110 Flashcards

1
Q
110.1 Describe the mission of the following primary warfare areas
ASW
ASUW
IW
AW
STW
NSW
A

a. ASW: Anti-Submarine Warfare is the destruction or neutralization of enemy submarines. It includes the action taken by aircraft, surface ships, and other submarines. The goal of ASW is to deny the enemy the effective use of its submarine.
b. ASUW: Anti-Surface Warfare is the destruction or neutralization of enemy surface combatants and merchant ships. The aim of ASUW is to deny the enemy the effective use of its surface warships and cargo-carrying vessels.
c. IW: Information Warfare is the action taken to achieve information superiority over the adversary by influencing his information and information-based processes, systems, and computer-based networks, while defending our own. IW capitalizes on the growing sophistication, connectivity, and reliance on information technology. The ultimate target of IW is the information-dependent process, human or automated. Intelligence and communications support are critical to conducting offensive and defensive IW.
d. AW: Air Warfare is the action required to destroy or reduce an enemy’s air and missile threat. It includes the use of interceptors, bombers, antiaircraft guns, surface-to-air missiles (SAMs), air-to-air missiles (AAMs), and electronic attack (EA) procedures. It also includes the destruction of the missile threat before and after launch. Other measures used to reduce the effects of hostile air actions include cover, concealment, dispersion, deception (including electronic), and mobility.
e. STW: Strike Warfare is the destruction or neutralization of enemy land-based targets with conventional or nuclear missiles. This includes targets assigned to nuclear strategic forces, building yards, and operating bases from which an enemy is capable of conducting or supporting air, surface, or subsurface operations.
f. NSW: Special Warfare is distinguished by unique objectives, weapons, and forces, and is characterized by the following:
Principally offensive, involving high physical and political risk
Directed at high-value, critical, and often perishable targets
Principally politico-military in nature and subject to oversight at the national level
Frequently covert or clandestine
It includes special mobile operations, unconventional warfare, coastal and river interdiction, beach and coastal reconnaissance, and tactical intelligence operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

110.2 Explain how the Reserve Component integrates with the Active Component

A

The mission of the Reserve component is, as defined in Section 10102 of Title 10 U.S.C., to “provide trained units and qualified persons available for active duty in the armed forces, in time of war or national emergency and at such other times as the national security may require.”
Strategy demands the Selected Reserve (SELRES) be prepared to respond to the entire spectrum of requirements, including war or national emergency, contingency operations, military operations other than war (MOOTW) , Peacetime Contributory Support (PCS), humanitarian operations, full or partial mobilization (including pre and/or post mobilization) and at such other times as the national security may require.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

110.3 Explain the purpose of a mobile detachment

A

Mobile detachments are reserve units designed to augment and integrate with a much smaller active unit for purposes of deployment. They deploy as an entire unit, rather than as individuals. SeaBees are a prime example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

110.4 Discuss the purpose of Direct Support Assets

A

Fleet commanders depend upon NAVSECGRU deployable assets to meet quick reaction mission requirements. These assets should be maintained ready for deployment at all times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

110.5 Discuss the primary services provided by the following deployable METOC teams
Mine Warfare UUV Platoon:
Naval Oceanography ASW Team (trike Group Oceanography Team (SGOT)

Mobile Environmental Team (MET):
Fleet Survey Team (FST):

A

a. Mine Warfare UUV Platoon: Responsible for
operational test and evaluation of new UUV technology for both Surface Mine Countermeasures (SMCM) and Underwater Mine Countermeasures (UMCM), providing MCM baseline and tactical surveys for strategic and operational Intelligence Preparation of the Operational Environment (IPOE), and mine hunting capability to MCM commanders.
b. Naval Oceanography ASW Team (NOAT): NOATs are experts in ASW-related environmental analysis, forecasting, and planning. They complement the skills resident in other experts like ACINT specialists, sonar system operators, and IMAT MTT TDA trainers. They deploy to provide direct support to ASW Commanders and staffs at the theater, strike group, DESRON, and MOCC levels. A team is typically composed of 2 to 3 personnel to provide on-scene planning and analysis support to ASW operations and to act as a forward liaison element to the ASW Reachback Cell. NOAC Stennis teams support all CONUS-based carrier strike group staffs through workups and deployments as well as fly-away teams for ASW operations and major exercises in the Second, Third, Fifth, and Sixth Fleets. NOAC Yokosuka deploys NOATS in support of forward deployed naval forces, and supports CTF-74, CTF-72, CTF-57, CTF-54, and CDS-15 planning. Most NOATs are continuously supporting multiple units and may provide support remotely via email, chat, etc.
c. Strike Group Oceanography Team (SGOT): Provide timely, comprehensive and tactically relevant METOC products and services in direct support of deploying Carrier Strike Group (CSG), Expeditionary Strike Group (ESG), and Amphibious Readiness Group (ARG) Commanders, assigned units, staff and other U.S. and Joint or Coalition forces, as directed. The SGOTs are departments within the Fleet Weather Centers (FWC) in Norfolk and San Diego.
All operational CVN and LHA/D class ships embark an SGOT to augment the ship’s OA division underway. Teams typically consist of an Aerographer’s Mate (AG) Chief, three AG Forecasters (NEC 7412), and four AG Technicians (NEC 0000). The role of an SGOT is to act as organic METOC support to the OA Division Officer and embarked staffs afloat, and to assist in the integration of METOC impacts into warfighter mission planning. Onboard LHA/Ds the SGOT coordinates all METOC support with the embedded MEU forecasters to provide comprehensive support to their respective ARG.
d. Mobile Environmental Team (MET): A smaller MET is utilized to support specific warfighting missions. A MET Team typically consists of one AG Forecaster and one AG Technician, but will flex based on the mission. METs are deployed based on the following prioritization, along with input from the Numbered Fleet METOC Officer:
JTF-Civil Support, Humanitarian Assistance / Disaster Relief (HA/DR) Missions
Flag Staff, Maritime Headquarters, Major Fleet Exercise, and Surge Operations Support
Maritime Security Operations and Theater Security Cooperation Support
United States Coast Guard (USCG) Support
North Atlantic Treaty Organization (NATO) Support
e. Fleet Survey Team (FST): Safety of navigation support is provided by the Naval Oceanographic Office (NAVOCEANO) located at Stennis Space Center, MS and its collocated subordinate command, Fleet Survey Team (FST). NAVOCEANO and FST can produce navigation products for short-term use by U.S. Navy vessels when neither NGA nor NOAA can meet immediate operational requirements. Additionally, FSTs maneuverability can allow rapid collection, analysis and dissemination of shallow water bathymetric data that provides an expeditionary safety of navigation capability that focuses on one-time use products that give the user qualitative vice quantitative information to support expeditionary ship-to-shore movement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

110.6 Discuss the IO Core Capabilities

A

Information operations are actions taken to affect adversary information and information systems, while defending one’s own information and information systems. IO require the close, continuous integration of offensive and defensive capabilities and activities, as well as effective design, integration, and interaction of C2 with intelligence support. IO are conducted through the integration of many capabilities and related activities. Major capabilities to conduct IO include, but are not limited to, OPSEC, PSYOP, military deception, EW, and physical attack/destruction. IO-related activities include, but are not limited to, public affairs (PA) and civil affairs (CA) activities. There are two major subdivisions within IO: Offensive IO and Defensive IO.
Offensive IO: Involve the integrated use of assigned and supporting capabilities and activities, mutually supported by intelligence, to affect adversary decision makers and achieve or promote specific objectives. These assigned and supporting capabilities and activities include, but are not limited to, OPSEC, military deception, PSYOP, EW, physical attack/destruction, and special information operations (SIO), and could include CNA.
Defensive IO: Integrate and coordinate policies and procedures, operations, personnel, and technology to protect and defend information and information systems. Defensive IO are conducted and assisted through information assurance (IA), OPSEC, physical security, counter deception, counterpropaganda, counterintelligence (CI), EW, and SIO. Defensive IO ensure timely, accurate, and relevant information access while denying adversaries the opportunity to exploit friendly information and information systems for their own purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

110.7 Define the roles of the U. S. Navy Blue and Red teams

A

BLUE TEAM: The group responsible for defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers (i.e., the Red Team). Typically the Blue Team and its supporters must defend against real or simulated attacks 1) over a significant period of time, 2) in a representative operational context (e.g., as part of an operational exercise), and 3) according to rules established and monitored with the help of a neutral group refereeing the simulation or exercise (i.e., the White Team).
The term Blue Team is also used for defining a group of individuals that conduct operational network vulnerability evaluations and provide mitigation techniques to customers who have a need for an independent technical review of their network security posture. The Blue Team identifies security threats and risks in the operating environment, and in cooperation with the customer, analyzes the network environment and its current state of security readiness. Based on the Blue Team findings and expertise, they provide recommendations that integrate into an overall community security solution to increase the customer’s cyber security readiness posture. Often times a Blue Team is employed by itself or prior to a Red Team employment to ensure that the customer’s networks are as secure as possible before having the Red Team test the systems.
RED TEAM: A group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture. The Red Team’s objective is to improve enterprise Information Assurance by demonstrating the impacts of successful attacks and by demonstrating what works for the defenders (i.e., the Blue Team) in an operational environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

110.8 Explain the purpose of FES

A

Fleet Electronics Shop: direct support assets deployable equipment suites
TYPICAL FES RESPONSIBILITIES
1. Within operating capabilities, provide assistance to all ships entering port with cryptologic equipment casualties.
2. Work with designated activities to perform equipment and van onloads/offloads including fabrication as required.
3. As directed by higher authority, provide qualified maintenance personnel for TAD.
4. Maintain an operating pool of augmentation equipment for use in afloat cryptologic operations.
5. Assist in the material checkout, inspection and certification of shipboard cryptologic installations.
6. Comply with administrative, logistics, and inventory requirements specified in applicable COMNAVSECGRU instructions.
7. Conduct military/professional training to ensure assigned personnel are prepared for short/no notice tasking.
8. Maintain all facilities in accordance with existing instructions.
9. Develop technical documentation for all work performed and installations completed.
10. Render technical advice and assistance to the extent resources permit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

110.9 Explain the difference between the following documents
TITLE 10
TITLE 50

A

a. USC Title 10 [ref. j]: It provides the legal basis for the roles, missions and organization of each of the services as well as the United States Department of Defense.
Subtitle A: General Military Law, including Uniform Code of Military Justice
Subtitle B: Army
Subtitle C: Navy and Marine Corps
Subtitle D: Air Force
Subtitle E: Reserve Components
b. USC Title 50 [ref. k]: Title 50 of the United States Code outlines the role of War and National Defense in the United States Code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

110.10 Define CRITIC

A

Critical Intelligence Communication: One of two formal reports to the National Military Command Center (NMCC) that could initiate a CRISIS ACTION PLAN.
Should come from area combatant command and include information about the nature of the crisis, forces readily available, major constraints to include terrorist threat considerations and force protection requirements, actions being taken within existing ROE, if any, and discussion of various COAs recommended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

110.11 State the purpose of the following
CCOP
NITES

A

a. CCOP [ref. c]: Develops state-of-the-art signal acquisition software in response to emergent Combatant Command requirements for a quick-reaction surface, subsurface and airborne cryptologic carry-on capability.
Before deployment for operational use, systems must be systematically tested to ensure suitable and reliable operation, tested for network vulnerabilities if connected to shipboard Local Area Networks, and tested relative to interoperability requirements. Certification testing is conducted to meet Office of Naval Intelligence security requirements and network testing is conducted in accordance with Information Technology (IT)-21 requirements to allow connection to Navy networks.
b. NITES [ref. h]: Navy Integrated Tactical Environmental Subsystem is the portable tactical environmental support system used by the U.S. Navy Mobile Environmental Teams operating aboard unit-level ships and at undeveloped shore sites. The NITES IV subsystem is also used by the U.S. Marine Corps weather service personnel assigned to Fleet Marine Force units. The main purpose of NITES IV is to enhance the automated capabilities of these teams/units to provide meteorology and oceanography (METOC) support at remote locations, which are often in harsh environments. The system is portable, lightweight, rugged, flexible and independent and allows deployment of the minimal hardware and software configuration needed to support each mission. NITES IV serves as the replacement system for the Interim Mobile Oceanographic Support System (IMOSS) and the METOC Integrated Data Display System-Tactical (MIDDS-T). Procurement, installation and training are provided by NAVOCEANO Systems Integration Division.
c. JDISS [ref. e]: The Joint Deployable Intelligence Support System (JDISS) program provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces, in garrison, and deployed during peace, crisis, and war. It provides the Joint Intelligence Center (JIC), Joint Task Forces (JTF) and operational commanders with on-site automation support and the connectivity necessary to execute the intelligence mission. JDISS and the Joint Worldwide Intelligence Communications System (JWICS) together comprise the joint standard and foundation for commonality among intelligence support systems. JDISS provides joint intelligence centers, joint task forces (JTFs), and operational commanders with on-site automation support and the connectivity to make the best use of the Intelligence Community’s resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

110.12 Discuss Maritime Domain Awarenes

A

The maritime Domain is defined as all areas and things of, on, under, relating to, adjacent to, or bordering on a sea, ocean, or other navigable waterway, including all maritime-related activities, infrastructure, people, cargo, and vessels and other conveyances.
Maritime domain awareness (MDA) is the effective understanding of anything associated with the global maritime domain that could impact the security, safety, economy, or environment of a nation and is essential in all maritime activities. MDA capability will be achieved by improving our ability to collect, process, exploit, fuse, analyze, display, and disseminate actionable information and intelligence to operational commanders, interagency partners, and non-government organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

110.13 State the purpose of a MOC

A

Maritime Operations Center exists to streamline the operational cycle and to provide a structure for quickly and effectively establishing support for an operational level maritime commander. The MOC is an extension of the commander; its sole function is command support, and its authority is delegated to it by the commander. The span of control a commander can effectively exercise is finite. At the operational level, the commander normally delegates the authority to plan and execute tactical missions to subordinate task force or task group commanders. This enables the commander and his MOC to focus attention on the operational level and empowers subordinate commanders to employ their forces to support the commander’s intent. A MOC’s structure, organization, and staffing differs depending upon the mission assigned, the environment within which operations will be conducted, the make-up of existing and potential adversaries or nature of the crisis, and the time available to reach the desired end state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly