IWO Board Flashcards
101.1 Discuss the concept of ORM
Principles of ORM.
a. Accept Risk when Benefits Outweigh the Cost.
b. Accept No Unnecessary Risk.
c. Anticipate and Manage Risk by Planning.
d. Make Risk Decisions at the Right Level.
Levels of ORM.
a. In-depth.
b. Deliberate.
c. Time Critical.
101.2 Explain the 5-step ORM Process
a. Identify the Hazards:
A hazard is any condition with the potential to negatively impact mission accomplishment or cause injury, death, or property damage.
b. Assess the Hazards:
For each hazard identified, determine the associated degree of risk in terms of probability and severity.
c. Make Risk Decisions:
There are three basic actions which ultimately lead to making informed risk decisions:
(1) Identifying control options.
(2) Determine the effect of these controls on the hazard or risk.
(3) Decide how to proceed.
d. Implement Controls:
(1) Ensure the plan is clearly communicated to all the involved personnel
(2) Establish Accountability.
(3) Provide Necessary Support.
e. Supervise:
Supervise and review involves determining the effectiveness of risk controls throughout the mission or task.
(1) Monitor the effectiveness of risk controls.
(2) Determine the need for further assessment of all or a portion of the task due to an anticipated change.
(3) Provide feedback- both positive and negative lessons learned.
101.3 Discuss the safety aspects of the following:
a. Tag-out precautions [ref. b, vol. I, ch. B11]
b. Electrical fires [ref. b, vol. III, ch. C9]
c. First aid for electricity-related injury [ref. b, vol. III, ch. C9]
d. Electronic precautions [ref. b, vol. III, ch. C9]
e. HERO/HERP/HERF [ref. c, ch. 3]
a. Tag-out precautions-A tag is placed on equipment warning people that the equipment
is out of calibration or not functioning properly.
b. Electrical fires-Great care is required fighting such a fire to avoid creating another explosion from batteries. The safest and most effective method for fighting an electrical fire is through oxygen starvation. Secure the compartment and stop all ventilation within, including agitation air, to deprive flames of oxygen. WARNING: NEVER ATTEMPT
TO EXTINGUISH AN ELECTRICAL FIRE BY WATER. THE HYDROGEN AND OXYGEN GENERATED BY ELECTROLYSIS COULD PRODUCE A VIOLENT EXPLOSION.
c. First aid for electric shock-First step is to secure the power source or insulate victim from power. Next perform CPR.
d. Electronics and RF radiation hazards-When working in an energized environment, always have supervision, station a safety observer, and insulate metal tools.
e. HERO/HERP/HERF
HERO-Hazards of Electro Magnetic Radiation to Ordinance. HERO 1-susceptable, HERO 2-unsafe, HERO 3-safe
HERP-Hazards of Electro Magnetic Radiation to Personnel. The body can
absorb EM Radiation.
HERF-Hazards of electro Magnetic Radiation to Fuel. EM radiation can ignite fuel vapor.
101.4 Discuss safety considerations during execution of the Emergency Action Plan.
All personnel involved must be familiar with the tasks associated with emergency destruction. Use personal protective equipment when using an ax or sledge hammer. Station safety observers if time and space permit.
Safety Considerations for Emergency Action Plan
Review local EAP/EDP
Perform ORM steps
Train on procedures annually/semi-annually
Destruction tools could be potential hazards
Shredder, axe/hammer, electrical, etc.
102.1 State the functions of the following personnel:
a. SSO [ref. a, ch. 2; ref. b, ch. 2]
b. CSO/CSM [ref. a, ch. 2]
c. IAM/ISSM [ref. a; ref. b, ch. 2]
d. IAO [ref. b, ch. 2]
e. TSCO [ref. a, ch. 2; ref. b, ch. 2]
The SSO will be responsible for the operation of the Sensitive Compartmented Information Facility (SCIF) and the security control and use of the SCIF.
All SCI matters shall be referred to the SSO.
Functions
SSO Special Security Officer
Handles SCI program - responsible for operation/security of SCIF
CSO/CSM Command Security Officer/Manager
Handles classified information programs (Secret and below, just not SCI)
IAM/ISSM Information Assurance/Information Systems Security Manager
Responsible for information assurance program (IAP)
IAM is new name for ISSM
IAO Information Assurance Officer
Designated for each system/network in command
Implement/maintain commands IT ssems and neork secri reqiremens
TSCO Top Secret Control Officer
Ensures inventories of TS info conducted at least once annually
Keep record of receipt from each TS recipient
Information Security vs. Information Assurance
INFOSEC
Ensuring personnel follow protocol in protecting information
Prevent illicit access to info
Information Assurance
Ensuring systems and networks are maintained to protect information
Maintained by DISA
Safeguard integrity of data
102.2 Discuss security classification levels, receipt, custody, document markings and handling requirements for the following:
a. TOP SECRET, SECRET, CONFIDENTIAL [ref. b, chs. 2, 7 thru 9]
b. U//FOUO [ref. b, chs. 4, 6]
c. SCI [ref. c, encls. 3, 5]
d. Allied Information/Publications [ref. e, ch. 5]
e. SAP [ref. m, encl. 4]
f. ORCON [ref. m, encl. 4]
g. ACCM [ref. m, encl. 4]
h. Foreign Releasability [ref. m, encl. 4]
a. Top Secret - exceptionally grave damage; Secret - serious damage; Confidential - damage
b. Unclassified, for official use only - unclassified info that should be protected for internal use only
c. sensitive compartmentalized information - Classified information concerning or derived from
intelligence sources or methods, or analytical processes, that is required to be handled within formal access control systems established by the DCI.
d. Allied Information/ NATO Control Documents - NATO has four levels of classified information: COSMIC TOP SECRET, NATO SECRET, NATO CONFIDENTIAL, and NATO RESTRICTED. Certain NATO information is further classified in a specific category as ATOMAL which can be either RESTRICTED DATA (RD) or FORMERLY RESTRICRED DATA (FRD).
e. Special Access Program (SAP) - Any DoD program or activity employing enhanced security measures exceeding those normally required for classified information at the same classification
level which is established, approved, and managed as a DoD SAP.
f. Originator Control - Dissemination & Extraction of Information Controlled by Originator
g. Alternative or Compensatory Control Measures - security measures used to safeguard classified intelligence or operations and support information when normal measures are insufficient to achieve strict need-to-know controls and where special access program (SAP) controls are not required.
h. Foreign Releasability
Ex. REL TO USA, FVEY
Released directly to foreign government representative
Designated by recipient gov’t to assume custody/responsibility
102.3 Discuss the following aspects of physical security:
a. Access controls [ref. b, ch. 10]
b. ATFP [ref. s]
c. Storage requirements for classified material [ref. a, ch. 9; ref. b, ch.10]
d. Required forms [ref. b, ch 2, app. B]
a. Access Controls
Uncleared persons escorted by cleared person
Entrance under visual control at all times
ATFP (Anti-Terrorism/Force Protection)
b. Anti-Terrorism Defensive measures to reduce vulnerability of individuals/properties
Force Protection Actions to prevent/mitigate hostile actions against DoD personnel,
resources, facilities
FPCON levels conserve fighting potential
c. Storage Requirements
Guard/store in locked GSA-approved security container, vault, modular vault, secure
room
TS and S require supplemental controls, C does not
Intrusion Detection System, continuous protection by duty personnel, etc.
d. Required Forms
SF-700 Security Container Information
Vital info about container (location, container #, contact info)
SF-701 Activity Security Checklist
Checklist at the end of each day (ensure classified materials secured properly,
employee accountability)
SF-702 Security Container Check Sheet
Record of names/times people have opened and closed container
SF-153 COMSEC Material Report
SF-312 Classified Information NDA
Contract between USG and cleared employee
102.4 Explain the purpose of your Command Emergency Action/Destruction Plan
and discuss the following: [ref. g; ref. i, Annex M]
a. Conditions that warrant implementation
b. Authority to impose, modify or cancel
c. Authority to order emergency destruction onboard a deployed unit
d. Primary and alternate means of completion
e. Procedures to be followed upon implementation, from first order to destroy through completion and follow-up documentation and reporting
f. Priority for destruction of classified materials
g. Responsibility for ensuring a correct inventory of destroyed materials is maintained and recorded
h. Methods of destruction
i. Classified waste
Emergency Action/Destruction Plan
* Conditions: Natural disasters, hostile action
* Authority: CO, XO, OPS
o In absence, CDO or most senior person present
o Senior person present is overall responsible for inventory
o Command Destruction Supervisor - - - EKMS manager or CDO
■ Maintains status/inventory
* Authority to destroy onboard deployed unit: CO, XO, CDO, senior person
o Only CO can authorize precautionary destruction
■ Anything not being used right now to complete mission
* Means of Completion
o Primary - Assets used to destroy material
o Alternate - Device used to render material useless
o Precautionary Destruction - Reduce classified material present in preparation for potential hostile action
o Complete Destruction - Prevent capture/compromise of COMSEC or classified material (destroy everything)
o Methods of Destruction:
■ Shred, pulverize, incinerate, hand tools, zeroize (wipe/burn) crypto equipment
* Procedures
o EAP details all procedures —
o Report situation to EKMS manager —
o Distribute destruction cards, commence destruction (track status, inventory) —
o EKMS or CDO reports the loss/compromise
* Priorities
o 1 — TS+
o 2 — S
o 3 — C
* Classified Waste
o Keep to a minimum - reduces buildup/excess if EAP or EDP is implemented
102.5 Define and discuss the following:
a. Access [ref. a, ch. 9]
b. Clearance [ref. a, ch. 8]
c. Compromise [ref. a, app. A]
d. Marking [ref. b, app. A]
e. Need-to-know [ref. a, app. A]
f. Transmission security [ref. c, encl. 5]
g. TPI [ref. i. ch. 4]
h. TPC [ref. i, ch. 9]
i. Working papers [ref. h, encl. 4]
j. Downgrading [ref. b, Exhibit 6b]
k. Disclosures [ref. h, encl. 4]
l. Sanitization [ref. b, ch. 11]
m. COMSEC [ref. b, app. A]
n. INFOSEC [ref. d]
o. TEMPEST [ref. u, encl. 4]
p. SSBI [ref. a, ch. 6]
a Access - Ability/opportunity to obtain knowledge
o Access is provided via the information owner, Clearance is provided by the Navy
b Clearance - Administrative decision by adjudicating authority
o DONCAF is adjudicating authority (levels: TS, S, C)
c Compromise - Unauthorized disclosure to unauthorized person/systems
d Marking - Indicates material’s classification/handling procedures
e Need-to-Know - Determination that person requires access to specific information
f OCA - Original Classification Authority
o Person/organization authorized to take raw intel and classify
■ Authorized in writing, by either POTUS, VPOTUS, or agency heads, to classify info in the first place
■ Shall apply the following markings:
* Classified By
* Classification Reason
* Declassify On
o To downgrade something, need permission from the OCA
o The point of classification is to protect sources and methods!
* DCA - Derivative Classification Authority
o Ability to classify based on previous classification determinations, made either from an authorized classification guide or from a source document
■ Shall apply the following markings:
* Derived From
* Declassify On
* Transmission Security - Protect transmissions from interception/exploitation
o Component of COMSEC
o Protect transfer of data via radio/electronics
g TPI - Two-person Integrity
o Handling/storing to prevent single-person access to COMSEC keying manual, cryptographic manuals
h TPC - Two-person control
o Continuous surveillance/control of positive control material at all times
i Working Papers - Docs/materials accumulated and created while preparing finished materials
o ex. Classified notes from training sessions, conferences, etc.
j Downgrading - Reducing classification to lower level
o Determined by approved authority (need permission from the OCA)
k Disclosures - Conveying classified info in any manner
o Unauthorized disclosure = crime
l Sanitization - Process of removing sensitive information to allow it to exist at a lower classification
o The point of classification is to protect sources and methods!
m COMSEC (Communications Security)
o Protective measures to deny unauthorized interceptors from accessing information from telecommunications, while still delivering content to intended recipients
■ Prevent unauthorized persons from interception/knowing your comms (ex. encryption)
o Includes:
■ Cryptosecurity - Security from technically sound cryptosystems and proper use
* Ex. PKI
■ Emissions Security - Securing emanations from crypto equipment, computers, telecomms systems
■ Physical Security - Physical measures to safeguard material/equipment
* Ex. Folders, safes, etc.
■ Transmissions Security - Protecting transmissions by means other than crypto
* Ex. Frequency hopping
o COMSEC Incident - If cryptographic keys (used by IPs/Its) are not destroyed in time, given to people without access, not secured
■ Cryptographic COMSEC Incident - Using keying material that is compromised, defective, or not authorized for use/reuse
■ Personnel COMSEC Incident - Defection, espionage, capture by enemy
■ Physical COMSEC Incident - Physical loss of COMPSEC material, failure to maintain TPI
n INFOSEC (Information Security)
o Protect info/info systems from unauthorized access, disclosure
o Concerned with confidentiality, integrity, availability of data (regardless of form data may take)
o TEMPEST
o Program to protect against unauthorized RF transmissions in/out of SCIF
■ TEMPEST team comes to certify DoD space
o NSA provides lists of TEMPEST-certified telecomms equipment
p SSBI (Single Scope Background Information)
o Investigative standard for TS & SCI
102.6 Discuss the authoritative manuals and instructions that govern the following:
a. Physical Security [refs. h]
b. Information Assurance/Cyber Security [ref. o]
Authoritative Manuals/Instructions
a DCID 6/1 - Security Policy for SCI and Security Manual
a DCID 6/9 - Physical Security Standards for SCIFs
b ALNAV 055/10 - Safeguarding Classified National Security Info
b SECNAVINST 5239.1-3B - DON Information Assurance Policy
b COMNAVCYBERFORINST 5239.2A - Guidance for Cyber Security Inspection and Certification Program
102.7 Describe the steps required to report a compromise, a suspected compromise of
classified material or a PDS. [ref. i, ch. 10]
Steps Required to Report Compliance
* Take custody of/safeguard info
* Notify SM or SSO/EKMS manager and CO (plus supervisory chain of command)
* CO initiates Preliminary Inquiry (PI), notifies NCIS of loss or compromise
o Most reports of compromise sent to CO
* CoC remediates practices dangerous to security
o PDS is a level below COMSEC incident
o Reportable
■ Premature/out-of-sequence use of keying material
■ Inadvertent destruction of material (if destruction properly documented and re- supply required)
o Non-Reportable
■ Improperly completed accounting reports
■ Late destruction
102.8 Discuss proper protocol for classified communications to include:
a. Telephone [ref. r, encl. 4]
b. Computer Systems [ref. f, ch. 11]
c. Radio Communications [ref. p, Exhibit b; ref. q]
d. Video / VTC [ref. r, encl. 4]
a Phones
o National Secure Telephone System (NSTS) - SCI, completely isolated phone network
o Defense Red Switched Network (DRSN) - Secure voice/conferencing requirements for POTUS, SECDEF, CJCS, etc.
o Voice Over Internet Protocol (VOIP) - NSTS uses VOIP to transfer data
o Colors (in SUPPLOT)
■ TS/SCI - Grey
■ SECRET - Red
■ UNCLASS - Black
b Computer Systems
o SIPR/JWICS
o CHAT (know/pay attention to avoid spillage!)
o Computer terminals must comply with OPNAVINST C5510.93
■ Be installed in accordance with TEMPEST guidelines
c Radio Communications
o FLTTAC - Book on bridge of ship with codewords (everything is in code)
■ Over open net (unclassified), so everyone can hear - including civilians
■ VHF
o NAVYRED - Encrypted comms line all surface stations are attached to
■ Can talk in plain language
d Video/VTC
o May occur on unclassified or classified networks
102.9 Describe the purpose of network scanning and patching. [ref. j]
- Scanning - Scan all components of network to identify possible threats/vulnerabilities
- Patching - Permanent or temporary restoration solution to a network
102.10 Describe the different types of firewalls and intrusion detection systems. [ref. n]
- Packet Filtering
o Everything going over the Internet is a “packet”
■ Firewall has certain rules to filter packets (ex. certain IP addresses, etc.) - Stateful Packet Filtering
o Instead of checking every packet, network connection made w/firewall; firewall remembers connection
■ Only passes packet with known active connection
o More concise than packet filtering
o Lacks ability to filter encrypted traffic - Application Proxies
o Application (ex. web server, email server proxy) takes packets to reroute through server proxy so application doesn’t get bogged down
o Can read encrypted sessions
■ Encrypted services can be set up on server
o Slower/more susceptible to overflow attacks
102.11 Define the purpose of DoD Cyber Security Workforce, including required baseline IAT and IAM certification levels (note: ref. r to be replaced by DoD Directive 8140).
[ref. r, chs. 1, 2]
- Anyone working on or with network must be cybersecurity qualified ➔ 40 hours of CEUs
- IA Certification Program
o IA principles & practices
o IAT (Technical) - Levels I, II, III
o IAM (Management) - Levels I, II, III
102.12 Define the following:
a. Electronic spillage. [ref. b, ch. 12; ref. k]
b. Network incident [refs. t, l]
- Electronic Spillage
o When data is placed on IT system with insufficient information security controls to protect data at required classification - Network Incident
o Any possible security compromise on a network
■ Ex. Attempted entry, unauthorized entry, malicious code execution, information attack
102.13 Define the following:
a. COMSEC incident [ref. i, ch. 11]
b. PDS [ref. i, ch. 10]
COMSEC = communications security incident: Occurrence that potentially jeopardizes the security of COMSEC material or the secure electrical transmission of national security information.
PDS = practice dangerous to security: A procedure that has the potential to jeopardize the security of COMSEC material if
allowed to continue. (NOTE: A PDS is not a COMSEC incident and does not have a COMSEC case number assigned.)
102.14 Discuss reporting requirements and actions to be completed upon discovery of the
following:
a. Electronic spillage [ref. b, ch. 12)
b. Network incident [ref. l]
c. COMSEC incident [ref. i, ch. 11]
d. PDS [ref. i, ch. 10]
- Command originating electronic spillage - Call SSO/SSM
o Report spillage via naval message
o Conduct/complete preliminary inquiry (PI) within 72 hours
o Acknowledge NETWARCOM SITREP within 24 hours
o Clean up/report completion within 72 hours - Command receiving
o Same steps as originating, no PI required, notify originating immediately
102.15 Define and Discuss PKI [ref. f, ch. 11]
Achieves 4 of the 5 pillars of Information Assurance - ensuring systems and networks are maintained to protect information (safeguard integrity of data)
o Confidentiality - Information only read by authorized entities
■ How: Encryption, passwords
o Integrity - Data is unchanged from its source
■ “Hash” - snapshot of message turned into a long string of binary tacked onto the end of the email (not actually in text of the email)
* Taken when email is sent
* Taken again when email received
* Program compares hashes to ensure they are the same to achieve integrity - if they are not the same, email was tampered with
■ How: Digital certifications/signatures
o Authentication - You are who you say you are
■ How: CAC/PKIs, username/password
o Non-Repudiation - Evidence of an information exchange or transaction
■ How: Log/digital signatures
o Availability - Information systems are available (PKI DOES NOT ACHIEVE THIS ONE)
■ How: Firewalls, anti-virus
103.1 Define the following terms as they apply to maintenance operations and management:
a. Tag-Out [ref. c]
b. MFOM [ref. h, app. B]
c. ASI [ref. g, ch. 7]
d. SKED [ref. d, app. F]
e. CSOSS [ref. j]
a Tag-Out Program
o Maintain electrical safety during maintenance
■ Let others know not to energize/operate
■ Serviced isolated from power
■ Must be kept in log
b Maintenance Figure of Merit (MFOM)
o Web-based, near real-time software tool
o Calculates material readiness values
■ Prioritizes job requests/work orders
■ Provides priority-ranked Consolidated Ship’s Maintenance Plan (CSMP)
c1 Automated Shore Interface
o Way to view statistics across fleet for specific equipment (type of file, not system)
c2 Authorized Service Interruption
o Identifies maintenance/repairs accomplished during authorized system shutdown
■ Reports include uplink alignments, antennas, etc.
d Automated Planned Maintenance System Scheduling Tool (SKED)
o Program/Scheduler
■ Tracks all 3-M efforts
■ Schedules based on ship, what you have
e Combat Systems Operational Sequencing System (CSOSS)
o Instructions with emergency procedures on how to emergency shut off work equipment
■ Provide info for casualty control
103.2 Describe the 3-M system, to include:
a. PMS schedule [ref. d, app. F]
b. Spot check program [ref. d, app. G]
c. Tag-Out Program [ref. b, ch. 1]
a Planned Maintenance Schedule (PMS)
o Displays planned maintenance to be performed over different periods of time in the maintenance life cycle
■ Quarterly, monthly, weekly, daily, situational
b Spot Check Program
o Test to determine if PMS is being performed correctly
■ Spot check grade entered in SKED Spot Check Accomplishment Rating (SCAR)
c Tag-Out Program
o Provides tag-out directives, maintain electrical safety
103.3 Discuss CASREP, including the categories and types. [ref. a, ch. 4]
- Go out on SIPR (ship readiness)
o Message to CNO/fleet commanders reporting malfunction or deficiency which cannot be corrected within 48 hours
■ Reduces unit’s ability to perform primary or secondary mission - Types
o INITIAL - First CASREP
o UPDATE (CASUP) - After trying to troubleshoot, something else breaks, new updates
o CORRECT (CASCOR) - Rescind something already sent
o CANCEL (CASCAN) - Cancel entirely (not just a correction) - Levels/Categories (CATs)
o 4 - Major degradation to primary mission/total loss
o 3 - Major degradation to primary mission
o 2 - Major degradation to secondary/minor to primary
o 1 - Minor degradation to secondary (not really used in fleet)
103.4 Explain who is responsible for the command’s maintenance program and the role of the Division Officer. [ref. d, ch.1]
- CO has ultimate responsibility for maintenance program, tasked down to XO/DHs
o XO is 3-M System Manager (3-M = Material Maintenance Management System)
o DIVOs are qualified in 3-M system, assist in managing maintenance requirements for division
103.5 Explain the following: [ref. i, ch. 3]
a. SOVT requirements
b. TCD waiver
- System Operation and Verification Test (SOVT) Requirements
o Ensure system/equipment performs as advertised before taking ownership from contractor who installed it
■ Ensure it works properly with everything it “touches” after being installed/modified - Target Configuration Date (TCD) Waiver
o Date when all planned installations and upgrades are to be completed
■ No further updates without waiver
103.6 Discuss maintenance and availability periods IAW the OFRP. [ref. f]
OFRP
* Optimized Fleet Response Plan
o Ensure Navy’s surge capabilities are met
■ Intervals between planned maintenance periods are long - constant preventative maintenance is required
o Calls for 6 of 12 CVNs to be available to deploy in 30 days
■ Another 2 in 90 days
103.7 Discuss installation/maintenance requirements for CCOP, to include:
a. FES [ref. e, app. D]
b. GAP [ref. e, ch. 4]
CCOP Maintenance/Installation
* Cryptologic Carry-On Program
o Allows the Navy to cycle the newest cryptologic technology onboard; Program of Record (POR) is slow to evolve due to the necessity of Congressional approval
■ Allows CTs to use NSANET (among other tools) on ship
a Fleet Electronic Support (FES)
o Responsible for installation, removal, maintenance, repair of DIRSUP electronic equipment on naval platforms
■ Essentially a SCIF-ed warehouse
■ Command (with an OIC)
■ For subs, in Groton and Hawaii
b Coordinated Fleet Global Augmentation Policy (GAP) message
o Based on operational requirements from fleet and afloat commanders
o Sets policies of what is acceptable augmentation to request
104.1 State the location of headquarters, geographic AOR, and responsibilities
for the following: [ref. a]
a. Geographic Combatant Commanders
b. Functional Combatant Commanders
Geographic COCOMs - Assigned AOR by Unified Command Plan (UCP), responsible for all operations in designated areas
Functional COCOMs - Not assigned a specific AOR, but designated specific operations/tasking
a.
USNORTHCOM: Peterson Air Force Base, CO; CONUS defense, Mexico, Canada;
Fleet Forces: All MTE commands fall under it (SUBLANT, NECC, SURFLANT, AFLANT, NAVIFOR)
2nd Fleet: Norfolk, VA
3rd fleet: San Diego, CA
USSOUTHCOM | Miami, FL - Central/South America, Caribbean; COMUSNAVSO,
4th Fleet (Mayport, FL):
■ Caribbean, oceans around Central and South America
■ Narcotic interdiction, humanitarian/goodwill interventions
USINDOPACOM | Camp H.M. Smith, Hawaii - Asia, Australia, Pacific Ocean, parts of IO
o COMPACFLT
■ Reports administratively to CNO - Pacific Coast TYCOM
* Provides naval resources under OPCON of PACOM
* 3rd/7th fleets, CNFK, CNFJ, CNFMarianas, etc.
o 3rd Fleet (San Diego, CA) | 7th Fleet (Yokosuka, JPN)
■ 3rd fleet responsible for West Coast, including Alaska, Aleutian Islands
■ 7th fleet responsible for Western Pacific and Indian Ocean
* Largest of forward deployed US fleets
* Yokosuka, Sasebo, Guam
USEUCOM | Patch Barracks, Stuttgart, GER - Europe, Arctic, Atlantic Ocean
o COMUSNAVEUR
o 6th Fleet (Naples, Italy)
■ Deputy of COMUSNAVEUR/COMUSNAVAF is CMDR, U.S. 6th fleet
■ Maritime ops/theater security cooperation missions in Europe and Africa
* USS Mount Whitney - flagship
■ Staff is CNE-CNA/C6F
USAFRICOM | Kelley Barracks, Stuttgart, GER - Sub-Saharan Africa
o COMUSNAVAF
o 6th Fleet (Naples, Italy)
■ Deputy of COMUSNAVEUR/COMUSNAVAF is CMDR, U.S. 6th fleet
■ Maritime ops/theater security cooperation missions in Europe and Africa
* USS Mount Whitney - flagship
■ Staff is CNE-CNA/C6F
USCENTCOM | MacDill AFB, Tampa, FL - Middle East, parts of North Africa/West Asia
o COMUSNAVCENT
o 5th Fleet (Manama, Bahrain)
■ Shares commander and HQ with NAVCENT
■ Persian Gulf, Red Sea, Arabian Sea, coast off East Africa
b.
USCYBERCOM | Fort Meade, Maryland - Cyberspace
o COMUSFLTCYBERCOM
■ Worldwide cyber support
■ Responsible for Navy’s cyber warfare programs
■ Operations/defense of DoD networks
■ Components:
* NAVNETWARCOM
* NIOCs
* NCDOC (Navy Cyber Defense Operations Command)
o 10th Fleet (Fort Meade, Maryland)
■ COMUSFLTCYBERCOM and Commander, U.S. 10th Fleet are the same person
USSOCOM | MacDill AFB, Tampa, FL - Special forces/operations
o COMNAVSPECWARCOM
USSTRATCOM | Offutt AFB, Omaha, NE
o Strategic (nuclear) forces, deterring attacks on U.S. allies, space & satellite systems
o 2/3 of nuclear triad
■ ICBM silos and B-52/B-2 bombers
o STRATCOM JIOC tracks missile activity
■ Missile defense, global strike, WMDs, global C2
USTRANSCOM | Scott AFB, Belleville, IL
o Transportation for DoD components
USSPACECOM | Peterson AFB, CO
o Stood up in 2019
104.2 Identify the organizations in the Information Warfare operational and administrative chains of command, and discuss the mission, functions, and locations of each:
a. U.S. Strategic Command [ref. a]
b. U.S Cyber Command [ref. b]
c. OPNAV N2/N6 [ref. c]
d. U.S. Fleet Forces Command [ref. d]
e. U.S. Pacific Fleet [ref. e]
f. Fleet Cyber Command [ref. b]
g. Navy Information Forces [ref. f]
h. Office of Naval Intelligence [ref. g]
i. Naval Meteorology and Oceanography Command [ref. h]
j. Naval Network Warfare Command [ref. i]
k. Navy Expeditionary Combat Command [ref. j]
l. Naval Special Warfare Command [ref. k]
m. Numbered Fleets:
1. Third [ref. aa]
2. Fourth [ref. ab]
3. Fifth [ref. ac]
4. Sixth [ref. ad]
5. Seventh [ref. ae]
6. Tenth [ref. l]
c. OPNAV N2/N6 - Deputy Chief of Naval Operations for Information Warfare
o Currently VADM Jeffrey Trussler as of June 2020 - submariner
o N2 - Intel/N6 - Comms
■ Merged in 2009
o Responsible for intel, information warfare, cyber, comms, networks, METOC, space
g. NAVIFOR - Navy Information Forces - Suffolk, VA
o TYCOM for Navy’s global cyber workforce
o Reports to USFF
h. Office of Naval Intelligence (ONI) - Suitland, MD
o Colocated with the National Maritime Intelligence Center
o Echelon II command
o Global maritime intelligence
■ Analysis, production, dissemination
■ Scientific, technical, geopolitical, military
o Oldest continuously operating U.S. intel agency (est. 1882)
i. Commander, Naval Meteorology and Oceanography Command (CNMOC) - Stennis Space Center, MS
o Hub command for METOC/TYCOM for METOC
■ Reports to USFF
o Meteorology, oceanography, precise time, astronomy, environmental knowledge
j. Naval Network Warfare Command (NNWC) - Suffolk, VA
o Hub command for IP
■ Falls under FLTCYBERCOM/C10F
o Commands/controls Navy networks
k. Navy Expeditionary Combat Command (NECC) - Little Creek, VA
o MTE of expeditionary forces
o Seabees, EOD
l. Naval Special Warfare Command (NSWC) - San Diego, CA
o MTE, deploy, sustain NSW forces in support of COCOMs
104.3 Discuss the three tenets of Information Dominance: [refs. y, z]
a. Assured C2
b. Battlespace Awareness
c. Integrated Fires
Pillars of Information Warfare
a. Assured Command and Control (AC2) - Network the Force - IP
o Enable exchange of orders/responses with subordinates
o Provide assured EM spectrum access
o Provide assured Positioning, Navigation, Timing
o Provide dynamic flexible networks
o Key N2/N6 programs:
■ NMCI/NGEN, CANES
■ Intelligence Community Information Technology Enterprise (IC ITE)
■ Cybersecurity/CYBERSPACE
b. Battlespace Awareness (BA) - Know the Environment - Intel, METOC
o Ensure persistent surveillance of the maritime and information battlespace
o Provide tactical, operational, strategic knowledge of the capabilities and intent of our adversaries
o Understand/predict the physical and virtual environments
o Enable automated processing, exploitation, analysis, fusion, and product delivery
o Provide scientific and technical modeling of adversary systems
o Key N2/N6 programs:
■ Triton, FireScout, LBS-UUV unmanned systems
■ Fixed Surveillance System
■ SURTASS
■ P-8 Quick Reaction Capability
c. Integrated Fires (IF) - Seize the Initiative - CW
o Exploit spectrum as a kinetic and non-kinetic weapon
o Enable increased weapons range, effectiveness, lethality
o Integrate targeting and fire control capabilities
104.4 Define the mission and functions of the following:
a. Maritime Headquarters with Maritime Operations Center [ref. w, ch. 6]
b. Carrier Strike Group [ref. m, chs. 1, 2]
c. Expeditionary Strike Group [ref. n, ch. 10]
d. Amphibious Readiness Group [ref. n, ch. 1]
a. Maritime HQ w/ Maritime Operations Center
o All fleets have MOCs (Maritime Operations Center) - coordinates CTFs, responsible for ordering larger-level fight (operations) and commanding theater-level war
o Exists to streamline operational cycle
■ Provide structure for quickly and effectively establishing support for operational- level maritime commander
o All operational fleets have MIOCs (Maritime Intelligence Operations Center)
■ 3rd, 5th, 6th, 7th, 10th
■ Takes intel and fuses with operations to support the MOC
b. Carrier Strike Groups (CSG)
o Missions: Power Projection, Deterrence, Naval presence in support of national interests
o Includes (at least): 1x HVU (CVN), 1x Cruiser, 2-4x Destroyers, CVW (Carrier Air Wing)
■ Sometimes includes a submarine, and theater-based supply ships conduct replenishment
c. Expeditionary Strike Group (ESG)
o Missions: Operational freedom and expanded warfare capabilities on land (with Marines) and sea
o Includes (at least): 1x LHA or LHD (primary landing - amphibious assault), LSD (dock landing ship with LCACs), LPD (transport dock), MEU (Marines), submarine or surface escorts, aircraft (Harriers, CH-53, CH-46, MV-22, AH-1W)
d. Amphibious Readiness Group
o Essentially a less complete ESG
o Missions: Span from HA/DR to major theater-level war
o Includes (at least): Amphibious Task Force of Navy ships (LHA or LHD, LPD, LSD), Landing Force (MEU), Aircraft
104.5 Discuss the Command structure and functions of the following, including typical
assignments in a CSG/ESG/ARG: [ref. o]
a. CWC/OTC [ch. 1]
b. Sea Combat Commander [ch. 3]
c. Anti-Submarine Warfare Commander [ch. 3]
d. Surface Warfare Commander [ch. 3]
e. Mine Warfare Commander [ch. 4]
f. Air Defense Commander [ch. 3]
g. Strike Warfare Commander [ch. 3]
h. Information Warfare Commander [ch. 3]
Composite Warfare Construct
o Command structure in which Admiral (OTC/A) delegates warfare functional areas to subordinate units
■ Centralized planning/decentralized control
■ Command by Negation
a.
OTC - Officer in Tactical Command (A)
o The Admiral
CWC - Composite Warfare Commander (B/V)
o Can be combined with OTC
o Where: CVN
o Role: Overall command
b. Sea Combat Commander (SCC) - Z
■ Who: DESRON Commander
■ Role: Surface - S/T (Shit Talkers); Undersea - X/Y (Examine Yourself)
* Defense against surface and submarine threats
c. Anti-Submarine Warfare Commander - X
- Defense against submarine threats
d. Surface Warfare Commander - S
o Current/potential threats to surface units
o IDIS (Independent Duty Intelligence Specialist) on small boys
Z- Combines S and X
e. Mine Warfare Commander (MIWC) - G/F
■ Principal advisor to OTC on matters pertaining to Mine Warfare
* Coordinate laying of minefields, supporting MCM forces (usually not under direct command of OTC)
f. Air Defense Commander - W
■ Who: Cruiser CDR (O-6)
* Only Warfare Commander NOT on CVN
* Usually has an O-3 representative on CVN
■ Where: Cruiser (since he’s the CO)
o Airborne threats to CSG
■ Aircraft, radars from ASCM/CDCMs/SAMs, missiles
g. Strike Warfare Commander - P
o Threats to CAG platforms/personnel
o Support operational mission planning, targeting process
h. Information Warfare Commander - Q
o Meet/inform IWC priorities
o Fuse intelligence with all IWC disciplines
104.6 Discuss the difference ONI groups:
SWORD
SABER
SPEAR
SPECTRUM
FARRAGUT
NIMITZ Geo Cells
a. ONI SWORD
Mission: Submarine Warfare Operations Research Division (SWORD) provides all source assessments on foreign submarine and anti-submarine warfare capabilities of selected world navies.
b. ONI SABER
Surface Warfare
c. ONI SPEAR
RED air intel - SPEAR (Strike Projection Evaluation and Anti-Air Warfare Research)
d. ONI SPECTRUM
Cyber/electronic warfare/C4ISR (Command, Control, Communications, Computers, Intelligence,
Surveillance and Reconnaissance)
e. ONI FARRAGUT Technical Analysis Center
The Farragut Center ensures the Navy understands the foreign-force capabilities it is likely to encounter
f. ONI NIMITZ Geo Cells
The Geographically Oriented Cells are teams focused on specific area of interest and provide extensive knowledge to the Naval forces.
104.7 Discuss the functions of the following Joint Warfare Commands:
a. Combined or Joint Task Force [ref. p, ch. 2]
b. Combined or Joint Force Air Component Command [ref. p, Glossary]
c. Joint Special Operations Task Force [ref. q, ch. 2]
d. Combined or Joint Force Land Component Command [ref. q, ch. 1]
e. Combined or Joint Force Maritime Component Command [ref. m, ch. 2]
f. Joint Military Information Support Task Force [ref. r, ch. 3]
g. Civil Military Operations Center [ref. p, ch. 2]
a. Combined or Joint Task Force
o JTF - More than one military service
o CTF - More than one nation
o CJTF - More than one service and more than one nation
b. Combined or Joint Force Air Component Command (JFACC)
o Commander within unified command, subordinate unified command, or JTF
■ Responsible for making recommendations on proper employment of air forces
c. Joint Special Operations Task Force (JSOTF)
o JTF composed of special ops units from more than one service
■ To carry out a specific special operation or prosecute special ops in support of theater campaign
■ May have conventional non-special ops units attached to support
d. Combined or Joint Force Land Component Command (JFLCC)
o Similar to JFACC, but for employment of land forces
e. Combined or Joint Force Maritime Component Command (JFMCC)
o Similar to JFACC/JFLCC, but for employment of maritime forces and assets
f. Joint Military Information Support Task Force (JMISTF)
o Develop strategic, operational, tactical MISO plans for theater campaign
■ Subordinate joint command of joint force
g. Civil Military Operations Center (CMOC)
o Conceptual meeting place of stakeholders in coordinating civil-military operations
■ May include reps of DoD forces, NGOs, IGOs, private sectors, etc.
o Generally does not set policy or direct ops
104.8 Discuss the following organizational responsibilities and command relationships,
specifying under what circumstances each is exercised in a joint environment:
[ref. s]
a. COCOM [ch. V]
b. OPCON [ch. V]
c. TACON [ch. V]
d. ADCON [ch. V]
e. DIRLAUTH [ch. V]
f. Supported and/or Supporting Commander [app. A]
a. Combatant Command (COCOM)
o Authority vested by Title 10, USC, Section 164
o Full authority for CCDR over assigned forces
■ Designating objectives
■ Direction over all aspects of military ops
■ Organizing/employing commands and forces
b. Operational Control (OPCON)
o Authoritative direction over all aspects of military operations and joint training
o Perform functions involving org/employing forces, assigning tasks, designating objectives, etc.
■ Ex. PACFLT, 7th FLT
c. Tactical Control (TACON)
o Falls under OPCON - more specific, unit/mission-oriented
■ Inherent in operational control
o May be delegated to any level at or below COCOM level
o Detailed direction and control of maneuvers within the op area necessary to accomplish missions
■ Ex. CSG
d. Administrative Control (ADCON)
o Man, Train, Equip
o Authority over admin and support
■ Resources, equipment, personnel management, logistics
■ Ex. NAVIFOR
e. Direct Liaison Authorized (DIRLAUTH)
o Coordination relationship, not an authority itself
o Granted by a CDR (at any level) to a subordinate to directly coordinate an action with a command or agency within or outside the command
■ Ex. C10F is given DIRLAUTH from CNO to coordinate with NSA
f. Supported/Supporting Commander
o Supported Commander - Receives assistance from other commanders’ force/capabilities
■ Primary responsibility for all aspects of task assigned
■ Responsible for ensuring supporting commanders understand assistance required
o Supporting Commander - Provides forces/capabilities to supported commander
104.9 Define and discuss the purpose of the following:
a. OPGEN/OPTASK [ref. n; ref. o, ch. 2]
b. ALERTORD [ref. t, ch. 4]
c PLANORD [ref. t, ch. 4]
d. WARNORD [ref. t, ch. 4]
e. EXORD [ref. t, ch. 4]
f. OPORD [ref. t, ch. 4]
g. FRAGORD [ref. t, ch. 4]
a. OPGEN - Operational General Message
o General instructions, policy and information common to all forms of warfare and detailed instructions about warfare responsibilities of OTC
b. ALERTORD - Alert Order
o Same as a PLANORD, but AFTER directing authority approves a COA
■ Does not authorize execution of COA!
c. PLANORD - Planning Order
o Directs initiation of plan development, BEFORE directing authority approves a COA
d. WARNORD - Warning Order
o Planning directive that initiates development and evaluation of COAs and commander’s estimate
■ Warning that “there will be an operation”
e. EXORD - Execution Order
o Execute COA or OPORD at direction of POTUS/SECDEF/CJCS
■ Includes:
* D-day (day on which operation will start)
* H-hour (time operation begins)
* DTGs (date time group) are expressed in Zulu time
f. OPORD - Operation Order
o Directive issued by CDR to sub CDRs to coordinate execution of operation
■ Often times are standing orders
g. FRAGORD - Fragmentation Order
o If changes need to be made to an OPORD without changing the whole thing, update with FRAGORD
■ Issue as needed
104.10 Discuss the roles and responsibilities of SPAWAR. [ref. u]
SPAWAR
* Name now changed to Naval Information Warfare Systems Command (NAVWAR) - located in San Diego, CA
* Provides hardware and software needed to execute Navy missions
o Develops, delivers, sustains advanced cyber capabilities
■ “Rapidly deliver cyber warfighting capability from seabed to space”
o Support full lifecycle of product delivery
■ R&D, acquisition and development, operations and logistical support
104.11 Discuss the TYCOM responsibilities for OFRP, ULTRA. [ref. v]
Type Commander (TYCOM)
o Perform MTE (mission task element) for “type” of weapon system (naval aviation, sub warfare, etc.)
■ NAVIFOR is TYCOM for IWC - falls under USFF TYCOM
o Each TYCOM is responsible for ensuring training, certification, maintenance requirements to implement and execute OFRP (Optimized Fleet Response Plan)
104.12 Describe operational readiness reporting at your organization, including DRRS-N.
Defense Readiness Reporting System (DRRS-N)
o Near real-time web-based tool that tracks command’s readiness to fight
■ Report to OSD readiness level of any USN unit to allow for critical decisions to be made to deploy units based on up-to-date info
104.13 Describe the differences between HD and HS. [ref. x, ch. I]
Homeland Defense
o Protection of U.S. territory, domestic population, critical infrastructure against attacks from outside the U.S.
Homeland Security
o National team effort (local, state, federal) to prevent terrorist attacks, reduce vulnerability to terrorism
■ DoD contributes via military missions overseas, HD, support to civil authorities
104.14 Describe Title 10 and Title 32 responsibilities in support of HD. [ref. x, ch. II]
Title 10
o Outlines role of armed forces
■ Provides legal basis for roles, missions, organization of each service and DoD; restricts domestic mission (Posse Comitatus)
Title 32
o Outlines role of National Guard
■ Chapter 9 outlines homeland defense activities
■ Maintains law enforcement abilities of state guard, controlled by governor
Title 50
o Outlines role of war and national defense
■ Establishes Council of National Defense
* Comprised of Secretaries of Army, Navy, Interior, Agriculture, Commerce, Labor
■ Chap. 36 governs foreign intelligence surveillance
■ Authorizes detention and removal of individuals from foreign nations with which U.S. is not at war
104.15 Discuss how the major provisions of Title 50 address HD. [ref. x, app. D]
A Council of National Defense is established, for the coordination of industries and resources for the national security and welfare, to consist of the Secretary of the Army, the Secretary of the Navy, the Secretary of the Interior, the Secretary of Agriculture, the Secretary of Commerce, and the Secretary of Labor.
105.1 Define the following:
a. Call sign [ref. a, ch. 9]
b. Precedence [ref. a, ch. 3]
c. Circuit discipline [ref. a, ch. 6]
d. Free net [ref. a, ch. 6]
e. Directed net [ref. b, ch. 2]
a. Call Sign
o Nickname over comms, can change every day
o Conceal who is talking to whom, level of CMD, purpose of net from intercepting operator
b. Precedence
o Indicate relative order of processing/delivery to recipients of messages
o 4 basic types reflect speed of service objectives
■ Time for message to be processed from sending comm center to recipient comm center
Precedence Prosign Objective
FLASH Z ASAP (under 10 min)
IMMEDIATE O 30 min.
PRIORITY P 3 hours
ROUTINE R 6 hours
c. Circuit Discipline
o Common manners/voice procedure - enforce security standards, enable comms efficiency/accuracy
d. Free Net
o Net Control Station (NECOS) allows member stations to transmit traffic to others without prior permission from NECOS
■ Bridge-to-bridge, always open
e. Directed Net
o Stations must obtain prior permission from NECOS
■ Permission not required for FLASH messages
105.2 Discuss the proper procedures in naval voice communications, including the
following: [ref. b, ch. 2]
a. Operating rules
b. Three basic parts of transmissions
c. Radio check
d. Call/collective call
e. Daily-changing call signs
f. Common prowords
g. BEADWINDOW
h. EEFI
i. GINGERBREAD
a. Operating Rules
o Write messages down prior to transmission
o Do not interfere with other traffic
o Clear pronunciation with natural pauses
o Short and concise comms
b. Three basic parts of transmissions
o Heading - “Collective, this is Romeo Five Sierra”
o Text - “Kick two, time 1532 authentication is bravo zulu”
o Ending - “Out”
c. Radio Check
o PROWORD for “What is my signal strength and readability; how do you hear me?”
d. Call/Collective Call
o Collective call signs identifying a predetermined group of stations
■ Advantage: Brevity
■ Cons: Used excessively, provide red analysts with ability to group and identify
e. Daily changing Call Signs
o Used in unsecure circuit to disguise unit identifies
o Classified combo of letters and numbers
■ Published in COMSEC directory
f. Common Terms
o BREAK - I have higher priority traffic
o ACKNOWLEDGE - Instruction to acknowledge a transmission
o AFFIRMATIVE - Yes
o INTERROGATIVE - Question
o OUT - End of transmission, no reply expected
o OVER - Out, but reply necessary
o WILCO - Signal received, understood, will comply
o WRONG - Last transmission incorrect, correct one follows
g. BEADWINDOW - EEFI has been disclosed
■ NECOS: “Beadwindow One - Over”
■ Offending station’s only authorized reply: Roger Out”
h. EEFI - Information about friendly position, caps/lims, ops, EW, personnel, COMSEC
■ If acquired by adversary, would degrade security of ops
i. GINGERBREAD - Pass if you suspect an enemy station is on the net
105.3 Discuss the following circuits in terms of usual frequency range, type of circuit
(voice or teletype), units on the net, where it is normally guarded, and the use of the
net:
a. C&R nets [ref. c, ch. 1]
b. Ship-to-Shore [ref. d, ch. 1]
c. Fleet tactical-warning [ref. e, ch. 2]
d. Distress frequencies [ref. f]
e. Bridge-to-Bridge [ref. g, ch. 4]
f. Chat [ref. j]
g. POTS [ref. a, ch. 2]
h. Iridium [ref. a, ch. 9]
a. C&R Nets - Coordinating & Reporting
o Dedicated circuits between warfare commanders and operating forces
■ Avoid overloading
■ Ex. ASW C&R net used by X and surface, air, undersea units for ASW info
b. Ship-to-Shore
o High Frequency (HF) range
o Difficult application because of constant ship movement
■ Less reliable than SATCOM systems
■ Susceptible to natural and manmade interference
c. Fleet Tactical-Warning (FLTTAC)
o Requires 24/7 monitoring
o Unencrypted voice circuit used to coordinate ship movement
■ NATO classified signals maintain secrecy of ops
d. Distress Frequencies
o 500 kHz - International CW/MCW distress and calling
o 2182 kHz - International voice distress, safety, calling
o 8364 kHz - International CW/MCW lifeboat, life raft, survival craft
o 40.5 MHz - US Army FM distress
o 121.5 MHz - International voice aeronautical/shipboard emergency
o 156.8 MHz - International FM voice distress, emergency
o 243.0 MHz - Joint/combined mil voice aeronautical emergency and international survival craft
o 406.0 MHz - International voice aeronautical/shipboard emergency
e. Bridge-to-Bridge
o Most common use of VHF comms - short range, nonsecure
o Typically set to monitor Channel 16
■ Commonly recognized as “distress” channel
■ Comms with unidentified/merchant vessels
f. Chat
o Internet chat comms capabilities to both shore and sea commands
■ Allows for plain language to expedite passing information (usually with abbreviations)
o Available through JWICS, SIPRNET, CENTRIXS, etc.
g. POTS (Plain Ol’ Telephone System)
o Unenhanced telephone service with ability to send and receive phone calls
h. Iridium
o Satellite phone
■ Designed to permit any type of narrowband wireless transmission to reach anywhere in the world
o Network consists of space segment with constellation of 66 satellites in 6 evenly spaced nearly polar orbital planes
■ System owned and operated by Iridium LLC
* Private international consortium of leading telecomms/industrial companies
105.4 Discuss the following COP tools:
a. Link 11/16 [ref. c, ch. 1]
b. GCCS-M/J [ref. i, ch. 4]
c. CEC [ref. i, ch. 4]
a. Link 11/16/22 - share track data between ships to broaden COP
o Link-11 - UHF/HF
■ Legacy system
■ NECOS (Neto Control Station) ship asks each ship in round-robin, circular fashion, allows each unit to reply with data
* More vulnerable if NECOS goes down - net will be useless for some period of time
o Link-16 - UHF
■ Newer system
■ Non-nodal; does not require NECOS to operate tactical “net”
* Prevents uselessness if loss of node (NECOS) goes down
■ Anyone can connect with anyone
* Each ship has a time slot - if ship doesn’t talk during slot, goes to next
o Link-22
■ Combination of Link-11 and Link-16, allows you to choose
b. GCCS-M/J (Global Command and Control System - Maritime/Joint)
o Correlate, fuse, maintain track info and displays as a tactical picture (COP)
■ Location of air, sea, land units anywhere in the world (friendly, neutral, enemy)
■ At SECRET level
■ Link feeds create GCCS tracks
■ Maintained by DBM (blue/green tracks) and RDBM (red tracks)
c. CEC (Cooperative Engagement Capability)
o Enhance anti-air warfare (AAW) capability of ships and aircraft
■ Net battle force sensors to provide single, distributed AAW defense capability
o Create single, common air tactical picture
■ Fuses tracking data from sensors using identical algorithms
o Designed against air threat (cruise missiles), especially in littoral waters
105.5 Discuss the content and format of naval messages to include:
a. AIGs, PLADs, CADs [ref. b, ch. 1]
b. DTG, Julian date [ref. b, ch. 1]
a. AIGs, PLADs, CADs
o Address Indicating Group (AIG)
■ Single address group to represent large # of addressees
* Might be used for task groups
* Increase speed-of-traffic handling
o Plain Language Address Designator (PLAD)
■ Individual designator/address written in easily understood format
* Ex. COMDESRONTEN
o Collective Address Designator (CAD)
■ Represent 2 or more commands or activities
b. DTG, Julian Date
o Date Time Group (DTG)
■ All DoD messages released with DTG in universal time
■ 091630Z JUL 16 - 09JUL16; 1630Z
o Julian Date
■ Actual day out of 365 we are on
■ July 21 = Julian Date 203
105.6 Discuss the purpose and format of the following Naval messages:
a. OPREP-3 SITREP, NAVY BLUE, PINNACLE [ref. h, ch. 2]
b. COMSPOT [ref. a, app. C]
a. OPREP-3 Reporting System
o Provides military units with system to report significant events/incidents to highest levels of command
■ Within 5 min. - submit voice report
* Include who, what, when, where, impact on capability
o PINNACLE
■ Event that warrants informing national level authorities - immediate attention of SECDEF/CJCS
* Ex. Terrorist attack, fired upon, need immediate attention
* 5 min - Voice Report; 20 min - Naval message
o NAVY BLUE
■ Informs CNO of incidents with media interest expected (operational, personnel, etc.)
* Ex. COVID, run aground
* 5 min - Voice Report; 20 min - Naval message
o SITREP
■ Incidents not meeting OPREP-3 criteria
* Ex. Bomb threat hoax, suicides, etc.
* No voice report required, 20 min - Naval message
b. COMSPOT (Communications Spot Report)
o Submitted to controlling NCTAMS and DISA by all fleet units experiencing difficulties causing comms shortage exceeding 30 min.
■ Ex. If EHF goes down when raining
■ Any changes (including restoration of comms) reported, updates
■ If cannot be restored within 48 hours, submit CASREP
106.1 Describe the implications of the peacetime ROE on the inherent right of self-defense. [ref. a, encl. A]
Self-Defense
* Inherent right/obligation to exercise unit self-defense in response to a hostile act or demonstrated hostile intent
o Peacetime ROE - engagement in individual, unit, or national self-defense
o After force declared hostile by appropriate authority, US forces need not observe hostile act/demonstrated hostile intent before engaging
o ROE decisions have strategic, political implications
■ In peace ops, more sensitive politically
■ May have certain UN mandates
* Must apply guidelines of:
o De-escalation
o Necessity
o Proportionality
106.2 Discuss the following as they pertain to ROE:
a. Standing ROE [ref. a, encl. A]
b. Standing RUF [ref. a, encl. A]
c. FON [ref. b, ch. 2]
d. Transit passage [ref. b, ch. 2]
e. Innocent passage [ref. b, ch. 2]
f. Pursuit [ref. a, encl. A]
g. Hostile intent [ref. a, encl. B]
h. Hostile act [ref. a, encl. A]
i. Supplemental ROE [ref. a, encl. I]
j. Necessity [ref. a, encl. A]
k. Proportionality [ref. a, encl. A, encl. B, app. A]
l. Contiguous zone [ref. b, ch. 1]
m. Territorial waters [ref. b. ch. 1]
n. Exclusive economic zone [ref. b, ch. 1]
o. Reconnaissance Reporting Areas [ref. c, encl. M]
p. Space [ref. a. encl. E]
a. Standing ROE (SROE)
o Fundamental policies/procedures governing actions taken by US commanders during all military ops
■ CJCSI (Instruction) 3121.01B
■ Approved by SECDEF
■ J-3 is responsible for ROE maintenance
o Also apply to air and homeland defense missions
o Basic considerations:
■ Deadly force only in response to hostile act/intent
■ Failure to comply punishable under UCMJ
b. Standing Rules of the Use of Force (SRUF)
o Govern actions re: DoD civil support (mil assistance to civil authorities) and routine military departments (incl. AT/FP) occurring within US territory or territorial waters
■ Civil-support missions, homeland defense
c. Freedom of Navigation (FON)
o US FON program challenges territorial claims on world’s oceans and airspace considered
excessive/inconsistent with UNCLOS
■ Diplomatic protests by State Dept.
■ Operational assertions by US military
o Politically neutral
■ Encouraged nations to amend claims, bring grievances to the Hague
o COCOM theater-specific guidance/OPORDs on planning and executing FONOPs in a particular AOR
d. Transit Passage
o Exercise of freedoms of navigation and overflight solely for purpose of continuous and expeditious transit in the normal modes of operation
o Must:
■ Proceed without delay through or over
■ Refrain from any threat or use of force
■ Refrain from any activities other than normal modes of continuous/expeditious transit
o Cannot be hampered or suspended by coastal nation during peacetime
e. Innocent Passage
o Continuous/expeditious traversing of territorial seas
■ Includes stopping and anchoring for ordinary navigation
o Innocent if not prejudicial to peace, good order, security of coastal nation
f. Pursuit
o Self-defense including authority to pursue forces who have committed a hostile act/demonstrated hostile intent
■ Must be in territorial or contiguous waters of pursuing nation
* Only continued outside territorial/contiguous waters if pursuit has not been interrupted
g. Hostile Intent
o Threat of imminent use of force against US, US forces, or other designated persons or property
■ Includes threat to preclude/impede mission of US forces, ex. recovery of US personnel
h. Hostile Act
o Attack or other use of force against US, US forces, other designated persons/property
■ Includes force directly used to preclude/impede mission of US forces
i. Supplemental ROE
o Tailored ROE for specific missions
■ Can be requested by commanders at any level
* May decide existing ROE are unclear, too restrictive, or otherwise unsuitable
o SROE (Standing ROE) is generally permissive from perspective of tactical-level commander
■ Not necessary for on-scene commander to request authority to use every tactic/weapon available unless higher commander has imposed restriction by supplementary measure
o ROE request message/process
■ J-2, J-3, Judge Advocate personnel will draft variation/request for approval by COCOM
* COCOMs have authority to modify SROE or Supplemental ROE
* If request is different from SROE restrictions (requiring SECDEF approval), COCOM submits to CJCS for SECDEF approval
■ Typically for a task force/mission that is a unique situation
j. Necessity
o Use of force must be in response to hostile act or demonstration of hostile intent
■ Must accomplish legitimate military objective
* Ex. Targeting facilities, equipment, forces which would lead to partial/complete submission of adversary
* Ex. Operation Desert Storm - targeting Iraqi SCUD missile batteries
k. Proportionality
o Use of force is limited in intensity, duration, and scope to that which is reasonably required to counter attack/threat of attack and ensure safety of US forces
l. Contiguous Zone
o Area extending seaward from baseline up to 24NM
■ State can exert limited control to prevent/punish infringement of customs, fiscal/immigration/sanitary laws and regulations within territory or territorial sea
o Ships/aircraft enjoy high seas freedoms in the contiguous zone
m. Territorial Waters
o Defined by UNCLOS as extending at most 12NM
o Regarded as sovereign territory
■ Innocent passage by civ and mil allowed
■ Aircraft overflight not allowed
n. Exclusive Economic Zone
o Extends at most 200NM
o State has special rights over exploration/use of marine resources
o Ships/aircraft enjoy high seas freedoms/overflight in EEZ
o. Reconnaissance Reporting Areas = ???
p. Space
o Geneva Convention - no combat in space
o Space Coordinating Authority (SCA) recommends guidelines for employing space capabilities (incl. ROE)
106.3 Describe the process for requesting supplemental ROE. [ref. a]
o Tailored ROE for specific missions
■ Can be requested by commanders at any level
* May decide existing ROE are unclear, too restrictive, or otherwise unsuitable
o SROE (Standing ROE) is generally permissive from perspective of tactical-level commander
■ Not necessary for on-scene commander to request authority to use every tactic/weapon available unless higher commander has imposed restriction by supplementary measure
o ROE request message/process
■ J-2, J-3, Judge Advocate personnel will draft variation/request for approval by COCOM
* COCOMs have authority to modify SROE or Supplemental ROE
* If request is different from SROE restrictions (requiring SECDEF approval), COCOM submits to CJCS for SECDEF approval
■ Typically for a task force/mission that is a unique situation
106.4 State the authority required to conduct the following:
a. Electronic warfare [ref. a, encl. F]
b. Military deception [ref. a, encl. F]
c. Operations Security [ref. a, encl. F]
d. Military Information Support Operations [ref. a, encl. F]
e. Defensive Cyber Operations [ref. e, ch. 3]
1. DCO-RA
2. DCO-IDM
f. Offensive Cyber Operations [ref. e, ch. 3]
a. Electronic Warfare (EW)
o COCOMS have authority to employ EW, approve/delegate
■ In accordance with policy issued by CJCS
b. Military Deception (MILDEC)
o Authority for tactical MILDEC rests with COCOM in whose theater the operation resides
■ May delegate authority to conduct ops to JTF commander
■ May not be used to deceive Congress/US public
c. Operational Security (OPSEC)
o COCOMs have authority to manage OPSEC and ensure subordinate commanders employ OPSEC
■ On-scene commanders employ OPSEC
d. Military Information Support Operations (MISO)
o During armed conflict ➔ POTUS/SECDEF through CJCS issues specific MISO policy to unified commands
■ CJCSI 3110.05C - guidance to military commanders conducting MISO in a joint environment
o COCOMs have authority for force protection purposes, otherwise SECDEF approval required
e. Defensive Cyber Operations (DCO)
o Executed to defend DODIN/other cyberspace from active threats
■ Preserve ability to use blue cyberspace capabilities, protect blue cyberspace by defeating ongoing or imminent malicious cyberspace activity
o DCO-RA (Response Action)
■ Conducted by National Mission Teams (NMTs)
■ Gray space - boundary between our networks and red space
* Focused on denying ability to infiltrate our systems, “offensive to be defensive”
* Ex. Infiltrating red country’s networks to plant a bug in the toolset they use to infiltrate us
o DCO-IDM (Internal Defensive Measures)
■ Conducted by Cyber Protection Teams (CPTs)
■ Blue space - defend our networks
* Intrusion detection systems, getting people out of our networks
* Conducted within DODIN, respond to unauthorized activity or alerts in DODIN
f. Offensive Cyber Operations (OCO)
o Conducted by Combat Mission Teams (CMTs)
■ Located at COCOMs - only ones who do OCO
■ Red space - to harm enemy
o Destroy, degrade, disrupt network infrastructure or enemy’s ability to use cyberspace
■ CCDRs authorized within respective AOR when part of SECDEF approved ops
106.5 Explain the Law of Armed Conflict. [ref. d, sec. 1]
The part of international law that regulates the conduct of armed hostilities
o Conduct of hostilities
o Protection of war victims in conflict
5 fundamental principles:
o Military necessity
o Unnecessary suffering
o Distinction
o Proportionality
o Honor (chivalry)
* Regulates “conditions for war” (jus ad bellum) and “conduct of warring parties” (jus in bello)
106.6 Define hostile intent/hostile act as it pertains to cyberspace. [ref. a, encl. F]
Hostile Intent
o Threat of an imminent hostile act based on capability to deny, disrupt, degrade, destroy critical cyber assets at will of adversary
■ Ex. Sleeper malware
■ Identified through defensive counter-cyber or forensic operations
Hostile Act
o Force or other means used directly to attack critical cyber assets
107.1 Define the following:
a. Amplitude [ref. a, ch. 1]
b. Wavelength [ref. a, ch. 1]
c. Cycle [ref. a, ch. 1]
d. Frequency [ref. a, ch. 1]
e. Ground wave [ref. a, ch. 2]
f. Sky wave [ref. a, ch. 2]
g. Space wave [ref. a, ch. 2]
h. Line of sight horizon [ref. b, ch. 5]
i. Polarization [ref. a, ch. 2]
j Skip zone and skip distance [ref. a, ch. 2]
a. Amplitude
o Height of wave crest above reference line (loudness is related to amplitude)
b. Wavelength
o Distance of which wave’s shape repeats
■ Between any 2 similar points on adjacent waves
c. Cycle
o Movement of one wavelength - vibration
o Combination of 1 complete positive and 1 complete negative alternation = cycle
d. Frequency
o Number of vibrations (cycles) of wave train in a unit of time (ex. # of cycles per second)
e. Ground Wave
o Radio waves that travel near the surface of the earth
o Ideal for short distances (relatively local radio comms coverage)
■ LF/MF
f. Sky Wave
o EM waves refracted back to the Earth by the ionosphere
■ Long-distance HF
g. Space Wave
o Propagate through atmosphere from transmitter antenna to receiver antenna
■ Roughly VHF and up (higher frequencies can’t work with sky and ground waves)
o Two distinct paths
■ Travel directly through air (point to point)
■ Travel after reflecting from earth’s surface to troposphere surface
o Limitations: Limited to the curvature of the earth, line-of-sight
h. Line of Sight Horizon
o Natural horizon
■ Curvature of the earth is the ultimate obstacle to LOS
■ At frequencies normally used for radar, radio waves usually travel in a straight line
i. Polarization
o Position of antenna in space affects polarization of the EM wave
■ When transmitting antenna is close to the ground, vertically polarized waves =
greater signal strength at Earth’s surface
j. Skip Zone/Distance
o Zone - Zone of silence between where ground wave is too weak for reception and sky wave is first returned to Earth
o Distance - Distance from transmitter to point to where sky wave is first returned to earth
o HF signals refract from ionosphere (sky wave) because of solar radiation
107.2 Discuss the effects of the following on radio wave propagation:
a. Atmospheric conditions [ref. a, ch. 2]
b. Natural interference [ref. a, ch. 2]
c. Terrain [ref. a, ch. 2]
d. Modulation types [ref. b, ch. 2]
e. Refraction [ref. a, ch. 2]
f. Diffraction [ref. a, ch. 2]
g. Reflection [ref. a, ch. 2]
h. Absorption [ref. a, ch. 2]
i. Ionospheric variations [ref. a, ch. 2]
j. Electromagnetic interference [ref. a, ch. 2]
k. Attenuation [ref. a, ch. 2]
l. Tropospheric scatter [ref. a, ch. 2]
m. Ducting [ref. a, ch. 2]
a. Atmospheric Conditions
o Wind, air temp, water content can have effect on strength of received signal
b. Natural Interference
o Natural occurrences like weather and geography (ex. mountains, bodies of water) can degrade or enhance signals
■ HF is most stable during the mid-day or mid-night, when ionosophere is less ionized
* Change between night and day (dusk/dawn) = most ionization
c. Terrain
d. Modulation types
e. Refraction
o Change in the direction of a wave as it passes from one medium to another medium with different properties
■ Bending of waves - change in speed and wavelength of waves
* Ex. Light going from air to water
f. Diffraction
o Bending of wave path when wave meets obstruction
■ Amount of diffraction depends on wavelength
* HF waves (ex. light) rarely diffracted in normal world
* Sound waves - higher notes with shorter waves - undergo little to no diffraction and do not reach ears
g. Reflection
o Waves neither transmitted nor absorbed, but reflected off a medium (ex. mirror)
h. Absorption
o Loss in energy of a radio wave
■ Affect the strength of a signal and ability to communicate over long distances (absorbed little by little)
i. Ionospheric Variations
o Cause refraction or absorption due to changes in sun’s activity, movement of earth about the sun
■ Regular - 11-year sunspot cycle, 27-day sunspot cycle
■ Irregular - Ionospheric storms
j. Electromagnetic Interference
o EM induction or radiation from an external source may interrupt/obstruct the performance of the electrical circuit
■ Source may be manmade (jamming/EW) or natural (solar flares/Northern Lights)
k. Attenuation
o Propagation loss - loss of signal strength due to medium
l. Tropospheric Scatter
o Radio wave meets turbulence in troposphere - abrupt change in velocity
■ Small amount of energy is scattered forward, returned to Earth at distances beyond horizon/LOS
m. Ducting
o Occurs with temperature inversion (ex. warm air over cooler air) - increases normal range of wave
■ For sound propagation, behaves like a transmission line - duct contains medium (ex. air) to support propagation
■ Often happens in HF - allows for long range
107.3 Describe the following processes: [ref. c]
a. Signal modulation [chs. 1, 2]
b. Signal multiplexing [ch. 1]
a. Signal Modulation
o Two types: frequency, amplitude
o Modulating an HF signal to transmit information/data
■ Ex. Hearing a song instead of one single note via radio - signal is always being modulated
b. Signal Multiplexing
o Multiple analog message signals or digital data streams combined into one signal over a shared medium
■ Ex. Telecomms - several telephone calls may be carried using one wire
107.4 Describe the frequency range of the following spectrum designators, and discuss
uses and limitations of each range: [ref. b, ch. 1]
a. ELF
b. VLF
c. LF
d. MF
e. HF
f. VHF
g. UHF
h. SHF
i. EHF
Freq. Range Primary Use
ELF 3 Hz- 30 Hz - LR signals to subs
SLF 30 Hz - 300 Hz - LR signals to subs
ULF 300 Hz - 3 KHz - LR signals to subs
VLF 3 KHz - 30 KHz - LR signals, message traffic to subs (highly reliable)
- USN doesn’t use anything lower than VLF - other countries may use lower ones for their subs
- Backup in nuclear war
- Penetrates seawater
LF 30 KHz - 300 KHz - Fleet multi-channel broadcast system
- LORAN-C - legacy GPS system
MF 300 KHz - 3 MHz - AM radio (not typically used by Navy)
- Int’l distress frequencies
HF 3 MHz - 30 MHz - OTH, long-distance comms
- Link-11
VHF 30 MHz - 300 MHz - Line-of-sight or just beyond
- Bridge-to-bridge comms
- Ideal for amphibious operations
- Handheld radios
UHF 300 MHz - 3 GHz - LOS comms, tactical voice transmissions (maneuvering of ships traveling together)
- Link-11/16
- SATCOM
- Cellular comms
- CBSP
SHF 3 GHz - 30 GHz - SATCOM, most modern radars
- Workhorse of the Navy
- Non-OTH radars
- MILSTAR
EHF 30 GHz - 300 GHz - Used for experimental radars, SATCOM, most internet for ships
- Can get through nuclear fallout but not through rain
- LPI - Low probability of intercept
- LPD - Low probability of detection
107.5 Describe basic radar theory. [ref. d, ch. 1]
RADAR - Radio Detection and Ranging
o Electronic equipment that detects presence, direction, height, and distance of objects by using reflected EM energy
■ RF energy transmitted to object, reflects from object
* Small portion of energy is reflected and returns to radar set (echo)
* Radar uses echo to determine direction and distance of reflecting object
108.1 Explain the following in Intelligence Doctrine, Organization, and Regulations:
a. Describe the general purpose of the following intelligence regulations and
guidance:
1. JP 2-0 [ref. a]
2. JP 2-01 [ref. b]
3. NWP 2-0 [ref. c]
4. NWP 2-01 [ref. d]
5. FICM [ref. e]
Doctrine, Organization, Regulations
1. JP 2-0 - Joint Intelligence
o Fundamental principles and guidance for joint and multinational intel activities across the range of military operations (ROMO)
- JP 2-01 Joint and National Intel Support to Military Operations
o Doctrine for joint and national intel products, services, assessments, and support to joint military operations - NWP 2-0 Naval Intelligence
o Capstone doctrine for Navy intel community - intel support to naval operations
■ Overarching framework for further publications - NWP 2-01 Intelligence Support to Naval Operations
o Detailed intel support available to commander
■ Foundation for follow-on NTTPs - FICM - Fleet Intelligence Collection Manual
o Product of ONI
o Single-source reference guide for how fleet should collect and report Intel
■ Standards for photography
■ Templates for reports (ex. IIRs)
o Derived from NIPF (National Intelligence Priorities Framework)
■ Delineates whose priorities are what - Priority #s are assigned
■ Ensures that the IC and Congress/lawmakers are on the same page regarding
priorities for U.S. intelligence
■ Used to determine assignment of collection assets
* NIPF is tailored down to NIPOA, FICM, ONI COLOPs
108.1
b. Discuss the role and responsibility of each of the following positions in the
Joint and Naval Intelligence Community:
1. Director of National Intelligence [ref. f]
2. J2, Joint Staff [ref. g]
3. Combatant Command/Joint Task Force J2 [ref. h, ch. 6]
4. Organization/Fleet N2 [ref. b, ch. 2]
5. Commander, Office of Naval Intelligence [ref. j]
- DNI - Director of National Intelligence
o Currently: John Ratcliffe (Avril Haines has been tapped to be Biden administration’s
nominee)
o Principal advisor to POTUS/NSC/HSC about intelligence matters regarding national security
o Head of 16-member Intelligence Community (IC)
o Works with 2 budgets
■ National Intelligence Program (NIP) - $62 billion/year
■ Military Intelligence Program (MIP) - $20 billion/year - J-2, Joint Staff
o Currently: RADM Frank D. Whitworth
o Person, but also a directorate (Directorate for Intelligence on Joint Staff)
o Supports CJCS, SECDEF, Unified Commanders
■ Focal point for Unified Command intel requirements - COCOM/JTF J2
o Person and directorate
o Responsible for supporting intel requirements within AO, validating RFIs, etc.
o Provides priority intelligence requirements to Chief of Staff, identifies CCIRs to include PIRs, ensures intel fully integrated in plans and operations - Organization/Fleet N2
o Supports intel requirements within AOR
o Responsible for supporting intel requirements of forces assigned for operations
■ COMSECONDFLT and COMTHIRDFLT have additional responsibility of preparing forces for deployment
* CSG-4, CSG-15 - COMONI
o Currently: RADM Kelly Aeschbach
o Dual-hatted 2-star billet
■ COMONI — military
■ NMIO (National Maritime Integration Office) — civil maritime
* Coordinates intelligence community for maritime purposes/focuses
* Focused on littorals, working with State and Coast Guard
o HQ at NMIC (National Maritime Intelligence Center) in Suitland, MD
■ Components include:
* ONI
* Marine Corps Intel Activity (MCIA)
* Coast Guard Intelligence Coordination Center (ICC)
108.1
c. Identify and discuss the intelligence roles and responsibilities of the
following workcenters/organizations:
1. CVIC/JIC [ref. b, ch. 2]
2. SUPPLOT/EXPLOT [ref. b, ch. 2]
3. SSES [ref. b, ch. 2]
4. CVW/CPRW/Squadron [ref. b, ch. 2]
5. JOC/MOC; JIOC/MIOC [ref. k, ch. 4; ref. l, ch. 4]
- Carrier Intel Center/Joint Intel Center (CVIC/JIC)
o Carrier/amphib hub of intelligence
o Maintain comprehensive, current OPINTEL picture
o Major sections:
■ Mission Planning (MP)
■ Multi-Sensor Interpretation (MSI)
■ Debriefing Area
■ Strike Intelligence Analysis Cell (SIAC)
* Targeting Intelligence Cell (TIC)
* Threat Analysis Cell (TAC)
■ SUPPLOT
■ Chart Vault Not physically located within CVIC
■ SSES - Supplementary/Expeditionary Plot (SUPPLOT/EXPLOT)
o Provide tactical I&W to warfare commanders
■ Intel support to CWC to help determine COAs
o Fuse all-source OPINTEL information
■ Derived from organic and national assets
o CTRs, CTTs, ISes - Ship’s Signals Exploitation Space (SSES)
o SIGINT space providing SIGINT I&W
■ Derive information/intelligence from SIGINT systems
* Electronic signals/systems
* Comms systems, radars, weapons systems
o CTRs, CTIs, CTMs - permanent division with ship’s company personnel
4a. Carrier Air Wing (CVW)
o Air wing with several squadrons (VFA, VAW, etc.)
o CAG AI directs/supervises Mission Planning
■ Responsible for collection, preparation, dissemination of Intel material needed by CAG
4b. Patrol and Reconnaissance Group (CPRG)
o Command 3 Patrol and Reconnaissance Wings (CPRW)
■ Command various patrol squadrons/reconnaissance (VP, VQ)
- JOC = Joint Operations Center
Maritime Operations Center (MOC)
o NTTP 3-32.1
o Plans, executes, assesses operational-level command and control
o Coordinates CTFs, responsible for ordering larger-level fight (operations) and commanding theater-level war
o Exists to streamline operational cycle
o One at every COCOM
■ Support for operational-level commander, reachback support
JIOC = Joint Intelligence Operations Center
MIOC = Maritime Intelligence Operations Center
108.1
d. Discuss the specialty areas available to Intelligence Specialists: [ref. m]
1. 3910 – Naval Imagery Interpreter
2. 3912 – Expeditionary Warfare Intelligence Specialist
3. 3913 – Navy Tactical Counterintelligence Human Intelligence
Specialist
4. 3923 – Strike Planning Applications
5. 3924 – Operational Intelligence Analyst
6. 3927 – Advanced Strike and Tomahawk Land Attack Missile
Mensuration Analyst
Old NEC New NEC Title Description
3910 K10A Imagery Interpreter
* Interpret all-source imagery, FMV
* Provides BDA and accurate picture for OPINTEL
3912 K12A Expeditionary Warfare (now combined to make OPINTEL)
* Intel support to SOF, expeditionary warfare ops
* All-source fusion, mission planning, threat analysis
3913 K13A Navy Tactical Human Intel Specialist (HUMINT)
* Supervise, conduct tactical HUMINT collection ops
* Issues corresponding HUMINT reports
3923 K23A Strike Planning Ops
* Tactical and operational level
* Research, analysis, dissemination in support of strike ops
* Center of excellence in NAWDC (Fallon, NV)
3924 K24A OPINTEL Analyst (now combined to make OPINTEL)
* All-source analysis to provide I&W
* Ship’s company on CVNs/Amphibs
3927 K27A TLAM Mensuration/Advanced Strike
* Imagery-based mission planning products for use by TLAM
* Support Tomahawk Strike and Fleet Mission Planning Cells (TSMPC)
K37A All-Source Intelligence Analyst - Intro to Cyber
108.1
e. Discuss the function and purpose of the following intelligence agencies:
[ref. b]
1. Office of the Director of National Intelligence
2. Open Source Center
3. Defense Intelligence Agency
4. National Reconnaissance Office
5. Central Intelligence Agency
6. National Geospatial-Intelligence Agency
7. National Security Agency/Central Security Services
- ODNI (Office of the Director of National Intelligence)
o Program Manager: OSINT
o Research reports, technical reports, working papers, unofficial government documents, discussion papers, dissertations, market surveys, etc.
o Usually covers scientific, political, socioeconomic, military disciplines
o Director: John Ratcliffe (Biden administration’s nominee is Avril Haines)
o Oversees/directs implementation of National Intelligence Program (funding for IC)
o Principal advisor to POTUS/NSC/HSC for intelligence matters - CIA hosts Open Source Enterprise (OSE) - previously named Open Source Center
* DNI is the program manager because CIA cannot have oversight of OSINT, despite hosting the OSE
* Provides analysis of OSINT materials to IC agencies, including gray literature - Defense Intelligence Agency (DIA) - Washington, D.C. (JBAB)
o Program Manager: MASINT
o Central producer and manager for military intelligence for DoD
o Director: Gen. Robert P. Ashley, Jr. - National Reconnaissance Office (NRO) - Chantilly, VA
o Director: Christopher Scolese
o Research and development, acquisition, launch, operation of satellites (“bus”)
■ Coordinates collection/analysis of information from plane and satellite reconnaissance by military services - Central Intelligence Agency (CIA) - Langley, VA
o Program Manager: HUMINT
o Covert psychological, cyber, social warfare
■ Largest producer of all-source national security intel
o Director: Gina Haspel - National Geospatial Intelligence Agency (NGA) - Fort Belvoir, VA
o Program Manager: GEOINT
o Collect, analyze, distribute GEOINT (imagery, map-based solutions - “payload”)
o Director: Vice Admiral Robert Sharp - National Security Agency (NSA) - Fort Meade, MD
o Program Manager: SIGINT
o Lead cryptologic organization
■ SIGINT & Information Assurance products/services
■ Computer Network Operations (CNO)
o NSA/CSS - Central Security Service
■ Timely/accurate cryptologic support and knowledge to military cryptologic activity
o Director: Gen. Paul M. Nakasone
108.2 Intelligence Reporting and Dissemination:
a. Discuss the general purpose and originators of the following types of messages:
1. IIR [ref. n, Collections Operations]
2. SPOT Report [ref. n, Collections Operations]
3. LOCATOR [ref. al, Appendix A]
4. 9-Line report [ref. am, ch. 6]
5. TACREP [ref. n, Collections Operations]
6. INTSUM [ref. n, Collections Operations]
7. PURPLE [ref. ao, ch. 5]
- IIR - Intelligence Information Reports
o HUMINT reports, report all HUMINT information in response to collection requirements
■ Referred to by Navy as Standard Human Intel Report (SHIR)
o Submitted through/stored in HOTR/CHROME
■ HUMINT Online Tasking and Reporting - SPOT Report
o HUMINT report of imminent threat
■ Immediate/significant effect on current ops - LOCATOR
o Generated for routine and high interest contacts
■ Location of surface, subsurface, special interest units operating in a maritime environment - 9-Line Report
o Pass information in consistent, concise manner
■ No time for detail/limited comms
o Standardized - each line has a specific meaning
■ Ex. “Line 6 - lat/long” (not a real example)
■ Used to call for CAS - Tactical Report (TACREP)
o TACREPs are derived from KLs to be pushed outside of SIGINT production chain
■ Urgent, perishable information of tactical significance
■ Sanitized to remove raw SIGINT
■ Sanitization from KL to TACREP does not necessarily always remove SI
* TACREP could technically still be S//SI, TS//SI
■ On CSG, talk to CRC about sanitization process - Intelligence Summary (INTSUM)
o Brief summary of current enemy situation covering specific period of time
■ Enemy situations, ops, caps/lims - Purple symbolizes all branches of the military, a combination of Army Green, Air Force Blue, Coast Guard Blue, Marine Red, and Navy Blue.
108.2
b. Discuss the following databases of intelligence information:
1. SeaLink [ref. o]
2. OMAR [ref. p]
3. Open Source Center [ref. q]
4. HOT-R [ref. r]
- SEALINK
o Database of merchant vessels maintained by ONI - OMAR (OSSIM Mapping Archive)
o Imagery database (used by K10As) - Open Source Enterprise (formerly Open Source Center)
o Database of OSINT final products
■ Textual translations, multimedia productions
o Brokers/hosts OSINT products from other OSINT providers (ex. think tanks, schools, etc.) - HOT-R (HUMINT Online Tasking and Reporting)
o Now being replaced by CHROME - maintains/organizes all HUMINT reporting
108.3 Intelligence Process:
a. Explain the steps of the intelligence process. [ref. b, ch. 3]
Intelligence Cycle (PCPADE)
1. Planning and Direction
o Commander’s Intent/Needs
■ Receive commander’s guidance, develop intel collection plan/priorities
■ PIRs
o Understand what our collection capabilities and limitations are
■ EEIs, EEFIs
- Collection
o Using assets to fulfill collection requests
o Gather raw information needed to produce finished intelligence
■ Imagery, P-8s, EP-3s, satellites, SIGINT, etc. - Processing and Exploitation
o Converting data into information for analytical use
■ K10A, BFCA, BFEA - Analysis and Production
o Fuse information into a coherent picture, put evaluated information in context to produce finished intelligence
■ Assessments, I&W
■ FIWOs/FIWAs - Dissemination and Integration
o Ensure finished analysis is received by the consumer in a timely manner
■ I&W TACREPs, briefs, etc. - Evaluation and Feedback
o Occurs throughout entire cycle, can come from anyone
108.3
b. Define the following disciplines: [ref. a, app. B; ref c, app D]
1. SIGINT
2. GEOINT
3. HUMINT
4. MASINT
5. ACINT
6. OSINT
7. TECHINT
8. Counterintelligence
- Signals Intelligence (SIGINT)
o Electronic Intelligence (ELINT)
■ TECHELINT
* Technical aspects of foreign non-communications emitters (signal characteristics, mods, functions, caps/lims, etc.)
■ OPELINT
* Operationally relevant information of non-communications emitters (location, movement, employment, tactics, activity)
o Communications Intelligence (COMINT)
■ Foreign communications
* Can reveal who is sending information, from where, time and duration of emission, frequencies they are using to communicate
* PROFORMA: Machine-to-machine communications
■ Internals
* What was being said
■ Externals
* Who said what, on what devices, etc.
o Foreign Instrumentation Signals Intelligence (FISINT)
■ Collection of electromagnetic emissions related to testing/use of foreign systems (missiles, aircraft, UAVs, etc.)
* Targets: Missile test ranges, space launches
* Ex. Telemetry, video links - Geospatial Intelligence (GEOINT)
o Exploitation and analysis of imagery, imagery intelligence (IMINT), and geospatial information - Human Intelligence (HUMINT)
o Using human beings as sources and collectors - Measurement and Signature Intelligence (MASINT)
o Information obtained by quantitative/qualitative analysis of data derived from specific technical sensors for purpose of identifying any distinctive features associated with the source, emitter, or sender
■ Ex. nuclear testing, nuclear events - Acoustic Intelligence (ACINT)
o Acoustic phenomena - subdiscipline of MASINT
■ Broadband/narrowband analysis of acquired acoustic signatures from surface ships, subs, and aircraft - Open Source Intelligence (OSINT)
o Information of value that is publicly available - Technical Intelligence (TECHINT)
o Derived from collection, processing, analysis, and exploitation of information pertaining to foreign equipment and material
■ Ex. FARRAGUT at ONI - Counterintelligence (CI)
o Information gathered and activities conducted to protect against espionage
108.3
c. Explain the National Intelligence Priorities Framework. [ref. s]
A classified national intelligence document used by the top planners of the United States Intelligence Community, such as the President of the United States and the Director of National Intelligence (DNI), that summarizes the United States’s intelligence gathering priorities
■ Delineates whose priorities are what - Priority #s are assigned
■ Ensures that the IC and Congress/lawmakers are on the same page regarding
priorities for U.S. intelligence
■ Used to determine assignment of collection assets
* NIPF is tailored down to NIPOA, FICM, ONI COLOPs
108.3
d. Explain the importance of Commander’s PIRs, their relationship to CCIRs,
and how they drive intelligence operations and collections. [ref. b, ch. 1]
- Commander’s Critical Information Requirement (CCIR)
o Information requirement identified by the commander as being critical to facilitating timely decision-making
■ Comprised of PIRs and EEIs/EEFIs
o Ex. Threat to USN forces in C5F - Priority Intelligence Requirement (PIR)
o Focused on the adversary and environment that may help answer CCIRs
o Ex. Mining in the SOH - Essential Elements of Information (EEI)
o Information requirements that are critical and answer PIRs (aka more specific PIRs)
o Ex. Suspicious small boat activity in the SOH - Essential Elements of Friendly Information (EEFI)
o What we do not want the enemy to know - blue force capabilities and limitations
o Ex. CSG next port of call
108.3
e. Explain JIPOE, to include steps, purpose, and the information it provides to
the commander. [ref. t]
- Develop cohesive understanding of the environment/adversary to enable operators to make more well-informed decisions
- Continuous process through which J-2 manages the analysis and development of products
o Held commander and staff understand the complex and interconnected operational environment
■ Composite of the conditions, circumstances, influences that affect employment of capabilities
Steps:
1. Define the Operational Environment
2. Describe the impact of the Operational Environment
3. Evaluate the Adversary
4. Determine Adversary Courses of Action
108.3
f. Name the five standards of analytic tradecraft. [ref. u]
- Objective
- Timely
- Independent of political considerations
- All-source
- Implement and exhibit analytic tradecraft standards
108.4 ISR Platforms:
a. Discuss the following naval platforms/systems, including intelligence
collection discipline(s) supported:
1. EA-18G Growler [refs. v, w]
2. EA-6B Prowler [refs. v, w]
3. E2-C Hawkeye [refs. v, w]
4. E2-D Advanced Hawkeye [refs. v, w]
5. P-3C Orion [refs. v, w]
6. EP-3E [refs.v, w]
8. P-8A Poseidon/Multi-mission Maritime Aircraft [refs. v, w]
9. MQ-4C Triton [refs. y]
10. SURTASS [ref. al, chs. 1, 2]
11. Fixed IUSS sensors [ref. am, ch. 1, ref. an]
12. RQ-8A/MQ-8B FIRESCOUT [ref. v, RQ-8A, MQ-8B Page]
13. SQQ-89 [ref. i, ch. 2]
- EA-18G GROWLER
o Electronic Warfare
■ EA jamming
■ Fly ahead of fighters/bombers to jam anti-aircraft radars - EA-6B Prowler - retired
-EA attack
3/4. E-2C/D HAWKEYE
o Airborne Early Warning (AEW), C2
■ 3 primary sensors
* Radar, IFF, passive detection system
■ D variant has new avionics suite
* AN/APY-9 radar
* Glass cockpit
- P-3C ORION
o ASW ISR
■ “Tail stinger” to magnetically detect subs
o Replaced by P-8 - EP-3E ARIES II
o Electronic Support, SIGINT
■ Fixed-wing
■ Receivers, antennas, computers, recording devices - P-8A POSEIDON
o ASW/ASUW ISR
■ Sonobuoys, depth charges, Harpoon anti-ship missiles
■ Designed to operate in conjunction with MQ-4 - MQ-4C TRITON
o BAMS (Broad Area Maritime Surveillance) UAV
o Conduct maritime ISR, owned at theater-level
■ Complement P-8, can also do SAR missions - SURTASS (Surveillance Towed Array Sensor System)
o Towed array sonar system - “ship’s tail” - for ASW
■ Detect subs, seismic signals
o System of hydrophones towed on cable behind ship or sub
■ Can be kilometers long (to keep away from own ship’s noise emitters) - Fixed Integrated Undersea Surveillance System (IUSS) Sensors
o Permanently fixed to ocean floor, provide tactical cueing to ASW forces
o Detect subs
o Collect acoustic, hydrographic information - RQ-8A/MQ-8B FIRESCOUT
o Unmanned autonomous helicopter
o Provide ISR, targeting/fire support to ground, air, sea forces - SQQ-89
o ASW system for surface ships
■ Active and passive sensor data
108.4
b. Explain National Technical Means, purpose, capabilities, and limitations.
[ref. z]
NTM - National Technical Means (satellites)
o GEOINT, telemetry, space-based IR sensors, space-based nuclear energy detection
108.5 Intelligence Support to Operations:
a. Discuss how intelligence supports the following Warfare Commanders:
[ref. aa]
1. Surface Warfare Commander
2. Anti-Submarine Warfare Commander
3. Air Defense Commander
4. Strike Warfare Commander
5. Information Warfare Commander
- Surface Warfare Commander (S)
o Current/potential threats to surface units
o IDIS (Independent Duty Intelligence Specialist) on small boys - Anti-Sub/Undersea Warfare Commander (X)
o Current/potential undersea threats - Air Defense Commander (W)
o Airborne threats to CSG
■ Aircraft, radars from ASCM/CDCMs/SAMs, missiles - Strike Warfare Commander (P)
o Threats to CAG platforms/personnel
o Support operational mission planning, targeting process - Information Warfare Commander (Q)
o Meet/inform IWC priorities
o Fuse intelligence with all IWC disciplines
108.5
b. Discuss how intelligence supports the following mission areas:
1. Amphibious Operations [ref. ab]
2. Coastal Riverine Operations [ref. ac]
3. Construction Forces [ref. ad]
4. Cyberspace Operations [ref. ae]
5. Explosive Ordnance Disposal Operations [ref. af]
6. Humanitarian Assistance/Disaster Relief [ref. ag]
7. Information Operations [ref. ah]
8. Undersea Warfare / TASW [ref. ap]
8. Mine Warfare [ref. ai, ch. 4]
9. Naval Special Warfare [ref. aj]
10. Littoral Operations [ref. ak]
11. Non-Combatant Evacuation Operations [ref. al]
Provide intel on what locations are safe, contested, etc.
What types of forces may be encountered and TTPs (tactics, techniques and procedures)
108.5
c. Explain FORMICA. [ref. x]
FORMICA involves the debriefing, by trained and certified Department of Defense human intelligence (HUMINT) collectors, of all DoD personnel who have access to information of potential foreign intelligence value.