110 Flashcards
110.1 Describe the mission of the following primary warfare areas: ASW; SUW; IW; AW; STW; NSW
a. ASW – Anti Submarine Warfare. The goal of ASW is to deny the enemy the effective use of its submarine.
b. SUW – Surface Warfare. The aim of SUW is to deny the enemy the effective use of its surface warships and cargo-carrying vessels.
c. IW – Information Warfare is the action taken to achieve information superiority over the adversary by influencing his information and information-based processes, systems, and computer-based networks, while defending our own.
d. AW – Air Warfare is the action required to destroy or reduce an enemy’s air and missile threat.
e. STW – Strike Warfare is the destruction or neutralization of enemy land-based targets with conventional or nuclear missiles. This includes targets assigned to nuclear strategic forces, building yards, and operating bases from which an enemy is capable of conducting or supporting air, surface, or subsurface operations.
f. NSW – Special Warfare is distinguished by unique objectives, weapons, and forces, and is carried out by special mobile operations, unconventional warfare, coastal and river interdiction, beach and coastal reconnaissance, and tactical intelligence operations.
110.2 Explain how the Reserve Component integrates with the Active Component:
- The mission of the Reserve component is to provide trained units and qualified persons available for active duty in the armed forces, in time of war or national emergency and at such other times as the national security may require.
110.3 Explain the purpose of a mobile detachment:
- Provide direct or indirect support to an operational entity to further enhance or support that entity’s operational or administrative capability.
110.4 Discuss the primary services provided by the following deployable METOC teams:
a. Mine Warfare UUV Platoon - This specialized platoon removes divers and marine mammals from the dangers and extreme hazards of Mine Countermeasure Warfare and replaces them with Unmanned Underwater Vehicles (UUVs) that can perform this function.
b. Naval Oceanography ASW Team (NOAT) - Provides integral support to ASW by taking model output and turning it into tactically relevant information that helps warfighters decide where and how to best use their sensors.
c. Strike Group Oceanography Team (SGOT) - Strike Group Oceanography Team supports aircraft carriers and amphibious ships, as well as special warfare operations, by providing them with meteorological and oceanographic support.
d. Mobile Environmental Team (MET) - They are the primary users of the Navy’s mobile equipment assets. They have their own portable sensing and display equipment which contain modules for tactical meteorological and oceanographic forecasting, polar-orbiting satellite ingest and processing and expendable bathythermograph probes.
e. Fleet Survey Team (FST) - FST members perform near-shore surveys to collect data which aids in the safe navigation of U.S. forces and supplies traversing the area.
110.5 Discuss the IO Core Capabilities:
- IO consists of five core capabilities which are: PSYOP, MILDEC, OPSEC, EW, and CNO. Used in conjunction with supporting and related capabilities, they provide the JFC with the principal means of influencing an adversary and other target audiences by enabling the joint forces freedom of operation in the information environment.
110.6 Define the roles of the U. S. Navy Blue and Red teams:
- Blue Team - The group is responsible for defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers (i.e., the Red Team). Typically the Blue Team and its supporters defend against real or simulated attacks, conduct operational network vulnerability evaluations, provide mitigation techniques and identifies security threats and risks in the operating environment.
- Red Team - A group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture. The Red Team’s objective is to improve enterprise Information Assurance by demonstrating the impacts of successful attacks and by demonstrating what works for the defenders (i.e., the Blue Team) in an operational environment
110.7 Explain the purpose of FES:
- Fleet Electronics Support - Responsible for the installation, removal, maintenance and repair of electronic equipment on surface and subsurface combatants.
110.8 Explain the difference between the following documents:
- USC Title 10 - Provides the legal basis for the roles, missions and organization of each of the services as well as the United States Department of Defense.
- USC Title 50 - Outlines the role of War and National Defense in the United States Code.
110.9 Define CRITIC:
- Critical Intelligence Communications. From the Intelligence Community Directive (ICD) 190, it is the message format intended for the timely identification and transmission of critical information concerning possible threats to US national security that are so significant that they require the immediate attention of the President (POTUS) and the National Security Council (NSC). This includes information pertaining to the decisions, intentions, or actions of foreign governments, organizations, or individuals that could imminently jeopardize vital US policy, economic, IS, critical infrastructure, cyberspace, or military interests. The message should be sent within 3 minutes of an event.
110.10 State the purpose of the following: CCOP; NITES; JDISS
a. CCOP – Cryptologic Carry-On Program. IO systems must respond to technological landscape to deliver tactically relevant data to the COTP. Carry-on capabilities rely heavily on government furnished software loaded on commercial-off-the-shelf (COTS) hardware and scaled to rapidly deploy on a wide range of platforms.
b. NITES - Navy Integrated Tactical Environmental Subsystem is the portable tactical environmental support system used by the U.S. Navy Mobile Environmental Teams operating aboard unit-level ships and at undeveloped shore sites. The main purpose is to enhance the automated capabilities of these teams/units to provide meteorology and oceanography (METOC) support at remote locations, which are often in harsh environments.
c. JDISS - The Joint Deployable Intelligence Support System program provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces, in garrison, and deployed during peace, crisis, and war. JDISS provides joint intelligence centers, joint task forces, and operational commanders with on-site automation support and the connectivity to make the best use of the Intelligence Community’s resources.
110.11 Discuss Maritime Domain Awareness:
- Maritime Domain Awareness is defined as the effective understanding of anything associated with the maritime domain that could impact the security, safety, economy, or environment
110.12 State the purpose of a MOC:
- Maritime Operations Center exists to streamline the operational cycle and to provide a structure for quickly and effectively establishing support for an operational level maritime commander. The MOC is an extension of the commander; its sole function is command support, and its authority is delegated to it by the commander.
110.13 Identify the following types of RADAR, their functions, and give examples of each: Air Search; Surface Search; Fire Control
- Air Search Used to search the air for signs of craft, eg. missiles, aircraft, obstacles like balloons, etc. It will typically use a wider beam width than a fire control style of radar, to enhance its ability to initially detect a target.
o Functions: two, (1) detection and accurate determination of range and bearing for objects to include low flying aircraft. (2) maintain a 360-degree search pattern for all objects within line of sight distance from the RADAR antenna.
o Example: AN/SPS-48E, SPS-49, SPS-40 - Surface Search Used to search the Earth’s surface for signs of land and air based craft, ie. Low flying planes or small boats. It is also used as a navigational aid in coastal waters and in poor weather conditions.
o Functions: two, detection and accurate determination of range and bearing for surface objects to include low flying aircraft. maintain a 360-degree search pattern for all objects within line of sight distance from the RADAR antenna.
o Example: AN/APS-126 is the surface search radar for the patrol version of the P-3 Orion. - Fire Control Used to search, track, and provide inputs to a fire control system. It specifically will provide things such as: target azimuth, elevation, range, and range rate. Its inputs are fed to directed energy weapon systems to ensure that they hit their target. Due to this they are also known as ‘targeting radars’ or ‘illuminators’. It will typically use a very narrow beam to track its target, making it not suitable for initially finding a target. This is why there are multiple types of radar, to complement each strength and weakness.
- Modern antennae have a built in ability to perform both air search and fire control through the use of a sleeping phased array antenna that can come online on demand making for a much tighter accuracy ‘Fire Control’ style RADAR.
110.14 Explain the difference between OPELINT and TECHELINT.
- Tech; concerned with the technical aspects of foreign non-communications emitters such as signal characteristics, modes, functions, associations, capabilities, limitations, vulnerabilities, and technology levels.
- OP; concerned with the operationally relevant information such as the location, movement, employment, tactics, and activity of foreign non-communications emitters and their associated weapon systems.
110.15 Describe the core components of an IW professional.
- This is effectively the same question as 110.5 (Discuss the IO core capabilities) Information Operations (IO) There are five: Signals Intelligence (SIGINT), Electronic Warfare (EW), Psychological Operations (PSYOP), Military Deception (MILDEC), Operations Security (OPSEC), Computer Network Operations (CNO). They are used in conjunction with supporting and related capabilities to influence, disrupt, corrupt, and usurp targeted enemy systems, while protecting our own.