100 EIWS Series Flashcards
Discuss ORM
ORM is a systematic decision-making process used to identify and manage hazards that endanger naval resources. Purpose is to increase operational readiness.
State the instruction that governs safety and mishap reporting.
OPNAVINST 5102.1D - Navy and Marine Corps Mishap and Safety Investigation, Reporting and Record Keeping Manual.
Define and discuss the four categories of hazard severity.
Hazard Severity is an assessment of the expected consequence.
CAT 1 - May cause death
CAT 2 - May cause serious injury, illness, property damage
CAT 3 - May cause minor injury
CAT 4 - Presents minimal threat
Define Risk Assessment Code (RAC) and list the five RAC’s
RAC is an expression of the risk associate with a hazard that combines the hazard severity and mishap probability into a single Arabic numeral.
- Critical risk
- Serious risk
- Moderate risk
- Minor risk
- Negligible risk
Mishap Investigation Reports
All mishap reports must be submitted within 30 days of mishap occurrence.
Name the four required mishap reportable items.
- On duty DOD Civilian and all on and off duty military class A mishaps
- DON on duty civilian fatalities occurring within the USA
- Laser or radio frequency radiation exposures
- Navy and Marine Corps ordnance related Class A explosive mishaps
State the purpose of a HAZREP message
Assist all leaders in identifying casual factors and formulating corrective measures to prevent mishap recurrence.
State the three objectives of first aid
- Save lives
- Prevent further injury
- Prevent infection
State the three methods of controlling bleeding
- Direct pressure
- Pressure points
- Tourniquet
Describe the symptoms and treatment for shock
Shock is disruption of circulatory system. Individuals usually faint due to the poor supply of oxygen to the brain.
- vacant or lackluster eyes
- Shallow or irregular breathing
- cold pale skin
- Nausea
- A weak or absent pulse
State the difference between an open and close fracture
Open fracture - bone protrudes skin
Close fracture - skin remains intact
Define the following (HERO, HERP and HERF)
HERO - ordinance
HERP - people
HERF - fuel
Hazards of Electromagnetic Radiation…
Define Hazmat
Any item or agent which as the potential to cause harm to humans, animals or the environment, even by itself of through interaction with other factors.
Discuss how to store HAZMAT
Store acids separately from bases; oxidizers away from combustibles and flammables; store dry materials such as powder above liquids or wet materials. Leaking liquids can drip down onto dry materials and cause a reaction
Describe potential risk of improperly labeled and stored HAZMAT
Can cause injury or a reaction that could be life threatening
Describe what an MSDS is and the information it provides
Material Safety Data Sheet (MSDS) are technical bulletins that contains info about hazardous material. According to OPNAVINST 5100.19 all hands are required to follow these guidelines.
State the goal of the Navy’s hearing conversation program
Prevent occupational hearing loss and assure auditory fitness for duty of all Navy personnel.
State the six areas of naval doctrine
WIPLOC
- Naval Warfare
- Naval Intelligence
- Naval Operations
- Naval Logistics
- Naval Planning
- Naval Command and Control
State the seven principles of Naval Logistics
- Responsiveness
- Simplicity
- Flexibility
- Economy
- Attainability
- Sustainability
- Survivability
The first Navy ship was named after an enlisted man, what was his name?
Osmond Ingram (DD 255). The ship was launched 28FEB 1919. Ingram was the first enlisted man killed in action in WWI, lost when the destroyer Cassin (DD 43) was torpedoed in OCT 1917.
Discuss the conditions that led to the formation of the US Navy
The king of England allowed the colonies to trade only with England. Problems arose between the colonists and England as years passed. English parliament passed several laws that affected the colonists in a problem know as “taxation without representation”
What are the three classes of Naval vessels existed at the inception of the Navy?
Ships-of-the-line: The battleships of the sailing days
Frigates: The cruisers of the 18th century
Sloops-of-war: The small sailing warships
State the mission of the US Navy
This mission of the navy is to maintain, train, equip combat-ready naval forces capable of winning wars, deterring aggression and maintaining freedom of the seas.
Discuss the difference between OPCON and ADCON
OPCON - Operational Control
ADCON - Administrative Control
Describe the six programs of Brilliant on the Basics
Sponsorship Assign Mentor Indoctrination Leadership Ombudsman Programs Recognition Programs
State the duties and responsibilities of Command ESO
Assist the XO administer educational programs for the command. ESO coordinates office and enlisted training and also PBFT.
Explain the purpose of the US Navy Drug Screening Program
A computer based application developed to assist CO’s in administering the command’s urinalysis testing program.
Discuss the NCA, its members and functions
National Command Authority (NCA) is a term used by the United States Military and United States government to refer to the ultimate lawful source of military orders. The NCA comprises of the President (as Commander in Chief) and the United States Secretary of Defense.
Define Combatant Command (COCOM)
Is the command authority over assigned forces vested in the CINCs by title 10, U.S. Code, Section 164, and is not transferable – There are 10 Unified COCOMs; six regional and four functional. United States Africa Command became initially operational in OCT 2007. NORTCOM, CENTCOM, EUCOM, PACOM, SOTHCOM, AFRICOM, SOCOM, JFCOM, STRATCOM, and TRANSCOM.
Define the FLTCOM
Fleet Commanders have a dual chain of command. Administratively, they report to the Chief of Naval Operations and provide, train, and equip naval forces. Operationally, the provide naval forces and report to the appropriate unified commanders.
Define TYCOM
Type Commander - All ships are organized into categories by type. Aircraft carries, aircraft squadrons, and air stations are under the administrative control of the appropriate Command Naval Air Force. Submarines come under the Commander Submarine Force. All other ships fall under Commander Naval Surface Force.
State the location, mission and component commands for the following: CNO N2 / N6
CNO N2 - The director of Naval Intelligence (OPNAV N2)
CNO N6 - Leads the Navy Space Team for the Chief of Naval Operations
Define the following (TF, TG, TU, TE) - Task Force, Group, Unit and Element
A task force (TF) is divided into tasks groups (TGs). Task groups are assigned numbers corresponding to the particular task force of which they are a part. For instance, TF 77 may have a task group assigned to reconnaissance, and its designated number will be TG 77.3. Tasks groups may be even further subdivided into task units (TU’s) and task elements (TE’s)
Describe the 8 IDC Ratings (AG/CTI/CTM/CTN/CTR/CTT/IS/IT)
AG - observe, collect, record and analyze meteorological and ocean data
CTI - Radiotelephone communications and foreign language translation
CTM - The installation, servicing and repair of electronic and electromechanical equipment
CTN - Plans and execute computer network operations (CNO) actions/counter-actions in support of defending and exploiting computer network systems
CTR - Voice/Morse communications and operation of radio direction finding equipment. Similar with US ARMY job specially 35S
CTT - Non-communications signals Intelligence (ELINT), Electronic Warfare Support (ES), Electronic Attack (EA) and Electronic Protection (EP)
IS - Intelligence Specialist rating was established in 1975 by combining the Photo Intelligencman (PT) rating and parts of the Yeoman (YN) rating. - Duties include analyzing intel information; identifying and producing intel from raw information.
IT -
Navy Cyber Defense Operations Command (NCDOC)
Responsible for coordinating, monitoring and overseeing the defense of the Navy’s computer networks and systems and their 700,000 users worldwide. - Based in Norfolk VA
Define SECDEF
The head of department for US Navy, Army, Marines and Air Force. These civilian appointees all report to SECDEF.
Define Fleet Master Chief / Force Master Chief / CMC
Provide leadership to the enlisted force and advise Commanders/Commanding Officers on enlisted matters that support mission accomplishment. They enforce the highest standards of professionalism, integrity and enhance active communication at all levels of the command throughout the Navy.
State NAVYCYBERFOR’s role in a CCRI.
Command Cyber Readiness Inspections (CCRIs) are to Improve the over all security posture of the Global Information Grid (GIG)
EDVR
Monthly statement of an commands enlisted personnel account i.e. Manning status
AMD - Activity Manning Document
Single source document that provides the quantitative and qualitative manpower requirements
Discuss the importance of the IG
Mission is to promote integrity, accountability, and improvement of the DOD personnel, programs and operations to support the Dept’s mission an server the public interest.
State the purpose of the Navy Correspondence Manual
SECNAV Manual 5216.5 prescribe uniform standards for management and preparation of correspondence throughout the department of the Navy
List the office accession programs that are available to enlisted personnel
- Seaman to Admiral
- Enlisted Commissing Program (ECP)
- United State Naval Academy Admissions
- LDO / CWO program
- Broadened Opportunity for Officer Selection and Training (BOOST)
Explain what the DLPT is
Defense Language Proficiency Test (DLPT) is a batter for foreign language test produced by the Defense Language Institute and used by the United States DOD. Intended to assess general language proficiency of native English speakers and specific foreign language, in the skills of reading and listening.
Discuss the purpose of the 3M/PMS System
Provides efficient and uniform methods of conducting and recording preventative and corrective maintenance. Supports and ensures maximum equipment operational readiness.
Explain how DPAS is used to track equipment
DPAS is a web based Defense Property Accountability System is used to track physical Accountability of DOD property and provides data to the DON Financial Statements for inclusion to the Plant, Property, and Equipment (PP&E)
Discuss the purpose of the MOV program
Material Obligation Validation (MOV) represents unfilled quantity of a requisition that is not immediately available for issue. The program allows for the periodic validation of all outstanding requisitions. If the requisition is no longer required a cancellation request is generated and if received a receipt is processed.
Explain the procedures for NRFI DLRs
Not ready of issue depot level repairable
a. TURN-IN - a not ready for issue repairable component that requires turn-in to a repair facility or designated overhaul point.
b. RIP - remain in place are items that are repairable components that cannot be removed until receipt of a replacement item.
What are MAMs (supply)
MAMs - Maintenance Assistance Modules (MAMs) are avionics system parts used for isolating faults within an avionics system or test set normally located in the operating space of a division.
Define the term CASREP and explain the four categories.
INITIAL - identifies, to an appropriate level of detail, the status of the casualty and parts and/or assistance requirements.
UPDATE - Contains information similar to that submitted in the INITIAL CASREP and or submit changes to previously submitted info.
CORRECTION - Submitted when equipment has been repaired and back in operational condition
CANCELLATION - Submitted upon commencement of an overhaul or other scheduled availability period
CHRIMP
Consolidated Hazardous Material Reutilization and Inventory Management Program serves as a fundamental element of the Navy’s life-cycle control and management of HAZMAT.
DRMS
Defense Reutilization Marketing Service - mission is to provide the DOD’s best value services and deliver great performance to our customers for reuse, transfer, donation, sale or disposal of excess property.
Explain OPTAR and its components
Defined as an estimate of the amount of money that will be required by an operating ship, staff, squadron, or other unit to perform assigned tasks and functions. Repair/Repairable and Consumables.
Identify the directives that govern personnel security.
There are 4 directives:
- DOD 5105.21-M-1
- SECNAV M-5510-30
- DCID 6/4 and 6/9
- JOINTDODISS
Define the following classification categories
TOP SECRET - Grave damage to national security (color code is ORANGE)
SECRET - Serious damage to national security (color code is RED)
CONFIDENTIAL - Damage to national security (color code is BLUE)
UNCLASSIFIED - Little damage to national security (color code is Green)
Explain what it meant by “need-to-know”
The authorized holder must determine that the prospective recipient needs-to-know that information in order to perform lawful and authorized government functions. Need-to-know is a preventative measure to identify and deter unauthorized access.
State the type of investigation classification levels: TS/SEC/CON/SCI
Top Secret - is favorably completed SSBI, SSBI-PR or PPR. Updated every 5 years.
SECRET/CONFIDENTIAL - is favorably completed NACLC or ANACI. For a secret clearance its updated every 10 to 15 years.
SCI - is a favorably adjudicated SSBI. A SSBI-PR is required to be submitted every 5 years.
Identify what a SAER is and its purpose
Security Access Eligibility Report (SAER) - used to identify an incident or any change in eligibility if an employee is still eligible for the security clearance.
Identify the events that should be reported the SSO
- Unlawful practice or advocate the overflow or alteration of the US Government by unconstitutional means.
- Foreign influences concerns, foreign citizenship or foreign monetary interests
- Sexual behavior that is a crime or reflects a lack of judgement or discretion
- Unwillingness to comply with the rules and refs or cooperate with security processing
- Change of marital status or marriage/cohabitation with a foreign national
Identify who has overall authority of a SCIF
The Special Security Officer (SSO) will be responsible for the operation of the SCIF and the security controls and use of the SCIF. All SCIF matters shall be referred to the SSO.
Identify the use of the following forms (SF 700, 701, 702, 703, 153, 312)
SF 700 - Security container information (open and unattended)
SF 701 - Activity security checklist (filled out at the end of the day)
SF 702 - Security container check sheet (form provides a record of the names and times that persons have opened, closed and checked a particular container that holds classified information)
SF 703 - Top Secret cover sheet (ORANGE)
SF 153 - COMSEC Material report
SF 312 - Classified information non-disclosure agreement (provide contractural agreement between US Government and cleared employees)
State when safe combinations should be changed
- When first placed in use
- When and individual knowing the combination no longer requires access
- When subjected to compromise
- When taken out of service. Built in combinations locks will then be reset to the standard comb 50-25-50; padlocks will be reset to the standard combo of 10-20-30
What is an FDO and state their responsibility
Foreign Disclosure Officer. Process all foreign visit requests to the command. Responsible for any foreign disclosure of information to foreign nationals.
State the purpose of the DCS
The Defense Courier Service (DCS) is a joint command and direct reporting unit (DRU) under the Commander in Chief United States Transportation Command (CINCTRANS)
State the responsibilities of the TSCO
The Top Secret Control Officer (TSCO) maintains a system of accountability and handling of TS information
State the THREATCON recognition and Force Protection levels.
FPCON NORMAL - no current terrorist activity
FPCON ALPHA - there is a small and general terrorist activity
FPCON BRAVO - Somewhat predictable terrorist threat
FPCON CHARLIE - There is terrorist activity imminent
FPCON DELTA - Terrorist attack is taking place or has just occurred
Explain what a RAM is
Random Antiterrorism Measures (RAM) - To maximize the effectiveness and deterrence value, and be implemented with a set pattern, either in terms of the measures selected, time, place, or other variables. (ex. Random implementation of FPCONs measures)
Explain and state the purpose of an EAP
Emergency Action Plan (EAP) is utilized when anticipating natural disasters. Protect COMSEC materials from natural disasters and the enemy.
Emergency Destruction (Priority 1-3)
Material will be identified for emergency destruction/removal following the general guidelines listed below:
Priority One: All Cryptographic equipment and documents
Priority Two: All operational SCI code word materials
Priority Three: Less sensitive administrative SCI materials and collateral classified material not included above.
Define SCI
Sensitive Compartmented Information - required to be handled within formal access control systems established by the Director of Central Intelligence
List of items prohibited in a SCIF
No device that transmits, receives, records or stores data is authorized into a SCIF without prior approval (CO or SSO or IAM)
The definitions of each INFOCON are:
INFOCON 5 - Normal Readiness Procedures
INFOCON 4 - Increased Military Vigilance Procedures
INFOCON 3 - Enhanced Readiness Procedures
INFOCON 2 - Greater Readiness Procedures
INFOCON 1 - Maximum Readiness Procedures
Explain the difference between vulnerability and threat
Threat - the potential to adversely impact organizational operations. Ex. Unauthorized access, destruction, disclosure,
Vulnerability - Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source
State the duties and responsibilities of the IAM
Individual responsible for the information assurance of a program, organization, system, or enclave.
Describe function and risk associate with following activities
- Network enumeration - occurs after scanning and is the process of gathering and compiling usernames, machine names (like taking an inventory) BLUF: actively querying or connecting to a target to acquire information
- Buffer overflow - exploits that hackers use against an operating system or application; buffer overflow exploit causes the system to fail by overloading its memory
- SQL Injections - can give an attacker access to database content or allow the hacker to remotely execute system commands
- Dictionary Attack - An attempt to crack a password using a list of dictionary words
- Privilege Escalation - Sailors starts out as a user, then sysadmin, then domain admin etc.
- Brute Force - Complex password that use letters, numbers and special characters
- Social Engineering - nontechnical method of breaking into a system or network. The process of deciding users of a system and convincing them to perform actions for the hackers.
Describe ADNS
Automated Digital Networking System - primary function is to connect Navy shipboard networks to other ship and shore networks for transferring IP date of various classifications levels. Also converts IP into RF signals…
Describe CUDIXS
CUDIXS - Common User Digital Information Exchange Subsystem: Has the capability to both send and recieve narrative message traffic. Up to 60 subscribers per CUDIXS suite. Each subscriber can send and receive operator-to-operator type messages in free form and up to 80 characters in length.
Describe VERDIN
The VLF Digital Information Network broadcast system provides a highly reliable and secure system for worldwide delivery of operational, tactical, and admin messages… (Part of TACAMO)
Discuss GINGERBREAD
A codeword meaning that voice imitative deception is suspected on this net.
Discuss BEAD WINDOW
Bead window is a real-time procedure which brings to the immediate attention of circuit operators the fact that an EFFI disclosure has occurred. Proper response for a net member receiving a BEADWINDOW will be “Roger Out” using proper net call signs.
List the components of a standard navy message (format lines)
FL 6 - From FL 7 - To FL 8 - Info FL 12 - Message Text FL 16 - End of Message
Define the following message precedence
R - Routine, 6 hours
P - Priority, 3 hours
O - Immediate, 30 minutes
Z - Flash, as fast as possible with an objective of less than 10 mins
W - The CRITIC message contains info vital importance
Define the roles of the Navy BLUE and RED teams
BLUF TEAM - conduct operational network vulnerability evaluations and provide mitigation techniques to customers.
RED TEAM - an authorized group to emulate a potential adversary attack or exploitation against an enterprise security posture. GOAL is improve security posture by demonstrating impacts of successful attacks and what works for the defenders.
Discuss the five step planning process for OPSEC
Step One - Identification of Critical information
Step Two - Analysis of Threats
Step Three - Analysis of Vulnerabilities
Step Four - Risk Assessment
Step Five - Application of the Countermeasures
Describe the following Types of Intelligence (HUMINT/OSINT/MASINT/SIGINT/COMINT/FISINT/ELINT/IMINT/ACINT)
HUMINT - Human intelligence is gathering info through human contact
OSINT - Open source information derived from newspapers, journals, radio, TV and the internet.
MASINT - Measurement and Signature Intelligence derived from special technical sensors for purpose of identifying and distinctive features associate with the source, emitter..
SIGINT - Signal Intelligence includes transmissions associated with comms, radar, and weapons systems used by our adversaries
COMINT - Communications Intelligence gained through the interception of foreign communications, excluding open radio and TV.
FISINT - Foreign Instrumentation Signals Intelligence derives from the interception of foreign Electromagnetic emissions associated with testing operational deployment surface and subsurface systems.
ELINT - Electronic Intelligence derive from foreign non-communications Electromagnetic Radiation emanating from detonations.
IMINT - Imagery Intelligence derive from the exploitation of collection by visual photography, infrared sensors, lasers etc.
ACINT - Acoustic Intelligence derive from the collection and processing of acoustic phenomena
Give 3 examples of Intelligence briefs
- Commanders Briefings
- Aircrew Briefings
- By voice radio (usually encrypted)
The communication capabilities of bands below:
ELF 3Hz - 30Hz SLF 30Hz - 300Hz ULF 300Hz - 3KHz VLF 3KHz - 30KHz LF 30KHz - 300KHz MF 300KHz - 3MHz HF 3MHz - 30MHz VHF 30MHz - 300MHz UHF 300MHz - 3GHz SHF 3GHz - 30GHz EHF 30GHz - 300GHz
Half Duplex / Duplex / Simplex Definitions
Half Duplex - has one-way flow of information between terminals
Full Duplex - comms take place simultaneously in both directions at the same time
SIMPLEX - Communicates in one direction only
Geostationary Operational Environment Satellite (GOES)
GOES satellites are a mainstay of weather forecasting in the US an are the backbone of short-term forecasting. The real-time weather data gathered by GOES satellites, combined with data from weather surveillance radar (WSR-88D)
There are four GOES currently in orbit
GOES-10 - Stationed 60 degrees west; provides 24 hour coverage of South America
GOES-11 - Stationed 135 degrees west; primary western US Satellite
GOES-12 - Stationed 75 degrees west; provides 24-hour coverage for the eastern portion of US
GOES-13 - “New” Stationed 105 degrees west; Serves as a backup to GOES 11 and 12.
Polar Operational Environmental Satellite (POES)
POES is able to collect global data on a daily basis for a variety of land, ocean, and atmospheric applications.
Defense Meteorological Satellite Program (DMSP)
There are currently 6 DMSP satellites in orbit:
- F-12: Used to provide tactical data
- F-13/14/15: Secondary satellites
- F-16/17: Serve as primary satellites
Discuss NOVA
Navy shore base message handling system, processes GENSER messages. Has been replaced by DMS.
Discuss IBS
Integrated Broadcast Service, integration of various SIGINT broadcast dissemination systems into a standardized protocol with compatible hardware and software
Discuss INMARSAT
International Maritime Satellite - Telecommunications offering global, mobile services
Discuss meaconing
Transmission of signals designed to deceive users of navigational aids
Discuss Jamming
Deliberate radiation, re-radiation, or reflection of electromagnetic energy to disrupt use of electronic devices, equipment, or systems.
Discuss spectrum management
Planning, coordinating and managing joint use of the Electromagnetic Spectrum
State the purpose of an OPTASK COMMS
Defines nets/circuits and approved frequencies w/ in an area
State the purpose of a COMMPLAN
A communications plan lists what communication circuits are required and indicate where and when they are needed
State the purpose of a TSR
A telephone service request is a request for services over the phone lines
State the purpose of a COMSPOT
A communications spot outage report provides pertinent information concerning conditions that impose serious degradation of communications operations.
State the purpose of the electronic key management system
To manage the use, control and destruction of sensitive cryptographic material essential to operations.
State the purpose of OTAT/OTAR
Over the air key transfer/Over the air rekey allows users to update their cryptographic requirements via RF
Discuss the security procedures involved when performing cross-domain transfers.
- Review the security attributes of each system to determine additional security requirements to be implemented.
- Document the requirements as part of the accreditation
Discuss risk management
Allows IT managers to balance the cost of protective measures while achieving gains in mission capability
Define the 5 attributes of IA:
- Confidentiality - assurance that info is no disclosed to unauthorized persons, processes or devices.
- Integrity - Assurance that info is not modified by unauthorized parties in an unauthorized manner
- Availability - assurance of timely, reliable access to data and information systems by authorized users
- Non-repudiation - assurance that the sender of data is provided with proof of delivery and the recipient is provided with proof of senders identity
- Authentication - assurance of the identity of an email message sender or receiver
List and define 9 categories of computer incidents
- Malicious Logic
- User level intrusion
- Root level intrusion
- Denial of Service
- Explained Anomaly
- Reconnaissance
- Unsuccessful Activity Attempt
- Non-compliance Activity
- Investigating
Describe the DON World Wide Web Security policy:
All websites must be registered through the Navy website registration system
Define vulnerability assessment:
Examination of information system or product to determine the efficiency of security measures.
Explain the difference between vulnerability and threat
Vulnerability- a security weakness that could be exploited by a threat
Threat - Any circumstance with the potential to adversely impact organizational operations