command, brief/train within 30 days, must be OPSEC approved, coordinate with the command security manager and ombudsmen
112.1 - State the purpose of Naval Intelligence
Supporting the commander
Identify centers of gravity and critical vulnerabilities
supporting planning and execution of operations
protecting the force
supporting combat assessment
support to operating forces
112.2 - Define the five steps of intelligence
I. Planning and Directions
II. Collection
III. Processing
IV. Production
V. Dissemination
112.3 - describe the three categories of intelligence
Strategic - national
Operational - Regional
Tactical - in combat situations.
112.4 - define National, Theater and Fleet level intelligence orgainizations
National - Strategic Intelligence
Theater - primarily used by commanders with subordinate JFCs
Fleet - focuses on combat intelligence in order to plan and conduct battles
112.5 - Define PIR
Priority Intelligence Requirement - this represents the commanders most important intelligence requirements. Single reqs focused on developing a course of action for an adversary
112.6 - Define CCIR
Commanders Critical intelligence requirements - directly affects decisions and dictates the successful execution of tactical operations.
I. Apply only to you
II. Situation Dependent
III. Predictable events/activities
IV. Specified by you for each operation
V. Time sensative
VI. Paragraph 5 of OPORD
VII. Transmitted by communications systems specified in SOP
112.7 - Explain Intelligence Oversight and state the publications that govern it.
Process of ensuring all DoD intelligence, CI, and intelligence related activities are conducted in accordance with US law, Presidential EO's and DoD regulations and directives. Two main objectives are: Conduct intelligence and Counter-intelligence while protecting the statutory and constitutional rights of US persons
112.9 - Define the difference between a US citizen and a US person with regards to US INTEL Oversight.
A US citizen is one who is born or natuarlized in the US. A US person is any person within the US border or US waters.
112.10 - Define intelligence preparation of the battelspace environment
the systematic and continuous analysis of the adversary, terrain, and weather in the assigned or potential battlespace. It is a significant element in the Commander's Preparation of the Battlespace and a key part of our decision making process. Its goals include understanding the adversary's forces, doctrine, tactics, and probable courses of action, together with the physical and environmental characteristics of the target area. IPB identifies gaps in knowledge that require intelligence collection efforts.
112.11 - Define the mission of Fleet Intelligence Office and its two subordinate commands.
located at CYBERFORCOM and provides a single entity within the naval network and naval cyberforces enterprise across fleet readiness enterprise.
112.12 - Explain ISR mission requirements and fundamentals
principle elements of US defense capabilities - wide variety of systems and processing information needed by national security decision makers and military commanders, national interests focus for information for DC and tactical for battle field
112.13 - Explain the function of an intelligence fusion cell
effective and efficient mechanism to exchange information and intel, max resources, streamline operations and improve the ability to fight crime and terrorism by data merging from various sources
112.14 - Describe the following:
a. HUMINT
b. OSINT
c. MASINT
d. SIGINT
e. COMINT
f. FISINT
g. ELINT
h. IMINT
i. ACINT
a.Human
b. Open Source
c. Measurement and signature
d. signals
e. communications
f. foriegn instrumentation
g. electronics - non comm intel
h. imagery
i. acoustic
112.15 - Give 3 examples of intelligence briefs
Oral Dissemination - May involve miscommunication. usually no permanent record kept of the brief.
Written Dissemination - takes longer to write, not prone to change when transmitted
Graphic Dissemination - picture is worth a 1000 words
112.16 - Define the role of an intelligence watch floor
provides a 24 hour watch that gives indications and warning (I&W) input to consumers. Strategic center for both national and forward deployed units. Supports strategic analysis and manages intel collection. Its capabilities include: battle analysis, identification of adversary COGs analysis of adversary C4.
113.1 - Define each band of the electromagnetic spectrum and describe what signals are commonly used in each.
radio - generally are utilized by antennas of appropriate size
microwave - used for point to point communications
infrared - data transfer
visible - This is the range in which the sun and other stars emit most of their radiation and the spectrum that the human eye is the most sensitive to.
ultra-violet - UV rays can break chemical bonds making molecules unusually reactive or ionizing them in general changing their physical behavior.
x-ray - As they can pass through most substances, X-rays can be used to 'see through' objects, most notably diagnostic X-ray images in medicine
gamma rays - They are useful to astronomers in the study of high energy objects or regions, and find a use with physicists thanks to their penetrative ability and their production from radioisotopes. Gamma rays are also used for the irradiation of food and seed for sterilization, and in medicine they are used in radiation cancer therapy and some kinds of diagnostic imaging such as PET scans. The wavelength of gamma rays can be measured with high accuracy by means of Compton scattering.
113.2 Describe the communication capabilities of transmissions in each of the bands below
a. ELF
b. SLF
c. ULF
d. VLF
e. LF
f. MF
g. HF
h. VHF
i. UHF
j. SHF
k. EHF
a. 3hz - 30hz
b. 30hz-300hz
c. 300hz-3khz
d. 3khz-30khz
e. 30khz-300khz
f. 300khz-3mhz
g. 3mhz-30mhz
h. 30mhz-300mhz
i. 300mhz-3ghz
j. 3ghz-30ghz
k. 30ghz-300ghz
113.3 - Define and discuss the following terms
a. frequency
b. wavelength
c. ducting
d. refraction
e. multiplexing
f. modulation/demodulation
g. bandwidth
h. keying
a. number of occurences of a repeating event per unit time
b. distance over which the waves shape repeats
c. the wavelength is forced to follow the curve of the earth by an atmospheric duct
d. change in direction of a wave due to a change in its speed
e. streams are combined into one signal over a shared medium
f. modulation encases information in with a signal and demodulation removes the information when it is received.
g. difference between upper and lower frequencies
h. used to transmit a digital signal over an analogue line.
113.4 - Discuss the following terms and give a description of what each means in relation to the atmosphere
a. layers
b. frequency
c. radio waves
d. propagation
e. azimuth angle
f. elevation angle
a. layers make up the ionisphere and depending on what layer it is the signal will be affected a different way.
b. The most practical operating frequency is one that you can rely on with the least amount of problems. It should be high enough to avoid the problems of multipath, absorption, and noise encountered at the lower frequencies; but not so high as to result in the adverse effects of rapid changes in the ionosphere.
c. There are two principal ways in which electromagnetic (radio) energy travels from a transmitting antenna to a receiving antenna. One way is by GROUND WAVES and the other is by SKY WAVES. Ground waves are radio waves that travel near the surface of the Earth (surface and space waves). Sky waves are radio waves that are reflected back to Earth from the ionosphere.
d. dependent upon the weather, signals can be propagated to extend or they can be shortened
e. Angular measurement in the horizontal plane in a clockwise direction
f. The angle between the horizontal plane and the line of sight.
113.5 - Describe the following modulation types and their common usage
a. USB
b. LSB
c. CW
d. AM
e. FM
a. Upper Side Band - signal components above the carrier frequency
b. Lower Side Band - signal components below the carrier frequency
c. continuous wave - The "on-off" keying of a carrier.
d. amplitude modulation - Any method of varying the amplitude of an electromagnetic carrier frequency in accordance with the intelligence to be transmitted
e. frequency modulation - the instantaneous frequency of the radio-frequency wave is varied in accordance with the modulating signal; the amplitude of the radio-frequency wave is kept constant.
113.6 - Define the following terms as they apply to radar
a. PRI
b. PRF
c. RF
d. BW
e. CW
f. PW
g. Scan
h. Bearing/Azimuth/Elevation
a. Pulse Repetition Interval - used to figure out PRF
b. Pulse Repetition Frequency
c. Radio Frequency
d. Beam Width
e. continuous wave
f. pulse width
g. Primary Scan: A scanning technique where the main antenna aerial is moved to produce a scanning beam, examples include circular scan, sector scan etc.
Secondary Scan: A scanning technique where the antenna feed is moved to produce a scanning beam, examples include conical scan, unidirectional sector scan, lobe switching etc.
Palmer Scan: A scanning technique that produces a scanning beam by moving the main antenna and its feed. A Palmer Scan is a combination of a Primary Scan and a Secondary Scan.
h. these all help to determine the location of a target
113.7 - Identify the following types of RADAR, their functions, and give examples of each
a. Air Search
b. Surface Search
c. Fire Control
a. used to identify different things in the atmosphere - AN/SPS-12
b. used to identify surface objects - AN/BPS-15
c. designed specifically to provide information (mainly target azimuth, elevation, range and velocity) to a fire-control system in order to calculate a firing solution - Mk 95
113.8 - Explain the difference between OPELINT and TECHELINT
The category of electronic intelligence concerned with the introduction, disposition, location, movement, employment, tactics, and activity levels of known foreign noncommunications emitters and the weapon systems and associated. In brief, Operational ELINT determines the locations and readiness of target emitters.

The category of electronic intelligence concerned with the signal characteristics, modes, functions, associations, capabilities, limitations, vulnerabilities, and technology levels of foreign noncommunications emitters and the electronics or weapons systems with which they are associated. In brief, Technical ELINT determines the capabilities and limitations of target emitters.
113.9 - Define the following
a. Half Duplex
b. Duplex
c. Simplex
a. send or receive
b. send and receive
c. simple communications
115.1 - Describe the following space mission areas
a. space force enhancement
b. space support
c. space control
d. space force application
a. Increase joint effectiveness - 5 force enhancement missions
1. ISR
2. missile warning
3. environment
4. SATCOMM
5. monitoring
b. space list ops/sat ops/ reconstitution of space forces
c. prevention/ negation/ protection/ offensive space control/ defensive/ ssa
d. in, through and from space
115.2 - describe the following entities in the space environment and how they affect communications
a. the sun
b. solar wind
c. solar cycle
d. van allen radiation belts
e. atmospheric drag
a. heat/solar power through fission
b. can start stream of wind from sun that affects satellites. one million mph
c. 7 years its cooler and 4 years it hotter - overall an 11 year cycle
d. two belts one inner and one outer
e. solar wind or debris caught in orbit and can knock a sat offline
115.3 - identify the following orbits
a. low earth orbit
b. medium earth orbit
c. highly eliptical orbit
d. geosynchronous orbit
e. polar orbit
a. between 150-800 miles from the earths surface - 90 minute revolution.
b. GPS and intermediate circular orbit out over 2000 km
c. high apogee and low perigee
d. satellite that hits the same spot each day at the same time, it does not appear stationary
e. this orbit has a north/ south orbit
115.4 - define the following
a. apogee
b. perigee
a. furthest point from the earth
b. closest point from the earth
115.5 - Identify the two main space launch facilities in the US
Kennedy Space station in FT Lauderdale
Vandenburg AFB in California
115.6 - discuss the following military satellite communication systems
a. Navy UHF follow-on
b. defense satellite communications system
c. GBS
d. WCS
a. replaced FLTSATS, higher power transmitters improved service and more reliable and dependable.
b. worldwide jam resistant secure communications
c. global broadcast service - provides data and video information products to military tactical terminals
d. worlds geodedic system - provides a common accessable global reference for DoD operations
115.7 - describe the global positioning system
Owned by airforce, needs three sats to sync up.
115.8 - describe the advantages and disadvantages of Space-based ISR
covers more ground, more capable and versataile. weather can be an issue
115.9 - Discuss space situational awareness
result of sufficient knowledge about space related conditions
115.10 - Discuss the following
a. astrometry
b. earth orientation parameters
a. study of astronomical moving objects in space
b. measures how much the earth wobbles -y understanding how much it wobbles we can adjust the satellites to move with it.
115.11 - Discuss the role of precise time in the following
a. GPS
b. Geo-location
c. network sync
a. has to be exact in order to provide the most accurate information
b. if time is not precise the location will not be exact
c. will not sync correctly if it isn't precisley timed