Book 1 Flashcards
State the location, mission, and component commands for the following: CNO N2/N6:
Director of Naval Intelligence/ Deputy Chief Naval operations (communications networks). A critical link to the inteligence community.
State the location, mission, and component commands for the following: CNMOC
Commander Naval Meteorology and Oceanography command
State the location, mission, and component commands for the following: NNWC
Naval Network warfare command- Norfolk, Virginia- Operations and Security of the Global Interface Grid (GIG)
State the location, mission, and component commands for the following: JSOC
Joint Space Operations Center- Vandenberg AFB, California
State the location, mission, and component commands for the following: NOAA
National Oceanic and atmospheric Administration- Silver Spring, Maryland
State the location, mission, and component commands for the following: NAVSOC Naval Sattelite Operations Center
Point Mugu, CA- provides Highly efficent, low cost, reliable suport to critical Navy and DOD sattelite systems, all in support of the joint warfighter
State the location, mission, and component commands for the following: NAVIFOR
Suffolk, Virginia. Commander, nval information forces. Resposible for Navy IW force generation and delivery to naval and joint operational commanders; IW doctrine, policy and goverance; training requirements; and community management.
State the location, mission, and component commands for the following: ONI
Office of Naval Intelligence- Suitland, Maryland and produces meaningful maritime intelligence and moves that intelligence rapidly to key strategic, operational, and tactical decision-makers
State the location, mission, and component commands for the following: Office of the Oceanographer/ Navigator of the navy
provides naval, joint, and coalition war fighters with environmental understanding of the air, surface, and subsurface maritime battle space- Washington, D.C.
State the location, mission, and component commands for the following: USCYBERCOM
US Cyber command and is located at fort meade, Maryland
2nd Fleet Location
Norfolk, VA. Western North Atlantic Ocean
3rd Fleet Location
San Diego, CA. Eastern Pacific Ocean
4th Fleet Location
Africa
5th Fleet Location
Middle East. Persian Gulf, Red Sea and partially the Indian Ocean.
6th Fleet Location
Gaeta, Italy. Eastern North Atlantic and mediterranean
7th Fleet Location
Yokosuka, Japan. Western Pacific and Indian Ocean
10th Fleet Location
Cyber space and Space
TF
Task force
TG
Task Group
TU
Task Unit
TE
Task Element
Aerographers Mate (AG)
collect, measure, and analyze the elements of the physical environment (land, sea, air, space) and land/ sea interface.
Cryptologic Technicians Interprative
conduct Infromation Operations (IO) using foreign language skills and advanced computer systems
Cryptologic Technicans Maintenance
perform preventative and corrective maintenance on electrical and electronic cryptological equipment.
Cryptologic technicians Networks (CTN) Superseded by CWT Cyber warfare Tech
monitor, identify, collect and analyze information, provide data for digital network products, and conduct computer network operations
Cryptologic Technicians Collection (CTR)
operate state-of-the-art computer systems to conduct information operations; collect, analyze and exploit signals of interest to identify, locate and report worldwide threats.
Cryptologic Technicians Technical (CTT)
operate and maintain electronic sensors and computer systems; collect, analyze, exploit, and disseminate Electronic Intelligence (ELINT) all in accordance with fleet and national tasking.
Intelligence Specialist (IS)
assist in every phase of the planning, collectionm processing, analysis, and idssemination of intelligence information; assemble and analyze multi-source operational intelligence in support of all warfare areas.
Information System Technicians (IT)
perform core and specialty functions of Communications Operations, message processing, and network administration and security.
Define NCTAMS LANT
Norfolk, VA. Provides secure and reliable, classified and unclassified, voice, messaging, video, and data, telecommunications to surface, subsurface, air and ground forces in support of Command, Control, Computer, Communications, and Intelligence (c4I) for real-world operations and exercises and to US Naval, Joint and Coalition operating forces worldwide.
Define NCTAMS PAC
Wahiawa, HI. Provides similar infrastructure support mainly for PACFLT Aswell as a backup to NCTAMS LANT.
Define NCTS Bahrain
Provides multi-spectral connectivity, network operations and information assurance to navy, joint and coalition forces in support of operations
Define NCTS Guam
(NCTS Guam) is a United States Navy communications facility on the U.S. territory of Guam. NCTS Guam is under 10th Fleet and NCTAMS PAC
Define NCTS NAPLES
The Naval Computer and Telecommunications Station Naples (NCTS Naples) provides voice, video and data services to the U.S. Navy joint, allied and coalition customers.
Define NCTS San Diego
NCTS San Diego is a regional communication office that provides quality, integrated tactical and non-tactical telecommunications connectivity to local and regional customers, both afloat and ashore
DEFINE C5I
COMMAND, CONTROL, COMMUNICATION, COMPUTERS, COLLABORATION, AND INTELLIGENCE.
EXPLAIN THE MISSION OF DISA
TO PROVIDE COMMAND AND CONTROL CAPABILITIES AND ENTERPRISE INFRASTRUCTURE TO ASSURE GLOBAL NET-CENTRIC ENTRPRISE ACROSS FUL SPECTRUM OF OPERATIONS.
EXPLAIN THE MISSION OF THE NASIC
NAVAL AIR AND SPACE INTELLIGENCE CENTER- PROVIDSE INTEL DIRECTLY TO MILITARY UNITS DEVELOPMENT AND SUSTAINMENT OF US AIR, SPACE AND CYBERSPACE CAPABILITIES.
STATE THE MISSION OF NCDOC
TO COORDINATE, MONITOR AND OVERSEE THE DEFENSE OF THE NAVY COMPUTER NETWORKS AND SYSTEMS; TO EXECUTE COMPUTER NETWORK DEFENSE MISSIONS AS ASSIGNED BY COMMANDER, TENTH FLEET AND COMMANDER, US CYBER COMMAND.
ODNI
OFFICE OF DIRECTOR OF NATIONAL INTELLIGENCE
DIA
DEFENSE INTELLIGENCE AGENCY
NSA
NATIONAL SECURIT AGENCY
CIA
CENTRAL INTELLIGENCE AGENCY
NGA
NATIONAL GEOSPATIAL INTELLIGENCE AGENCY
DHS
DEPARTMENT OF HOMELAND SECURITY
FBI
FEDERAL BUREAU OF INVESTIGATION
DEA
DRUG ENFORCEMENT AGENCY
DOE
DEPARMENT OF ENERGY
DOS
DEPARTMENT OF STATE
DOT
DEPARTMENT OF TRANSPORTATION
NASA
NATIONAL AERONAUTICS AND SPACE ADMINISTRATION
NMEC
NATIONAL MEDIA EXPLOITATION CENTER
NRO
NATINOAL RECONNAISSANCE OFFICE
USAF
USAIRFORCE
USA
US ARMY
USMC
US MARINE CORP
USN
US NAVY
USCG
US COAST GUARD
THREE LEVELS OF LEADERSHIP
DIRECT, SENIOR, EXECUTIVE.
COMMANDER IN CHIEF
PRESIDENT OF THE UNITED STATES, DONALD J. TRUMP IS THE OVERALL HEAD OF THE US ARMED FORCES.
SECRETARY OF DEFENSE
PETE HEGSETH. HEAD OF THE US DOD CONCERNED WITH THE ARMED SERVICES AND MILITARY MATTERS, THIS POSITION ROUGHLY OCRRESPONDS TO MINISTER OF DEFENSE IN OTHER COUNTRIES.
SECRETARY OF THE NAVY.
CARLOS DEL TORO WAS THE PREVIOUS. SUBORDINATE TO THE SECRETARY OF DEFENSE, THE SECRATARY OF THE NAVY IS RESPONSIBLE FOR, AND HAS STATUTORY AUTHORITY (TITLE 10 OF THE UNITED STATES CODE SECTION 5013) TO “CONDUCT ALL THE AFFAIRS OF THE DEPARTMENT OF THE NAVY”
Chairman of the Joint Chiefs of Staff:
Currently General Charles Q. Brown, Jr is the principal military adviser to the President, Secretary of Defense, and the National Security Council (NSC), also the highest-ranking military officer
Chief of Naval Operations
Admiral Lisa Marie Franchetti. Reports directly to the Secretary of the Navy for the command, utilization of resources and operating efficiency of the operating forces of the Navy and of the Navy shore activities assigned by the Secretary. Under the authority of the Secretary of the Navy, the CNO also designates naval personnel and naval resources to the commanders of Unified Combatant Commands.
Numbered Fleet Commander:
Each fleet is led by a three-star vice admiral, except Fourth Fleet is led by a rear admiral. These seven fleets are further grouped under Fleet Forces Command (the former Atlantic Fleet), Pacific Fleet, Naval Forces Europe, and Naval Forces Central Command, whose commander also doubles as Commander Fifth Fleet; the first three commands being led by four-star full Admirals
Type Commander:
COMNAVAIRFOR is responsible for modernization needs, training initiatives, and operational concept development for the naval aviation community throughout the U.S. Navy’s operational fleet.
Master Chief Petty Officer of the Navy:
James Honea. The senior enlisted leader of the Navy and reports directly to the CNO.
Fleet Master Chief
responsible for larger fleet commands: e.g., U.S. Pacific Fleet. There are Five Fleet Master Chief positions in the Navy
Force Master Chief
Force Master Chief: responsible for larger force commands: e.g., Submarine Force U.S. Atlantic Fleet. There are ten Force Master Chief positions in the Navy.
COMMAND MASTER CHIEF
Command Master Chief: Is the senior enlisted person at a command and as such works as a liaison between the Commanding Officer and the enlisted ranks, serving as the senior enlisted leader.
BBD
Billet Based Distribution – 10 Section document that gives a command all the pertinent information concerning
ODCR
The Officer Distribution Control Report – is similar to the BBD, except is utilized for the placement of officers.
AMD
Activity Manpower Document – contains the manpower requirements for the Navy.
Evaluation report:
is an evaluation of a Sailor’s performance in the last year and is used for personnel E-6 and below
Fitness report
Fitness reports are similar to the Evaluation reports but are designed for Officers W2-W5 and O1-O9.
Concurrent report:
Concurrent reports are filed when Sailors are away from their parent command such as IA or TAD for a period greater than 90 days
Page 2
SGLI and dependents page.
Page 13
Administrative comments in a Sailor’s record can be a local record or be added to their permanent record.
NAVPERS 1070/880 and 881
A listing of qualifications, awards earned, Schools attended and the history of assignments.
SGLI
$400,000 life insurance policy for all active-duty service members.
OPREP-3 NAVY BLUE:
any incident military, political, or media interests that are of high Navy, vice national level, interest; may include murder, rape, forcible sodomy, aggravated sexual assault, armed robbery, aggravated assault, assault with a deadly weapon, kidnapping, carjacking, and burglary of an occupied dwelling. Sent to CNO.
The OPEREP-3 NAVY PINNACLE:
used to report any event or incident that could attract national-level interest, are sent to the Pentagon.
OPREP-3 NAVY UNIT SITREP:
reported to the Operational Commander, and includes lesser misconduct to include domestic violence, domestic abuse, child abuse/neglect, child sexual abuse, indecent assault, assault with intent to commit rape or forcible sodomy, sexual harassment, DUI, suicide-related behavior, EO incidents, unlawful discrimination, and hazing.
Discuss the importance of the IG
The Office of the Inspector General of the Department of Defense was established as an independent and objective unit within the Department of Defense to conduct and supervise audits and investigations relating to the programs and operations of the Department of Defense.
State the purpose of the Navy Correspondence Manual.
The correspondence manual provides the user with the proper means of drafting Navy Messages from formatting to proper titles and spacing.
Explain the C-WAY program.
It is used for retention purposes to determine whether an individual was eligible to re-enlist and the manning volumes for each rating.
List the officer accession programs that are available to enlisted personnel.
- US Naval Academy and Naval Academy Preparatory School
- Selection and Training Program (BOOST)
- Officer Candidate School (OCS) Program
- Limited Duty Officer (LDO) and Chief Warrant Officer (CWO) Programs
- Seaman to Admiral-21 (STA-21) Program
- Medical Enlisted Commissioning Program
- Medical Service Corps In-service Procurement Program
Explain what the DLPT is.
The Defense Language Proficiency Test: is a battery of foreign language tests produced by the Defense Language Institute and are intended to assess the general language proficiency of native English speakers in a specific foreign language, in the skills of reading and listening.
104.12 State the duties and responsibilities of the Command ESO.
Education Service Officer: assists the Executive Officer in administering education programs and oversees the command’s training program.
Explain the purpose of the U. S. Navy’s Drug Screening Program.
Assists the local command with administering urinalysis testing to reduce or eliminate illicit drug use in the Navy.
Describe the six programs of Brilliant on the Basics.
- Career Development Board
- Sponsorship
- Mentorship
- Sailor Recognition
- Command Indoctrination
- Command Ombudsmen
104.15 Explain the CNO’s four core attributes.
- Integrity
- Accountability
- Initiative
- Toughness
Explain the purpose of the PAO.
The Public Affairs Officer: Their function is to coordinate between media outlets and the command’s OPSEC officer to prevent sensitive material from being disclosed to the public
Discuss the purpose of the 3-M/PMS System.
- 3M: Maintenance and Material Management is a program designed for commands to conduct maintenance on a specific schedule to achieve maximum equipment operational readiness.
- PMS: Preventive Maintenance System: is a standardized method for planning, scheduling, and accomplishing preventive maintenance.
Discuss the purpose and components of NTCSS
Naval Tactical Command Support System (NTCSS) is a logistics command and control support information system.
RADM
Relational Administration; Used for muster, PQS input, role assignments, and recall information.
R-SUPPLY
Relational Supply; Used to order tools/parts
OMMS-NG
Organizational Maintenance Management System-Next Generation, Job submission on ship’s equipment
Explain how DPAS is used to track equipment.
Defense Property and Accountability System: is software developed to standardize property accountability, asset management and financial reporting across all of the DoD.
Discuss the purpose of the MOV program.
Material Obligation Validation: is a system used to verify the unfilled quantity of a requisition that is not immediately available for issue (backorder).
Discuss the DLRs program.
Depot Level Repairable: are repaired at the organizational or intermediate level based on the cost and need for repair
Explain the procedures for NRFI DLRs in regard to the following situations. a. Turn-in:
DOD components shall physically turn in their property to the nearest DRMO when economically feasible and permitted by Hazardous Waste regulations.
Explain the procedures for NRFI DLRs in regard to the following situations. b. RIP (Receipt in Place or Remain in Place):
occurs when a command cannot remove the current part until a replacement can be made available for install.
Maintenance Assistance Modules (MAMs)
is a system recording, reporting and evaluating the maintenance requirements of the fleet.
Bulkhead mounted spares
spare parts located near or within a work center to provide easy access to replacement parts for items that require frequent repair.
Define the term CASREP
Casualty reporting – A system for requisitioning emergency replacement parts for equipment or components out of commission that are essential to the command’s mission.
CASREP CAT1
Non-sufficient impact on command.
CASREP CAT3
major degradation of secondary mission or minor degradation of a primary mission.
CASREP CAT2
minor degradation of secondary mission
COG
Cognizance Symbol
CASREP CAT4
loss of at least one primary mission (i.e. DIW).
NSN
National Stock Number
APL
Allowance Parts List
AEL
Allowance Equipage List
NC
Not Carried
NIS
Not in Stock
DD Form 1348-6
DOD Single Line-Item Requisition System Document
SIM
Selected Item Management
NAVCOMPT 2276
Contractual procurement
DD Form 448
Military interdepartmental purchase request
SF 44
On the spot, over-the-counter purchase request ($2,500 MAX for supplies, $25,000 for Aviation Fuel)
SF 1449
Solicitation Contract Order for commercial items
SF 30
Modification of contract
DD Form 1155
shipment invoice
DD Form 200
Survey Form - for missing or non-repairable electronic test equipment
SF 364
Report of Deficiency - for shipping or packing discrepancies
SF 386
Quality Deficiency Report - to report deficiencies in materials received
DD Form 1149
Requisition and invoice/shipping document
CHRIMP
The Consolidated Hazardous Material Reutilization and inventory Management Program serves as a fundamental element of the Navy’s life cycle control and management of hazardous materials.
DRMO
Defense Reutilization and Marketing Office. A service that is designed to save valuable ships resources by providing an inventory or excess material that has been turned into through the Defense Reutilization and Marketing Service (DRMS)
GSA Acquisitions
A self-service store operated by an ashore supply activity. Provides a ready supply of relatively low-cost items frequently required by customers in the area.
Explain OPTAR and its components.
Operational Target: is an estimated amount of money that will be required by an operating unit to perform tasks and functions that are assigned.
Discuss the uses of the Government commercial purchase Card (IMPAC VISA).
Is used as a payment vehicle for commercial invoices valued at or below the micro-purchase threshold ($3,000)
Normal Power
Power supplied by the power company.
Emergency Power
Backup or generator power if normal power fails
Uninterrupted Power
Assures continued performance during a power outage or allow time to transfer of function to an alternate power source.
Discuss the purpose of personnel security.
Purpose of personnel security is to authorize initial and continued access to classified information and/or initial and continued assignment to sensitive duties to those persons whose loyalty, reliability and trustworthiness are such that entrusting them with classified information or assigning them to sensitive duties is clearly consistent with the interests of national security. Additionally, the PSP ensures that no final unfavorable personnel security determination will be made without compliance with all procedural requirements.
TOP SECRET
(ORANGE) highest level, compromise would cause “exceptionally grave damage” to national security.
SECRET
(RED) compromise would cause “serious damage” to national security.
CONFIDENTIAL
(BLUE) lowest level, would cause “damage” to national security.
UNCLASSIFIED
(GREEN) can be released without clearance, but is sometimes restricted—SBU (Sensitive, But Unclassified), FOUO (For Official Use Only), or NOFORN (No Foreign Officials).
Explain what is meant by ‘need to know’.
Limits materials to personnel who have the appropriate clearance and a necessity for the information to perform their duties.
State the type of investigation and how often it is updated for access to the following classification levels. (TOP SECRET)
SSBI – 5 years
State the type of investigation and how often it is updated for access to the following classification levels. (SECRET)
NACLC – 10 and 15 years
State the type of investigation and how often it is updated for access to the following classification levels. (CONFIDENTIAL)
NACLC – 10 and 15 years
State the type of investigation and how often it is updated for access to the following classification levels. (SCI)
SSBI – 5 years
Identify what a (SAER) is and its purpose.
Security Access Eligibility Report is used to identify changes in a person’s eligibility for a security clearance.
Identify the events that should be reported to the SSO.
Any unlawful or criminal acts, foreign travel, changes in marital status, financial difficulties, and, but not limited to, any contact with foreign peoples or officials.
Identify who has overall authority of, and controls access to, a SCIF.
Special Security Officer (SSO).
SF700
security container information.
SF701
activity security checklist.
SF702
container checklist.
SF703
Top Secret Cover Sheet (SF704-Secret Cover Sheet & SF705-Confidential Cover Sheet)
SF153
COMSEC (CMS) Report.
SF312
classified information Non-Disclosure Agreement (NDA).
State when safe combinations should be changed.
- When first placed in use.
- When someone transfers out of the facility.
- When subjected to compromise.
- When taken out of service.
State the responsibilities of the DDA
The DDA has the authority and responsibility to control disclosures of Classified Military Information (CMI) and Controlled Unclassified Information (CUI) to foreign governments and international organizations and their representatives or persons sponsored by them.
State the purpose of the DCS.
Defense Courier Service: tasked with establishment, staffing, maintaining and operating an international network of couriers for secure transmission of classified documents and materials (USPS).
Describe the procedures for preparing hard copy classified material for transportation via (DCS)
classified documents and material shall be addressed with the standardized DCS two-line address. Envelopes, labels, or tags with visible “postage and fees paid” indicia shall not be used. Security classification markings, special security caveats, and other extraneous markings must not appear on the outer wrapper. Nickname and/or special project markings previously approved by the DCS must be placed on the outer wrapper.
Describe the procedures for preparing hard copy classified material for transportation via (Handcarry)
when transferring information inside a facility, use a coversheet. If it must be carried outdoors, double-wrap the item.
State the THREATCON recognition and Force Protection levels and discuss what each represents.
- NORMAL: general threat of terrorist activity is possible.
- ALPHA: threat of possible terrorist activity is unpredictable.
- BRAVO: a predictable terrorist activity exists.
- CHARLIE: a terrorist attack is imminent.
- DELTA: terrorist attack is occurring or just occurred.
Random Antiterrorism Measures (RAM)
used to deter possible terror plot by changing force protection posture (i.e. gate changes, hour changes, shift rotation changes, etc.).
PSP
Physical Security Program, provides authorized access to classified material.
ATFP
Anti-Terrorism Force Protection, provides a safe and secure environment for and deter acts of terrorism against DOD personnel, assets, and facilities.
Explain and state the purpose of an EAP.
Emergency Action Plan: establishes procedures to protect classified information and communications security materials during emergency situations such as abandoning ship or natural disasters. Can only be initiated by the Commanding Officer or the highest ranking official
Explain and state the purpose of Emergency Destruction Procedures.
Prescribes policy and procedures for planning, protecting, and destroying COMSEC material during emergency conditions
State who can give the order to initiate Emergency Destruction.
The Commanding Officer or other responsible official must be aware of and approve the emergency plan as outlined in the CO’s battle orders.
Explain how, and in what order, material is destroyed during Emergency Destruction.
Items are destroyed in the following order by burning, shredding, destroying, sinking, or physically smashing equipment.
- Priority One– Top Secret information
- Priority Two–Secret information
- Priority Three–Confidential information
Define SCI.
Sensitive Compartmented Information. Classified information concerning or derived from intelligence sources, methods, or analytical processes that is required to be handled within formal access control systems
Describe the Items that are PROHIBITED EXCEPT FOR OFFICIAL DUTY In a SCIF
- PROHIBITED EXCEPT FOR OFFICIAL DUTY:
a. Two-way transmitting equipment.
b. Recording equipment (audio, video, optical). Associated media will be controlled.
c. Test, measurement, and diagnostic equipment.
Describe the Items that are explicitly PROHIBITED IN SCIFs
- PROHIBITED IN SCIFs:
a. Personally owned photographic, video, and audio recording equipment.
b. Personally owned computers and associated media.
explain differences between PDS vs Security Violation
- PDS: A failure to comply with the provisions of security regulations causing a potential compromise of classified information
- Security Violation: A compromise of classified information to persons not authorized to receive it or a serious failure to comply with the provisions of security regulations which is likely to result in compromise.
Explain the security requirements for a SCIF
a solid, permanent facility that is sound-proof, one primary entrance with an automatic closing door, vents/ducts that are protected with bars, as well as opaque windows or no windows.
Explain the security requirements for a T-SCIF
Tactical SCIF has physical barriers like a facilities SCIF, but also has physically armed sentries standing guard over the space.
Explain vault recertification and recurring inspections.
For Secret and above, recertification and inspections occur every six months. For Confidential and below, every nine months.
Discuss the need for access lists, required documentation logs, and two-person integrity.
All of these are required for accountability purposes and to prevent the loss or theft of materials.
Explain the DOD escort policy.
The movement of all visitors shall be controlled to ensure that access to classified information is deliberate and consistent with the purpose of the visit.
Discuss the procedures for sanitizing an area.
The removal of information from the media or equipment such that data recovery using any known technique or analysis is prevented.
Discuss each of the following, giving their definition and the purpose of each:
a. COMSEC:
b. INFOSEC:
c. COMPUSEC:
a. COMSEC: Communications Security, protects classified and unclassified voice, video, and data systems.
b. INFOSEC: Information Security, protects US information and information systems.
c. COMPUSEC: Computer Security, protects computing systems against compromise.
State the purpose of the ICD system.
Principal means by which the DNI provides guidance, policy, and direction, and instruction to the Intelligence Community.
Identify SSO Navy
Special Security Officer for the Navy has been designated as the Cognizant Security Authority (CSA), and is responsible for implementing SCI security policy and procedures.
106.31 List the duties and responsibilities of the SSO
The SSO is responsible for the operation (i.e. security, control, use, etc.) of all command Sensitive Compartmented Information Facilities (SCIFs).
Identify who can be a CSM
The command security manager must be an officer or a civilian employee, GS-11 or above, with sufficient authority and staff to manage the program for the command.
State the duties and responsibilities of a CSM.
The CSM ensures that the security programs are coordinated and inclusive of all requirements as outlined in SECNAVINST-M-5510.36. (See section 204 for more information)
Explain and state the purpose of JPAS.
Joint Personnel Adjudication System: provides centralized, integrated system to assist verification of a person’s security clearance status and eligibility.
106.35 Explain and state the responsibilities of DODCAF.
Department of the Navy Central Adjudication Facility reports directly to DIRNCIS and conducts clearance verification to enhance national security and protect government information.
106.36 Discuss how long a Commanding Officer can administratively suspend access before DODCAF revokes a clearance.
30 days.
106.37 Discuss the security rules and procedures for magnetic and electronic media.
- Must be properly stored and labeled
- Must be degaussed and/or properly destroyed
- Records of materials and their destruction must be maintained
Define Information Assurance (IA)
Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.
Define Defensive Cyberspace Operations (DCO)
Missions are executed to defend the DODIN, or other cyberspace DOD cyberspace forces have been ordered to defend, from active threats in cyberspace
Define Offensive Cyberspace Operations (OCO)
Missions intended to project power in and through foreign cyberspace through actions taken in support of CCDR or national objectives.
107.2 Define Certification
comprehensive evaluation of the technical and non-technical security safeguards of an information system that establishes the extent to which a particular design and implementation meets a set of specific security requirements.
107.2 Define Accreditation
a process in which certification of competency, authority, or credibility is presented.
107.2 Define DAA
the Designated Approving Authority, is the official with the authority to formally assume responsibility for operating a system at an acceptable level of risk.
107.2 Define System Security Plan
the purpose of the system security plan (SSP) is to provide an overview of the security requirements of the system and describe the controls in place or planned responsibilities and expected behavior of all individuals who access the system.
107.2 Define ATO
Authorization to Operate, the official management decision issued by a DAA or authorize operation of an information system and to explicitly accept the residual risk to agency operations.
107.2 Define IATO
an Interim Authorization to Operate (IATO), is the temporary authorization granted by a DAA for an information system to process information based on preliminary results of a security evaluation of the system.
107.2 Define Configuration Management
management of security features and assurances through control of changes made to hardware, software, firmware, and documentation, test, test fixtures, and test documentation throughout the life cycle of an information system.
107.3 Discuss security procedures involved when performing cross-domain transfers.
In addition to command specified required training, transferring of files from a lower classification to a higher classification requires malware scanning of the source files, but is not limited to the type of file being transferred. From higher classification down however, the files MUST be converted to a .txt document and ran through a buster tool designed to look for key words to enable the user to safely transfer information without leaking potentially classified documents. Also, the user and a subject matter expert need to go through any document being transferred down to ensure that no potentially dangerous material is spilled onto an unclassified host.
107.4 Discuss Risk Management
Process of managing risks to agency operations (including mission, functions, image, or reputation), agency assets, or individuals resulting from the operation of an information system. The process considers effectiveness, efficiency, and constraints due to laws, directives, policies, or regulations.
107.5 Define the five attributes of IA
a. Confidentiality: is assurance that information is not disclosed to unauthorized individuals, processes, or devices.
b. Integrity: is assurance that information is not modified by unauthorized parties or in an unauthorized manner.
c. Availability: is assurance of timely, reliable access to data and Information Systems by authorized users. Availability-focused IA controls protect against degraded capabilities and denial of service conditions.
d. Non-repudiation: is assurance that the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the data.
e. Authentication: is assurance of the identity of an e-mail message sender or receiver is who they claim they are.
9 categories of computer incidents: CAT1
Root-Level Intrusions – Unauthorized privileged access (administrative or root access) to a DOD system
9 categories of computer incidents: CAT2
User-Level Intrusions – Unauthorized non-privileged access (user-level permissions) to a DOD system. Automated tools, targeted exploits, or self-propagating malicious logic may also attain these privileges.
9 categories of computer incidents: CAT3
Unsuccessful Activity Attempt – Attempt to gain unauthorized access to the system, which is defeated by normal defensive mechanisms. Attempt fails to gain access to the system (i.e., attacker attempt valid or potentially valid username and password combinations) and the activity cannot be characterized as exploratory scanning. Can include reporting of quarantined malicious code.
9 categories of computer incidents: CAT4
Denial of Service – Activity that impairs, impedes, or halts normal functionality of a system or network
9 categories of computer incidents: CAT5
Non-Compliance Activity – Occurs when a system is not compliant with appropriate Navy or DOD regulations (i.e. block list not applied, command not up-to-date, etc.).
9 categories of computer incidents: CAT6
An activity (scan/probe) that seeks to identify a computer, an open port, an open service, or any combination for later exploits. This activity does not directly result in a compromise.
9 categories of computer incidents: CAT7
Malicious Code – Installation of malicious software (i.e. trojan, backdoor, virus, or worm).
9 categories of computer incidents: CAT8
Investigating – Events that are potentially malicious or anomalous activity deemed suspicious and warrants, or is undergoing, further review. No event will be closed out as a Category 8. Category 8 will be re-categorized to appropriate Category 1-7 or 9 prior to closure.
9 categories of computer incidents: CAT9
Events that are initially suspected as being malicious but after investigation are determined not to fit the criteria for any of the other categories (e.g., system malfunction or false positive).
Category 0 (zero) events are for training purposes only.
107.7 Describe the DON World Wide Web Security Policy.
Provides primary governing policy for all unclassified DOD WWW sites to prevent the release of classified information.
Define: Information Assurance Vulnerability Alerts (IAVA)
address severe network vulnerabilities resulting in immediate and potentially severe threats to DON systems and information.
Define: Information Assurance Vulnerability Bulletins (IAVB)
address new vulnerabilities that do not pose an immediate risk to DON systems but are significant enough that noncompliance with the corrective action could increase the risk.
Define: Computer Tasking Order (CTO)
a formal tasking order that contains detailed guidance and missions for each component to accomplish.
Define: NTD (Navy Telecommunications Directive)
a formal tasking order that contains guidance for official Navy communication circuits.
Define: NIA/NIB/OIA/OIB
NMCI Information Advisory, NMCI Information Bulletin, Overseas Navy Enterprise Network Advisory, Overseas Navy Enterprise Network Bulletin
Define: Patch
Updates, fixes and/or enhancements to a software program delivered in the form of a single installable package.
107.9 Define vulnerability assessment
Systematic examination of an information system or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security measures, and confirm the adequacy of such measures after implementation.
107.10 Explain the difference between vulnerability and threat
- Vulnerability: Weakness in an IS, system security procedures, internal controls, or implementation that could be exploited.
- Threat: Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.
107.11 State the duties and responsibilities of the ISSM and ISSO.
The Information Systems Security Manager/Officer: Is the individual responsible to the Commanding Officer for the proper execution of an effective IA program for their system or site. The ISSM is designated in writing by the CO and is overall in charge of and responsible for the network, its security, as well as any training requirements to ensure the safety of the network, its systems, and its users.
107.12 Explain CSWF Specialty Codes and responsibilities
Personnel must meet and maintain the minimum qualification standards of their assigned Specialty Area/Work Role and proficiency level.
107.13 Discuss the role and responsibilities of Navy Blue Team
a. Blue Team Operations: uses a team specifically constructed for the Inter-Deployment Training Cycle charged with assisting in the protection of the targeted assets and conducting training to local personnel.
107.13 Discuss the role and responsibilities of Navy Red Team
b. Red Team Operation: is an independent and threat-based effort by an interdisciplinary, simulated opposing force, which after proper safeguards are established, uses both active and passive capabilities on a formal, time-bounded tasking to expose and exploit IA vulnerabilities of friendly forces.
107.14 Define CCRI and NAVIFOR role during the process (NOW CORA) (Command Operational Readiness Assessment)
Command Cyber Readiness Inspection (CCRI) – quick look methodology for compliance validations for COCOMs. NAVIFOR is the Office of the Designator Approving Authority and is the overall authority for operating a network.
107.15 Explain what constitutes PII
- PII is any information which can be used to distinguish or trace an individual’s identity, such as their name, social security number, biometric records, etc. alone, or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother’s maiden name, etc.
Explain the importance of Safeguarding
- Safeguarding is protective measures to prevent compromise or unauthorized disclosure of personally identifiable information (PII) The loss of PII can result in substantial harm to individuals, including identity theft or other fraudulent use of the information.
107.16 Explain why the U.S. Navy only uses “.mil” email addresses on government systems.
Official government email system restricts access to official users providing CIANA requirements as well as meeting IA and accreditation requirements.
Define and uses Host/Client:
any node that can be connected to a network, and allow users to interact with it and utilize its resources (i.e. a
computer or other networking device).
Define and uses Application Server:
a server with the specific purpose of providing services to users from a centralized source.
Define and uses Hub:
a layer 1 network device that allows for computers to be connected to share data. This device does not separate
collision domains.
Define and uses Switch:
layer 2 network device that allows for computer to be connected to share data. This device separates each host onto
its own collision domain allowing for fast, reliable communication between hosts.
Define and uses Router:
layer 3 network device that interconnects two or more computer networks together. A router is a networking device
whose software and hardware are customized to the tasks of routing and forwarding information and has two or more
network connections to allow cross-network communication to occur.
Define and uses WAP:
Wireless Access Point, a layer 2 network device that functions similarly to a switch.
Define and uses Proxy Server:
allows for multiple hosts to share a single internet connection. Has the ability to filter web traffic, as well as
cache commonly used internet pages to speed up internet activity.
Define and uses Firewall:
can be either layer 4 or layer 7, and can be comprised of either hardware or software, or a combination of both.
Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the
Internet, especially intranets.
Define and uses VPN Concentrator:
built specifically for creating a remote-access VPN. They provide high availability, high performance
and scalability and include components, called scalable encryption processing (SEP) modules that enable users to easily
increase capacity and throughput.
Define and uses Back-up:
refers to making copies of data so that these additional copies may be used to restore the original after a data loss
event (i.e. natural disaster or compromise).
Define and uses Repeater:
a layer 1 device used to amplify signals transmitted between network nodes.
Define the following layers of routing and common devices associated with each. ACCESS
consists of hubs, repeaters, switches and bridges (layer 1 and layer 2).
Define the following layers of routing and common devices associated with each. DISTRIBUTION
LAN-based routers and layer 3 switches to interconnect separate networks.
Define the following layers of routing and common devices associated with each. CORE
the network back-bone. Designed to be fault tolerant, have high data transfer rates, and low latency periods.
a. Topology (Bus/Star/Ring/Mesh):
the logical layout of the network.
b. LAN:
Local Area Network, a computer network covering a small area and contained behind a router.
c. WAN:
Wide Area Network, a computer network that covers a broad area or services multiple groups of people by linking LANs together.
d. MAN:
Metropolitan Area Network, a large computer network that usually spans a city or a large campus. Utilizes multiple access point to allow users over a large geographical area or location to connect to the same network and use its resources.
e. GAN:
Global Area Network, a computer network that spans the globe.
a. OSI Model: a logical layout of the interoperability of devices, systems, and applications. (From layer 1 to layer 7)
- Physical – media, signal, binary
- Data-Link – physical addressing (Media Access Control or Logical Link Control)
- Network – logical addressing
- Transport – end-to-end connections
- Session – inter-host communications
- Presentation – data presentation and encryption
- Application – network process to application
b. TCP/IP Model: a logical layout of the interoperability of devices, systems, and applications that utilize networking
Link Layer: Frame Header | Frame Data | Frame Footer
Internet Layer: IP Header | IP Data
Transport Layer: TCP Header | TCP Data
Application Layer: Data
a. NIPRNET:
Non-classified Internet Protocol Router Network, is used to exchange sensitive but unclassified information between “internal” users as well as providing user’s access to the Internet.
108.5 State the difference between IPv4 and IPv6.
- IPv4 uses only 32 bits and has no unique identifiers; IPv6 uses a 128-bit address where the last 48 bits is the device’s full MAC address
- IPv4 uses numeric addresses (205.x.x.x); IPv6 uses hexadecimal address (2001:0D45:FF00::0)
- IPv4 octets are separated by a dot(.); IPv6 octets are separated by a colon(:)
b. SIPRNET:
Secret Internet Protocol Router Network, is a system of interconnected computer networks to transmit classified information up to and including SECRET.
c. JWICS:
Joint Worldwide Intelligence Communications System, is a system of interconnected computer networks cleared up to Top Secret and SCI.
d. CENTRIXS:
Combined Enterprise Regional Information Exchange System is a collection of classified coalition networks, called enclaves, that enable information sharing using email and Web services, instant messaging or chat, the Common Operational Picture service, and Voice over IP. CENTRIXS supports combatant commands throughout the world, including the U.S. Pacific, Central and European commands. Also known as Secret Releasable
a. CANES:
Consolidated Afloat Networks and Enterprise Services (CANES) provide a common computing network and common operating system for command, control, communications, computers, and intelligence (C4I) systems onboard Navy ships.
b. DoDIN (GIG):
Department of Defense Information Network, is defined as a “globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information.”
c. DISN:
Defense Information Systems Network, has been the United States Department of Defense’s enterprise network for providing data, video and voice services for 40 years.
d. NMCI:
Navy/Marine Corps Intranet, is an Information System provided by a contracting company (HP) to allow interoperability between CONUS Navy and Marine commands.
e. ONENET:
OCONUS Navy Enterprise Network; OCONUS version of NMCI.
f. IT21/ISNS:
Shipboard network. Legacy has been getting replaced by canes
a. Machine Language:
is a system of instructions and data executed directly by a computer’s central processing unit. Machine code may be regarded as a primitive programming language or as the lowest-level representation of a compiled and/or assembled computer program.
b. Assembly Language:
is a type of low-level language for programming computers, microprocessors, microcontrollers, and other integrated circuits. They implement a symbolic representation of the numeric machine codes and other constants needed to program a particular CPU architecture.
c. High-Level Language:
is a programming language with strong abstraction from the details of the computer. In comparison to low-level programming languages, it may use natural language elements, be easier to use, or be more portable across platforms.
d. Operating System:
is a set of system software programs in a computer that regulate the ways application software programs use the computer hardware and the ways that users control the computer.
e. Application:
is computer software designed to help the user to perform singular or multiple related specific tasks.
a. Virus
: is a computer program that can copy itself and infect a computer using a host (typically benign looking) file. Requires user interaction to propagate across systems.
b. Worm:
is a self-replicating malware program that uses a computer network to send copies of itself to other nodes. Unlike a virus, it does not need to attach itself to an existing program.
c. Trojan:
is malware that appears to perform a desirable function for the user prior to executing, but instead facilitates unauthorized access of the user’s computer system.
d. Backdoor:
is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected.
e. Phishing:
is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
b. Buffer Overflow:
is a Denial-of-Service attack that overloads a system’s input capacity, thereby crashing the program, system, or preventing the user from accessing its resources.
a. Network Enumeration:
is the process of scanning and compiling pertinent information of the layout of a network, its users, and its resources.
c. SQL Injection:
overloads the input sector of an SQL database and allows the ability to execute arbitrary code forcing the database to divulge its contents or access privileges.
d. Dictionary Attack:
attempts to crack passwords based on a list of words or values.
e. Privilege Escalation:
the ability to escalate privileges to a level allowing the intruder to access or execute programs or data higher than the original intrusion perspective.
f. Brute Force Attack:
physically inputting a user’s PII until access is granted to a system when credentials are unknown.
g. Social Engineering:
the ability to get a user to divulge their credentials or other useful information about themselves or their organization by impersonating someone of authority.
h. Rainbow Table:
precomputed table for caching the output of cryptographic hash functions, usually for cracking password hashes. Usually through brute force or dictionary attack.
i. Denial of Service (DOS):
cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
j. Distributed Denial of Service (DDOS):
malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
108.11 Describe the functionality of PKI.
Public Key Infrastructure is a set of hardware, software, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates to provide encryption and data security in computer networks.
a. Domain controllers -
On Microsoft Servers, a domain controller (DC) is a server that responds to security authentication requests (logging in, checking permissions, etc.) within a Windows domain. A domain is a concept introduced in Windows NT whereby a user may be granted access to a number of computer resources with the use of a single username and password combination.
b. Exchange -
Microsoft Exchange Server is a calendaring and mail server developed by Microsoft that runs exclusively on the Microsoft Windows Server product line.
c. Domain Name System or (SERVICE) -
translates URLs to IP addresses, and vice versa. It allows users to input an easy to remember domain name and be directed to the appropriate website.
a. FTP -
PORT 20/21- File transfer Protocol
b. SSH -
PORT 22- Secure Shell
c. Telnet-
PORT 23 - Unsecure
d. SMTP
PORT 25 – Simple Mail Transfer
e. DNS
PORT 53 - Translates Domain name to IP
f. DHCP
PORT 67/ 68 - Dynamic Host Configuration, used to assign IPs
g. HTTP
PORT 30- Hypertext Transfer, used for internet connection
h. HTTPS
PORT 443- HTTP combined with SSL ot TLS
i. POP3
PORT 110- Retrieve Mail
j. IMAP
PORT 143- POP3 with more support for remote mailboxes
a. TCP:
It is a connection-oriented protocol. Reads data as streams of bytes, and the message is transmitted to segment boundaries.
b. UDP:
It is a connectionless protocol. Messages contain packets that were sent one by one. It also checks for integrity at the arrival time.
a. Mandatory Access Controls (MAC):
The operating system or database constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.
b. Discretionary Access Controls (DAC):
Defined by the Trusted Computer System Evaluation Criteria “as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong.
c. Role Based Access Controls (RBAC):
restricting system access to only authorized users
d. Separation of Duty:
divides critical functions among different staff members in an attempt to ensure that no one individual has enough information or access privilege to perpetrate damaging fraud.
108.16 Define/Discuss VOIP and VOSIP
Voice over Internet Protocol, also called IP telephony, is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol networks
e. Least Privilege:
must be able to access only the information and resources that are necessary
a. Network Address Translation (NAT):
the translation of private IP address to a public IP address
b. Port Address Translation (PAT):
an extension of Network Address Translation (NAT) that permits multiple devices on a LAN to be mapped to a single public IP address to conserve IP addresses.
c. Demilitarized Zone (DMZ):
demilitarized zone is a perimeter network that protects an organization’s internal local-area network (LAN) from untrusted traffic
d. Virtualization:
: process of creating a software-based, or virtual, representation of something, such as virtual applications, servers, storage and networks. It is the single most effective way to reduce IT expenses while boosting efficiency and agility
108.18 State the purpose of Active Directory.
Provides Domain Services, Rights Management Services, Federation Services, Certificate Services, and Lightweight Directory Services. Integrated with Windows Server, gives out-of-the-box functionality needed to centrally configure and administer system, user, and application settings
109.1 Discuss the purpose of a Red Cross message.
Is used to notify a service member of an emergency or other important event such as the birth of a child or serious illness or death of a family member.
a. ADNS:
Automated Digital Networking System connects Navy shipboard networks to other ship and shore networks for transferring IP data of various classification levels.
b. CUDIXS:
Common User Digital Information Exchange Subsystem has the capability to both send and receive narrative shipboard message traffic.
c. VERDIN:
VLF Digital Information Network is a broadcast system that provides a highly reliable and secure system for worldwide delivery of operational, tactical, and administrative messages from the Fleet Submarine Broadcast System (FSBS) and Minimum Essential Emergency Communications Network (MEECN).
d. NOVA:
Automated Message Store and Forward is a switching system that provides automated readdressed and quote functions for authorized users.
e. IBS:
INTEGRATED BROADCAST SYSTEM disseminates threat avoidance, targeting, maneuvers, force protection, target tracking, and target/situation awareness information, and will be continuously refined by data from national, theater, and tactical sensors.
g. DMS (DEFENSE MESSAGE SYSTEM):
(DEFENSE MESSAGE SYSTEM): Employs the messaging and directory services using internationally recognized COTS-based X.400 and X.500 messaging and directory products.
f. INMARSAT:
International Maritime Satellite is a critical communications path for SIPRNET, NIPRNET, and POTS (plain-old telephone system) ship-to-shore communication for all Navy ships less the CV/CVN/LHA/LHD/AGF and LCC classes. This multipurpose SATCOM system provides both simultaneous voice and IP data up to 128 Kbps.
NREMS (NAVY REGIONAL ENTERPRISE MESSAGE SYSTEM):
(NAVY REGIONAL ENTERPRISE MESSAGE SYSTEM): Provides web-based messaging capability that allows users to send and receive DMS messages using a web browser or via SMTP.
AMHS (AUTOMATED MESSAGE HANDLING SYSTEM):
(AUTOMATED MESSAGE HANDLING SYSTEM): Implements on-site redundancy and full Continuity of Operations Planning (COOP) capability between NCTAMS LANT and NCTAMS PAC.
h. VTC:
Video Teleconferencing Service is an extension of traditional telephony technologies with the added feature of being able to see the person or persons with whom one is talking.
i. DCO:
Defense Coordinating Officer, will help provide war fighters and supporting elements with some of the tools required for collaboration during engagements.
109.3 Discuss GINGERBREAD and explain the procedures involved.
Gingerbread indicates that an unauthorized person is present on a circuit. The only proper response to this is “Roger out” and communications are to cease on that circuit
109.4 Discuss BEAD WINDOW and explain the procedures involved.
Occurs when the previous transmission may have disclosed unauthorized EEFI information and uses a code word and a number combination which is transmitted immediately by any net member to the unit disclosing the EEFI. Proper response for a net member receiving a BEADWINDOW will be “ROGER OUT” using proper net call signs.
109.5 Discuss types of disclosures afforded protection by the EEFI list.
Essential Elements of Friendly Information – designed to protect friendly intelligence by granting it the same classification level of our own corresponding intelligence to include: position, capabilities, operations, personnel, COMSEC, and inappropriate transmissions (Wrong Circuit) of friendly and enemy combatants and their systems.
109.6 Define RIVER CITY and state when it is utilized.
River City is an OPSEC countermeasure. There are various levels that further restrict the outbound transmission/radiation of communication systems and RADAR.
109.7 Discuss JSIR (Joint Spectrum Interference Resolution) to include the following: Meaconing:
a system of receiving radio beacon signals and rebroadcasting them on the same frequency to confuse navigation.
109.7 Discuss JSIR (Joint Spectrum Interference Resolution) to include the following: Intrusion:
The intentional insertion of EM energy into transmission paths in any manner, with the objective of deceiving or confusing operators.
109.7 Discuss JSIR (Joint Spectrum Interference Resolution) to include the following: Jamming/Inference:
The deliberate radiation, re-radiation, or reflection of EM energy for the purpose of preventing or reducing an enemy’s effective use of the EM spectrum with the intent of degrading or neutralizing the enemy’s combat capability.
109.7 Discuss JSIR (Joint Spectrum Interference Resolution) to include the following: Spectrum management:
the fine-tuning of RF to reduce crosstalk and converging of different communication systems to maintain COMSEC.
- Format line 2:
Repeated routing indicators of station who is responsible for delivery
- Format line 4:
Special Handling Designators
- Format line 5:
DTG and Precedence
- Format line 6:
FROM
- Format Line 7:
TO
- Format Line 8:
INFO
- Format Line 12:
Subject, References, Subject Body and Declassification Instructions
a. R:
Routine (6hrs)
c. O:
Immediate (30 minutes)
b. P:
Priority (3hrs)
d. Z:
Flash (As fast as possible with an objective of less than 10 minutes)
e. W:
Pinnacle (As fast as possible) (WW is used for CRITIC, which must be routed to DIRNSA in <5 minutes)
109.10 State the purpose of an OPTASK COMMS
Operational Tasking Communications are a means used by which the United States Navy and Allied Navies distribute afloat communications plans.
109.11 State the purpose of a COMMPLAN.
A Communications Plan provides the communications planner with an automated method of drafting the OPTASK COMMS message.
109.12 State the purpose of a TSO.
A Telecommunications Service Order is the authorization from Headquarters, DISA, a DISA area, or DISA-DSC to start, change, or discontinue circuits or trunks and to effect administrative changes.
109.13 State the purpose of a TSR.
A Telecommunications Service Request requires additions, deletions or changes in existing Defense Communication System circuits.
109.14 State the purpose of a COMSPOT/ Communications service advisory.
A COMSPOT is a report indicative of issues, expected outages, or an outage of a circuit(s) lasting more than 30 minutes. Report is made to NCTAMS and DISA.
109.16 State the purpose of OTAT
- Over-the-Air Key Transfer (OTAT): Electronically distributing key without changing the traffic encryption key used on the secured communications path over which the transfer is accomplished. (Transmitting electronic key mat for new day, month, etc.)
109.15 State the purpose of Key Management Infrastructure (KMI).
Prescribes the minimum policies for issuing, accounting, handling, safeguarding, disposing of COMSEC (Communications Security) material, and the application of cryptographic/physical security measures to COMSEC material and facilities.
109.16 State the purpose of OTAR
- Over-the-Air Rekeying (OTAR): Changing traffic encryption key or transmission security key in remote crypto-equipment by sending new key directly to the remote crypto-equipment over the communications path it secures. (The reception of the new key mat for new day, month, etc.)
109.18 State the purpose of Emissions Control (EMCON).
Prevents an enemy from detecting, identifying, and locating friendly forces and is used to minimize electromagnetic interference from friendly systems.
109.17 Describe TEMPEST.
Transient Electromagnetic Pulse Emanation Standard is the code name given to the investigation, study, and control of compromising emissions from telecommunications and automated information processing systems.
a. ASW (Anti-Submarine Warfare):
is a branch of naval warfare that uses surface warships, aircraft, or other submarines to find, track and deter damage or destroy enemy submarines.
c. IW (Information Warfare):
activities are conducted daily in peace, crisis, or conflict. As the country enters crisis, existing IO plans can be used as a starting point for supporting a commander’s war fighting mission.
b. SUW (Surface Warfare)
core missions, derived from the tenets of Sea Power 21, guide the preparation and focus of joint and naval forces to achieve SUW objectives
110.2 Explain how the Reserve Component integrates with the Active Component.
The Naval Reserve supports the mission of Navy by providing trained personnel available for active duty when the need arises.
d. AW (Air Warfare):
mission analysis is to determine restrictions and constraints, number of aircraft required to accomplish mission whether it’s air-to-air or air-to-ground combat.
f. NSW (Naval Special Warfare):
forces conduct special operations (SO) in any environment, and are uniquely trained and equipped to operate from, around, and in maritime environments.
110.3 Explain the purpose of a mobile detachment.
Allows for strategic placement of necessary forces in a peacetime or wartime theater.
e. STW (Strike Warfare):
is the destruction or neutralization of enemy targets ashore by conventional or nuclear weapons.
a. Mine Warfare UUV Platoon:
conduct port/harbor shallow water mine warfare utilizing unmanned underwater vehicles (UUVs) operated by small, rapidly deployable teams.
b. Naval Oceanography ASW Team (NOAT):
provide detailed tactical weather data to the ASW team.
c. Strike Group Oceanography Team (SGOT):
Provide timely, comprehensive, and tactically relevant meteorological and oceanographic (METOC) products and services in direct support of Numbered Fleet / Navy Component Commanders, deploying Carrier and Expeditionary Strike Group Commanders, assigned units/staff, and other U.S. and Joint / Coalition forces as directed.
d. Mobile Environmental Team (MET):
are the primary users of the Navy’s mobile equipment assets. They are deployable, portable environmental analysts.
- Blue Team Operations
uses a team specifically constructed for the Inter-Deployment Training Cycle charged with assisting in the protection of the targeted assets and conducting training to local personnel.
e. Fleet Survey Team (FST):
is a rapid-response Navy command that excels at conducting quick turnaround hydrographic surveys in locations around the world using air-transportable rigid hull inflatable boats.
110.5 Discuss the IO Core Capabilities.
- MISO – Military Information Support Operations (Formerly PSYOP)
- MILDEC – Military Deception
- OPSEC – Operations Security
- EW – Electronic Warfare
- CNO – Computer Network Operations
a. United States Code (USC) Title 10:
outlines the role of the armed forces. It provides the legal basis for the roles, missions and organizations of each of the services as well as the Department of Defense.
- Red Team Operation:
is an independent and threat-based effort by an interdisciplinary, simulated opposing force, which after proper safeguards are established, uses both active and passive capabilities on a formal, time-bounded tasking to expose and exploit IA vulnerabilities of friendly forces.
110.7 Explain the purpose of FES (Fleet Electronics Support).
Maintains operational readiness of Electronic Warfare equipment.
b. USC Title 50:
outlines the role of War and National Defense. Allows each department of the armed forces to have their own Secretary and work under the direction of the Secretary of Defense.
110.9 Define CRITIC.
Critical Information that is reported in a short, specially formatted message.
a. CCOP (Cryptologic Carry-On Program):
provides direct support systems worldwide to support Navy, NSA, and DOD national and theater level missions and perform installation and maintenance of organizational level cryptographic and ancillary equipment and communication devices associated with fleet cryptologic systems and antenna maintenance while deployed.
b. Naval Integrated Tactical Environmental Subsystems (NITES):
is a set of meteorology and oceanography forecast, database, and decision aids tailored for specific platforms and uses.
c. JDISS (Joint Deployable Intelligence Support System):
program provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces, in garrison, and deployed during peace, crisis and in war.
110.11 Discuss Maritime Domain Awareness
Is the effective understanding of anything associated with the maritime domain that could impact the security, safety, economy, or environment.
110.12 State the purpose of a MOC.
Maritime Operation Centers are in each numbered fleet and allow the Navy to maintain a steady level of readiness. Also known as NTCS.
b. Surface Search:
Short range, 2-dimensional surface search and navigation radar.
a. Air Search:
The primary function of air search radar is to provide 360 degree from the surface to high altitudes and determine ranges and bearings to aircraft targets.
c. Fire Control:
Provides information to ships fire control systems for use in tracking and destroying enemy targets.
111.1 Define OPSEC.
Operations Security is a systematic, proven process that identifies, controls generally sensitive but unclassified information about a mission, operation or activity.
111.2 Discuss the 5-step planning process. (IT v. RM)
- Identify – pinpoints critical information about friendly activities, intentions and capabilities.
- Threat assessment – includes the process of identifying potential adversaries and their associated capabilities, limitations and intentions.
- Vulnerability analysis – Works with other security elements in the organization. Searching for weaknesses that reveal CI through collected and analyzed indicators which create vulnerabilities.
- Risk assessment – Measuring the level of risk has two components, which are analyzing vulnerabilities and identifying countermeasures.
- Measures/Counter Measures – Preserve military capabilities by preventing adversarial exploitation of CI. Countermeasures mitigate or remove vulnerabilities that divulge CI.
6.
110.14 Explain the difference between OPELINT and TECHELINT.
- Operational Electronic Intelligence: intelligence that is required for planning and conducting campaigns.
- Technical Electronic Intelligence: is intelligence derived from the collection, processing, analysis and exploitation of data and information pertaining to foreign equipment and material to prevent technical surprise.
111.4 Describe the OPSEC considerations regarding public affairs.
Essential to ensure the PA maintains its credibility. The public affairs officer and OPSEC officer should be coordinating the release of data relative to the mission or to impending potentially sensitive activity.
111.3 Discuss the responsibilities of the command OPSEC Officer.
Administers the Command’s OPSEC Program and is responsible for the development, organization, and administration of an OPSEC program. Provides guidance and oversight for all OPSEC Programs and coordinates OPSEC actions under the Command’s OPSEC Program.
a. EEFI:
Essential Elements of Friendly Information.
111.5 Define WRA (Web Risk Assessment).
Application of the 5 stop OPSEC process is imperative. Self-assessments are helpful in determining if potential CI is on a command’s web site.
b. Critical Information:
Information about friendly US, allied and/or coalition activities, intentions, capabilities, or limitations an adversary seeks in order to gain a military, political, diplomatic, economic, or technological advantage.
111.7 Describe the components and functions of the command OPSEC Program.
The OPSEC Officer is appointed in writing and runs the program. OPSEC Team ensures that command and family maintain an acute OPSEC awareness.
112.2 Define the five steps of Intelligence.
There are five general steps in the force assignment process:
1. Planning and Direction
2. Collection
3. Processing
4. Production
5. Dissemination
112.1 State the purpose of Naval Intelligence.
To support all aspects of naval operations, to inform the commander of risk factors associated with, objectives, plan and direct operations, and evaluate the effects of their actions.
- Strategic Intelligence (Three categories of intelligence)
is required for the formation of policy and military plans at national and international levels.
- Operational Intelligence (Three categories of intelligence)
is required for planning operations within regional theaters or areas of operations.
- Tactical Intelligence: (Three categories of intelligence)
is required for planning and conducting tactical operations at the component or unit level.
112.4 Define National, Theater, and Fleet Level Intelligence Organizations.
- National Level: is of a wider scale based on intelligence that can affect the nation.
- Theater Level: is specific to an AOR.
- Fleet Level: constitutes any Intel that can be disseminated across the Naval AORs.
112.6 Define CCIR (Commander’s Critical Information Requirements).
A comprehensive list of information requirements identified by the commander as being critical in facilitating timely information management and the decision-making process that affect successful mission accomplishment.
112.5 Define PIR
Priority Intelligence Requirements, intelligence requirements for which a commander has an anticipated and stated priority in the task of planning and decision making.
112.7 Explain Intelligence Oversight and state the publications that govern it.
The heads of departments and agencies with organizations in the Intelligence Community or the heads of such organizations, as appropriate, shall report to the Intelligence Oversight Board, and keep the Director of Central Intelligence appropriately informed, concerning any intelligence activities of their organizations that they have reason to believe may be unlawful or contrary to Executive order or Presidential directive.
112.8 Define the difference between a US citizen and a US person with regards to US Intelligence Oversight. (US CITIZENS)
native-born or naturalized citizens, permanent residents with a Green Card, or persons born on US Military Installations abroad by a U.S. Citizen. It also includes an unincorporated association made up mostly of U.S. citizens and/or permanent resident aliens, an activity incorporated in the U.S. EXCEPT for a corporation directed and controlled by a foreign government(s).
112.8 Define the difference between a US citizen and a US person with regards to US Intelligence Oversight. (US PERSONS)
foreign nationals who are lawfully in the US and who are permanent resident aliens are US Persons. An alien in the U.S. is not a U.S. Person unless there is specific information to the contrary. Persons who are in the U.S. on a VISA are not U.S. persons.
112.10 Describe the National Intelligence Leadership Structure.
The Director of Naval Intelligence exercises staff supervision over the Office of Naval Intelligence (ONI), which provides the intelligence necessary to plan, build, train, equip, and maintain US naval forces.
112.9 Define intelligence preparation of the battle space environment.
Used to signify a unified military strategy to integrate and combine armed forces for the military theatre of operations, including air, information, land, sea and space to achieve military goals.
112.11 Explain ISR mission requirements and fundamentals.
Force assignment is primarily an operations function, but requires considerable intelligence support to ensure intelligence, surveillance, and reconnaissance (ISR) assets are integrated into the operation plan.
c. MASINT (Measurement and Signature Intelligence):
refers to intelligence gathering activities that bring together disparate elements that do not fit within the definitions of the major disciplines mentioned above.
a. HUMINT (Human Intelligence):
refers to intelligence gathering by means of interpersonal contact.
112.12 Explain the function of an Intelligence Fusion Cell.
A fusion cell combines, in real time, national strategic intelligence, which we gather around the world, with local or tactical intelligence.
b. OSINT (Open-Source Intelligence):
is a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence.
d. SIGINT (Signals Intelligence):
is intelligence-gathering by interception of signals between people, electronic signals, or EM radiation not directly used in communication.
e. COMINT (Communications Intelligence):
is intelligence-gathering by interception of signals between people, involving electronic signals that are directly used in communication.
f. FISINT (Foreign Instrumentation Signals Intelligence):
from the intercept of foreign electromagnetic emissions associated with the testing and operational deployment of non-US aerospace, surface, and subsurface systems.
g. ELINT (Electronic Intelligence):
is intelligence-gathering by interception of signals.
i. ACINT (Acoustical Intelligence):
is an intelligence gathering discipline that collects and processes acoustic phenomena.
h. IMINT (Imagery Intelligence):
Is an intelligence gathering discipline which collects information via satellite and aerial photography.
112.15 Define the role of intelligence on the watch floor.
To provide subscribers with real-time updates on intelligence as it is made available.
112.14 Give 3 examples of intelligence briefs.
a. Operations and planning
b. Logistics
c. Communications
113.1 Define each band of the Electromagnetic spectrum and describe what communications are commonly used in each.
See physical card
b. Wavelength:
The distance in space occupied by one cycle of a radio wave in a given amount of time.
a. Frequency:
The number of vibrations, or cycles, of a wave train in a unit of time.
d. Refraction:
The changing of direction of a wave as it leaves one medium and enters another medium of different density.
c. Ducting:
Trapping of an RF wave between two layers of the Earth’s atmosphere or between an atmospheric layer and the Earth.
f. Bandwidth:
The difference between the highest useable frequency of a device (upper frequency limit) and the lowest usable frequency of the device (lower frequency limit) measured at the half-power points.
Multiplexing:
: A method for simultaneous transmission of two or more signals over a common carrier wave.
113.4 Discuss/describe the following layers of the atmosphere and how each effect communication.
Layers: Regions of the atmosphere.
1. Troposphere: Sea level to 3.7 miles
2. Stratosphere: 3.7 miles to 250 miles
3. Ionosphere: 250 miles to space.
h. Azimuth Angle:
The 360-degree angle at which the radio wave travels. Can have some effect on the angle of incidence at which a radio wave intersects the atmosphere layers.
g. Keying:
: Relays used in radio transmitter where the ordinary hand key cannot accommodate the pate current without excessive arcing.
i. Elevation Angle:
The angle at which the radio wave travels from the antenna to the atmosphere. This affects the angle of incidence at which a radio wave intersects the atmosphere layers.
a. Frequency:
The number of vibrations, or cycles, of an EM wave in a unit of time.
b. Radio Waves:
An electromagnetic wave generated by a transmitter.
a. USB (Upper Sideband):
When modulated by voice or music signals, all of the sum frequencies above that of the carrier.
c. Propagation Paths:
Waves traveling through a medium.
c. CW (Continuous Wave):
Modulation by on/off keying—Morse code. (Can also be Carrier Wave – which carries multiple frequencies over one channel.)
b. LSB (Lower Sideband):
When modulated by voice or music signal, all difference frequencies below that of the carrier.
d. AM (Amplitude Modulation):
Any method of modulating an electromagnetic carrier frequency by varying its amplitude in accordance with message intelligence. Used diode detectors (rectifiers)
e. FM (Frequency Modulation):
the variation of the instantaneous frequency of the carrier, either above or below the frequency.
113.7 Define the following terms as they apply to radar. a. PRI or PRT (Plan Position Indicator):
is the most common radar display used for (Pulse Repetition Rate is same as PRF) in which range is indicated by the distance of a bright spot or blip from the center of the screen and the bearing is indicated by the radial angle of the spot.
113.7 Define the following terms as they apply to radar. b. PRF (Pulse Repetition Frequency):
The rate at which pulses are transmitted, given in hertz or pulses per second. Reciprocal of pulse - repetition time.
113.7 Define the following terms as they apply to radar. c. RF (Radio Frequency):
the modulated carrier wave from a transmitter.
113.7 Define the following terms as they apply to radar. d. BW (Beam Width):
angular width of the beam’s curvature.
113.7 Define the following terms as they apply to radar. e. CW (Curve Width):
the width of the pulse arc.
113.7 Define the following terms as they apply to radar. f. PW (Pulse Width):
The duration of the pulse.
a. Half Duplex:
Provides communications in both directions, but only in one at a time.
113.7 Define the following terms as they apply to radar. g. Scan:
Systematic movement of a radar beam to cover a definite pattern or area in space.
b. Duplex:
Provides communications in both directions simultaneously.
c. Simplex:
Communication that occurs in one direction only
a. Modulation –
the ability to impress intelligence upon a transmission medium such as radio waves.
114.1 Explain how Naval Meteorology and Oceanography supports the Information Dominance mission?
Develops and delivers dominant meteorological/oceanographic capabilities in support of U.S. Navy, Joint and national warfighting requirements.
a. True Bearing:
the angle between true north and a line pointed directly at the target. Relative Bearing: The bearing angle to the radar target is measured from the centerline of your own ship or aircraft.
b. Demodulation –
the removal of intelligence from a Transmission medium.
b. Azimuth:
Angular measurement in the horizontal plane in a clockwise direction.
c. Elevation:
Used by height finding radars, Uses a very narrow beam in both horizontal and vertical search planes.
114.2 Discuss the general mission of the Naval Meteorology and Oceanography Command.
NMOC provides the preponderance of oceanographic and hydrographic survey capabilities for the Department of the Navy (DoN) and the Department of Defense (DoD).
114.4 Define Battle Space on Demand (BOND) WRT decision superiority.
Battle space on Demand (BonD) supports the long-range Naval Oceanography strategy for linking environmental data to timely and informed decisions – a key aspect of decision superiority.
a. The Data Layer (Tier 0)
Consists of data collected while observing the atmosphere and the ocean using a vast range of in-situ sensors and remote sensors, including satellites, altimeters, gliders, buoys, and master clocks, assimilated and fused to provide initial and boundary conditions that accurately describe the current ocean and atmosphere environment, as well as the celestial and temporal reference frames. The output is a collection of raw observation data on the state of the physical environment.
The Environment Layer (Tier 1)
In Tier 1, the Tier 0 data are analyzed, processed, and merged into databases and/or prediction systems or numerical models operated on High Performance Computing (HPC) systems to forecast the future state of the environment. The output is a set of predictions, in space and time, of the expected physical environn1ent for whatever operation is under consideration. The output can also contain a ‘confidence factor’.
The Performance Layer (Tier 2)
In Tier 2, the predicted environment is used in conjunction with information about the operational environment to predict how forces, sensors, weapons systems, and platforms will perform over time in a given operational situation. This information is analyzed to provide meaning with respect to implications for the operation, such as influences on planning, force structure, targeting, timing, maneuver, tactics, techniques and procedures. The output of this fusion of information about the predicted environment and the friendly and enemy situation is an impact assessment in terms the operator understands, again with a confidence factor if appropriate. Situational awareness is the desired outcome at this level.
The Decision Layer (Tier 3)
In Tier 3, the situational awareness gained in Tier 2 is applied to specific situations to quantify risk and opportunity at strategic, operational, and tactical levels. Here, actionable recommendation are made to the decision-maker regarding force allocation and employment that directly enhance safety and warfighting effectiveness. In Tier 3, the performance predictions made in Tier 2 are considered with alternative scenarios to develop optimal solutions, i.e., courses of action (COAs), and to understand probabilities of success and elements of risk. The intent is to make recommendations that take maximum advantage of asymmetric opportunities in the changing physical environment, to provide the most advantage to our forces, and the most disadvantages to the enemy. The output is a decision recommendation with compelling rationale, based on our best understanding of the physical environment. The decision-maker cor1bines knowledge of the present and future situation with their judgment into situational understanding to facilitate superior decision-making.
114.6 Define the Navy Enterprise Portal (NEP-Oc).
The Navy Enterprise Portal - Oceanography (NEP-Oc) has been created as the Naval Oceanography mission extension to the Navy Enterprise Portal. NEP-Oc will serve as a single access point for all METOC web-accessible information on the NIPRNet and SIPRNet.
a. Mixed Fleet Weather Center
(FWC), Norfolk, VA
b. Fleet Weather Center
(FWC), San Diego, CA
c. Joint Typhoon Warning Center
(JTWC), Pearl Harbor, HI