IWO Board Flashcards

1
Q

101.1 Discuss the concept of ORM

A

Principles of ORM.
a. Accept Risk when Benefits Outweigh the Cost.
b. Accept No Unnecessary Risk.
c. Anticipate and Manage Risk by Planning.
d. Make Risk Decisions at the Right Level.

Levels of ORM.
a. In-depth.
b. Deliberate.
c. Time Critical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

101.2 Explain the 5-step ORM Process

A

a. Identify the Hazards:
A hazard is any condition with the potential to negatively impact mission accomplishment or cause injury, death, or property damage.

b. Assess the Hazards:
For each hazard identified, determine the associated degree of risk in terms of probability and severity.

c. Make Risk Decisions:
There are three basic actions which ultimately lead to making informed risk decisions:
(1) Identifying control options.
(2) Determine the effect of these controls on the hazard or risk.
(3) Decide how to proceed.

d. Implement Controls:
(1) Ensure the plan is clearly communicated to all the involved personnel
(2) Establish Accountability.
(3) Provide Necessary Support.

e. Supervise:
Supervise and review involves determining the effectiveness of risk controls throughout the mission or task.
(1) Monitor the effectiveness of risk controls.
(2) Determine the need for further assessment of all or a portion of the task due to an anticipated change.
(3) Provide feedback- both positive and negative lessons learned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

101.3 Discuss the safety aspects of the following:
a. Tag-out precautions [ref. b, vol. I, ch. B11]
b. Electrical fires [ref. b, vol. III, ch. C9]
c. First aid for electricity-related injury [ref. b, vol. III, ch. C9]
d. Electronic precautions [ref. b, vol. III, ch. C9]
e. HERO/HERP/HERF [ref. c, ch. 3]

A

a. Tag-out precautions-A tag is placed on equipment warning people that the equipment
is out of calibration or not functioning properly.
b. Electrical fires-Great care is required fighting such a fire to avoid creating another explosion from batteries. The safest and most effective method for fighting an electrical fire is through oxygen starvation. Secure the compartment and stop all ventilation within, including agitation air, to deprive flames of oxygen. WARNING: NEVER ATTEMPT
TO EXTINGUISH AN ELECTRICAL FIRE BY WATER. THE HYDROGEN AND OXYGEN GENERATED BY ELECTROLYSIS COULD PRODUCE A VIOLENT EXPLOSION.
c. First aid for electric shock-First step is to secure the power source or insulate victim from power. Next perform CPR.
d. Electronics and RF radiation hazards-When working in an energized environment, always have supervision, station a safety observer, and insulate metal tools.
e. HERO/HERP/HERF
HERO-Hazards of Electro Magnetic Radiation to Ordinance. HERO 1-susceptable, HERO 2-unsafe, HERO 3-safe
HERP-Hazards of Electro Magnetic Radiation to Personnel. The body can
absorb EM Radiation.
HERF-Hazards of electro Magnetic Radiation to Fuel. EM radiation can ignite fuel vapor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

101.4 Discuss safety considerations during execution of the Emergency Action Plan.

A

All personnel involved must be familiar with the tasks associated with emergency destruction. Use personal protective equipment when using an ax or sledge hammer. Station safety observers if time and space permit.

Safety Considerations for Emergency Action Plan
􀆔 Review local EAP/EDP
􀅼 Perform ORM steps
􀆔 Train on procedures annually/semi-annually
􀆔 Destruction tools could be potential hazards
􀅼 Shredder, axe/hammer, electrical, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

102.1 State the functions of the following personnel:
a. SSO [ref. a, ch. 2; ref. b, ch. 2]
b. CSO/CSM [ref. a, ch. 2]
c. IAM/ISSM [ref. a; ref. b, ch. 2]
d. IAO [ref. b, ch. 2]
e. TSCO [ref. a, ch. 2; ref. b, ch. 2]

A

The SSO will be responsible for the operation of the Sensitive Compartmented Information Facility (SCIF) and the security control and use of the SCIF.
All SCI matters shall be referred to the SSO.

Functions
􀆔 SSO 􀂱 Special Security Officer
􀅼 Handles SCI program - responsible for operation/security of SCIF
􀆔 CSO/CSM 􀂱 Command Security Officer/Manager
􀅼 Handles classified information programs (Secret and below, just not SCI)
􀆔 IAM/ISSM 􀂱 Information Assurance/Information Systems Security Manager
􀅼 Responsible for information assurance program (IAP)
􀅼 IAM is new name for ISSM
􀆔 IAO 􀂱 Information Assurance Officer
􀅼 Designated for each system/network in command
􀅶 Implement/maintain command􀂶s IT s􀁜s􀁗ems and ne􀁗􀁚ork sec􀁘ri􀁗􀁜 req􀁘iremen􀁗s
􀆔 TSCO 􀂱 Top Secret Control Officer
􀅼 Ensures inventories of TS info conducted at least once annually
􀅼 Keep record of receipt from each TS recipient
􀆔 Information Security vs. Information Assurance
􀅼 INFOSEC
􀅶 Ensuring personnel follow protocol in protecting information
􀅶 Prevent illicit access to info
􀅼 Information Assurance
􀅶 Ensuring systems and networks are maintained to protect information
􀆔 Maintained by DISA
􀆔 Safeguard integrity of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

102.2 Discuss security classification levels, receipt, custody, document markings and handling requirements for the following:
a. TOP SECRET, SECRET, CONFIDENTIAL [ref. b, chs. 2, 7 thru 9]
b. U//FOUO [ref. b, chs. 4, 6]
c. SCI [ref. c, encls. 3, 5]
d. Allied Information/Publications [ref. e, ch. 5]
e. SAP [ref. m, encl. 4]
f. ORCON [ref. m, encl. 4]
g. ACCM [ref. m, encl. 4]
h. Foreign Releasability [ref. m, encl. 4]

A

a. Top Secret - exceptionally grave damage; Secret - serious damage; Confidential - damage
b. Unclassified, for official use only - unclassified info that should be protected for internal use only
c. sensitive compartmentalized information - Classified information concerning or derived from
intelligence sources or methods, or analytical processes, that is required to be handled within formal access control systems established by the DCI.
d. Allied Information/ NATO Control Documents - NATO has four levels of classified information: COSMIC TOP SECRET, NATO SECRET, NATO CONFIDENTIAL, and NATO RESTRICTED. Certain NATO information is further classified in a specific category as ATOMAL which can be either RESTRICTED DATA (RD) or FORMERLY RESTRICRED DATA (FRD).
e. Special Access Program (SAP) - Any DoD program or activity employing enhanced security measures exceeding those normally required for classified information at the same classification
level which is established, approved, and managed as a DoD SAP.
f. Originator Control - Dissemination & Extraction of Information Controlled by Originator
g. Alternative or Compensatory Control Measures - security measures used to safeguard classified intelligence or operations and support information when normal measures are insufficient to achieve strict need-to-know controls and where special access program (SAP) controls are not required.
h. Foreign Releasability
Ex. REL TO USA, FVEY
Released directly to foreign government representative
Designated by recipient gov’t to assume custody/responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

102.3 Discuss the following aspects of physical security:
a. Access controls [ref. b, ch. 10]
b. ATFP [ref. s]
c. Storage requirements for classified material [ref. a, ch. 9; ref. b, ch.10]
d. Required forms [ref. b, ch 2, app. B]

A

a. Access Controls
􀅼 Uncleared persons escorted by cleared person
􀅼 Entrance under visual control at all times
􀆔 ATFP (Anti-Terrorism/Force Protection)

b. Anti-Terrorism 􀂱 Defensive measures to reduce vulnerability of individuals/properties
􀅼 Force Protection 􀂱 Actions to prevent/mitigate hostile actions against DoD personnel,
resources, facilities
􀅶 FPCON levels 􀂱 conserve fighting potential

c. Storage Requirements
􀅼 Guard/store in locked GSA-approved security container, vault, modular vault, secure
room
􀅶 TS and S require supplemental controls, C does not
􀆔 Intrusion Detection System, continuous protection by duty personnel, etc.

d. Required Forms
􀅼 SF-700 􀂱 Security Container Information
􀅶 Vital info about container (location, container #, contact info)
􀅼 SF-701 􀂱 Activity Security Checklist
􀅶 Checklist at the end of each day (ensure classified materials secured properly,
employee accountability)
􀅼 SF-702 􀂱 Security Container Check Sheet
􀅶 Record of names/times people have opened and closed container
􀅼 SF-153 􀂱 COMSEC Material Report
􀅼 SF-312 􀂱 Classified Information NDA
􀅶 Contract between USG and cleared employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

102.4 Explain the purpose of your Command Emergency Action/Destruction Plan
and discuss the following: [ref. g; ref. i, Annex M]
a. Conditions that warrant implementation
b. Authority to impose, modify or cancel
c. Authority to order emergency destruction onboard a deployed unit
d. Primary and alternate means of completion
e. Procedures to be followed upon implementation, from first order to destroy through completion and follow-up documentation and reporting
f. Priority for destruction of classified materials
g. Responsibility for ensuring a correct inventory of destroyed materials is maintained and recorded
h. Methods of destruction
i. Classified waste

A

Emergency Action/Destruction Plan
* Conditions: Natural disasters, hostile action
* Authority: CO, XO, OPS
o In absence, CDO or most senior person present
o Senior person present is overall responsible for inventory
o Command Destruction Supervisor - - - EKMS manager or CDO
■ Maintains status/inventory
* Authority to destroy onboard deployed unit: CO, XO, CDO, senior person
o Only CO can authorize precautionary destruction
■ Anything not being used right now to complete mission
* Means of Completion
o Primary - Assets used to destroy material
o Alternate - Device used to render material useless
o Precautionary Destruction - Reduce classified material present in preparation for potential hostile action
o Complete Destruction - Prevent capture/compromise of COMSEC or classified material (destroy everything)
o Methods of Destruction:
■ Shred, pulverize, incinerate, hand tools, zeroize (wipe/burn) crypto equipment
* Procedures
o EAP details all procedures —
o Report situation to EKMS manager —
o Distribute destruction cards, commence destruction (track status, inventory) —
o EKMS or CDO reports the loss/compromise
* Priorities
o 1 — TS+
o 2 — S
o 3 — C
* Classified Waste
o Keep to a minimum - reduces buildup/excess if EAP or EDP is implemented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

102.5 Define and discuss the following:
a. Access [ref. a, ch. 9]
b. Clearance [ref. a, ch. 8]
c. Compromise [ref. a, app. A]
d. Marking [ref. b, app. A]
e. Need-to-know [ref. a, app. A]
f. Transmission security [ref. c, encl. 5]
g. TPI [ref. i. ch. 4]
h. TPC [ref. i, ch. 9]
i. Working papers [ref. h, encl. 4]
j. Downgrading [ref. b, Exhibit 6b]
k. Disclosures [ref. h, encl. 4]
l. Sanitization [ref. b, ch. 11]
m. COMSEC [ref. b, app. A]
n. INFOSEC [ref. d]
o. TEMPEST [ref. u, encl. 4]
p. SSBI [ref. a, ch. 6]

A

a Access - Ability/opportunity to obtain knowledge
o Access is provided via the information owner, Clearance is provided by the Navy
b Clearance - Administrative decision by adjudicating authority
o DONCAF is adjudicating authority (levels: TS, S, C)
c Compromise - Unauthorized disclosure to unauthorized person/systems
d Marking - Indicates material’s classification/handling procedures
e Need-to-Know - Determination that person requires access to specific information
f OCA - Original Classification Authority
o Person/organization authorized to take raw intel and classify
■ Authorized in writing, by either POTUS, VPOTUS, or agency heads, to classify info in the first place
■ Shall apply the following markings:
* Classified By
* Classification Reason
* Declassify On
o To downgrade something, need permission from the OCA
o The point of classification is to protect sources and methods!
* DCA - Derivative Classification Authority
o Ability to classify based on previous classification determinations, made either from an authorized classification guide or from a source document
■ Shall apply the following markings:
* Derived From
* Declassify On
* Transmission Security - Protect transmissions from interception/exploitation
o Component of COMSEC
o Protect transfer of data via radio/electronics
g TPI - Two-person Integrity
o Handling/storing to prevent single-person access to COMSEC keying manual, cryptographic manuals
h TPC - Two-person control
o Continuous surveillance/control of positive control material at all times
i Working Papers - Docs/materials accumulated and created while preparing finished materials
o ex. Classified notes from training sessions, conferences, etc.
j Downgrading - Reducing classification to lower level
o Determined by approved authority (need permission from the OCA)
k Disclosures - Conveying classified info in any manner
o Unauthorized disclosure = crime
l Sanitization - Process of removing sensitive information to allow it to exist at a lower classification
o The point of classification is to protect sources and methods!
m COMSEC (Communications Security)
o Protective measures to deny unauthorized interceptors from accessing information from telecommunications, while still delivering content to intended recipients
■ Prevent unauthorized persons from interception/knowing your comms (ex. encryption)
o Includes:
■ Cryptosecurity - Security from technically sound cryptosystems and proper use
* Ex. PKI
■ Emissions Security - Securing emanations from crypto equipment, computers, telecomms systems
■ Physical Security - Physical measures to safeguard material/equipment
* Ex. Folders, safes, etc.
■ Transmissions Security - Protecting transmissions by means other than crypto
* Ex. Frequency hopping
o COMSEC Incident - If cryptographic keys (used by IPs/Its) are not destroyed in time, given to people without access, not secured
■ Cryptographic COMSEC Incident - Using keying material that is compromised, defective, or not authorized for use/reuse
■ Personnel COMSEC Incident - Defection, espionage, capture by enemy
■ Physical COMSEC Incident - Physical loss of COMPSEC material, failure to maintain TPI
n INFOSEC (Information Security)
o Protect info/info systems from unauthorized access, disclosure
o Concerned with confidentiality, integrity, availability of data (regardless of form data may take)
o TEMPEST
o Program to protect against unauthorized RF transmissions in/out of SCIF
■ TEMPEST team comes to certify DoD space
o NSA provides lists of TEMPEST-certified telecomms equipment
p SSBI (Single Scope Background Information)
o Investigative standard for TS & SCI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

102.6 Discuss the authoritative manuals and instructions that govern the following:
a. Physical Security [refs. h]
b. Information Assurance/Cyber Security [ref. o]

A

Authoritative Manuals/Instructions
a DCID 6/1 - Security Policy for SCI and Security Manual
a DCID 6/9 - Physical Security Standards for SCIFs

b ALNAV 055/10 - Safeguarding Classified National Security Info
b SECNAVINST 5239.1-3B - DON Information Assurance Policy
b COMNAVCYBERFORINST 5239.2A - Guidance for Cyber Security Inspection and Certification Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

102.7 Describe the steps required to report a compromise, a suspected compromise of
classified material or a PDS. [ref. i, ch. 10]

A

Steps Required to Report Compliance
* Take custody of/safeguard info
* Notify SM or SSO/EKMS manager and CO (plus supervisory chain of command)
* CO initiates Preliminary Inquiry (PI), notifies NCIS of loss or compromise
o Most reports of compromise sent to CO
* CoC remediates practices dangerous to security
o PDS is a level below COMSEC incident
o Reportable
■ Premature/out-of-sequence use of keying material
■ Inadvertent destruction of material (if destruction properly documented and re- supply required)
o Non-Reportable
■ Improperly completed accounting reports
■ Late destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

102.8 Discuss proper protocol for classified communications to include:
a. Telephone [ref. r, encl. 4]
b. Computer Systems [ref. f, ch. 11]
c. Radio Communications [ref. p, Exhibit b; ref. q]
d. Video / VTC [ref. r, encl. 4]

A

a Phones
o National Secure Telephone System (NSTS) - SCI, completely isolated phone network
o Defense Red Switched Network (DRSN) - Secure voice/conferencing requirements for POTUS, SECDEF, CJCS, etc.
o Voice Over Internet Protocol (VOIP) - NSTS uses VOIP to transfer data
o Colors (in SUPPLOT)
■ TS/SCI - Grey
■ SECRET - Red
■ UNCLASS - Black

b Computer Systems
o SIPR/JWICS
o CHAT (know/pay attention to avoid spillage!)
o Computer terminals must comply with OPNAVINST C5510.93
■ Be installed in accordance with TEMPEST guidelines

c Radio Communications
o FLTTAC - Book on bridge of ship with codewords (everything is in code)
■ Over open net (unclassified), so everyone can hear - including civilians
■ VHF
o NAVYRED - Encrypted comms line all surface stations are attached to
■ Can talk in plain language

d Video/VTC
o May occur on unclassified or classified networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

102.9 Describe the purpose of network scanning and patching. [ref. j]

A
  • Scanning - Scan all components of network to identify possible threats/vulnerabilities
  • Patching - Permanent or temporary restoration solution to a network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

102.10 Describe the different types of firewalls and intrusion detection systems. [ref. n]

A
  • Packet Filtering
    o Everything going over the Internet is a “packet”
    ■ Firewall has certain rules to filter packets (ex. certain IP addresses, etc.)
  • Stateful Packet Filtering
    o Instead of checking every packet, network connection made w/firewall; firewall remembers connection
    ■ Only passes packet with known active connection
    o More concise than packet filtering
    o Lacks ability to filter encrypted traffic
  • Application Proxies
    o Application (ex. web server, email server proxy) takes packets to reroute through server proxy so application doesn’t get bogged down
    o Can read encrypted sessions
    ■ Encrypted services can be set up on server
    o Slower/more susceptible to overflow attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

102.11 Define the purpose of DoD Cyber Security Workforce, including required baseline IAT and IAM certification levels (note: ref. r to be replaced by DoD Directive 8140).
[ref. r, chs. 1, 2]

A
  • Anyone working on or with network must be cybersecurity qualified ➔ 40 hours of CEUs
  • IA Certification Program
    o IA principles & practices
    o IAT (Technical) - Levels I, II, III
    o IAM (Management) - Levels I, II, III
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

102.12 Define the following:
a. Electronic spillage. [ref. b, ch. 12; ref. k]
b. Network incident [refs. t, l]

A
  • Electronic Spillage
    o When data is placed on IT system with insufficient information security controls to protect data at required classification
  • Network Incident
    o Any possible security compromise on a network
    ■ Ex. Attempted entry, unauthorized entry, malicious code execution, information attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

102.13 Define the following:
a. COMSEC incident [ref. i, ch. 11]
b. PDS [ref. i, ch. 10]

A

COMSEC = communications security incident: Occurrence that potentially jeopardizes the security of COMSEC material or the secure electrical transmission of national security information.

PDS = practice dangerous to security: A procedure that has the potential to jeopardize the security of COMSEC material if
allowed to continue. (NOTE: A PDS is not a COMSEC incident and does not have a COMSEC case number assigned.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

102.14 Discuss reporting requirements and actions to be completed upon discovery of the
following:
a. Electronic spillage [ref. b, ch. 12)
b. Network incident [ref. l]
c. COMSEC incident [ref. i, ch. 11]
d. PDS [ref. i, ch. 10]

A
  • Command originating electronic spillage - Call SSO/SSM
    o Report spillage via naval message
    o Conduct/complete preliminary inquiry (PI) within 72 hours
    o Acknowledge NETWARCOM SITREP within 24 hours
    o Clean up/report completion within 72 hours
  • Command receiving
    o Same steps as originating, no PI required, notify originating immediately
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

102.15 Define and Discuss PKI [ref. f, ch. 11]

A

Achieves 4 of the 5 pillars of Information Assurance - ensuring systems and networks are maintained to protect information (safeguard integrity of data)

o Confidentiality - Information only read by authorized entities
■ How: Encryption, passwords
o Integrity - Data is unchanged from its source
■ “Hash” - snapshot of message turned into a long string of binary tacked onto the end of the email (not actually in text of the email)
* Taken when email is sent
* Taken again when email received
* Program compares hashes to ensure they are the same to achieve integrity - if they are not the same, email was tampered with
■ How: Digital certifications/signatures
o Authentication - You are who you say you are
■ How: CAC/PKIs, username/password
o Non-Repudiation - Evidence of an information exchange or transaction
■ How: Log/digital signatures
o Availability - Information systems are available (PKI DOES NOT ACHIEVE THIS ONE)
■ How: Firewalls, anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

103.1 Define the following terms as they apply to maintenance operations and management:
a. Tag-Out [ref. c]
b. MFOM [ref. h, app. B]
c. ASI [ref. g, ch. 7]
d. SKED [ref. d, app. F]
e. CSOSS [ref. j]

A

a Tag-Out Program
o Maintain electrical safety during maintenance
■ Let others know not to energize/operate
■ Serviced isolated from power
■ Must be kept in log
b Maintenance Figure of Merit (MFOM)
o Web-based, near real-time software tool
o Calculates material readiness values
■ Prioritizes job requests/work orders
■ Provides priority-ranked Consolidated Ship’s Maintenance Plan (CSMP)
c1 Automated Shore Interface
o Way to view statistics across fleet for specific equipment (type of file, not system)
c2 Authorized Service Interruption
o Identifies maintenance/repairs accomplished during authorized system shutdown
■ Reports include uplink alignments, antennas, etc.
d Automated Planned Maintenance System Scheduling Tool (SKED)
o Program/Scheduler
■ Tracks all 3-M efforts
■ Schedules based on ship, what you have
e Combat Systems Operational Sequencing System (CSOSS)
o Instructions with emergency procedures on how to emergency shut off work equipment
■ Provide info for casualty control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

103.2 Describe the 3-M system, to include:
a. PMS schedule [ref. d, app. F]
b. Spot check program [ref. d, app. G]
c. Tag-Out Program [ref. b, ch. 1]

A

a Planned Maintenance Schedule (PMS)
o Displays planned maintenance to be performed over different periods of time in the maintenance life cycle
■ Quarterly, monthly, weekly, daily, situational
b Spot Check Program
o Test to determine if PMS is being performed correctly
■ Spot check grade entered in SKED Spot Check Accomplishment Rating (SCAR)
c Tag-Out Program
o Provides tag-out directives, maintain electrical safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

103.3 Discuss CASREP, including the categories and types. [ref. a, ch. 4]

A
  • Go out on SIPR (ship readiness)
    o Message to CNO/fleet commanders reporting malfunction or deficiency which cannot be corrected within 48 hours
    ■ Reduces unit’s ability to perform primary or secondary mission
  • Types
    o INITIAL - First CASREP
    o UPDATE (CASUP) - After trying to troubleshoot, something else breaks, new updates
    o CORRECT (CASCOR) - Rescind something already sent
    o CANCEL (CASCAN) - Cancel entirely (not just a correction)
  • Levels/Categories (CATs)
    o 4 - Major degradation to primary mission/total loss
    o 3 - Major degradation to primary mission
    o 2 - Major degradation to secondary/minor to primary
    o 1 - Minor degradation to secondary (not really used in fleet)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

103.4 Explain who is responsible for the command’s maintenance program and the role of the Division Officer. [ref. d, ch.1]

A
  • CO has ultimate responsibility for maintenance program, tasked down to XO/DHs

o XO is 3-M System Manager (3-M = Material Maintenance Management System)
o DIVOs are qualified in 3-M system, assist in managing maintenance requirements for division

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

103.5 Explain the following: [ref. i, ch. 3]
a. SOVT requirements
b. TCD waiver

A
  • System Operation and Verification Test (SOVT) Requirements
    o Ensure system/equipment performs as advertised before taking ownership from contractor who installed it
    ■ Ensure it works properly with everything it “touches” after being installed/modified
  • Target Configuration Date (TCD) Waiver
    o Date when all planned installations and upgrades are to be completed
    ■ No further updates without waiver
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

103.6 Discuss maintenance and availability periods IAW the OFRP. [ref. f]

A

OFRP
* Optimized Fleet Response Plan
o Ensure Navy’s surge capabilities are met
■ Intervals between planned maintenance periods are long - constant preventative maintenance is required
o Calls for 6 of 12 CVNs to be available to deploy in 30 days
■ Another 2 in 90 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

103.7 Discuss installation/maintenance requirements for CCOP, to include:
a. FES [ref. e, app. D]
b. GAP [ref. e, ch. 4]

A

CCOP Maintenance/Installation
* Cryptologic Carry-On Program
o Allows the Navy to cycle the newest cryptologic technology onboard; Program of Record (POR) is slow to evolve due to the necessity of Congressional approval
■ Allows CTs to use NSANET (among other tools) on ship
a Fleet Electronic Support (FES)
o Responsible for installation, removal, maintenance, repair of DIRSUP electronic equipment on naval platforms
■ Essentially a SCIF-ed warehouse
■ Command (with an OIC)
■ For subs, in Groton and Hawaii
b Coordinated Fleet Global Augmentation Policy (GAP) message
o Based on operational requirements from fleet and afloat commanders
o Sets policies of what is acceptable augmentation to request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

104.1 State the location of headquarters, geographic AOR, and responsibilities
for the following: [ref. a]
a. Geographic Combatant Commanders
b. Functional Combatant Commanders

A

Geographic COCOMs - Assigned AOR by Unified Command Plan (UCP), responsible for all operations in designated areas
Functional COCOMs - Not assigned a specific AOR, but designated specific operations/tasking

a.
USNORTHCOM: Peterson Air Force Base, CO; CONUS defense, Mexico, Canada;
Fleet Forces: All MTE commands fall under it (SUBLANT, NECC, SURFLANT, AFLANT, NAVIFOR)
2nd Fleet: Norfolk, VA
3rd fleet: San Diego, CA

USSOUTHCOM | Miami, FL - Central/South America, Caribbean; COMUSNAVSO,
4th Fleet (Mayport, FL):
■ Caribbean, oceans around Central and South America
■ Narcotic interdiction, humanitarian/goodwill interventions

USINDOPACOM | Camp H.M. Smith, Hawaii - Asia, Australia, Pacific Ocean, parts of IO
o COMPACFLT
■ Reports administratively to CNO - Pacific Coast TYCOM
* Provides naval resources under OPCON of PACOM
* 3rd/7th fleets, CNFK, CNFJ, CNFMarianas, etc.
o 3rd Fleet (San Diego, CA) | 7th Fleet (Yokosuka, JPN)
■ 3rd fleet responsible for West Coast, including Alaska, Aleutian Islands
■ 7th fleet responsible for Western Pacific and Indian Ocean
* Largest of forward deployed US fleets
* Yokosuka, Sasebo, Guam

USEUCOM | Patch Barracks, Stuttgart, GER - Europe, Arctic, Atlantic Ocean
o COMUSNAVEUR
o 6th Fleet (Naples, Italy)
■ Deputy of COMUSNAVEUR/COMUSNAVAF is CMDR, U.S. 6th fleet
■ Maritime ops/theater security cooperation missions in Europe and Africa
* USS Mount Whitney - flagship
■ Staff is CNE-CNA/C6F

USAFRICOM | Kelley Barracks, Stuttgart, GER - Sub-Saharan Africa
o COMUSNAVAF
o 6th Fleet (Naples, Italy)
■ Deputy of COMUSNAVEUR/COMUSNAVAF is CMDR, U.S. 6th fleet
■ Maritime ops/theater security cooperation missions in Europe and Africa
* USS Mount Whitney - flagship
■ Staff is CNE-CNA/C6F

USCENTCOM | MacDill AFB, Tampa, FL - Middle East, parts of North Africa/West Asia
o COMUSNAVCENT
o 5th Fleet (Manama, Bahrain)
■ Shares commander and HQ with NAVCENT
■ Persian Gulf, Red Sea, Arabian Sea, coast off East Africa

b.
USCYBERCOM | Fort Meade, Maryland - Cyberspace
o COMUSFLTCYBERCOM
■ Worldwide cyber support
■ Responsible for Navy’s cyber warfare programs
■ Operations/defense of DoD networks
■ Components:
* NAVNETWARCOM
* NIOCs
* NCDOC (Navy Cyber Defense Operations Command)
o 10th Fleet (Fort Meade, Maryland)
■ COMUSFLTCYBERCOM and Commander, U.S. 10th Fleet are the same person

USSOCOM | MacDill AFB, Tampa, FL - Special forces/operations
o COMNAVSPECWARCOM

USSTRATCOM | Offutt AFB, Omaha, NE
o Strategic (nuclear) forces, deterring attacks on U.S. allies, space & satellite systems
o 2/3 of nuclear triad
■ ICBM silos and B-52/B-2 bombers
o STRATCOM JIOC tracks missile activity
■ Missile defense, global strike, WMDs, global C2

USTRANSCOM | Scott AFB, Belleville, IL
o Transportation for DoD components

USSPACECOM | Peterson AFB, CO
o Stood up in 2019

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

104.2 Identify the organizations in the Information Warfare operational and administrative chains of command, and discuss the mission, functions, and locations of each:
a. U.S. Strategic Command [ref. a]
b. U.S Cyber Command [ref. b]
c. OPNAV N2/N6 [ref. c]
d. U.S. Fleet Forces Command [ref. d]
e. U.S. Pacific Fleet [ref. e]
f. Fleet Cyber Command [ref. b]
g. Navy Information Forces [ref. f]
h. Office of Naval Intelligence [ref. g]
i. Naval Meteorology and Oceanography Command [ref. h]
j. Naval Network Warfare Command [ref. i]
k. Navy Expeditionary Combat Command [ref. j]
l. Naval Special Warfare Command [ref. k]
m. Numbered Fleets:
1. Third [ref. aa]
2. Fourth [ref. ab]
3. Fifth [ref. ac]
4. Sixth [ref. ad]
5. Seventh [ref. ae]
6. Tenth [ref. l]

A

c. OPNAV N2/N6 - Deputy Chief of Naval Operations for Information Warfare
o Currently VADM Jeffrey Trussler as of June 2020 - submariner
o N2 - Intel/N6 - Comms
■ Merged in 2009
o Responsible for intel, information warfare, cyber, comms, networks, METOC, space

g. NAVIFOR - Navy Information Forces - Suffolk, VA
o TYCOM for Navy’s global cyber workforce
o Reports to USFF

h. Office of Naval Intelligence (ONI) - Suitland, MD
o Colocated with the National Maritime Intelligence Center
o Echelon II command
o Global maritime intelligence
■ Analysis, production, dissemination
■ Scientific, technical, geopolitical, military
o Oldest continuously operating U.S. intel agency (est. 1882)

i. Commander, Naval Meteorology and Oceanography Command (CNMOC) - Stennis Space Center, MS
o Hub command for METOC/TYCOM for METOC
■ Reports to USFF
o Meteorology, oceanography, precise time, astronomy, environmental knowledge

j. Naval Network Warfare Command (NNWC) - Suffolk, VA
o Hub command for IP
■ Falls under FLTCYBERCOM/C10F
o Commands/controls Navy networks

k. Navy Expeditionary Combat Command (NECC) - Little Creek, VA
o MTE of expeditionary forces
o Seabees, EOD

l. Naval Special Warfare Command (NSWC) - San Diego, CA
o MTE, deploy, sustain NSW forces in support of COCOMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

104.3 Discuss the three tenets of Information Dominance: [refs. y, z]
a. Assured C2
b. Battlespace Awareness
c. Integrated Fires

A

Pillars of Information Warfare
a. Assured Command and Control (AC2) - Network the Force - IP
o Enable exchange of orders/responses with subordinates
o Provide assured EM spectrum access
o Provide assured Positioning, Navigation, Timing
o Provide dynamic flexible networks
o Key N2/N6 programs:
■ NMCI/NGEN, CANES
■ Intelligence Community Information Technology Enterprise (IC ITE)
■ Cybersecurity/CYBERSPACE

b. Battlespace Awareness (BA) - Know the Environment - Intel, METOC
o Ensure persistent surveillance of the maritime and information battlespace
o Provide tactical, operational, strategic knowledge of the capabilities and intent of our adversaries
o Understand/predict the physical and virtual environments
o Enable automated processing, exploitation, analysis, fusion, and product delivery
o Provide scientific and technical modeling of adversary systems
o Key N2/N6 programs:
■ Triton, FireScout, LBS-UUV unmanned systems
■ Fixed Surveillance System
■ SURTASS
■ P-8 Quick Reaction Capability

c. Integrated Fires (IF) - Seize the Initiative - CW
o Exploit spectrum as a kinetic and non-kinetic weapon
o Enable increased weapons range, effectiveness, lethality
o Integrate targeting and fire control capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

104.4 Define the mission and functions of the following:
a. Maritime Headquarters with Maritime Operations Center [ref. w, ch. 6]
b. Carrier Strike Group [ref. m, chs. 1, 2]
c. Expeditionary Strike Group [ref. n, ch. 10]
d. Amphibious Readiness Group [ref. n, ch. 1]

A

a. Maritime HQ w/ Maritime Operations Center
o All fleets have MOCs (Maritime Operations Center) - coordinates CTFs, responsible for ordering larger-level fight (operations) and commanding theater-level war
o Exists to streamline operational cycle
■ Provide structure for quickly and effectively establishing support for operational- level maritime commander
o All operational fleets have MIOCs (Maritime Intelligence Operations Center)
■ 3rd, 5th, 6th, 7th, 10th
■ Takes intel and fuses with operations to support the MOC

b. Carrier Strike Groups (CSG)
o Missions: Power Projection, Deterrence, Naval presence in support of national interests
o Includes (at least): 1x HVU (CVN), 1x Cruiser, 2-4x Destroyers, CVW (Carrier Air Wing)
■ Sometimes includes a submarine, and theater-based supply ships conduct replenishment

c. Expeditionary Strike Group (ESG)
o Missions: Operational freedom and expanded warfare capabilities on land (with Marines) and sea
o Includes (at least): 1x LHA or LHD (primary landing - amphibious assault), LSD (dock landing ship with LCACs), LPD (transport dock), MEU (Marines), submarine or surface escorts, aircraft (Harriers, CH-53, CH-46, MV-22, AH-1W)

d. Amphibious Readiness Group
o Essentially a less complete ESG
o Missions: Span from HA/DR to major theater-level war
o Includes (at least): Amphibious Task Force of Navy ships (LHA or LHD, LPD, LSD), Landing Force (MEU), Aircraft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

104.5 Discuss the Command structure and functions of the following, including typical
assignments in a CSG/ESG/ARG: [ref. o]
a. CWC/OTC [ch. 1]
b. Sea Combat Commander [ch. 3]
c. Anti-Submarine Warfare Commander [ch. 3]
d. Surface Warfare Commander [ch. 3]
e. Mine Warfare Commander [ch. 4]
f. Air Defense Commander [ch. 3]
g. Strike Warfare Commander [ch. 3]
h. Information Warfare Commander [ch. 3]

A

Composite Warfare Construct
o Command structure in which Admiral (OTC/A) delegates warfare functional areas to subordinate units
■ Centralized planning/decentralized control
■ Command by Negation

a.
OTC - Officer in Tactical Command (A)
o The Admiral
CWC - Composite Warfare Commander (B/V)
o Can be combined with OTC
o Where: CVN
o Role: Overall command

b. Sea Combat Commander (SCC) - Z
■ Who: DESRON Commander
■ Role: Surface - S/T (Shit Talkers); Undersea - X/Y (Examine Yourself)
* Defense against surface and submarine threats

c. Anti-Submarine Warfare Commander - X
- Defense against submarine threats

d. Surface Warfare Commander - S
o Current/potential threats to surface units
o IDIS (Independent Duty Intelligence Specialist) on small boys

Z- Combines S and X

e. Mine Warfare Commander (MIWC) - G/F
■ Principal advisor to OTC on matters pertaining to Mine Warfare
* Coordinate laying of minefields, supporting MCM forces (usually not under direct command of OTC)

f. Air Defense Commander - W
■ Who: Cruiser CDR (O-6)
* Only Warfare Commander NOT on CVN
* Usually has an O-3 representative on CVN
■ Where: Cruiser (since he’s the CO)

o Airborne threats to CSG
■ Aircraft, radars from ASCM/CDCMs/SAMs, missiles

g. Strike Warfare Commander - P
o Threats to CAG platforms/personnel
o Support operational mission planning, targeting process

h. Information Warfare Commander - Q
o Meet/inform IWC priorities
o Fuse intelligence with all IWC disciplines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

104.6 Discuss the difference ONI groups:
SWORD
SABER
SPEAR
SPECTRUM
FARRAGUT
NIMITZ Geo Cells

A

a. ONI SWORD
Mission: Submarine Warfare Operations Research Division (SWORD) provides all source assessments on foreign submarine and anti-submarine warfare capabilities of selected world navies.

b. ONI SABER
Surface Warfare

c. ONI SPEAR
RED air intel - SPEAR (Strike Projection Evaluation and Anti-Air Warfare Research)

d. ONI SPECTRUM
Cyber/electronic warfare/C4ISR (Command, Control, Communications, Computers, Intelligence,
Surveillance and Reconnaissance)

e. ONI FARRAGUT Technical Analysis Center
The Farragut Center ensures the Navy understands the foreign-force capabilities it is likely to encounter

f. ONI NIMITZ Geo Cells
The Geographically Oriented Cells are teams focused on specific area of interest and provide extensive knowledge to the Naval forces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

104.7 Discuss the functions of the following Joint Warfare Commands:
a. Combined or Joint Task Force [ref. p, ch. 2]
b. Combined or Joint Force Air Component Command [ref. p, Glossary]
c. Joint Special Operations Task Force [ref. q, ch. 2]
d. Combined or Joint Force Land Component Command [ref. q, ch. 1]
e. Combined or Joint Force Maritime Component Command [ref. m, ch. 2]
f. Joint Military Information Support Task Force [ref. r, ch. 3]
g. Civil Military Operations Center [ref. p, ch. 2]

A

a. Combined or Joint Task Force
o JTF - More than one military service
o CTF - More than one nation
o CJTF - More than one service and more than one nation

b. Combined or Joint Force Air Component Command (JFACC)
o Commander within unified command, subordinate unified command, or JTF
■ Responsible for making recommendations on proper employment of air forces

c. Joint Special Operations Task Force (JSOTF)
o JTF composed of special ops units from more than one service
■ To carry out a specific special operation or prosecute special ops in support of theater campaign
■ May have conventional non-special ops units attached to support

d. Combined or Joint Force Land Component Command (JFLCC)
o Similar to JFACC, but for employment of land forces

e. Combined or Joint Force Maritime Component Command (JFMCC)
o Similar to JFACC/JFLCC, but for employment of maritime forces and assets

f. Joint Military Information Support Task Force (JMISTF)
o Develop strategic, operational, tactical MISO plans for theater campaign
■ Subordinate joint command of joint force

g. Civil Military Operations Center (CMOC)
o Conceptual meeting place of stakeholders in coordinating civil-military operations
■ May include reps of DoD forces, NGOs, IGOs, private sectors, etc.
o Generally does not set policy or direct ops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

104.8 Discuss the following organizational responsibilities and command relationships,
specifying under what circumstances each is exercised in a joint environment:
[ref. s]
a. COCOM [ch. V]
b. OPCON [ch. V]
c. TACON [ch. V]
d. ADCON [ch. V]
e. DIRLAUTH [ch. V]
f. Supported and/or Supporting Commander [app. A]

A

a. Combatant Command (COCOM)
o Authority vested by Title 10, USC, Section 164
o Full authority for CCDR over assigned forces
■ Designating objectives
■ Direction over all aspects of military ops
■ Organizing/employing commands and forces

b. Operational Control (OPCON)
o Authoritative direction over all aspects of military operations and joint training
o Perform functions involving org/employing forces, assigning tasks, designating objectives, etc.
■ Ex. PACFLT, 7th FLT

c. Tactical Control (TACON)
o Falls under OPCON - more specific, unit/mission-oriented
■ Inherent in operational control
o May be delegated to any level at or below COCOM level
o Detailed direction and control of maneuvers within the op area necessary to accomplish missions
■ Ex. CSG

d. Administrative Control (ADCON)
o Man, Train, Equip
o Authority over admin and support
■ Resources, equipment, personnel management, logistics
■ Ex. NAVIFOR

e. Direct Liaison Authorized (DIRLAUTH)
o Coordination relationship, not an authority itself
o Granted by a CDR (at any level) to a subordinate to directly coordinate an action with a command or agency within or outside the command
■ Ex. C10F is given DIRLAUTH from CNO to coordinate with NSA

f. Supported/Supporting Commander
o Supported Commander - Receives assistance from other commanders’ force/capabilities
■ Primary responsibility for all aspects of task assigned
■ Responsible for ensuring supporting commanders understand assistance required
o Supporting Commander - Provides forces/capabilities to supported commander

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

104.9 Define and discuss the purpose of the following:
a. OPGEN/OPTASK [ref. n; ref. o, ch. 2]
b. ALERTORD [ref. t, ch. 4]
c PLANORD [ref. t, ch. 4]
d. WARNORD [ref. t, ch. 4]
e. EXORD [ref. t, ch. 4]
f. OPORD [ref. t, ch. 4]
g. FRAGORD [ref. t, ch. 4]

A

a. OPGEN - Operational General Message
o General instructions, policy and information common to all forms of warfare and detailed instructions about warfare responsibilities of OTC

b. ALERTORD - Alert Order
o Same as a PLANORD, but AFTER directing authority approves a COA
■ Does not authorize execution of COA!

c. PLANORD - Planning Order
o Directs initiation of plan development, BEFORE directing authority approves a COA

d. WARNORD - Warning Order
o Planning directive that initiates development and evaluation of COAs and commander’s estimate
■ Warning that “there will be an operation”

e. EXORD - Execution Order
o Execute COA or OPORD at direction of POTUS/SECDEF/CJCS
■ Includes:
* D-day (day on which operation will start)
* H-hour (time operation begins)
* DTGs (date time group) are expressed in Zulu time

f. OPORD - Operation Order
o Directive issued by CDR to sub CDRs to coordinate execution of operation
■ Often times are standing orders

g. FRAGORD - Fragmentation Order
o If changes need to be made to an OPORD without changing the whole thing, update with FRAGORD
■ Issue as needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

104.10 Discuss the roles and responsibilities of SPAWAR. [ref. u]

A

SPAWAR
* Name now changed to Naval Information Warfare Systems Command (NAVWAR) - located in San Diego, CA
* Provides hardware and software needed to execute Navy missions
o Develops, delivers, sustains advanced cyber capabilities
■ “Rapidly deliver cyber warfighting capability from seabed to space”
o Support full lifecycle of product delivery
■ R&D, acquisition and development, operations and logistical support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

104.11 Discuss the TYCOM responsibilities for OFRP, ULTRA. [ref. v]

A

Type Commander (TYCOM)
o Perform MTE (mission task element) for “type” of weapon system (naval aviation, sub warfare, etc.)
■ NAVIFOR is TYCOM for IWC - falls under USFF TYCOM
o Each TYCOM is responsible for ensuring training, certification, maintenance requirements to implement and execute OFRP (Optimized Fleet Response Plan)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

104.12 Describe operational readiness reporting at your organization, including DRRS-N.

A

Defense Readiness Reporting System (DRRS-N)
o Near real-time web-based tool that tracks command’s readiness to fight
■ Report to OSD readiness level of any USN unit to allow for critical decisions to be made to deploy units based on up-to-date info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

104.13 Describe the differences between HD and HS. [ref. x, ch. I]

A

Homeland Defense
o Protection of U.S. territory, domestic population, critical infrastructure against attacks from outside the U.S.

Homeland Security
o National team effort (local, state, federal) to prevent terrorist attacks, reduce vulnerability to terrorism
■ DoD contributes via military missions overseas, HD, support to civil authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

104.14 Describe Title 10 and Title 32 responsibilities in support of HD. [ref. x, ch. II]

A

Title 10
o Outlines role of armed forces
■ Provides legal basis for roles, missions, organization of each service and DoD; restricts domestic mission (Posse Comitatus)

Title 32
o Outlines role of National Guard
■ Chapter 9 outlines homeland defense activities
■ Maintains law enforcement abilities of state guard, controlled by governor

Title 50
o Outlines role of war and national defense
■ Establishes Council of National Defense
* Comprised of Secretaries of Army, Navy, Interior, Agriculture, Commerce, Labor
■ Chap. 36 governs foreign intelligence surveillance
■ Authorizes detention and removal of individuals from foreign nations with which U.S. is not at war

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

104.15 Discuss how the major provisions of Title 50 address HD. [ref. x, app. D]

A

A Council of National Defense is established, for the coordination of industries and resources for the national security and welfare, to consist of the Secretary of the Army, the Secretary of the Navy, the Secretary of the Interior, the Secretary of Agriculture, the Secretary of Commerce, and the Secretary of Labor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

105.1 Define the following:
a. Call sign [ref. a, ch. 9]
b. Precedence [ref. a, ch. 3]
c. Circuit discipline [ref. a, ch. 6]
d. Free net [ref. a, ch. 6]
e. Directed net [ref. b, ch. 2]

A

a. Call Sign
o Nickname over comms, can change every day
o Conceal who is talking to whom, level of CMD, purpose of net from intercepting operator

b. Precedence
o Indicate relative order of processing/delivery to recipients of messages
o 4 basic types reflect speed of service objectives
■ Time for message to be processed from sending comm center to recipient comm center

Precedence Prosign Objective
FLASH Z ASAP (under 10 min)
IMMEDIATE O 30 min.
PRIORITY P 3 hours
ROUTINE R 6 hours

c. Circuit Discipline
o Common manners/voice procedure - enforce security standards, enable comms efficiency/accuracy

d. Free Net
o Net Control Station (NECOS) allows member stations to transmit traffic to others without prior permission from NECOS
■ Bridge-to-bridge, always open

e. Directed Net
o Stations must obtain prior permission from NECOS
■ Permission not required for FLASH messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

105.2 Discuss the proper procedures in naval voice communications, including the
following: [ref. b, ch. 2]
a. Operating rules
b. Three basic parts of transmissions
c. Radio check
d. Call/collective call
e. Daily-changing call signs
f. Common prowords
g. BEADWINDOW
h. EEFI
i. GINGERBREAD

A

a. Operating Rules
o Write messages down prior to transmission
o Do not interfere with other traffic
o Clear pronunciation with natural pauses
o Short and concise comms

b. Three basic parts of transmissions
o Heading - “Collective, this is Romeo Five Sierra”
o Text - “Kick two, time 1532 authentication is bravo zulu”
o Ending - “Out”

c. Radio Check
o PROWORD for “What is my signal strength and readability; how do you hear me?”

d. Call/Collective Call
o Collective call signs identifying a predetermined group of stations
■ Advantage: Brevity
■ Cons: Used excessively, provide red analysts with ability to group and identify

e. Daily changing Call Signs
o Used in unsecure circuit to disguise unit identifies
o Classified combo of letters and numbers
■ Published in COMSEC directory

f. Common Terms
o BREAK - I have higher priority traffic
o ACKNOWLEDGE - Instruction to acknowledge a transmission
o AFFIRMATIVE - Yes
o INTERROGATIVE - Question
o OUT - End of transmission, no reply expected
o OVER - Out, but reply necessary
o WILCO - Signal received, understood, will comply
o WRONG - Last transmission incorrect, correct one follows

g. BEADWINDOW - EEFI has been disclosed
■ NECOS: “Beadwindow One - Over”
■ Offending station’s only authorized reply: Roger Out”

h. EEFI - Information about friendly position, caps/lims, ops, EW, personnel, COMSEC
■ If acquired by adversary, would degrade security of ops

i. GINGERBREAD - Pass if you suspect an enemy station is on the net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

105.3 Discuss the following circuits in terms of usual frequency range, type of circuit
(voice or teletype), units on the net, where it is normally guarded, and the use of the
net:
a. C&R nets [ref. c, ch. 1]
b. Ship-to-Shore [ref. d, ch. 1]
c. Fleet tactical-warning [ref. e, ch. 2]
d. Distress frequencies [ref. f]
e. Bridge-to-Bridge [ref. g, ch. 4]
f. Chat [ref. j]
g. POTS [ref. a, ch. 2]
h. Iridium [ref. a, ch. 9]

A

a. C&R Nets - Coordinating & Reporting
o Dedicated circuits between warfare commanders and operating forces
■ Avoid overloading
■ Ex. ASW C&R net used by X and surface, air, undersea units for ASW info

b. Ship-to-Shore
o High Frequency (HF) range
o Difficult application because of constant ship movement
■ Less reliable than SATCOM systems
■ Susceptible to natural and manmade interference

c. Fleet Tactical-Warning (FLTTAC)
o Requires 24/7 monitoring
o Unencrypted voice circuit used to coordinate ship movement
■ NATO classified signals maintain secrecy of ops

d. Distress Frequencies
o 500 kHz - International CW/MCW distress and calling
o 2182 kHz - International voice distress, safety, calling
o 8364 kHz - International CW/MCW lifeboat, life raft, survival craft
o 40.5 MHz - US Army FM distress
o 121.5 MHz - International voice aeronautical/shipboard emergency
o 156.8 MHz - International FM voice distress, emergency
o 243.0 MHz - Joint/combined mil voice aeronautical emergency and international survival craft
o 406.0 MHz - International voice aeronautical/shipboard emergency

e. Bridge-to-Bridge
o Most common use of VHF comms - short range, nonsecure
o Typically set to monitor Channel 16
■ Commonly recognized as “distress” channel
■ Comms with unidentified/merchant vessels

f. Chat
o Internet chat comms capabilities to both shore and sea commands
■ Allows for plain language to expedite passing information (usually with abbreviations)
o Available through JWICS, SIPRNET, CENTRIXS, etc.

g. POTS (Plain Ol’ Telephone System)
o Unenhanced telephone service with ability to send and receive phone calls

h. Iridium
o Satellite phone
■ Designed to permit any type of narrowband wireless transmission to reach anywhere in the world
o Network consists of space segment with constellation of 66 satellites in 6 evenly spaced nearly polar orbital planes
■ System owned and operated by Iridium LLC
* Private international consortium of leading telecomms/industrial companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

105.4 Discuss the following COP tools:
a. Link 11/16 [ref. c, ch. 1]
b. GCCS-M/J [ref. i, ch. 4]
c. CEC [ref. i, ch. 4]

A

a. Link 11/16/22 - share track data between ships to broaden COP
o Link-11 - UHF/HF
■ Legacy system
■ NECOS (Neto Control Station) ship asks each ship in round-robin, circular fashion, allows each unit to reply with data
* More vulnerable if NECOS goes down - net will be useless for some period of time
o Link-16 - UHF
■ Newer system
■ Non-nodal; does not require NECOS to operate tactical “net”
* Prevents uselessness if loss of node (NECOS) goes down
■ Anyone can connect with anyone
* Each ship has a time slot - if ship doesn’t talk during slot, goes to next
o Link-22
■ Combination of Link-11 and Link-16, allows you to choose

b. GCCS-M/J (Global Command and Control System - Maritime/Joint)
o Correlate, fuse, maintain track info and displays as a tactical picture (COP)
■ Location of air, sea, land units anywhere in the world (friendly, neutral, enemy)
■ At SECRET level
■ Link feeds create GCCS tracks
■ Maintained by DBM (blue/green tracks) and RDBM (red tracks)

c. CEC (Cooperative Engagement Capability)
o Enhance anti-air warfare (AAW) capability of ships and aircraft
■ Net battle force sensors to provide single, distributed AAW defense capability
o Create single, common air tactical picture
■ Fuses tracking data from sensors using identical algorithms
o Designed against air threat (cruise missiles), especially in littoral waters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

105.5 Discuss the content and format of naval messages to include:
a. AIGs, PLADs, CADs [ref. b, ch. 1]
b. DTG, Julian date [ref. b, ch. 1]

A

a. AIGs, PLADs, CADs
o Address Indicating Group (AIG)
■ Single address group to represent large # of addressees
* Might be used for task groups
* Increase speed-of-traffic handling
o Plain Language Address Designator (PLAD)
■ Individual designator/address written in easily understood format
* Ex. COMDESRONTEN
o Collective Address Designator (CAD)
■ Represent 2 or more commands or activities

b. DTG, Julian Date
o Date Time Group (DTG)
■ All DoD messages released with DTG in universal time
■ 091630Z JUL 16 - 09JUL16; 1630Z
o Julian Date
■ Actual day out of 365 we are on
■ July 21 = Julian Date 203

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

105.6 Discuss the purpose and format of the following Naval messages:
a. OPREP-3 SITREP, NAVY BLUE, PINNACLE [ref. h, ch. 2]
b. COMSPOT [ref. a, app. C]

A

a. OPREP-3 Reporting System
o Provides military units with system to report significant events/incidents to highest levels of command
■ Within 5 min. - submit voice report
* Include who, what, when, where, impact on capability
o PINNACLE
■ Event that warrants informing national level authorities - immediate attention of SECDEF/CJCS
* Ex. Terrorist attack, fired upon, need immediate attention
* 5 min - Voice Report; 20 min - Naval message
o NAVY BLUE
■ Informs CNO of incidents with media interest expected (operational, personnel, etc.)
* Ex. COVID, run aground
* 5 min - Voice Report; 20 min - Naval message
o SITREP
■ Incidents not meeting OPREP-3 criteria
* Ex. Bomb threat hoax, suicides, etc.
* No voice report required, 20 min - Naval message

b. COMSPOT (Communications Spot Report)
o Submitted to controlling NCTAMS and DISA by all fleet units experiencing difficulties causing comms shortage exceeding 30 min.
■ Ex. If EHF goes down when raining
■ Any changes (including restoration of comms) reported, updates
■ If cannot be restored within 48 hours, submit CASREP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

106.1 Describe the implications of the peacetime ROE on the inherent right of self-defense. [ref. a, encl. A]

A

Self-Defense
* Inherent right/obligation to exercise unit self-defense in response to a hostile act or demonstrated hostile intent
o Peacetime ROE - engagement in individual, unit, or national self-defense
o After force declared hostile by appropriate authority, US forces need not observe hostile act/demonstrated hostile intent before engaging
o ROE decisions have strategic, political implications
■ In peace ops, more sensitive politically
■ May have certain UN mandates
* Must apply guidelines of:
o De-escalation
o Necessity
o Proportionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

106.2 Discuss the following as they pertain to ROE:
a. Standing ROE [ref. a, encl. A]
b. Standing RUF [ref. a, encl. A]
c. FON [ref. b, ch. 2]
d. Transit passage [ref. b, ch. 2]
e. Innocent passage [ref. b, ch. 2]
f. Pursuit [ref. a, encl. A]
g. Hostile intent [ref. a, encl. B]
h. Hostile act [ref. a, encl. A]
i. Supplemental ROE [ref. a, encl. I]
j. Necessity [ref. a, encl. A]
k. Proportionality [ref. a, encl. A, encl. B, app. A]
l. Contiguous zone [ref. b, ch. 1]
m. Territorial waters [ref. b. ch. 1]
n. Exclusive economic zone [ref. b, ch. 1]
o. Reconnaissance Reporting Areas [ref. c, encl. M]
p. Space [ref. a. encl. E]

A

a. Standing ROE (SROE)
o Fundamental policies/procedures governing actions taken by US commanders during all military ops
■ CJCSI (Instruction) 3121.01B
■ Approved by SECDEF
■ J-3 is responsible for ROE maintenance
o Also apply to air and homeland defense missions
o Basic considerations:
■ Deadly force only in response to hostile act/intent
■ Failure to comply punishable under UCMJ

b. Standing Rules of the Use of Force (SRUF)
o Govern actions re: DoD civil support (mil assistance to civil authorities) and routine military departments (incl. AT/FP) occurring within US territory or territorial waters
■ Civil-support missions, homeland defense

c. Freedom of Navigation (FON)
o US FON program challenges territorial claims on world’s oceans and airspace considered
excessive/inconsistent with UNCLOS
■ Diplomatic protests by State Dept.
■ Operational assertions by US military
o Politically neutral
■ Encouraged nations to amend claims, bring grievances to the Hague
o COCOM theater-specific guidance/OPORDs on planning and executing FONOPs in a particular AOR

d. Transit Passage
o Exercise of freedoms of navigation and overflight solely for purpose of continuous and expeditious transit in the normal modes of operation
o Must:
■ Proceed without delay through or over
■ Refrain from any threat or use of force
■ Refrain from any activities other than normal modes of continuous/expeditious transit
o Cannot be hampered or suspended by coastal nation during peacetime

e. Innocent Passage
o Continuous/expeditious traversing of territorial seas
■ Includes stopping and anchoring for ordinary navigation
o Innocent if not prejudicial to peace, good order, security of coastal nation

f. Pursuit
o Self-defense including authority to pursue forces who have committed a hostile act/demonstrated hostile intent
■ Must be in territorial or contiguous waters of pursuing nation
* Only continued outside territorial/contiguous waters if pursuit has not been interrupted

g. Hostile Intent
o Threat of imminent use of force against US, US forces, or other designated persons or property
■ Includes threat to preclude/impede mission of US forces, ex. recovery of US personnel

h. Hostile Act
o Attack or other use of force against US, US forces, other designated persons/property
■ Includes force directly used to preclude/impede mission of US forces

i. Supplemental ROE
o Tailored ROE for specific missions
■ Can be requested by commanders at any level
* May decide existing ROE are unclear, too restrictive, or otherwise unsuitable
o SROE (Standing ROE) is generally permissive from perspective of tactical-level commander
■ Not necessary for on-scene commander to request authority to use every tactic/weapon available unless higher commander has imposed restriction by supplementary measure
o ROE request message/process
■ J-2, J-3, Judge Advocate personnel will draft variation/request for approval by COCOM
* COCOMs have authority to modify SROE or Supplemental ROE
* If request is different from SROE restrictions (requiring SECDEF approval), COCOM submits to CJCS for SECDEF approval
■ Typically for a task force/mission that is a unique situation

j. Necessity
o Use of force must be in response to hostile act or demonstration of hostile intent
■ Must accomplish legitimate military objective
* Ex. Targeting facilities, equipment, forces which would lead to partial/complete submission of adversary
* Ex. Operation Desert Storm - targeting Iraqi SCUD missile batteries

k. Proportionality
o Use of force is limited in intensity, duration, and scope to that which is reasonably required to counter attack/threat of attack and ensure safety of US forces

l. Contiguous Zone
o Area extending seaward from baseline up to 24NM
■ State can exert limited control to prevent/punish infringement of customs, fiscal/immigration/sanitary laws and regulations within territory or territorial sea
o Ships/aircraft enjoy high seas freedoms in the contiguous zone

m. Territorial Waters
o Defined by UNCLOS as extending at most 12NM
o Regarded as sovereign territory
■ Innocent passage by civ and mil allowed
■ Aircraft overflight not allowed

n. Exclusive Economic Zone
o Extends at most 200NM
o State has special rights over exploration/use of marine resources
o Ships/aircraft enjoy high seas freedoms/overflight in EEZ

o. Reconnaissance Reporting Areas = ???

p. Space
o Geneva Convention - no combat in space
o Space Coordinating Authority (SCA) recommends guidelines for employing space capabilities (incl. ROE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

106.3 Describe the process for requesting supplemental ROE. [ref. a]

A

o Tailored ROE for specific missions
■ Can be requested by commanders at any level
* May decide existing ROE are unclear, too restrictive, or otherwise unsuitable
o SROE (Standing ROE) is generally permissive from perspective of tactical-level commander
■ Not necessary for on-scene commander to request authority to use every tactic/weapon available unless higher commander has imposed restriction by supplementary measure
o ROE request message/process
■ J-2, J-3, Judge Advocate personnel will draft variation/request for approval by COCOM
* COCOMs have authority to modify SROE or Supplemental ROE
* If request is different from SROE restrictions (requiring SECDEF approval), COCOM submits to CJCS for SECDEF approval
■ Typically for a task force/mission that is a unique situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

106.4 State the authority required to conduct the following:
a. Electronic warfare [ref. a, encl. F]
b. Military deception [ref. a, encl. F]
c. Operations Security [ref. a, encl. F]
d. Military Information Support Operations [ref. a, encl. F]
e. Defensive Cyber Operations [ref. e, ch. 3]
1. DCO-RA
2. DCO-IDM
f. Offensive Cyber Operations [ref. e, ch. 3]

A

a. Electronic Warfare (EW)
o COCOMS have authority to employ EW, approve/delegate
■ In accordance with policy issued by CJCS

b. Military Deception (MILDEC)
o Authority for tactical MILDEC rests with COCOM in whose theater the operation resides
■ May delegate authority to conduct ops to JTF commander
■ May not be used to deceive Congress/US public

c. Operational Security (OPSEC)
o COCOMs have authority to manage OPSEC and ensure subordinate commanders employ OPSEC
■ On-scene commanders employ OPSEC

d. Military Information Support Operations (MISO)
o During armed conflict ➔ POTUS/SECDEF through CJCS issues specific MISO policy to unified commands
■ CJCSI 3110.05C - guidance to military commanders conducting MISO in a joint environment
o COCOMs have authority for force protection purposes, otherwise SECDEF approval required

e. Defensive Cyber Operations (DCO)
o Executed to defend DODIN/other cyberspace from active threats
■ Preserve ability to use blue cyberspace capabilities, protect blue cyberspace by defeating ongoing or imminent malicious cyberspace activity
o DCO-RA (Response Action)
■ Conducted by National Mission Teams (NMTs)
■ Gray space - boundary between our networks and red space
* Focused on denying ability to infiltrate our systems, “offensive to be defensive”
* Ex. Infiltrating red country’s networks to plant a bug in the toolset they use to infiltrate us
o DCO-IDM (Internal Defensive Measures)
■ Conducted by Cyber Protection Teams (CPTs)
■ Blue space - defend our networks
* Intrusion detection systems, getting people out of our networks
* Conducted within DODIN, respond to unauthorized activity or alerts in DODIN

f. Offensive Cyber Operations (OCO)
o Conducted by Combat Mission Teams (CMTs)
■ Located at COCOMs - only ones who do OCO
■ Red space - to harm enemy
o Destroy, degrade, disrupt network infrastructure or enemy’s ability to use cyberspace
■ CCDRs authorized within respective AOR when part of SECDEF approved ops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

106.5 Explain the Law of Armed Conflict. [ref. d, sec. 1]

A

The part of international law that regulates the conduct of armed hostilities
o Conduct of hostilities
o Protection of war victims in conflict

5 fundamental principles:
o Military necessity
o Unnecessary suffering
o Distinction
o Proportionality
o Honor (chivalry)
* Regulates “conditions for war” (jus ad bellum) and “conduct of warring parties” (jus in bello)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

106.6 Define hostile intent/hostile act as it pertains to cyberspace. [ref. a, encl. F]

A

Hostile Intent
o Threat of an imminent hostile act based on capability to deny, disrupt, degrade, destroy critical cyber assets at will of adversary
■ Ex. Sleeper malware
■ Identified through defensive counter-cyber or forensic operations

Hostile Act
o Force or other means used directly to attack critical cyber assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

107.1 Define the following:
a. Amplitude [ref. a, ch. 1]
b. Wavelength [ref. a, ch. 1]
c. Cycle [ref. a, ch. 1]
d. Frequency [ref. a, ch. 1]
e. Ground wave [ref. a, ch. 2]
f. Sky wave [ref. a, ch. 2]
g. Space wave [ref. a, ch. 2]
h. Line of sight horizon [ref. b, ch. 5]
i. Polarization [ref. a, ch. 2]
j Skip zone and skip distance [ref. a, ch. 2]

A

a. Amplitude
o Height of wave crest above reference line (loudness is related to amplitude)

b. Wavelength
o Distance of which wave’s shape repeats
■ Between any 2 similar points on adjacent waves

c. Cycle
o Movement of one wavelength - vibration
o Combination of 1 complete positive and 1 complete negative alternation = cycle

d. Frequency
o Number of vibrations (cycles) of wave train in a unit of time (ex. # of cycles per second)

e. Ground Wave
o Radio waves that travel near the surface of the earth
o Ideal for short distances (relatively local radio comms coverage)
■ LF/MF

f. Sky Wave
o EM waves refracted back to the Earth by the ionosphere
■ Long-distance HF

g. Space Wave
o Propagate through atmosphere from transmitter antenna to receiver antenna
■ Roughly VHF and up (higher frequencies can’t work with sky and ground waves)
o Two distinct paths
■ Travel directly through air (point to point)
■ Travel after reflecting from earth’s surface to troposphere surface
o Limitations: Limited to the curvature of the earth, line-of-sight

h. Line of Sight Horizon
o Natural horizon
■ Curvature of the earth is the ultimate obstacle to LOS
■ At frequencies normally used for radar, radio waves usually travel in a straight line

i. Polarization
o Position of antenna in space affects polarization of the EM wave
■ When transmitting antenna is close to the ground, vertically polarized waves =
greater signal strength at Earth’s surface

j. Skip Zone/Distance
o Zone - Zone of silence between where ground wave is too weak for reception and sky wave is first returned to Earth
o Distance - Distance from transmitter to point to where sky wave is first returned to earth
o HF signals refract from ionosphere (sky wave) because of solar radiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

107.2 Discuss the effects of the following on radio wave propagation:
a. Atmospheric conditions [ref. a, ch. 2]
b. Natural interference [ref. a, ch. 2]
c. Terrain [ref. a, ch. 2]
d. Modulation types [ref. b, ch. 2]
e. Refraction [ref. a, ch. 2]
f. Diffraction [ref. a, ch. 2]
g. Reflection [ref. a, ch. 2]
h. Absorption [ref. a, ch. 2]
i. Ionospheric variations [ref. a, ch. 2]
j. Electromagnetic interference [ref. a, ch. 2]
k. Attenuation [ref. a, ch. 2]
l. Tropospheric scatter [ref. a, ch. 2]
m. Ducting [ref. a, ch. 2]

A

a. Atmospheric Conditions
o Wind, air temp, water content can have effect on strength of received signal

b. Natural Interference
o Natural occurrences like weather and geography (ex. mountains, bodies of water) can degrade or enhance signals
■ HF is most stable during the mid-day or mid-night, when ionosophere is less ionized
* Change between night and day (dusk/dawn) = most ionization

c. Terrain
d. Modulation types

e. Refraction
o Change in the direction of a wave as it passes from one medium to another medium with different properties
■ Bending of waves - change in speed and wavelength of waves
* Ex. Light going from air to water

f. Diffraction
o Bending of wave path when wave meets obstruction
■ Amount of diffraction depends on wavelength
* HF waves (ex. light) rarely diffracted in normal world
* Sound waves - higher notes with shorter waves - undergo little to no diffraction and do not reach ears

g. Reflection
o Waves neither transmitted nor absorbed, but reflected off a medium (ex. mirror)

h. Absorption
o Loss in energy of a radio wave
■ Affect the strength of a signal and ability to communicate over long distances (absorbed little by little)

i. Ionospheric Variations
o Cause refraction or absorption due to changes in sun’s activity, movement of earth about the sun
■ Regular - 11-year sunspot cycle, 27-day sunspot cycle
■ Irregular - Ionospheric storms

j. Electromagnetic Interference
o EM induction or radiation from an external source may interrupt/obstruct the performance of the electrical circuit
■ Source may be manmade (jamming/EW) or natural (solar flares/Northern Lights)

k. Attenuation
o Propagation loss - loss of signal strength due to medium

l. Tropospheric Scatter
o Radio wave meets turbulence in troposphere - abrupt change in velocity
■ Small amount of energy is scattered forward, returned to Earth at distances beyond horizon/LOS

m. Ducting
o Occurs with temperature inversion (ex. warm air over cooler air) - increases normal range of wave
■ For sound propagation, behaves like a transmission line - duct contains medium (ex. air) to support propagation
■ Often happens in HF - allows for long range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

107.3 Describe the following processes: [ref. c]
a. Signal modulation [chs. 1, 2]
b. Signal multiplexing [ch. 1]

A

a. Signal Modulation
o Two types: frequency, amplitude
o Modulating an HF signal to transmit information/data
■ Ex. Hearing a song instead of one single note via radio - signal is always being modulated

b. Signal Multiplexing
o Multiple analog message signals or digital data streams combined into one signal over a shared medium
■ Ex. Telecomms - several telephone calls may be carried using one wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

107.4 Describe the frequency range of the following spectrum designators, and discuss
uses and limitations of each range: [ref. b, ch. 1]
a. ELF
b. VLF
c. LF
d. MF
e. HF
f. VHF
g. UHF
h. SHF
i. EHF

A

Freq. Range Primary Use
ELF 3 Hz- 30 Hz - LR signals to subs

SLF 30 Hz - 300 Hz - LR signals to subs

ULF 300 Hz - 3 KHz - LR signals to subs

VLF 3 KHz - 30 KHz - LR signals, message traffic to subs (highly reliable)
- USN doesn’t use anything lower than VLF - other countries may use lower ones for their subs
- Backup in nuclear war
- Penetrates seawater

LF 30 KHz - 300 KHz - Fleet multi-channel broadcast system
- LORAN-C - legacy GPS system

MF 300 KHz - 3 MHz - AM radio (not typically used by Navy)
- Int’l distress frequencies

HF 3 MHz - 30 MHz - OTH, long-distance comms
- Link-11

VHF 30 MHz - 300 MHz - Line-of-sight or just beyond
- Bridge-to-bridge comms
- Ideal for amphibious operations
- Handheld radios

UHF 300 MHz - 3 GHz - LOS comms, tactical voice transmissions (maneuvering of ships traveling together)
- Link-11/16
- SATCOM
- Cellular comms
- CBSP

SHF 3 GHz - 30 GHz - SATCOM, most modern radars
- Workhorse of the Navy
- Non-OTH radars
- MILSTAR

EHF 30 GHz - 300 GHz - Used for experimental radars, SATCOM, most internet for ships
- Can get through nuclear fallout but not through rain
- LPI - Low probability of intercept
- LPD - Low probability of detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

107.5 Describe basic radar theory. [ref. d, ch. 1]

A

RADAR - Radio Detection and Ranging
o Electronic equipment that detects presence, direction, height, and distance of objects by using reflected EM energy
■ RF energy transmitted to object, reflects from object
* Small portion of energy is reflected and returns to radar set (echo)
* Radar uses echo to determine direction and distance of reflecting object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

108.1 Explain the following in Intelligence Doctrine, Organization, and Regulations:
a. Describe the general purpose of the following intelligence regulations and
guidance:
1. JP 2-0 [ref. a]
2. JP 2-01 [ref. b]
3. NWP 2-0 [ref. c]
4. NWP 2-01 [ref. d]
5. FICM [ref. e]

A

Doctrine, Organization, Regulations
1. JP 2-0 - Joint Intelligence
o Fundamental principles and guidance for joint and multinational intel activities across the range of military operations (ROMO)

  1. JP 2-01 Joint and National Intel Support to Military Operations
    o Doctrine for joint and national intel products, services, assessments, and support to joint military operations
  2. NWP 2-0 Naval Intelligence
    o Capstone doctrine for Navy intel community - intel support to naval operations
    ■ Overarching framework for further publications
  3. NWP 2-01 Intelligence Support to Naval Operations
    o Detailed intel support available to commander
    ■ Foundation for follow-on NTTPs
  4. FICM - Fleet Intelligence Collection Manual
    o Product of ONI
    o Single-source reference guide for how fleet should collect and report Intel
    ■ Standards for photography
    ■ Templates for reports (ex. IIRs)
    o Derived from NIPF (National Intelligence Priorities Framework)
    ■ Delineates whose priorities are what - Priority #s are assigned
    ■ Ensures that the IC and Congress/lawmakers are on the same page regarding
    priorities for U.S. intelligence
    ■ Used to determine assignment of collection assets
    * NIPF is tailored down to NIPOA, FICM, ONI COLOPs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

108.1
b. Discuss the role and responsibility of each of the following positions in the
Joint and Naval Intelligence Community:
1. Director of National Intelligence [ref. f]
2. J2, Joint Staff [ref. g]
3. Combatant Command/Joint Task Force J2 [ref. h, ch. 6]
4. Organization/Fleet N2 [ref. b, ch. 2]
5. Commander, Office of Naval Intelligence [ref. j]

A
  1. DNI - Director of National Intelligence
    o Currently: John Ratcliffe (Avril Haines has been tapped to be Biden administration’s
    nominee)
    o Principal advisor to POTUS/NSC/HSC about intelligence matters regarding national security
    o Head of 16-member Intelligence Community (IC)
    o Works with 2 budgets
    ■ National Intelligence Program (NIP) - $62 billion/year
    ■ Military Intelligence Program (MIP) - $20 billion/year
  2. J-2, Joint Staff
    o Currently: RADM Frank D. Whitworth
    o Person, but also a directorate (Directorate for Intelligence on Joint Staff)
    o Supports CJCS, SECDEF, Unified Commanders
    ■ Focal point for Unified Command intel requirements
  3. COCOM/JTF J2
    o Person and directorate
    o Responsible for supporting intel requirements within AO, validating RFIs, etc.
    o Provides priority intelligence requirements to Chief of Staff, identifies CCIRs to include PIRs, ensures intel fully integrated in plans and operations
  4. Organization/Fleet N2
    o Supports intel requirements within AOR
    o Responsible for supporting intel requirements of forces assigned for operations
    ■ COMSECONDFLT and COMTHIRDFLT have additional responsibility of preparing forces for deployment
    * CSG-4, CSG-15
  5. COMONI
    o Currently: RADM Kelly Aeschbach
    o Dual-hatted 2-star billet
    ■ COMONI — military
    ■ NMIO (National Maritime Integration Office) — civil maritime
    * Coordinates intelligence community for maritime purposes/focuses
    * Focused on littorals, working with State and Coast Guard
    o HQ at NMIC (National Maritime Intelligence Center) in Suitland, MD
    ■ Components include:
    * ONI
    * Marine Corps Intel Activity (MCIA)
    * Coast Guard Intelligence Coordination Center (ICC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

108.1
c. Identify and discuss the intelligence roles and responsibilities of the
following workcenters/organizations:
1. CVIC/JIC [ref. b, ch. 2]
2. SUPPLOT/EXPLOT [ref. b, ch. 2]
3. SSES [ref. b, ch. 2]
4. CVW/CPRW/Squadron [ref. b, ch. 2]
5. JOC/MOC; JIOC/MIOC [ref. k, ch. 4; ref. l, ch. 4]

A
  1. Carrier Intel Center/Joint Intel Center (CVIC/JIC)
    o Carrier/amphib hub of intelligence
    o Maintain comprehensive, current OPINTEL picture
    o Major sections:
    ■ Mission Planning (MP)
    ■ Multi-Sensor Interpretation (MSI)
    ■ Debriefing Area
    ■ Strike Intelligence Analysis Cell (SIAC)
    * Targeting Intelligence Cell (TIC)
    * Threat Analysis Cell (TAC)
    ■ SUPPLOT
    ■ Chart Vault Not physically located within CVIC
    ■ SSES
  2. Supplementary/Expeditionary Plot (SUPPLOT/EXPLOT)
    o Provide tactical I&W to warfare commanders
    ■ Intel support to CWC to help determine COAs
    o Fuse all-source OPINTEL information
    ■ Derived from organic and national assets
    o CTRs, CTTs, ISes
  3. Ship’s Signals Exploitation Space (SSES)
    o SIGINT space providing SIGINT I&W
    ■ Derive information/intelligence from SIGINT systems
    * Electronic signals/systems
    * Comms systems, radars, weapons systems
    o CTRs, CTIs, CTMs - permanent division with ship’s company personnel

4a. Carrier Air Wing (CVW)
o Air wing with several squadrons (VFA, VAW, etc.)
o CAG AI directs/supervises Mission Planning
■ Responsible for collection, preparation, dissemination of Intel material needed by CAG

4b. Patrol and Reconnaissance Group (CPRG)
o Command 3 Patrol and Reconnaissance Wings (CPRW)
■ Command various patrol squadrons/reconnaissance (VP, VQ)

  1. JOC = Joint Operations Center
    Maritime Operations Center (MOC)
    o NTTP 3-32.1
    o Plans, executes, assesses operational-level command and control
    o Coordinates CTFs, responsible for ordering larger-level fight (operations) and commanding theater-level war
    o Exists to streamline operational cycle
    o One at every COCOM
    ■ Support for operational-level commander, reachback support
    JIOC = Joint Intelligence Operations Center
    MIOC = Maritime Intelligence Operations Center
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

108.1
d. Discuss the specialty areas available to Intelligence Specialists: [ref. m]
1. 3910 – Naval Imagery Interpreter
2. 3912 – Expeditionary Warfare Intelligence Specialist
3. 3913 – Navy Tactical Counterintelligence Human Intelligence
Specialist
4. 3923 – Strike Planning Applications
5. 3924 – Operational Intelligence Analyst
6. 3927 – Advanced Strike and Tomahawk Land Attack Missile
Mensuration Analyst

A

Old NEC New NEC Title Description
3910 K10A Imagery Interpreter
* Interpret all-source imagery, FMV
* Provides BDA and accurate picture for OPINTEL

3912 K12A Expeditionary Warfare (now combined to make OPINTEL)
* Intel support to SOF, expeditionary warfare ops
* All-source fusion, mission planning, threat analysis

3913 K13A Navy Tactical Human Intel Specialist (HUMINT)
* Supervise, conduct tactical HUMINT collection ops
* Issues corresponding HUMINT reports

3923 K23A Strike Planning Ops
* Tactical and operational level
* Research, analysis, dissemination in support of strike ops
* Center of excellence in NAWDC (Fallon, NV)

3924 K24A OPINTEL Analyst (now combined to make OPINTEL)
* All-source analysis to provide I&W
* Ship’s company on CVNs/Amphibs

3927 K27A TLAM Mensuration/Advanced Strike
* Imagery-based mission planning products for use by TLAM
* Support Tomahawk Strike and Fleet Mission Planning Cells (TSMPC)

K37A	All-Source Intelligence Analyst - Intro to Cyber
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

108.1
e. Discuss the function and purpose of the following intelligence agencies:
[ref. b]
1. Office of the Director of National Intelligence
2. Open Source Center
3. Defense Intelligence Agency
4. National Reconnaissance Office
5. Central Intelligence Agency
6. National Geospatial-Intelligence Agency
7. National Security Agency/Central Security Services

A
  1. ODNI (Office of the Director of National Intelligence)
    o Program Manager: OSINT
    o Research reports, technical reports, working papers, unofficial government documents, discussion papers, dissertations, market surveys, etc.
    o Usually covers scientific, political, socioeconomic, military disciplines
    o Director: John Ratcliffe (Biden administration’s nominee is Avril Haines)
    o Oversees/directs implementation of National Intelligence Program (funding for IC)
    o Principal advisor to POTUS/NSC/HSC for intelligence matters
  2. CIA hosts Open Source Enterprise (OSE) - previously named Open Source Center
    * DNI is the program manager because CIA cannot have oversight of OSINT, despite hosting the OSE
    * Provides analysis of OSINT materials to IC agencies, including gray literature
  3. Defense Intelligence Agency (DIA) - Washington, D.C. (JBAB)
    o Program Manager: MASINT
    o Central producer and manager for military intelligence for DoD
    o Director: Gen. Robert P. Ashley, Jr.
  4. National Reconnaissance Office (NRO) - Chantilly, VA
    o Director: Christopher Scolese
    o Research and development, acquisition, launch, operation of satellites (“bus”)
    ■ Coordinates collection/analysis of information from plane and satellite reconnaissance by military services
  5. Central Intelligence Agency (CIA) - Langley, VA
    o Program Manager: HUMINT
    o Covert psychological, cyber, social warfare
    ■ Largest producer of all-source national security intel
    o Director: Gina Haspel
  6. National Geospatial Intelligence Agency (NGA) - Fort Belvoir, VA
    o Program Manager: GEOINT
    o Collect, analyze, distribute GEOINT (imagery, map-based solutions - “payload”)
    o Director: Vice Admiral Robert Sharp
  7. National Security Agency (NSA) - Fort Meade, MD
    o Program Manager: SIGINT
    o Lead cryptologic organization
    ■ SIGINT & Information Assurance products/services
    ■ Computer Network Operations (CNO)
    o NSA/CSS - Central Security Service
    ■ Timely/accurate cryptologic support and knowledge to military cryptologic activity
    o Director: Gen. Paul M. Nakasone
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

108.2 Intelligence Reporting and Dissemination:
a. Discuss the general purpose and originators of the following types of messages:
1. IIR [ref. n, Collections Operations]
2. SPOT Report [ref. n, Collections Operations]
3. LOCATOR [ref. al, Appendix A]
4. 9-Line report [ref. am, ch. 6]
5. TACREP [ref. n, Collections Operations]
6. INTSUM [ref. n, Collections Operations]
7. PURPLE [ref. ao, ch. 5]

A
  1. IIR - Intelligence Information Reports
    o HUMINT reports, report all HUMINT information in response to collection requirements
    ■ Referred to by Navy as Standard Human Intel Report (SHIR)
    o Submitted through/stored in HOTR/CHROME
    ■ HUMINT Online Tasking and Reporting
  2. SPOT Report
    o HUMINT report of imminent threat
    ■ Immediate/significant effect on current ops
  3. LOCATOR
    o Generated for routine and high interest contacts
    ■ Location of surface, subsurface, special interest units operating in a maritime environment
  4. 9-Line Report
    o Pass information in consistent, concise manner
    ■ No time for detail/limited comms
    o Standardized - each line has a specific meaning
    ■ Ex. “Line 6 - lat/long” (not a real example)
    ■ Used to call for CAS
  5. Tactical Report (TACREP)
    o TACREPs are derived from KLs to be pushed outside of SIGINT production chain
    ■ Urgent, perishable information of tactical significance
    ■ Sanitized to remove raw SIGINT
    ■ Sanitization from KL to TACREP does not necessarily always remove SI
    * TACREP could technically still be S//SI, TS//SI
    ■ On CSG, talk to CRC about sanitization process
  6. Intelligence Summary (INTSUM)
    o Brief summary of current enemy situation covering specific period of time
    ■ Enemy situations, ops, caps/lims
  7. Purple symbolizes all branches of the military, a combination of Army Green, Air Force Blue, Coast Guard Blue, Marine Red, and Navy Blue.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

108.2
b. Discuss the following databases of intelligence information:
1. SeaLink [ref. o]
2. OMAR [ref. p]
3. Open Source Center [ref. q]
4. HOT-R [ref. r]

A
  1. SEALINK
    o Database of merchant vessels maintained by ONI
  2. OMAR (OSSIM Mapping Archive)
    o Imagery database (used by K10As)
  3. Open Source Enterprise (formerly Open Source Center)
    o Database of OSINT final products
    ■ Textual translations, multimedia productions
    o Brokers/hosts OSINT products from other OSINT providers (ex. think tanks, schools, etc.)
  4. HOT-R (HUMINT Online Tasking and Reporting)
    o Now being replaced by CHROME - maintains/organizes all HUMINT reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

108.3 Intelligence Process:
a. Explain the steps of the intelligence process. [ref. b, ch. 3]

A

Intelligence Cycle (PCPADE)
1. Planning and Direction
o Commander’s Intent/Needs
■ Receive commander’s guidance, develop intel collection plan/priorities
■ PIRs
o Understand what our collection capabilities and limitations are
■ EEIs, EEFIs

  1. Collection
    o Using assets to fulfill collection requests
    o Gather raw information needed to produce finished intelligence
    ■ Imagery, P-8s, EP-3s, satellites, SIGINT, etc.
  2. Processing and Exploitation
    o Converting data into information for analytical use
    ■ K10A, BFCA, BFEA
  3. Analysis and Production
    o Fuse information into a coherent picture, put evaluated information in context to produce finished intelligence
    ■ Assessments, I&W
    ■ FIWOs/FIWAs
  4. Dissemination and Integration
    o Ensure finished analysis is received by the consumer in a timely manner
    ■ I&W TACREPs, briefs, etc.
  5. Evaluation and Feedback
    o Occurs throughout entire cycle, can come from anyone
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

108.3
b. Define the following disciplines: [ref. a, app. B; ref c, app D]
1. SIGINT
2. GEOINT
3. HUMINT
4. MASINT
5. ACINT
6. OSINT
7. TECHINT
8. Counterintelligence

A
  1. Signals Intelligence (SIGINT)
    o Electronic Intelligence (ELINT)
    ■ TECHELINT
    * Technical aspects of foreign non-communications emitters (signal characteristics, mods, functions, caps/lims, etc.)
    ■ OPELINT
    * Operationally relevant information of non-communications emitters (location, movement, employment, tactics, activity)
    o Communications Intelligence (COMINT)
    ■ Foreign communications
    * Can reveal who is sending information, from where, time and duration of emission, frequencies they are using to communicate
    * PROFORMA: Machine-to-machine communications
    ■ Internals
    * What was being said
    ■ Externals
    * Who said what, on what devices, etc.
    o Foreign Instrumentation Signals Intelligence (FISINT)
    ■ Collection of electromagnetic emissions related to testing/use of foreign systems (missiles, aircraft, UAVs, etc.)
    * Targets: Missile test ranges, space launches
    * Ex. Telemetry, video links
  2. Geospatial Intelligence (GEOINT)
    o Exploitation and analysis of imagery, imagery intelligence (IMINT), and geospatial information
  3. Human Intelligence (HUMINT)
    o Using human beings as sources and collectors
  4. Measurement and Signature Intelligence (MASINT)
    o Information obtained by quantitative/qualitative analysis of data derived from specific technical sensors for purpose of identifying any distinctive features associated with the source, emitter, or sender
    ■ Ex. nuclear testing, nuclear events
  5. Acoustic Intelligence (ACINT)
    o Acoustic phenomena - subdiscipline of MASINT
    ■ Broadband/narrowband analysis of acquired acoustic signatures from surface ships, subs, and aircraft
  6. Open Source Intelligence (OSINT)
    o Information of value that is publicly available
  7. Technical Intelligence (TECHINT)
    o Derived from collection, processing, analysis, and exploitation of information pertaining to foreign equipment and material
    ■ Ex. FARRAGUT at ONI
  8. Counterintelligence (CI)
    o Information gathered and activities conducted to protect against espionage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

108.3
c. Explain the National Intelligence Priorities Framework. [ref. s]

A

A classified national intelligence document used by the top planners of the United States Intelligence Community, such as the President of the United States and the Director of National Intelligence (DNI), that summarizes the United States’s intelligence gathering priorities

■ Delineates whose priorities are what - Priority #s are assigned
■ Ensures that the IC and Congress/lawmakers are on the same page regarding
priorities for U.S. intelligence
■ Used to determine assignment of collection assets
* NIPF is tailored down to NIPOA, FICM, ONI COLOPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

108.3
d. Explain the importance of Commander’s PIRs, their relationship to CCIRs,
and how they drive intelligence operations and collections. [ref. b, ch. 1]

A
  • Commander’s Critical Information Requirement (CCIR)
    o Information requirement identified by the commander as being critical to facilitating timely decision-making
    ■ Comprised of PIRs and EEIs/EEFIs
    o Ex. Threat to USN forces in C5F
  • Priority Intelligence Requirement (PIR)
    o Focused on the adversary and environment that may help answer CCIRs
    o Ex. Mining in the SOH
  • Essential Elements of Information (EEI)
    o Information requirements that are critical and answer PIRs (aka more specific PIRs)
    o Ex. Suspicious small boat activity in the SOH
  • Essential Elements of Friendly Information (EEFI)
    o What we do not want the enemy to know - blue force capabilities and limitations
    o Ex. CSG next port of call
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

108.3
e. Explain JIPOE, to include steps, purpose, and the information it provides to
the commander. [ref. t]

A
  • Develop cohesive understanding of the environment/adversary to enable operators to make more well-informed decisions
  • Continuous process through which J-2 manages the analysis and development of products
    o Held commander and staff understand the complex and interconnected operational environment
    ■ Composite of the conditions, circumstances, influences that affect employment of capabilities

Steps:
1. Define the Operational Environment
2. Describe the impact of the Operational Environment
3. Evaluate the Adversary
4. Determine Adversary Courses of Action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

108.3
f. Name the five standards of analytic tradecraft. [ref. u]

A
  • Objective
  • Timely
  • Independent of political considerations
  • All-source
  • Implement and exhibit analytic tradecraft standards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

108.4 ISR Platforms:
a. Discuss the following naval platforms/systems, including intelligence
collection discipline(s) supported:
1. EA-18G Growler [refs. v, w]
2. EA-6B Prowler [refs. v, w]
3. E2-C Hawkeye [refs. v, w]
4. E2-D Advanced Hawkeye [refs. v, w]
5. P-3C Orion [refs. v, w]
6. EP-3E [refs.v, w]
8. P-8A Poseidon/Multi-mission Maritime Aircraft [refs. v, w]
9. MQ-4C Triton [refs. y]
10. SURTASS [ref. al, chs. 1, 2]
11. Fixed IUSS sensors [ref. am, ch. 1, ref. an]
12. RQ-8A/MQ-8B FIRESCOUT [ref. v, RQ-8A, MQ-8B Page]
13. SQQ-89 [ref. i, ch. 2]

A
  1. EA-18G GROWLER
    o Electronic Warfare
    ■ EA jamming
    ■ Fly ahead of fighters/bombers to jam anti-aircraft radars
  2. EA-6B Prowler - retired
    -EA attack

3/4. E-2C/D HAWKEYE
o Airborne Early Warning (AEW), C2
■ 3 primary sensors
* Radar, IFF, passive detection system
■ D variant has new avionics suite
* AN/APY-9 radar
* Glass cockpit

  1. P-3C ORION
    o ASW ISR
    ■ “Tail stinger” to magnetically detect subs
    o Replaced by P-8
  2. EP-3E ARIES II
    o Electronic Support, SIGINT
    ■ Fixed-wing
    ■ Receivers, antennas, computers, recording devices
  3. P-8A POSEIDON
    o ASW/ASUW ISR
    ■ Sonobuoys, depth charges, Harpoon anti-ship missiles
    ■ Designed to operate in conjunction with MQ-4
  4. MQ-4C TRITON
    o BAMS (Broad Area Maritime Surveillance) UAV
    o Conduct maritime ISR, owned at theater-level
    ■ Complement P-8, can also do SAR missions
  5. SURTASS (Surveillance Towed Array Sensor System)
    o Towed array sonar system - “ship’s tail” - for ASW
    ■ Detect subs, seismic signals
    o System of hydrophones towed on cable behind ship or sub
    ■ Can be kilometers long (to keep away from own ship’s noise emitters)
  6. Fixed Integrated Undersea Surveillance System (IUSS) Sensors
    o Permanently fixed to ocean floor, provide tactical cueing to ASW forces
    o Detect subs
    o Collect acoustic, hydrographic information
  7. RQ-8A/MQ-8B FIRESCOUT
    o Unmanned autonomous helicopter
    o Provide ISR, targeting/fire support to ground, air, sea forces
  8. SQQ-89
    o ASW system for surface ships
    ■ Active and passive sensor data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

108.4
b. Explain National Technical Means, purpose, capabilities, and limitations.
[ref. z]

A

NTM - National Technical Means (satellites)
o GEOINT, telemetry, space-based IR sensors, space-based nuclear energy detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

108.5 Intelligence Support to Operations:
a. Discuss how intelligence supports the following Warfare Commanders:
[ref. aa]
1. Surface Warfare Commander
2. Anti-Submarine Warfare Commander
3. Air Defense Commander
4. Strike Warfare Commander
5. Information Warfare Commander

A
  • Surface Warfare Commander (S)
    o Current/potential threats to surface units
    o IDIS (Independent Duty Intelligence Specialist) on small boys
  • Anti-Sub/Undersea Warfare Commander (X)
    o Current/potential undersea threats
  • Air Defense Commander (W)
    o Airborne threats to CSG
    ■ Aircraft, radars from ASCM/CDCMs/SAMs, missiles
  • Strike Warfare Commander (P)
    o Threats to CAG platforms/personnel
    o Support operational mission planning, targeting process
  • Information Warfare Commander (Q)
    o Meet/inform IWC priorities
    o Fuse intelligence with all IWC disciplines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

108.5
b. Discuss how intelligence supports the following mission areas:
1. Amphibious Operations [ref. ab]
2. Coastal Riverine Operations [ref. ac]
3. Construction Forces [ref. ad]
4. Cyberspace Operations [ref. ae]
5. Explosive Ordnance Disposal Operations [ref. af]
6. Humanitarian Assistance/Disaster Relief [ref. ag]
7. Information Operations [ref. ah]
8. Undersea Warfare / TASW [ref. ap]
8. Mine Warfare [ref. ai, ch. 4]
9. Naval Special Warfare [ref. aj]
10. Littoral Operations [ref. ak]
11. Non-Combatant Evacuation Operations [ref. al]

A

Provide intel on what locations are safe, contested, etc.

What types of forces may be encountered and TTPs (tactics, techniques and procedures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

108.5
c. Explain FORMICA. [ref. x]

A

FORMICA involves the debriefing, by trained and certified Department of Defense human intelligence (HUMINT) collectors, of all DoD personnel who have access to information of potential foreign intelligence value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

109.1 Information Operations Doctrine, Organization, and Regulations:
a. Define and describe the functions of the following organizations:
1. NIOC/NIOD [ref. a, ch. 4]
2. FIOC [ref. a, ch. 4]
3. NCDOC [ref. b, ch. 3]
4. NSW SRT-1, SRT-2 [ref. d, ch. 1]
5. ETIOS [ref. a, ch. 4]
6. U.S. Marine Corps Radio Battalion [ref. a, ch. 4]
7. U.S. Coast Guard Tactical Cryptologic Element [ref. a, ch. 4]

A
  1. Naval Information Operations Command (NIOC)
    o Commands with CW (1810) personnel to provide SIGINT/IO expertise
    o Collocated with NSA/CSS components (NSA mission)
    ■ Ex. NIOC HI is collocated with NSA/CSS HI who are doing NSA missions, but often work closely with NIOC HI
  2. Fleet Information Operations Center (FIOC)
    o 24/7 watchfloor for NIOC
    ■ AOR-focused
    o Signals Analysis Labs (SALs) analyze unfamiliar signals at the theater level
  3. Navy Cyber Defense Operations Command (NCDOC) - Suffolk, VA
    o Defense of Navy’s computer networks, systems, telecomms
    ■ CTF 1020
    ■ CND operations
    ■ 24/7 watch @ NCDOC MOC
  4. Naval Special Warfare - Special Reconaissance Team 1/2
    -specializing in cyberwarfare; electronic warfare; and intelligence, surveillance, and reconnaissance.
    -GWOT showcased the need for dedicated intelligence-gathering units that could funnel actionable intelligence and targets to SEAL platoons.
  5. Expeditionary Tactical Information Operations Support (ETIOS)
    o Deployable 3-man enlisted teams
    ■ Conduct tactical SIGINT/EW collection, processing, analysis to support deployed expeditionary forces
  6. US Marine Corps Radio Battalion (RADBN)
    o Subordinate command of MAGTF command element - tactical SIGINT, EW, COMSEC in support of MAGTF
    ■ MAGTF commander has SOTA over RADBN units operating as part of a naval task group/force, regardless of sea/shore
  7. Coast Guard Cryptologic Group (CGCG)
    o SIGINT to support Coast Guard/DHS missions
78
Q

109.1 Information Operations Doctrine, Organization, and Regulations: (Cont’d)
b. Describe the purpose of the following Navy-wide OPTASKs: [ref. a, ch. 3]
1. IO
2. Cryptology
3. Electronic Warfare

A
  1. OPTASK IO - core capabilities of CNO, EW, MILDEC, OPSEC, PSYOPS
  2. OPTASK CRYPTOLOGY - guidance for units conducting cryptologic operations
  3. Electronic Warfare - Impede/exploit the enemy’s use of the EM spectrum while
    protecting/enhancing own force spectrum use
    o ES, EA, EP
    -ES - electronic support - immediate defense/immediate response
    -EA - electronic attack - attack enemy with directed energy
    -EP - electronic protection - protect friendly from enemy EA
79
Q

109.1
c. Define and describe the duties and responsibilities of the following tactical organizational positions:
1. IWC [ref. a, ch. 2]
2. DIWC [ref. a, ch. 2]
3. CRC [ref. a, ch. 2]
4. ACRC [ref. a, ch. 2]
5. SSES Division Officer/SIGWO/TIWO [ref. a, ch. 2]
6. EWO [ref. e, ch. 4]
7. Special Evaluator (SPECEVAL) [ref. a, ch. 2]
8. DIRSUP (Subsurface) [ref. a, ch. 2]
9. TIO [ref. a, ch. 2]
10. Mission Commander (ref. o, Annex E)

A
  1. IWC - Information Warfare Commander
    o Responsible to CWC to develop/execute IO plans
    o Controls all force emitters, information, info systems
    ■ Execute EMCON & INFOCON
    ■ Disseminate tactically relevant IW information to force
  2. DIWC - Deputy Information Warfare Commander
    o Executes IWC’s plans
    o Now the most senior O-5, or an O-5 picked by the IWC
  3. CRC - Cryptologic Resource Coordinator
    o Directs/coordinates all aspects of afloat cryptologic operations
    o Implements Cryptologic Coverage Plan (CCP)
    ■ Detailed guidance outlining collection, exploitation, processing, production, dissemination - should be aligned with commander’s intent and PIRs
  4. ACRC - Assistant Cryptologic Resource Coordinator
    o Chief
    o Helps write CCP
    o Responsible for DIRSUP CT personnel

5a. SSES DIVO
o Responsible for ship’s company CTs, SSES operations/systems

5b. SIGWO - Signals Warfare Officer
o More SIGINT-focused

  1. EWO - Electronic Warfare Officer
    o Principal EW planner - on all EW-capable ships
  2. Special Evaluator
    o Onboard to evaluate DIRSUP personnel during workups
  3. TIO - Tactical Information Operations Officer
    o Cryptologic Warfare Officer at an SRT
  4. Mission Commander
    o Lead for NMTs/CPTs/CMTs
80
Q

109.1
d. Discuss the roles and responsibilities of the following Navy Enlisted ratings:
[ref. f]
1. CTI
2. CTM
3. CTN
4. CTR
5. CTT

A
  1. CTI (Interpretive)
    o Linguists - training at DLI (SIGINT/COMINT)
  2. CTM (Maintenance)
    o Installation, configuration, diagnosis, maintain, repair of cryptologic systems
    o PCS’ed to ships or supplied by FES
    o Maintain SLQ-32, CCOP systems
  3. CTN (Networks)
    o Computer Network Defense (CND), Cyber
    ■ Blue/Red teams
    ■ NCDOC
  4. CTR (Collection)
    o Use SSEE Inc E/F, CCOP (SIGINT/COMINT)
    o Collection, analysis, reporting on communications signals
    ■ BFCA in SUPPLOT
  5. CTT (Technical)
    o ELINT receiving/direction finding systems (EW)
    o PCS’ed to ship
    ■ BFEA in SUPPLOT, SLQ-32 operators in EW MOD
81
Q

109.2 Define and discuss the following Information-Related Capabilities: [ref. c, ch. 3]
a. EW
b. Cyberspace Operations
c. MISO
d. MILDEC
e. OPSEC
f. PA
g. Civil-military operations
h. Defense support to public diplomacy
i. Physical (lethal) attack
j. IA
k. Physical Security
l. Combat Camera (visual information)
m. Intelligence
n. Counterintelligence

A

a. Electronic Warfare - Impede/exploit the enemy’s use of the EM spectrum while
protecting/enhancing own force spectrum use
o ES, EA, EP

b. Cyber (Computer Network Operations)
o OCO (Offensive Cyber Operations)
o DCO-RA (Defensive Cyber Operations-Response Action)
o DCO-IDM (Defensive Cyber Operations-Internal Defensive Measures)
o CNE (Computer Network Exploitation)
■ Using networks for intel- gathering purposes (passively listening/collecting)

c. Military Information Support Operations (MISO)
o Previously known as PSYOPS
o Influence foreign audiences - “hearts and minds” - and subsequent behaviors as part of approved programs supporting USG policy/mil objectives

d. Military Deception (MILDEC)
o Deliberately mislead adversary military decision-makers
■ Encourage them to take specific actions (or inaction)
■ Complementary to OPSEC
* MILDEC seeks to encourage incorrect analysis
* OPSEC seeks to deny real/correct information to prevent correct deduction of blue plans

e. Operational Security (OPSEC)
o Systematic process identifying generally unclassified but critical information about mission, operations, or activity
o RIVER CITY controls outgoing paths from ships and shore systems
■ OPSEC tool limiting comms

f. Physical Attack
o Kinetic, destructive power

g. Civil-Military Operations
o Relations between military/government forces and civilian populace

h. Defense Support to Public Diplomacy (DSPD)
o Support public diplomacy efforts of USG

i. same as f.

j. Information Assurance (IA)
o Measures to protect/defend information
o CIANA - Confidentiality, Integrity, Authentication, Non-repudiation, Availability

k. Physical Security - Physical measures to safeguard personnel, prevent unauthorized access

l. Combat Camera
o Imagery capabilities for operational/planning requirements
■ SNOOPIE (Ship’s Nautical or Otherwise Photographic Interpretation and
Exploitation)

m. Intelligence refers to processed, evaluated and perspective-driven data that is gathered from trusted sources

n. activities designed to prevent or thwart spying, intelligence gathering, and sabotage by an enemy or other foreign entity

82
Q

109.3 Electronic Warfare:
a. State the objectives of EW. [ref. e, ch. 1]

A

Impede/exploit the enemy’s use of the EM spectrum while protecting/enhancing own use
o Pros of Emitter Use: Better situational awareness
o Cons of Emitter Use: Leaves us more vulnerable to adversary capabilities/threats

83
Q

109.3
b. Define and discuss the following terms:
1. ES [ref. e, chs. 2, 3]
2. EA [ref. e, chs. 2, 3]
3. EP [ref. e, chs. 2, 3]
4. EMI [ref. e, ch. 3]
5. ASMD [ref. h, ch. 2]
6. ZIPPO [ref. e, ch. 6]
7. CTTG [ref. e, ch. 3]
8. JRFL [ref. e, ch. 3]
9. HULTEC/SEI [ref. e, app. B]
10. Technical ELINT [ref. f, ch. 1]
11. Operational ELINT [ref. f, ch. 1]

A
    • Electronic Support (ES)
      o Actions tasked to search for/intercept/identify/locate/localize radiated EM energy for purposes of immediate threat recognition
    • Electronic Attack (EA)
      o Use of EM energy, directed energy, anti-radiation weapons to attack personnel/facilities/equipment
      ■ Intent of degrading/neutralizing/destroying enemy combat capabilities
    • Electronic Protection (EP)
      o Passive/active means to protect from any effects of friendly or enemy employment of EW
    • Electronic Magnetic Interference (EMI)
      o Functional EMI - systems designed to generate EM energy
      ■ Create interference as a normal result of EM operations (unintentional or intentional)
      • Ex. Radar
        o Incidental EMI - manmade sources not designed to generate EM energy (but still create interference)
        ■ Ex. Power lines, motors, switches
    • Anti-Ship Missile Defense (ASMD)
      o Countersurveillance (CSV) against full range of adversary ISR capabilities
      ■ Avoid/delay detection, identification, localization
      o Countertargeting (CTTG) against potential launch platforms
      ■ Deny/degrade ability to target friendly units
      • Obscuration, false-threat generation, confusion
        o Countermissile (CM) activities against missiles in flight
  1. ZIPPO o Predefined list of actions used to help determine sequence of reactions to take against threat
  2. CTTG - Countertargeting (see #5)
  3. JRFL (Joint Restricted Frequency List)
    o Time and geographically oriented listing of taboo, protected, guarded functions, nets, frequencies
    • HULTEC/SEI
      o CTTs in EW MOD/SUPPLOT/CASE observe slight variations in radar frequencies
      o HULTEC (Hull-to-Emitter Correlation)
      ■ Various parameter measurements correlated to provide specific platform identification (ex. specific radar on x class of vessel)
      o SEI (Specific Emitter Identification)
      ■ Correlates to specific vessel using the specific radar signature - UMOP (Unintended Modulation on Pulse - results in specific radar signature, creates specific radar “fingerprint”)
    • TECHELINT (Technical ELINT)
      o Technical aspects of foreign non-comms emitters
      ■ Ex. Signals characteristics, modes, functions, associations, caps/lims
    • OPELINT (Operational ELINT)
      o Operationally relevant information of foreign non-comms emitters
      ■ Location, movement, tactics, activity
84
Q

109.3 Electronic Warfare: (Cont’d)
c. Describe the similarities and differences between ES and ELINT and describe the role ELINT plays in Cryptologic operations and Electronic Warfare. [ref. a, chs.1, 3]

A

■ ES vs. ELINT: ES is for defense/immediate response, while ELINT systems tend to collect signals for future exploitation. Subtle difference, but ability of ES systems to automatically cue a response (either a countermeasure or an additional degree of signal processing) usually differentiates them from ELINT collection systems.

85
Q

109.3
d. Discuss the functions of the EW module. [ref. h, ch. 4]

A
  • EW MOD (EW Module)
    o On every ship in CSG, CVN/DDG/CG
    o Anti-ship missile defense (ASMD) using the SLQ-32
86
Q

109.3
e. Discuss the purpose and function of REGS. [ref. h, ch. 4]

A
  • REGS (Rapid Emitter Evaluation Guidelines)
    o Used by operators (CTTs) to review a radar’s parameters to quickly estimate its probable function - quick guidelines for CTTs to analyze wavetops of whatever emitter/radar to determine if it is a threat
87
Q

109.3
f. Discuss the following EW voice reports: [ref. e]
1. Racket Report [ch. 6]
2. Volcano Report [ch. 6]
3. Vampire Report [ch. 6]
4. Cease/Stop Buzzer [ch. 3]

A
    • Racket
      o Report of all unknown/unfriendly emitters with frequency/true bearing of emitter
      ■ Signals of interest reported on a time interval (ex. 15, 30 min)
    • Volcano
      o Missile emergency report of active radar seeker
      • EW MOD is receiving/listening for their radar in EW MOD
    • Vampire
      o Radar detection (could be passive) warning from EW MOD - we see it on our radar
      ■ Could also be something that isn’t easily
      detected as well
    • Cease/Stop Buzzer
      o Terminate EA activities (might be interfering with EW MOD functions)
88
Q

109.3
g. Discuss the following types of radar: [ref. e, app. A]
1. Surface search
2. Air search
3. Height-finding search
4. Fire control
5. Missile guidance

A
    • Surface-Search Radar
      o Detection/determination of accurate ranges and bearings of surface objects and low- flying aircraft
      o 360 degree search for all objects within LOS distance
    • Air Search
      o Detect/determine position, course, speed of air targets in a relatively large area
    • Height-Finding Search
      o Computing accurate ranges, bearings, altitudes of aircraft targets
      ■ More accurate range/bearing/altitude of targets detected by air search radars
    • Fire Control
      o Continuous positional data on a target - precursor to launching a missile
    • Missile Guidance
      o Guide missile to hostile target
89
Q

109.3
h. Explain the advantages and disadvantages of emitter use. [ref. e, ch. 7]

A

o Pros of Emitter Use: Better situational awareness
o Cons of Emitter Use: Leaves us more vulnerable to adversary capabilities/threats

90
Q

109.3 Electronic Warfare: (Cont’d)
i. Discuss the following emission conditions and their impact to operations:
[ref. g, sec. e1.4]
1. EMCON A
2. EMCON A1
3. EMCON A2
4. EMCON B
5. EMCON B1
6 EMCOM B2
7. EMCON C
8. EMCON D

A

EMCON
* Management of EM and acoustic missions to prevent enemy from detecting, identifying, and locating friendly forces

  • EMCON A - more restrictive
  • EMCON A1
  • EMCON B
  • EMCON C
  • EMCON D - least restrictive
91
Q

109.3
j. Discuss TACSITs: [ref. g, sec. c4.1]
1. TACSIT I
2. TACSIT II
3. TACSIT III

A

Our assessment of how good of a position the enemy has on us

1 – Forces located and targeted
2 – Force location known, disposition unknown
3 – Forces not located

92
Q

109.3
k. Discuss Counter-ISR as it relates to EMCON and TACSIT. [ref. g, sec. c4]

A

We want to reduce EM footprint as much as possible so that enemy cannot obtain a good TACSIT on our forces

93
Q

109.3
l. Discuss the following EA terms: [ref. e]
1. Electromagnetic jamming [ch. 2]
2. Electromagnetic deception [ch. 2]
3. Comms EA [ch. 3]

A
  1. ■ EM Jamming:
    * Deliberate radiation, re-radiation, reflection of EM energy
    o Degrade/neutralize enemy’s combat capability
  2. ■ EM Deception:
    * Use of EM energy in a manner intended to convey misleading information to enemy or enemy EM-dependent weapons
    o Inject false signals to make them think we’re someone/somewhere we’re not
    * Manipulative - eliminate revealing, convey misleading, EM tell-tale indicators
    * Simulative - simulate friendly, notional, actual capabilities to mislead hostile forces
    * Imitative - introduce EM energy into adversary systems that imitates adversary emissions

■ Comms EA:
* Degrade/deny/deceive adversary’s C4ISR systems (ex. voice channels)

94
Q

109.4 Define and discuss tactical MILDEC methods to include: [ref. j, ch. 3]
a. Acoustic
b. Visual
c. Radar
d. Communications

A
  1. o Acoustic
    ■ Use of sound waves to simulate or conceal forces or movement (in air or underwater)
    * Ex. Indicating movement of troops to persuade adversaries to seek cover
  2. o Visual
    ■ Sense of sight (human observers and electro-optical systems)
    * Ex. Renumbering a ship, decoys
  3. o Radar
    ■ Deliberate radiation, re-radiation, reflection, and absorption of radar signals to mislead enemy in interpretating data presented by radar indicators/systems
    * Ex. Providing false radar returns/injects, altering position of supposed contacts
  4. o Communications
    ■ Transmission, retransmission, alteration of comms to mislead adversary’s
    interpretation of the comms
    * Ex. Broadcasting unencrypted false radio transmissions to misguide adversary forces
95
Q

109.5 Military Information Support Operations:
a. Define and discuss MISO. [ref. k, ch. 2]

A
  • Military Information Support Operations (MISO)
    o Previously known as PSYOPS
    o Influence foreign audiences - “hearts and minds” - and subsequent behaviors as part of approved programs supporting USG policy/mil objectives

o During armed conflict ➔ POTUS/SECDEF through CJCS issues specific MISO policy to unified commands
■ CJCSI 3110.05C - guidance to military commanders conducting MISO in a joint environment

96
Q

109.5
b. Discuss the following MISO media products and the advantages/
disadvantages of each: [ref. k, ch. 3]
1. Visual
2. Print
3. Audio

A

Visual
Video, allied- managed TV
pro - Effective in reaching public
con - Signals can be jammed, distribution limited

Print
Pamphlets, leaflets, printed media
pro - Wider distribution
con - Must be viewed/read for full effect, literacy

Audio
Recorded messages, loudspeakers
pro - Can be culturally significant, easier to understand
con - Must be within hearing distance, need accurate interpretation

97
Q

109.5
c. Explain the difference between MISO and Public Affairs. [ref. k, ch. 2]

A

similar would be:
MISO: Win over Pepsi customers if you are Coke.
PA: Tell your current customers how great you are

MISO v. Public Affairs v. MILDEC

MISO - Influence attitudes/opinions/behavior of foreign target audience

PA - Provide information concerning DoD activities to domestic/friendly audiences

MILDEC - Deceptive purposes to sway adversary officials/decisionmaking

98
Q

109.5
d. Discuss the relationship among maritime influence, IO, Public Affairs, and communication synchronization. [ref. k, Executive Summary, chs. 1, 2, 4, 6]

A

All try to influence the public to view us favorably

IO v. PA v. Strategic Communications
IO Integrated employment of core capabilities of EW/CNO/MISO/MILDEC/OPSEC to influence, corrupt, or usurp adversarial decision-making while protecting our own

PA Public/command info, community relations for both external and internal publics

COMMSTRAT Focused USG efforts to understand/engage key audiences to create favorable conditions for USG

99
Q

109.5
e. Define and discuss the following MISO organizations: [ref. k]
1. CDRUSSOCOM [ch. 2]
2. JMISTF [ch. 3]

A
  1. o CDRUSSOCOM (Commander, U.S. Special Operations Command) designated as joint proponent for MISO across DoD
    ■ Prepares/provides MISO forces to other CCDRs/USG lead agencies
    • Joint Military Information Support Task Force (JMISTF)
      o Develop strategic, operational, tactical MISO plans for theater campaign
      ■ Subordinate joint command of joint force
100
Q

109.6 Cyberspace Operations:
a. Define and describe the functions of the following organizations:
1. USCC [ref. l, ch. 3]
2. FCC/C10F [ref. o]
3. CNMF-HQ [ref. o]
4. JFHQ-Cyber [ref. o]
5. JFHQ-DoDIN [ref. o, Annex X]
6. NMT [ref. o, Annex D]
7. NST [ref. o, Annex D]
8. CMT [ref. o, Annex E]
9. CST [ref. o, Annex F]
10. CPT [ref. o, Annex G]

A
    • USCYBERCOM
      o Dual-hatted with DIRNSA - Gen. Paul Nakasone
      ■ Prepares to conduct full spectrum of military cyberspace operations
      ■ Directs ops/defense of DoD information networks

2.* FCC/C10F
o Dual-hatted - VADM Ross Meyers
o FCC - U.S. Fleet Cyber Command
■ Navy service component to CYBERCOM
■ Report directly to CNO as Ech. II command
o C10 - Commander, U.S. 10th Fleet
■ Operational arm of FCC
■ Operational direction through CWAs/CWMAs

3.* CNMF-HQ (Cyber National Mission Force)
o Defense of cyberspace through DCO-RA missions (operational)
■ When directed, employ national CPTs on DCO-IDM missions focused on internal threats to critical blue cyberspace outside DoDIN

    • JFHQ-C (Joint Force Headquarters - Cyberspace)
      o Analyze, plan, execute cyber operations missions in support of CCDRs
    • JFHQ-DODIN (Joint Force Headquarters - DoD Information Network)
      o Operational-level global DODIN ops and DCO-IDM missions
      ■ Support CCDRs for theater/functional DODIN operations and DCO-IDM

6.* NMT (National Mission Teams)
o DCO-RA
o Located at NSA sites

    • NST (National Support Teams)
      o Develop tools used by NMTs (CTNs, Its, CWEs located at NCWDG)

8.* CMT (Combat Mission Teams)
o Located at COCOMs
o OCO

9.* CST (Cyber Support Teams)
o Develop tools used by CMTs

10.* CPT (Cyber Protection Teams)
o DCO-IDM
o Can be national, command, Navy, or DODIN

101
Q

109.6
b. Define the following: [ref. l]
1. CO [ch. 1]
2. DCO [ch. 2]
3. DCO-Response Action [ch. 2]
4. OCO [ch. 2]
5. DODIN OPS [ch. 2]
6. Cyberspace Actions [ch. 2]
7. Computer Network Defense-in-Depth [ch. 4]

A

DCO vs OCO
IDM I’m going to board up my house
RA I’m going to go to your house and take away your guns
OCO I’m going to kill you

  • CNO - Employment of cyberspace capabilities to achieve objectives in or through cyberspace
    o Computer Network Attack (CNA) ➔ OCO
    o Computer Network Defense (CND) ➔ DCO
    o Computer Network Exploitation
  • Defensive Cyber Operations (DCO)
    o Executed to defend DODIN/other cyberspace from active threats
    ■ Preserve ability to use blue cyberspace capabilities, protect blue cyberspace by defeating ongoing or imminent malicious cyberspace activity/inside threats

o DCO-RA (Response Action)
■ Conducted by National Mission Teams (NMTs)
■ Gray space - boundary between our networks and red space

o DCO-IDM (Internal Defensive Measures)
■ Conducted by Cyber Protection Teams (CPTs)
■ Blue space - defend our networks
* Intrusion detection systems, getting people out of our networks
* Conducted within DODIN, respond to unauthorized activity or alerts in DODIN

  • Offensive Cyber Operations (OCO)
    o Conducted by Combat Mission Teams (CMTs)
    ■ Located at COCOMs - only ones who do OCO
    ■ Red space - to harm enemy - foreign cyberspace
    o Destroy, degrade, disrupt network infrastructure or enemy’s ability to use cyberspace
    o CCDRs authorized within respective AOR when part of SECDEF approved ops
  • Computer Network Exploitation (CNE)
    o Using target or adversary automated information systems and networks for intel- gathering purposes (passively listening/collecting, not modifying or destroying data)
  • Computer Network Defense-in-Depth
    o Recognizing that DCO, IA, INFOSEC, etc. all comes together for a multi-layered solution to defend our networks - every piece is important!
102
Q

109.6
c. Describe the differences and similarities between IA and DCO.
[ref. b, ch. 4]

A

IA v. DCO
IA Protect/defend info systems by ensuring CIANA and providing for restoration of info systems

DCO Protect/monitor/analyze/detect/respond to unauthorized activity within DoD info systems and networks

103
Q

109.6
d. Define and discuss the following computer network vulnerability assessment terms:
1. Blue team [ref. b, ch. 4]
2. Red team [ref. b, ch. 4]
3. CSICP Stage I, II and III [ref. y, ch. 3]

A
    • Blue Team
      o Plans/executes vulnerability assessments, surveys, network security/remediation training
      ■ Provide special technical expertise to system/security administrators
    • Red Team
      o Independent threat-based activity aimed at readiness improvements
      ■ Simulation of an opposing force (OPFOR)
    • CSICP Stage I, II, III (cyber security inspection and certification program)
      o I (Administrative Review) - 1-2 day review conducted by ISIC, internal review
      o II (Unit Level TAV) - 5-day review of Stage 1 by Ech. II commands, plus additional in- depth assessment of network security, physical security, etc.
      o III - 5-day comprehensive graded inspection conducted by FLTCYBERCOM
104
Q

109.7 Operations Security:
a. Define and discuss OPSEC. [ref. n, ch. 2]

A

o Systematic process identifying generally unclassified but critical information about mission, operations, or activity

105
Q

109.7
b. Discuss the five steps of the OPSEC planning process. [ref. n, ch. 3]

A

Identify Critical Information Answers to EEFI (ex. What units will rotate? When will it deploy? When/where is a port call?)

Threat Assessment/ Analysis Identify threat, collection capabilities and techniques

Vulnerability Analysis Look at own observable actions/indicators/information vulnerable to collection and determine protective measures to reduce vulnerability

Risk Assessment Identify best OPSEC measures

Measures/ Countermeasures Apply appropriate measures, incorporate into future plans

106
Q

109.7
c. Define and describe the OPSEC roles, responsibilities and support provided by each of the following:
1. Navy OPSEC Support Team [ref. n, ch. 4]
2. IOSS [ref. n, ch. 4]
3. JCMA [ref. a, ch. 2]

A

o Navy OPSEC Support Team (NOST)
■ Located at NIOC Norfolk to provide OPSEC support throughout USN/USMC
* Conduct OPSEC, social networking, web risk assessments

o Interagency OPSEC Support Staff (IOSS)
■ Includes FBI, CIA, DoE, DoD - support national OPSEC program

o JCMA (Joint COMSEC Monitoring Activity)
■ CJCS-sponsored joint service activity of NSA
* Conduct COMSEC monitoring of DoD telecommunications

107
Q

109.7
d. Describe the purpose and service provided by the OPSEC Red Team Vulnerability Assessment process. [ref. n, ch. 7]

A

o OPSEC Red Team Vulnerability Assessment
■ Red Team exercise commences upon arrival of RT officer/ops chief
■ Phase I - Discovery and Mapping
* Thorough search for information about target in open source
■ Phase II - Identifying Vulnerabilities/Risk Mitigation
* Apply assessment tools to identify computer system security vulnerabilities
■ Phase III - Exploitation/Attack
* Red Team officer/ops chief reviews logs/data to gather a list of potential targets

108
Q

109.7
e. Discuss Department of the Navy web site restrictions. [ref. p]

A
109
Q

109.7
f. Describe the purpose of River City. [ref. n, ch. 3]

A

o RIVER CITY controls outgoing paths from ships and shore systems
■ OPSEC tool limiting comms
■ Ex. Man overboard/suicide, COVID outbreak

110
Q

109.8 Signals Intelligence:
a. Define and discuss SIGINT to include the following: [ref. a, ch. 1]
1. COMINT
2. ELINT
3. FISINT
4. PROFORMA

A

o Communications Intelligence (COMINT)
■ Foreign communications
* Can reveal who is sending information, from where, time and duration of emission, frequencies they are using to communicate
* PROFORMA: Machine-to-machine communications
■ Internals
* What was being said
■ Externals
* Who said what, on what devices, etc.

o Electronic Intelligence (ELINT)
■ TECHELINT
* Technical aspects of foreign non-communications emitters (signal characteristics, mods, functions, caps/lims, etc.)
■ OPELINT
* Operationally relevant information of non-communications emitters (location, movement, employment, tactics, activity)

o Foreign Instrumentation Signals Intelligence (FISINT)
■ Collection of electromagnetic emissions related to testing/use of foreign systems (missiles, aircraft, UAVs, etc.)
* Targets: Missile test ranges, space launches
* Ex. Telemetry, video links

  • PROFORMA: Machine-to-machine communications
111
Q

109.8
b. Discuss the following SIGINT analysis and production functions:
[ref. a, fig. 4-7]
1. Traffic analysis
2. Cryptanalysis
3. Linguistic analysis
4. Signals analysis
5. ELINT analysis

A
  • Traffic Analysis
    o Deduce information from patterns in communications - nodal analysis
  • Cryptanalysis
    o Knowledge of cryptologic systems (codes, COMSEC)
  • Linguistic Analysis
    o Scientific study of human language
  • Signals Analysis
    o Derive intel from foreign signals
  • ELINT Analysis
    o Assess techniques, signals, equipment in connection with radar
112
Q

109.8
c. Describe a CRITIC, identify the different types of CRITIC and provide examples of CRITIC information. [ref. a, ch. 3; ref. x]

A

CRITIC
* Written by SSES on ship
* FLASH precedent message
* CRITIC reporting system is the communications infrastructure providing for rapid dissemination of CRITICs, DIRNSA has OPCON
o Info is raw/unevaluated, may be unclassified or classified

o Initial message is followed by amplifying messages as necessary, and a close out/cancellation message
* Purposes:
o Get everyone to look at problem, get critical information to POTUS/NSC within 10 minutes
* Timeline/Categories:
o Look on high side

113
Q

109.8
d. Discuss the purpose of the following types of messages:
1. KL [ref. a, ch. 3]
2. TACREP [ref. a, ch. 3]
3. TACELINT [ref. i]

A
  • KL
    o Forward time-sensitive SIGINT technical information
    ■ SSES, BFCAs in SUPPLOT are monitoring
    ■ Technical supplement in support of SIGINT serialized reports and CRITICs
  • TACREP
    o Sanitized KL with raw SIGINT removed
    ■ Does not necessarily change the classification - this is a misconception!
    o Principal reporting vehicle to keep tactical commands and non-SIGINT organizations advised
  • TACELINT
    o Tactical ELINT report
114
Q

109.8
e. Describe the Cryptologic and IO functions of SSES. [ref. a, ch. 2]

A
  • Ship’s Signals Exploitation Space (SSES)
    o SIGINT space providing SIGINT I&W
    ■ Derive information/intelligence from SIGINT systems
  • Electronic signals/systems
  • Comms systems, radars, weapons systems
    o CTRs, CTIs, CTMs - permanent division with ship’s company personnel
115
Q

109.8 Signals Intelligence: (Cont’d)
f. Describe the functions and locations of the SALs. [ref. a, ch. 4]

A
  • Signals Analysis Laboratories
    o Component of NSA for when CTs record/collect a new signal, unsure what it is
    ■ ASAL (Atlantic Signals Analysis Lab) - Georgia
    ■ PTAC (Pacific Technical Analysis Center) - Hawaii
    ■ GSAL (Global Signals Analysis Lab) - NCWDG
    o Part of the CRC’s job is to ensure all SSES have relevant Signal Descriptor Files (SDFs) loaded for the AOR
    ■ SDF - fingerprints of signals we care about
    o SCMA (SDF Configuration Management Authority) is located at the GSAL and owns an SDF database - SSES pulls the relevant SDFs from the database for the AOR
    ■ If CTs record/collect a new signal and send to the SALs, they will then exploit the signals and create SDF for it, and load it into the database
116
Q

109.8
g. State the purpose of the CCP. [ref. a, ch. 3]

A
  • CCP - Cryptologic Coverage Plan
    o Created by CRC for all SSES
    ■ What signals to collect, signals tasking, signals to avoid
117
Q

109.8
h. Define and describe SOTA. [ref. a, chs. 1 thru 3]

A
  • SOTA - Signals Intelligence Operation Tasking Authority
    o Rests with DIRNSA
    ■ Exercised through fleet command, delegated to the CSG commander to task SIGINT collection
118
Q

109.9 Systems:
a. Describe the purpose/function of the following Surface systems:
1. SSEE Increment E/F [ref. q, app.C]
2. AN/SLQ-32 [ref. r, app C.]
3. CCOP [ref. s]
4. MK 36, DLS (SRBOC) [ref. r, app. C]
5. MK 53, DLS (NULKA) [ref. r, app. C]
6. SPLITROCK [ref. t, app. A]
7. AN/SSX-1 [ref. r, ch. 3]
8. GALE-Lite [ref. q, ch. 6]
9. GCCS-J/M (GENSER and SI) [refs. u, v]
10. JTT/CTT [ref. r, app. C]

A

o SSEE - Ship’s Signals Exploitation Equipment
■ INC E/F - part of larger MCS 21, INC F is more capable
■ SIGINT suite in SSES; for INC E ships, systems that are program of record for INC F but not for INC E will have to be CCOP

o AN/SLQ-32 - Anti-ship missile defense in EW MOD

o CCOP - Cryptologic Carry-On Program
■ Systems that are not part of the ship’s program of record - allows for COTS technology, program of record can take a long time to be integrated
* Equipment maintained at FES (Fleet Electronic Support)

o Mk 36, DLS (SRBOC) - Chaff

o Mk 53, DLS (NULKA) - NULKA

o AN/SSX-1 - SEI system in EW MOD

o GALE-LITE - Generic Area Limited Environment - Lightweight Integrated Telecommunications Equipment (shipboard version of GALE)
■ Application to view various feeds, give BFEA all ELINT, PROFORMA, IR, etc. hits they need to collect/analyze/correlate ELINT
* ELNOTs (family type fingerprint for radar series)

o GCCS-M - Global Command and Control System - Maritime
■ Interface for COP (Common Operational Picture)
* IS RDBMs maintain red COP
* OS DBMs maintain blue/green COP

119
Q

109.9
b. Describe the purpose/function of the following Sub-surface systems:
1. TIDES [ref. t, apps. A, C]
2. AN/ULR-21TROLL/ISCRS [ref. q, app. C]

A

o TIDES - Subsurface activity.

o AN/ULR-21 TROLL/ISCRS - sub version of SSEE (MCS21 allows anyone who can operate SSEE/BANSHEE to operate ISCRS, and vice versa)

120
Q
  1. 9 Systems: (Cont’d)
    c. Describe the purpose/function of the following Air systems:
  2. ARIEL/BANSHEE [ref. q, app. C]
  3. AN/USQ-113 [ref. q, app. C]
  4. AN/ALQ-99 [ref. q, app. C]
  5. AN/ALQ-218 [ref. w, ch. 15]
  6. ALQ-210 [ref. m, ch. 16]
A

o ARIEL/BANSHEE - air version of SSEE/ISCRS (MCS21)

o AN/ALQ-99 - comms jamming pods on EA-18 GROWLER

o AN/ALQ-218 - SIGINT system on EA-18 GROWLER, P-8
■ Provides airborne situational awareness and SIGINT by detecting/identifying/analyzing sources of RF emissions

o ALQ-210 - ES system that provides SA, threat warning, precision targeting
■ Detects, identifies, locates combat threats in support of USN MH-60s

121
Q

110.1 Discuss the roles and responsibilities of the AG rating. [ref. d, ch. 5]

A
  • Aerographer’s Mate (AG) - J00A
    o Navy’s technical weather experts
    o AG “A” School - 5 months - IWTG Gulfport
    ■ Apprentice Forecaster (observer - not yet a forecaster)
    o AG “C” School - 8 months - IWTG Gulfport
    ■ Must reenlist after first tour
    ■ Earn 7412 NEC (now J00A)
    ■ Forecaster
122
Q

110.2 State the location, mission and component commands for the following Naval METOC commands: [ref. a, encl. 1; ref. m, ch. 17]
a. CNMOC
b. FNMOC
c. NOOC
d. NAVO
e. USNO
f. FWC-N
g. FWC-SD
h. NMOPDC

A
  • Commander, Naval Meteorology and Oceanography Command (CNMOC) - Stennis Space Center, MS
    o Hub command for METOC/TYCOM for METOC
    ■ Reports to USFF
    o Meteorology, oceanography, precise time, astronomy, environmental knowledge
  • CTU 80.7.2 - FNMOC (Fleet Numerical, Meteorology, and Oceanography Center)
    o Monterey, CA
    o Handle atmospheric and weather modeling/forecasting, climatology
    ■ “Cover everything from the waterline and up”
    ■ NOT a 24/7 ops center
    ■ Climatology - used for long-term planning, usual conditions for certain time period in a certain area
  • Cannot replace a forecast
    o Ech IV command aligned under CNMOC
    o Products/Support:
    ■ Request climatology for exercises via web request form
    ■ Wide variety of on-demand satellite imagery products from METOC satellites
    ■ Super computers providing global and regional modeling
  • CTU 80.7.4 - NOOC (Naval Oceanography Operations Center)
    o Ech IV command reporting to CNMOC (ADCON is NAVIFOR)
    All of these report up to NOOC:
    -NO-ASW Center - Japan
    -NO-Special Warfare Center
    -NO-Mine Warfare Center
    -NO-ASW Center - MS
  • CTU 80.7.1 - NAVO (Navy Oceanographic Center)
    o Runs “white hulls” - hydrographic ships (T-AGS with HSL),
    o Provides Fleet Survey Teams (FSTs)
    ■ Rapid-response military team to conduct quick turnaround hydrographic surveys anywhere (jetskis, 9m RHIB)
    ■ Modeling, satellite imagery analysis, white ships that map the ocean floor
  • CTU 80.7.3 - USNO (US Naval Observatory)
    o Washington, DC
    o Ech IV command reporting to CNMOC
    o Products/Support:
    ■ Collects/provides celestial data (sunrise/sunset)
    ■ Precise navigational timing (PNT) - determining precise time, important for satellites, voice, modem, networks, GPS, 2-way satellite time transfer
  • CTG 80.7.6 - FWC-N (Fleet Weather Center - Norfolk)
    o Provide deployable teams (SGOT - Strike Group Oceanography Team) in direct support of CSGs and ESGs
    ■ 2nd, 4th, 6th fleets
  • CTG 80.7.7 - FWC-SD (Fleet Weather Center - San Diego)
    o Provide deployable teams (SGOT - Strike Group Oceanography Team) in direct support of CSGs and ESGs
    ■ 3rd, 5th, 7th fleets
  • CTG 80.7.6 - IWTG Gulfport
    o Formerly (NMOPDC) Naval Meteorology and Oceanography Professional Development Center
    o Gulfport, MS
    o Where METOC schools/courses are for initial training
123
Q

110.3 Describe the ADCON and OPCON relationships between CNMOC, NAVIDFOR, and USFF. [ref. r]

A

Naval Meteorology & Oceanography Command - Fully reports to USFF

Naval Info Dominance Forces - fully reports to USFF

All oceanography and metoc units report:
OPCON: Naval Meteorology & Oceanography Command
ADCON: Naval Information Dominance Forces

124
Q

110.4 Discuss TCPED as the Operating Concept for Naval Meteorology and Oceanography. [ref. w, ch. 3]

A
  • TCPED replaced Battle Space On-Demand (BonD) - which is now returning
    o Tiers - how “data” is turned into useful “information”
    ■ 0 - Collection of Data
    ■ 1 - Analysis/model of predicted environment
    ■ 2 - Performance - how it affects fleet/joint forces
    ■ 3 - Exploit/decision

Tasking ->
Collection ->
Processing ->
Exploitation/Analysis ->
Dissemination

125
Q

110.5 Discuss the primary services provided by deployable Naval Meteorology and Oceanography teams and how to request support, to include:
[ref. a, encl. 1; ref. b; ref. m, ch. 5]
a. SGOT
b. MET
c. NOAT
d. UUV Platoon

A
  • SGOTs (strike group oceanography team)
    o Support CSG/ESG from FWC for entire workup cycle/deployment
  • METs (mobile environment team)
    o Support specific missions on smaller independent small boys
    ■ Chief and AGs from FW
  • Naval Oceanography Anti-Submarine Warfare Team (NOAT)
    o Go to CVNs to work for DESRON
    o Provide ASW commanders with environmental knowledge that defines battlespace for planning and operations
  • MIW UUV Platoon
    o NOMWC deploys UUV platoons/post-mission analysis (PMA) cells and Data Fusion Cells (DFC) as DIRSUP to global MCM forces
    o Use MEDAL (Mine Warfare Environmental Decision Aids Library) - TDA that overlays into GCCS
    o Continuous IPOE (near shore current modeling, bottom mapping, etc.)
126
Q

110.6 Describe available support services from the following: [ref. e]
a. NAVO Customer Support Office
b. FWC-N/SD Watchfloor
c. FNMOC Watchfloor
d. CTG 80.7 (CNMOC) MOC

A
127
Q

110.7 Discuss the basic Joint METOC organizational structure during Joint Naval METOC Operations. [ref. c, ch. 3]

A

Joint METOC Organizational Structure
* Senior METOC Officer (SMO)
o CCDR designates, expert on CCDR’s METOC requirements

  • Joint METOC Officer (JMO)
    o Operational METOC commander for JFC, could be the same as the SMO. If separate, close coordination between the two is key
128
Q

110.8 Define the following terms in relation to Naval METOC information, and how it relates to the Intelligence process: [ref. c, ch. 1]
a. Collect
b. Analyze
c. Predict
d. Tailor
e. Integrate

A
  • Collect - collect information on atmospheric/ocean conditions
  • Analyze - use raw data to determine predictive outcomes
  • Predict - create informed decisions about the weather
  • Tailor - recommendations on how best to use weather to mil advantage
  • Integrate - delivery of products to fleet
129
Q

110.9 Discuss the various Naval METOC models/products available on the NEP-Oc Portal.
[ref. e; ref. m, ch. 2]

A

■ Stores products from all CNMOC commands
■ One-stop-shop for METOC support and for fleet to access/request services

130
Q

110.10 Discuss the importance of satellite imagery to Naval METOC applications.
[ref. f, ch. 2; ref. m, ch. 12]

A
131
Q

110.11 Discuss how the following affect military operations:
[ref. c, ch. 5, apps. C, E; ref. g, ch. 2]
a. Visibility
b. Precipitation
c. Winds
d. Cloud Cover and Ceiling
e. Temperature
f. Humidity
g. Sea State
h. Space Weather
i. Tides and Currents
j. Ocean Fronts and Eddies
k. Illumination (Solar/Lunar)

A
  • Visibility
    o Poor visibility affects targeting, air ops, safety of navigation
    o RHIB/small boat operations are based on sea state/visibility
  • Precipitation
    o Performance of EO/IR/comms/radar
    ■ EHF is especially impacted due to the size of raindrops v. size of wavelength (basically useless when raining)
    ■ Lightning activity can generate high degree of noise (static)
    o Damage supplies, hazardous for transport
  • Winds
    o Affect flight operations - need specific wind speed/direction for launch and recovery
    o Sortie of ships, TCCOR
    o Dust storms
  • Cloud Cover
    o Visibility for strike ops - depends on weapons sensor
    o Imagery collection
  • Temperature/Humidity
    o Biggest impact on EM radiation and RF propagation - ducting, refraction, etc.
    ■ Little/no impact on SHF bands
    ■ Severe impact on LF/MF/HF/VHF/UHF comms
  • If trapped, HF & VHF will go further
    o Background temperature impacts how EO/IR targeting or sensing devices distinguish objects from the background
  • Sea State
    o Small boat ops (own ship RHIB; FAC/FIAC; pirates)
    o Amphibious ops
  • Space Weather (mostly done by Air Force)
    o Communications, satellite performance
  • Tides/Currents
    o Navigation - tides for harbor transitis/amphib landings
    ■ 1 kt of current = 30 kts of wind (close to tropical storm), can impact ops in restricted navigation area
  • Ocean Fronts/Eddies
    o Temperatures changing rapidly in an area affect sound propagation
    ■ Gulf Stream current (Atlantic), Kuroshio (Pacific) have many eddies and significant temperature gradient to impact ASW
    o Eddies - warm temperatures meet cold temperatures
    ■ Distort/bend sound propagation
    ■ Subs try to hide in eddies
  • Illumination (Solar/Lunar)
    o Mission planning for covert ops, NSW, amphibious ops
132
Q

110.12 Discuss how climatology affects military planning. [ref. c, apps. C, E]

A

■ Climatology - used for long-term planning, usual conditions for certain time period in a certain area

133
Q

110.13 Discuss how sound velocity affects acoustic propagation in the water column.
[ref. s, ch. 2]

A
134
Q

110.14 Discuss the following acoustic propagation paths and their effect on the tactical decision making process. [ref. h, ch. 4]
a. Direct Path
b. Bottom Bounce
c. Convergence Zone
d. Sound Channel
e. Half-channel
f. Surface Duct

A
  • Direct Path
    o Sound travels through water directly from source to sensor - unimpeded route
  • Bottom Bounce
    o Sound reflected off the sea floor
    ■ Sound energy usually diminishes rapidly as the seafloor, sea surface, and water column absorb and scatter energy
    ■ Depends on angle of incidence and bottom type
  • Rock - reflects more sound
  • Mud/sand - absorbs sound
  • Convergence Zone
    o When all sound rays are returned to near the surface, they tend to converge into a small region - sound pressure level increased dramatically in this region (CZ)
    ■ Can cause distortion in returns due to overabundance of noise
  • Good for planning where to place ASW assets to listen
    ■ Tend to be at large distances, typically 20-30 NM from source
    ■ Possible to have multiple convergence zones occurring at regular intervals
  • Sound Channel
    o Occurs when water is deeper than the thermocline
    ■ Sound gets trapped, can travel for a really long time/distance
    ■ Old method of SOS signals - buoys from downed pilot, sound would travel hundreds of miles
  • Half Channel
    o Refraction at bottom/reflection at surface - long ranges when water is very shallow
    ■ Sound waves behave as if in a very thick surface duct
  • Surface Duct
    o Zone below sea surface where sound rays are refracted toward surface and reflected
    ■ Sound trapped near surface and propagates (ducting)
    ■ Subs can hide below the ducting for masking
135
Q

110.15 Describe modes of propagation and loss to include the following:
[ref. m, ch. 14; ref. s, ch. 7]
a. Attenuation
b. Ambient Noise
c. Scattering
d. Absorption

A
  • Attenuation
    o Propagation loss - loss of signal strength due to medium
  • Ambient Noise
    o Background noise level a signal must overcome in order to be heard
  • Scattering
    o Energy reradiated in all directions from an interaction
  • Absorption
    o Loss in energy of a radio wave, conversion of signal energy into heat energy
    ■ Affect ability to communicate over long distances (absorbed little by little)
136
Q

110.16 Discuss the effects that the following atmospheric conditions can have on electromagnetic propagation: [ref. i]
a. Standard refraction
b. Super-refraction
c. Sub-refraction
d. Trapping/Ducting

A
  • Standard Refraction
    o In free space, EM wave travels in a straight line
    ■ Within Earth’s atmosphere, propagating wave bent downward from a straight line
  • Super Refraction
    o Vertical distribution of temperature, moisture, pressure causes radar waves to bend more towards to surface of the Earth than normal
    ■ Extends radar coverage up to 50%
  • Sub Refraction
    o Causes radar, waves to be refracted upward and away from Earth’s surface
  • Trapping/Ducting
    o Occurs with temperature inversion (ex. warm air over cooler air) - increases normal range of wave
    ■ For sound propagation, behaves like a transmission line - duct contains medium (ex. air) to support propagation
    ■ Often happens in HF - allows for long range comms
    o Frequently occurs in the Arabian Gulf during the summer due to high humidity and temperature inversion near the surface
137
Q

110.17 Discuss the effects of atmospheric conditions on propagation in various radio frequency ranges. [ref. j, ch. 3]

A
  • Lower Frequency - “Survivable Comms”
    o Longer wavelength (long range = > 100NM)
    o Needs larger antenna/apparatus
    o Needs more power
    o Less data transmit rate
  • Higher Frequency
    o More fragile
    o Shorter range
    o Higher transmit rate
    o More susceptible to absorption, attenuate

EHF - 30 GHz to 300 GHz - size of rain drop and doesnt work while raining for this reason

138
Q

110.18 Describe the purpose of the following TDAs:
a. AREPS [ref. i]
b. GFMPL [ref. h, ch. 3]
c. TAWS [ref. h, chs. 8, 9]
d. PCIMAT [ref. l]
e. MEDAL [ref. k, ch. 4]
f. WEBSAR [ref. e]

A
  • AREPS (now called BUILDER)
    o Computers atmospheric/terrain effects on radars
    ■ Used to predict expected ranges of radars and different communications frequencies on CVN/LHD
  • GFMPL (Geophysics Fleet Mission Program Library)
    o Collection of software providing meteorologic, EM, oceanographic, hazard avoidance, acoustic and weapons system support
  • TAWS (Target Acquisition Weapons Software)
    o Predicts effects of atmosphere on IR and EO systems
  • PCIMAT (Personal Computer Interactive Multi-Sensor Analysis Training)
    o Training system for acoustics and oceanography
    o Acoustic modeling for predicting sonar performance
    ■ Takes inputs, ocean model fields, XBTs - does math on how sound will travel in an environment
  • MEDAL (Mine Warfare Environmental Decision Aide Library)
    o GCCS overlay for MIW
    ■ Mine threats, develops hunting/sweeping plans
    ■ Uses historical and situational data
    o Used by MIW UUV platoons from NOMWC
  • WEBSAR (Web-Based Search and Rescue)
    o Tool for predictions involving SAR missions
    ■ Estimates where person could have gone and survivability given currents, winds, water temperature
139
Q

110.19 Discuss the following METOC support equipment:
a. HWDDC [ref. t]
b. SMQ-11/FMQ-17 [ref. u]
c. AN/UYQ-100 USWDSS [ref. v]
d. NITES IV / NITES Next [ref. t]
e. ASOS [ref. x]

A
  • HWDDC
    o Uses SPS-48 radar (air search radar) to generate Doppler radar equivalent
  • SMQ-11/FMQ-17
    o Ship’s force equipment - receive-only terminal for METOC satellite data/products
    ■ Receive-only antenna similar to GBS
    ■ SMQ - ships, FMQ - shore
    ■ SMQ has own hardware, to include NITES laptop
  • AN/UYQ-100 USWDSS
    o NITES-based tool for acoustic modeling, plans for where to place CSG assets (to fine red/hide blue) - force allocation
    ■ Takes PCIMAT input of sound propagation paths
  • NITES IV/NITES NEXT
    o Carry-on laptop - store, process, analysis of METOC data and products
    ■ Comes with SMQ-11 antenna for data connection
  • ASOS (Automated Surface Observing System)
    o Automated observations/data - winds, cloud heights, temperatures, humidity, precipitation amounts
140
Q

110.20 Discuss the following METOC support products:
a. OBS [ref. m, ch. 5]
b. TAF [ref. m]
c. XBT [ref. m, ch. 5]
d WEAX/SUBWEAX [ref. m, ch. 3]
e. OTSR Divert Request/OTSR Advisory [ref. m, ch. 4]
f. TOFA [ref. h]

A
  • OBS
    o Weather observations - observers record surface observations, transmit to national meteorological database in a timely manner
    ■ Baesline data needed as input for TDAs
  • TAF (Terminal Aerodrome Forecast)/DD 175-1
    o Forecast for pilots, ATC to make operational decisions
    ■ Expected weather conditions for airfield zone over 24 hour period - wind, visibility, precipitation, cloud ceilings, turbulence, icing, etc.
    ■ Flight weather briefing
    o If area is far away from aerodromes, select 3-4 air facilities to form a triangle/square with area of interest in the center
  • XBT (Expendable Bathythermograph)
    o Measure temperature and salinity - quick/inexpensive means of collecting temp. data for oceanographic//climate studies
    ■ Surface ships required to take/transmit shipboard XBT (SXBT) observations at least every 6 hours in open ocean areas
    ■ PCIMAT takes data to output poss. sound propagation paths
  • WEAX/SUBWEAX (Weather Report/Submarine Weather Report)
    o Created by SGOT for CSG/ESG
    o FWCs provide for USNS, USCS, independent steamers
    o Basic weather forecast and impact to operations slide
  • OTSR (Optimal Track Ship Routing)
    o Keep ships out of destructive weather that would impact operations, done by FWCs
    ■ FWC’s Ship Routing Officers (SRO) talks to ship’s NAV to find route/situation amendable to all parties - balance movement and operations with weather
    o SURVEILLANCE
    ■ When unit requests service, confirms OTSR surveillance will be provided
    o ADVISORY
    ■ Conditions forecasted to approach/meet wind or sea limits
    o DIVERT
    ■ Conditions forecasted to exceed wind or sea limits
  • Recommendation to change course/speed
  • Admiral’s signature needed to ignore DIVERT message
    o ROUTE RECOMMENDATION
    ■ Planning route issued upon request considering ship’s limits, operational
    constraints, fuel/time savings, currents, etc.
  • Must be requested 72 hours prior to underway
    o SPECIAL WEATHER ADVISORY
    ■ Issued for prolonged periods of heavy weather in high-traffic areas of AOR, 72+ hours in advance
  • TOFA (Tactical Oceanographic Features Analysis)
    o Large-scale map depiction of eddies, currents, etc. used for ASW
    ■ Produced by Undersea Warfare Reachback Cell (watchfloor) at NOOC for different AORs
141
Q

110.21 Discuss the following tropical weather warnings: [ref. n]
a. Tropical Cyclone Formation Alert
b. Tropical Depression
c. Tropical Storm
d. Hurricane

A

Tropical Cyclone Formation Alert: warns of possibility of TC forming from tropical disturbance
Tropical Depression: 33 kts or less
Tropical Storm: 34-63 kts
Hurricane: 64+ kts

142
Q

110.22 Discuss TCCORs and ship sortie conditions, including how they relate to Fleet Resource Protection. [ref. m, ch. 4; ref. n; ref. o, app. 4]

A

Tropical Cyclone Conditions of Readiness (TCCOR)
Based on time to onset of destructive winds (50kts or greater), set by CDR, Navy
Region, recommended by local weather units
1: 12 hours (caution), now (emergency)
2: 24 hours
3: 48 hours
4: 72 hours
5: 96 hours

143
Q

110.23 Describe the various missions of the T-AGS Oceanographic Survey Ships.
[ref. m, ch. 11; ref. p, Introduction]

A
  • T-AGS ships employ these surveillance systems/techniques in order to collect bathymetric and oceanographic information/data to feed into NAVO oceanographic models
144
Q

110.24 Discuss USNO’s input to astrometry and earth orientation parameters as they relate to precise timing and navigation. [ref. m, ch. 9; ref. q, chs. N3AD, N3EO]

A
  • Astrometry
    o The science of precision measurements of celestial bodies
    (star positions/motions, important because satellites figure out their location via location of stars)
145
Q

110.25 Discuss the role of precise time in the following: [ref. m. ch. 9; ref. q, ch. N3TS]
a. GPS
b. Geolocation
c. Network synchronization

A

■ Precise navigational timing (PNT) - determining precise time, important for satellites, voice, modem, networks, GPS, 2-way satellite time transfer
* GPS receiver compares own time with time sent by satellite, uses difference in time to calculate distance from satellite
* Time provides only frame of reference between all devices on a network

146
Q

111.1 Explain Information Professional Doctrine, Organization, and Regulations:
a. Describe the general purpose and content of the following regulations and
guidance:
1. NTP 2 [ref. a]
2. NTP 4 [ref. c]
3. NTP 6 [ref. v]
3. NTTP 6-02 [ref. d]
4. NTTP 6-02.8[ref. e]
5. Fleet OPTASK Annexes [ref. f]
a. COMMS
b. CHAT
c. Information Management
d. Knowledge Management

A
  • NTP 2 (Naval Telecommunications Procedures)
    o SHF satellite comms guidance (somewhat outdated)
    ■ Direction, management, control of SHF satellite systems operating in the X-band
  • NTP 4 - Echo
    o Navy comms SOPs - “comms bible”
    ■ Outlines USN comms shore/afloat organizations
    ■ Standard protocol for requesting
    access
    ■ Identify Allied/coalition communications capabilities/systems
    ■ Guidance for COMSPOT reporting
    ■ COMSEC measures and controls
  • NTP 6
    o Governs/directs spectrum management
    ■ Used by spectrum manager - states what has to be submitted, in what format, and to whom
  • NTTP 6-02 (Navy Tactics, Techniques, and Procedures)
    o Description of network composition and associated systems required for CSG/ESG operations and C2
    ■ Emphasis on C4I architectures for individual warfare and mission areas
  • NTTP 6-02.8
    o TTPs for Internet Tactical Chat in support of operations
    ■ Guidelines for MAKOCHAT, ChatSurfer, key words (brevity)
    ■ Standards for set up, management, use

o Fleet OPTASKs are for each fleet - switch to them when you chop into fleet - if you don’t know - find it in an OPTASK!

o OPTASK COMMS
■ Provides assigned circuits/frequencies for operating units
■ Derived from OPORD Annex Kilo

o OPTASK CHAT
■ Guidance for chat use (to include reporting, archiving, SOPs) - all chats are connected via IP address

o Information Management
■ Guidance for creation, collection/control, dissemination storage, retrieval protection and destruction of information
* Crypto key guidance
* Where to go to request permission to keep using crypto if it will expire before the end of the mission

147
Q

111.1
b. Discuss the roles and responsibilities of each of the following positions in the Naval Information Professional community: [ref. g]
1. Staff N6/J6
2. CSO
3. CISO
4. COMMO
5. EMO
6. KMO
7. ISO/ADPO
8. CMSO
9. AC5IO

A
  • Staff N6/J6
    o Numbered fleet N6 - responsible for ops/management of all comms systems in their respective numbered fleet
    ■ O-6
    ■ Make sure comms networks are all good for the numbered fleet
  • CSO (Combat Systems Officer)
    o O-5 on CVN, lead Combat Systems department
    o Responsible for ops/management of all combat-related comms systems aboard ship
    ■ Electronics, RADARs, internal comms, CIWS (owned by Combat)
  • CSIO (Combat Systems Information Officer)
    o O-4 on CVN
    o Responsible for ops/management of all comms circuits
    ■ Ensure radios/comms are up and working
  • COMMO (Ship’s Company)
    o DIVO for CS1 (Radio), O-2/O-3 billet
    ■ Ensure radios/comms are up and working for ship
    ■ Works for CSIO
  • CSMO (Combat Systems Maintenance Officer)
    o O-4/Warrants (typically LDOs/Warrants)
    o Responsible for maintenance/performance of combat systems equipment
148
Q

111.1
c. Discuss the following NECs available to Information Systems Technicians:
[ref. h]
1. Enlisted Frequency Manager (2301)
2. Journeyman Communication Transmission System Technician (2379)
3. Information System Security Manager (2779)
4. Network Security Vulnerability Technician (2780)
5. Advanced Network Analyst (2781)
6. Information Systems Technician (2790)
7. Information Systems Administrator (2791)
8. Joint Task Force Spectrum Manangement Master Level (2302)
9. Tactical Support Communications (2375)

A
  • Enlisted Frequency Manager (2301)
    o Coordinate frequencies for use within AOR, maintain frequency employment files
    ■ Work at CSG and up levels to deconflict frequencies on OPTASKs to prevent traffic jams
  • Journeyman Communication Transmission Systems Technician (2379)
    o Systems monitoring, fault isolation, circuit restoration of communications suites in HF, UHF, SHF, EHF
    ■ Go-to people to understand how “radio shack” works (where all the radio
    equipment is)
  • Network Security Vulnerability Technician (2780)
    o Attached to CPTs - becoming extinct
  • Advanced Network Analyst (2781)
    o Manage network operating systems and network connectivity, performs hardware installation and testing
    ■ One step up from NSVT
  • Information Systems Technician (2790)
    o IT rate as a whole
  • Information Systems Administrator (2791)
    o Administrator of networked systems - creates accounts, folders, backups
  • Joint Task Force Spectrum Management (2302)
    o NEC for spectrum management at a JTF
    ■ Planning, coordinating, managing joint use of EM spectrum
149
Q

111.2 Define the following network components/terms: [ref. i]
a. Hub [ch. 1]
b. Switch. [ch. 1]
c. Router [ch. 1]
d. Firewall [ch. 1]
e. IDS/IPS [ch. 15]
f. DMZ [ch. 1]
g. CDS [ch. 1]
h. Host [ch. 1]
i. Exchange Server [ch. 1]
j. File Server [ch. 1]
k. Web Server [ch. 1]
l. Internet [ch. 3]
m. Intranet [ch. 3]

A
  • Hub
    o Central location for attachment of workstations
    o Sends information from 1 workstation to every other one connected to the hub (insecure)
  • Using a switch avoids this (internal workstation to internal workstation)
  • Switch
    o More efficient hub
    ■ Internal computer to internal computer
    o “Learns” where particular addresses are - traffic therefore only goes where it needs to, rather than to every
    workstation
  • Router
    o Smarter than hub and switch
    o Can be programmed to understand (and possible manipulate), route data it is being asked to handle
    ■ Build routing
    tables/use algorithms
    o Can connect 2 or more networks
    o 2 types of data packets
    ■ User Datagram Protocol (UDP) - fire and forget - great for VTC because it’s
    fast
    ■ Transport Control Protocol (TCP) - 2-way handshake with confirmation - great for email, file transfer, etc.
  • Firewall
    o Enforces access control policy
    ■ Device or set of devices designed to permit or deny network transmissions based on a set of rules
  • Usually located close to the router
  • Chokepoint for security - acts as “bouncer”
    ■ Protects against unauthorized access from the outside world
  • IDS/IPS (Intrusion Detection System/Intrusion Prevention System)
    o IDS - “alarm”
    ■ Analyze data trafficking in-depth flowing at a certain point on the network to detect/alert for unusual activity (ex. unusual behavior, unusual devices, etc.)
  • Will notify user of unusual behavior/event, but no preventative measures are taken
    o IPS - “door/lock”
    ■ Analyze data trafficking in-depth flowing at a certain point on the network to detect/alert for unusual activity, but will reject the packet/suspend account/disconnect intruder from network
    o IDS and IPS differ from a firewall because they look more in-depth at data
    ■ Firewall is the first line of defense and only looks at the packet header and where
    it’s going
    ■ IDS/IPS dig into what the packet really contains, despite its header
  • Ex. Firewall is the security guard who sees the same mailman everyday delivering packages to his guarded building (network) - he’ll let him in because he recognizes him, but he doesn’t check the contents of what is actually being delivered in the mail. IDS and IPS are like a security screening for the package as it is being delivered
  • DMZ (Demilitarized Zone; aka Perimeter Network)
    o Middle ground where people can’t come into your internal network
    ■ Firewalls on both sides
    ■ IDS/IPS are located in the DMZ
    o Portion of network that’s “more accessible” to outside world than the internal network
  • CDS (Cross Domain System)
    o Information Assurance solution providing the ability to access and/or transfer between 2 or more different security domains
    ■ Prevents leakage of data from high to low
    ■ Ex. RADMERC
  • Host
    o Any computer/endpoint connected to the network
    ■ Ex. Printer, GCCS terminal, workstation
  • File Server
    o Server acting as a repository for files - primary job is to store files (share drive) to prevent users from having to save to the desktop
  • Internet
    o Publicly available network typically made of multiple networks
    ■ Information traveling over the Internet does so via a variety of languages, known as protocols
  • Intranet
    o Internal network - inside of the DMZ
    ■ Private computer network collection within organization (ex. ship’s network)
    ■ Typically includes Internet access, but is firewalled so computers cannot be reached directly from the outside
150
Q

111.3 Define the following application protocols/services: [ref. i, ch. 6]
a. TCP/IP
b. UDP
c. Telnet
d. FTP/SFTP
e. POP3/IMAP
f. HTTP/HTTPS
g. SMTP
h. DNS
i. SNMP
j. SSH

A

■ Transport Control Protocol (TCP) - 2-way handshake with confirmation - great for email, file transfer, etc.

■ User Datagram Protocol (UDP) - fire and forget - great for VTC because it’s fast

  • Telnet
    o Network protocol used on Internet or local area networks to work from a different server
    ■ Using different IP address, username, password
    ■ Cons: All data (usernames/passwords) sent in clear text - potential security risk
  • Rarely used today, being replaced by SSH
  • FTP (File Transfer Protocol)
    o Standard network protocol used to transfer/copy a file from one host to another over TCP-based network (ex. Internet) - no security
  • POP3 (Post Office Protocol Version 3)
    o Used by local email clients to retrieve email from remote server over TCP/IP connection
    ■ Ex. Logging into gmail = sending a POP request to gmail to see emails (designed to delete email on server as soon as user has downloaded)
  • HTTP/HTTPS (Hypertext Transfer Protocol)
    o HTTP - 80
    o HTTPS - 443
    o Foundation of data communications for World Wide Web
    ■ HTTP(S) - secure point-to-point communications
  • SMTP (Simple Mail Transfer Protocol)
    o Internet standard for email transmission across IP networks
    ■ Most email systems sending mail over Internet use SMTP to send messages from one server to the other; messages are then retrieved with email client from server using POP or IMAP
  • DNS (Domain Name System)
    o Hierarchical naming system built on distributed database for computers, services, etc. connected to the Internet or a private network
    ■ System around the world that stores addresses
    ■ Ex. If trying to go to Facebook, just type facebook.com and DNS will find the stored address to send you there
  • SSH (Secure Shell)
    o Same as TELNET but more secure - uses encryption
    ■ Data transmitted over network is secure from eavesdropping
151
Q

111.4 Explain why ACLs are used and where they are applied. [ref. i, ch. 13]

A
  • Access Control List
    o Policy (set of rules) indicating what resources certain users/hosts have access to - list of permissions
    ■ System administrators manage the system using ACLs
    ■ Says who can go into what folders (Alice can use x share drive, etc.) and conduct certain activity
  • Ex. File with ACL containing (Alice, delete) gives Alice permission to delete a file
152
Q

111.5 Define wireless networking and its associated risks. [ref. i, ch. 12]

A
  • Wireless Networking
    o Wireless - any computer network not connected by cables of any kind - utilize the RF spectrum as a communications medium
    ■ Allow for less required physical infrastructure
    ■ Risk: Unauthorized persons can view traffic passing through RF transmission areas
  • Secret and above are not supposed to be wireless
153
Q

111.6 Discuss methods for managing bandwidth. [ref. r]

A

o Scheduling: Balance load of data flows

o Traffic Shaping: Technique that delays some or all datagrams to bring them into compliance with desired traffic profile

o Traffic Classification: Categorizes network traffic according to various parameters

154
Q

111.7 Discuss Navy network domains to include ONENET, NMCI/NGEN, and ISNS/CANES as they relate to DODIN. [ref. l]

A
  • ONENET
    o Navy’s network for overseas shore installations
    ■ Theater Network Operations and Security Centers (TNOSCs) are in Yokosuka, Bahrain, and Naples
155
Q

111.8 Discuss the purpose of the JIE. [ref. s]

A
  • Joint Information Environment
    o Overarching concept of developing a network architecture to support existing and future DoD capabilities and programs
    ■ Supposed to make it easier to connect in a joint environment
156
Q

111.9 Explain IT Infrastructure Library lifecycle and processes: [ref. m]
a. Strategy
b. Design
c. Transition
d. Operations
e. Continuous Service Improvement

A
  • Strategy - Provide guidance on clarification and prioritization
    o Strategy must provide sufficient value to customers and all service provider’s
    stakeholders
  • Design - IT design of services and processes to meet business requirements
  • Transition - Deliver yof services required into operational use
  • Operations - Achieve delivery of agreed levels of service; services deliver value to businesses
  • Continuous Service Improvement - realignment of IT services to the changing needs of the customer
157
Q

111.10 Discuss USCYBERCOM TASKORDs and CTOs. [ref. n]

A
  • USCYBERCOM CTO (Communication Tasking Orders)
    o Orders governing operations and management of DoD communications networks
    ■ DISA, CYBERCOM, 10th Fleet, etc. can give/order
  • Ex. “Stop using Zoom”
  • Ex. USCYBERCOM CTO 10-122 “Protection of Classified Info on DoD SIPRNET”
    o Each DoD service may issue additional instructions for comms personnel to act upon
    ■ CYBERCOM CTO is used/cited as a reference
158
Q

111.11 Define Spectrum Management and why it is important. State the application used to manage organizational spectrum management. [refs. o, t]

A
  • Spectrum Management
    o Planning, coordination, and management of the use of the EM spectrum
    ■ Purpose: Enable electronic systems to perform their functions in an intended environment without causing or suffering unacceptable interference
  • Divide spectrum to use it effectively
  • Ex. If I’m listening for intel gathering purposes on x frequency, don’t want
    another unit jamming it - frequency deconfliction
  • Ex. When to turn/on/off certain emissions (UNREPs)

o AESOP (Afloat EM Spectrum Operations Program)
■ Tool used for centralized spectrum management and planning

159
Q

111.12 Describe the process of building and deconflicting an OPTASK COMMS and COMMPLAN. [ref. f]

A

Use AESOP (Afloat EM Spectrum Operations Program)
o COMMPLAN (Communications Plan)
■ Unit-level, built using OPTASK COMMS, OPORD Annex K
o OPTASK COMMS
■ Includes nets, approved frequencies used/allotted
■ At different levels - numbered fleets, CSGs

160
Q

111.13 Describe the process for requesting satellite access to include approval. [ref. k]

A
  • SAR (Satellite Access Request)
    o Access requests for IP services to include NIPR, SIPR, VTC, POTS, VOIP
    o Requests made in JIST (SIPRNET website) from 45-60 days out
    ■ Termination requests submitted at least 30-45 days prior to desired activation date
    ■ Activation date precedes a ship’s underway time by 72 hours
    ■ Technically a new request should be sent every time you CHange OPerational (CHOP) control, but since they are such a pain, a good COMMO will ensure the SAR will provide services until they get to their destination
    o Usually comes from COMMO
    ■ USFF is approval authority
    o Each satellite can only load so much/support comms with so many ships
161
Q

111.14 Discuss EKMS/KMI. [refs. p, u]

A
  • EKMS (Electronic Key Management System)
    o Provides capability for automated generation accounting, distribution, destruction, and management of electronic key (crypto) items
    ■ Transfer keys between ships and NSA to encrypt all our comms
  • Ensure timely support to global community enhancing security, managing costs associated with shipping
    ■ EKMS owned by USN; KMI owned by NSA
  • KMI (Key Management Infrastructure)
    o Replaced EKMS on 01JAN18
    o Constantly ensure keys are up-to-date to ensure comms (loading crypto)
    ■ Done by COMMOs and their ITs
    o Avoid ability/possibility of the enemy to gather enough keys to reverse engineer how we make them
162
Q

111.15 Describe the purpose/function of the following systems and how they support operations:
a. NIPRNet [ref. c, ch. 2]
b. SIPRNet [ref. c, ch. 2]
c. JWICS [ref. c, ch. 2]
d. NSANET [ref. q, ch. 3]
e. CENTRIXS [ref. c, ch. 7]

A
  • NIPRNet (Non-Secure Internet Protocol Router Network)
    o Primary unclassified automated administration tool for U.S. Navy
    ■ Managed by NMCI
  • SIPRNet (Secret Internet Protocol Router Network)
    o Official information transmission network of DoD
    ■ Classified version of Internet
    ■ Assure privacy in transmission of sensitive information
  • JWICS (Joint Worldwide Intelligence Communications System)
    o DoD’s top secret version of Internet
    ■ Transmit classified information by packet switching over TCP/IP in a secure environment
  • NSANET
    o Official NSA intranet network (classified TS/SCI internal network)
    ■ Requires NSA poly cert
  • CENTRIXS (Combined Enterprise Regional Information Exchange System)
    o Computer network allowing the U.S. and coalition nations and their forces to securely share operational and intelligence information in support of combined planning
163
Q

111.16 Discuss the products and services provided by DISA/DISN. [ref. b]

A
  • DISN (Defense Information System Network)
    o Worldwide-protected telecommunications network
    ■ NIPRNet, SIPRNet, JWICS, VOIP, Global Video Services (GVS), TS/SCI videoconferencing
  • DISA (Defense Information System Agency) - Fort Meade, MD
    o Owns all/responsible for all DoD networks
164
Q

111.17 Explain the following expeditionary and joint transport systems:
a. DWTS [ref. c, ch. 6]
b. SINCGARS [ref. c, ch. 6]
c. DJC2 [ref. j]

A
  • DWTS (Digital Wideband Transmission System)
    o Ship-to-ground communications system (LOS)
    ■ SHF system
    ■ High-speed amphibious comms
    o Typically used by USMC, also on amphibs where voice/data routed via ship’s MAGTF router to shore HQs - point-to-point communications
    ■ Cannot be operated off coast of Japan because it is on the same frequency as cell towers there (would jam them)
  • SINCGARS (Single Channel Ground to Air Radio System)
    o How USMC communicates with air forces
    ■ VHF
    ■ Mostly used for voice comms, frequency hopping
    ■ Aircraft are synced up to what frequencies you’re hopping to
  • DJC2 (Deployable Joint Command and Control)
    o Self-contained C2 comms/network systems “in a box” for the field to set up a C2
    command post
    ■ NIPR, SIPR, JWICS capable
    ■ Deployed by SPAWAR Reserves in New Orleans after Hurricane Katrina
165
Q

111.18 Discuss the NCTAMS/NCTS organizational structure and locations of each:
[ref. c, ch. 2]
a. Tech Control Facility
b. NOC
c. Message Center
d. JFTOC

A
  • Tech Control Facility
    o Operated by each NCTAMS and NCTS
    ■ Provides fast, reliable, secure exchange of information and maintaining receiver and transmitter sites remotely - where communications come in
    ■ Provides broadcast service across the RF spectrum
  • From VLF for sub comms to EHF for SATCOM
    o Contains equipment, distribution frames, panels, switches, etc. to allow personnel to control communications paths and facilities
  • NOC (Network Operating Center)
    o Act as regional gateways to DISN IP networks in respective AORs
    ■ Provide secure/nonsecure IP services, DNS, web-browsing, email storing and forwarding
    ■ If chopping into a new AOR, need to do a comms shift
  • Ex. Shifting from 2nd fleet to 6th - stop communications with NCTAM and NOC in Norfolk to NCTC and NOC in Naples
  • Message Center
    o Receive/edit incoming messages, push messages
    ■ Processes naval messages using Command and Control Information Exchange (C2OIX)
  • JFTOC (Joint Fleet Telecommunications Operations Center)
    o Provide regional support/control to all customers; day-to-day operations
    ■ Located at NCTAMS
    o JFTOC WO (watch officer) is the “BWC” at NCTAMS - 24/7 POC where communications status for the fleet is monitored
166
Q

112.1 Describe the roles and responsibilities of the following with respect to Navy Space:
a. NNWC Space Cell [ref. a, ch. IV]
b. CSG/CPR Space Ops Officer [refs. b, c]
c. SPAWAR PEO Space Systems [ref. f]
d. SSFA [ref. f]
e. ONR, NRL [ref. f]
f. Navy Space Cadre [ref. e]
g. NAVSOC [ref. d]
h. PMW 146 [ref. i]

A
  • Naval Network Warfare Command (NNWC) MOC Space Cell - Suffolk, VA
    o NWC = CTF 1010 (Suffolk, VA) for 10th Fleet
    o Reach-back support for fleet space needs
    ■ Provides NNWC with internal space situational awareness
    ■ Tailored support to CSG/ESG staffs
  • Space situational awareness reports
  • Space effects packages
  • CSG/CPR Space Ops Officer
    o Integrates/synchronizes space capabilities into combat plans and execution, including:
    ■ SATCOM
    ■ PNT
    ■ ISR
    ■ METOC
    ■ Missile Warning
    o Develop Space Effects Packages in support of CSG combat plans - coordinates with NNWC MOC Space Cell
    ■ Space Effects Packages
  • Support package covering multitude of aspects (space weather, PNT, knowing what satellites you’re on, environmental events and operational impacts)
    ■ Space Support Packages
  • Template/roadmap created prior to deployment laying out space capabilities to be utilized
    o Makes Space Assessment, including:
    ■ GPS EMI, SATCOM EMI, space weather, GPS performance, space vulnerabilities, space system status
    o 2 AQDs to qualify - Operations, Acquisitions
    ■ Can be any 18xx, but majority are IP and Intel
  • SPAWAR PEO Space Systems - Chantilly, VA
    o Establish acquisition strategies and plans for Navy space systems - lead development, testing, integration, and operational support
    ■ Own space PORs (programs of record)
  • SSFA (SPAWAR Space Field Activity) - Washington, D.C.
    o Navy’s core acquisition/engineering workforce
    o Management of Navy Space Cadre
    ■ Staffing/support to NRO, NSS, DoD program offices
    o Designs architecture for USN space systems with NRO, other DoD space commands
  • ONR, NRL
    o Office of Naval Research
    ■ Research center for developing new technology
    o Naval Research Laboratory

■ Naval Center for Space Technology at NRL - exploit tech/develop space-related capabilities in support of DoD/Navy

  • Navy Space Cadre
    o Provide leadership/technical expertise in space systems
    ■ People with space AQDs and/or in space billet
  • Navy Satellite Operations Center (NAVSOC) - Point Mugu, CA
    o Operates satellite constellations:
    ■ Military UHF narrow-band comms
  • Navy owns UHF, AF owns EHF (nuclear is in ELF/EHF), Army owns SHF
    ■ Global Broadcast Systems (UHF Follow-On - UFO)
    o Operates satellites from 5 remote ground stations throughout the U.S. and Guam
  • PMW 146
    o Part of SPAWAR - supported by PEO Space Systems
    ■ In charge of acquisitions, leveraging latest commercial advances in satellite/terrestrial technology
167
Q

112.2 Describe the roles and responsibilities of the following service, joint, and national level organizations:
a. JFCC SPACE and JSpOC [ref. a, ch. IV]
b. DoD Executive Agent for Space [ref. g]
c. Space Coordinating Authority [ref. a, ch. III]
d. Director of Space Forces [ref. a, ch. III]
e. NRO [ref. l]
f. NSSI, ASOpS [ref. h]
g. AFSPC [ref. m, ch. 2]
h. SMDC/ARSTRAT [ref. m, ch. 2]

A
  • JFCC Space (Commander, Joint Functional Component Command for Space) -
    Vandenberg AFB, CA
    o Single POC for assigned military space operational matters
    o Inactivated in 2017 - now USSPACECOM (stood up in 2019) - Peterson AFB, CO
    ■ Commander: Gen. James H. Dickinson (as of 20AUG20)
    ■ USSPACECOM has not yet reached operational capability
  • Comprised of military members, civilian employees, contractor personnel
    ■ USSPACECOM has 2 subordinates
  • Combined Force Space Component Command (CFSCC)
    o Plans, integrates, conducts, assesses global space operations to deliver space capabilities to CCDRs, Coalition partners, Joint Force
  • Joint Task Force Space Defense (JTF-SD)
    o Conducts, in unified action with mission partners, space superiority operations to deter aggression and defend U.S./Allied interests
  • Joint Space Operations Center - now Command Space Operations Center - Vandenberg AFB, CA
    o Provides C2 of space forces for CFSCC
  • DoD Executive Agent for Space - now Principal DoD Space Advisor (PDSA)
    o PDSA established in 2015
    o Secretary of the Air Force
  • Space Coordinating Authority (SCA)
    o Authority to coordinate joint space operations, integrate space capabilities
    ■ Primary responsibility for joint space ops planning within joint force
    ■ Designated by Joint Force Commander
  • Director of Space Forces - Chief of Space Operations, U.S. Space Force (stood up in 2019)
    o Gen. John “Jay” Raymond
    o Senior uniformed Space Force officer responsible for organization, training, and equipping of all organic and assigned space forces
    ■ Member of Joint Chiefs of Staff
  • NRO (National Reconnaissance Office) - Chantilly, VA
    o R&D, acquisition, launch, operation of overhead reconnaissance systems
    ■ Operates “bus” - satellites themselves
  • NSSI (National Security Space Institute) - Peterson AFB, CO
    o DoD’s single focal point for space education and training
    ■ Complement space programs at Air University, NPS, etc.

Previously the Air Force Space Command (AFSPC):
o SPACEFOR is new 6th service branch of armed forces responsible for space warfare, consistent with FY-20 NDAA

  • SMDC/ARSTRAT (U.S. Army Space and Missile Defense Command/Army Forces Strategic Command) - Redstone Arsenal, AL
    o Global space, missile defense, high altitude forces and capabilities for Army
168
Q

112.3 Name the five space force enhancement mission areas and how each one contributes to naval operations. [ref. a, ch. III]

A
  • Space Force Enhancement
    o Multiply joint force effectiveness - 5 force enhancement functions - afford commanders access to denied areas and increase combat potential of force
    ■ ISR
    ■ Missile warning
    ■ Environmental monitoring
    ■ Satellite communications
    ■ Space-based positioning, navigation, timing
169
Q

112.4 Describe the two components of Space Control. [ref. a, ch. II]

A
  • Space Control
    o Offensive Space Control (OSC) - deny adversary freedom of action in space
    o Defensive Space Control (DSC) - protect blue space capabilities
    o Space Situational Awareness (SSA) - characterizing space capabilities operating within terrestrial environment, space domain
170
Q

112.5 Describe the process by which space effects are requested via Space Support Request. [ref. b]

A

Space Support Request (SSR) Process
* Requests are issued monthly by theater commanders, generated by Space Officer
o Issued/submitted when commanders in the field need space support that is not already being provided
* Submitted to Combined Air Operations Center (CAOC), who tracks requests
o NNWC MOC Space Cell assists USN assets in development of SSR
* Categories:
o Communications/Weather, PNT, knowing what satellites you’re on, environmental
events/operational impacts

  • Example from 2006:
    o SSR was generated to have the Joint Space Operations Center (now Combined Space Operations Center) at Vandenberg to notify field forces of changes to GPS satellite constellation
    ■ Allowed field forces to be notified of satellite anomalies, prevented bombs from missing targets/prevented collateral damage
171
Q

112.6 Describe the three segments associated with space systems. [ref. j, ch. 21]

A
  • 3 segments of space systems:
    o Space - satellites, space stations, reusable space transport systems
    o Control - data transmitted between ground and space segments
    o Ground/User - fixed and mobile land, sea, or airborne equipment used to interact with space segment/transmit data
172
Q

112.7 Describe the following space system threats and their potential impacts:
[ref. j, ch. 21]
a. Electromagnetic Interference/Purposeful Interference
b. Directed Energy
c. Electromagnetic Pulse/Nuclear Detonation
d. Anti-Satellite Weapon (ASAT)
e. Ground Attack
f. Cyber Attack
g. Space debris

A

o Electromagnetic Interference (EMI)
■ Disturbance affecting electrical circuit due to EM induction or EM radiation emitted from an external source
* Could be from an electrical circuit, sunspots, Northern Lights (source can be any object - natural or manmade)

o Directed Energy
■ DE weapons include laser, RF, particle-beam weapons (primarily standoff ground or air-based systems)
* Ground-based (lasers, microwave beams) can damage sensors or kill a satellite
* Space-based can do the same thing, but do not have to worry about
Earth’s atmosphere

o Electromagnetic Pulse/Nuclear Detonation (NUDET)
■ EMP will fry anything with complex circuitry - damage voltages/currents
* Widespread impact on extended power and comms networks
■ Nuclear detonations can fry/destroy power and comms networks within the first minute

o ASAT (Anti-Satellite Weapon)
■ Extremely expensive option requiring detailed/complex information - can be easily detected by intel organizations
* Pros: Target destruction is complete/easily verified
* Cons: Significant political ramifications

o Ground Attack
■ Attack/sabotage associated ground segments
* Ex. Telemetry, tracking, and commanding (TT&C) of space nodes
* Most facilities for U.S. space systems are in CONUS

o Cyber Attack
■ Spoofing - subtle, effective means of defeating a satellite
* Injecting a false signal to directly control the satellite or cause a ground controller to think the satellite needs to be controlled
o Can cause issues with GPS ➔ make ship think it’s not where it
actually is
* Pros: Adversary may never know what happened
* Cons: Extremely technically difficult (must know correct frequencies, codes, transmissions)

o Space Debris
■ Debris that can hit Earth, satellites
* Tracked by JSpOC (now CspOC) Space Situational Awareness Cell
* Man-made and natural space material can bombard Earth, disastrously impact spacecraft

173
Q

112.8 Discuss the impact of terrestrial and space weather on space operations (both on-orbit and terrestrial) and how this impacts the mission. [ref. j, ch. 7]

A
  • EM Radiation
    o Effects: SATCOM and radar interference (increased background noise), absorption of HF radio communications
    o Solar flares can affect comms
    ■ Tremendous explosions on the surface of the sun that release energy (as much as 1 billion megatons of TNT) in forms of EM and energetic particles (protons, electrons)
    ■ Emit x-ray, UV, optical, and/or radio waves
  • High-Energy Particles
    o Particles (protons, cosmic rays) reach Earth within 15 min. to a few hours after a strong solar flare
    o Effects: Satellite disorientation, physical damage to satellites, false sensor readings, etc.
    ■ Proton events are most hazardous - occur when solar flares eject high-energy particles arrive at the earth in 30 min.
  • Low-to-Medium Energy Particles
    o Particle streams may arrive at Earth ~2-3 days after solar flare
    o Effects: Geomagnetic and ionospheric storms causing radar interference, radio wave propagation anomalies, space tracking errors
  • Van Allen Radiation Belts
    o Zone of energetic charged particles (usually originating from solar wind/cosmic rays)
    ■ Result of Earth’s magnetic
    field working like a magnetic trap
    ■ Traps solar wind and deflects
    energetic particles, protecting atmosphere from destruction
    o Gap between inner and outer belts
    called slot region (devoid of energetic particles)
    ■ Geosynchronous communications satellites just inside the outer edge of the outer radiation belt
    ■ LEO (ISS and Hubble space telescope) is just below inner edge of inner belt
    o Impacts: During periods of intense space weather, density/energy of radiation belt particles can increase and pose a danger to astronauts, spacecraft, ground technologies
  • Scintillation
    o Rapid, random variations of a radio signal due to variations in ionosphere’s electron
    content
174
Q

112.9 Define the following orbital parameters: [ref. j, ch. 6]
a. Period
b. Inclination
c. Altitude
d. Perigee
e. Apogee
f. Eccentricity

A
  • Period - Time it takes for satellite to complete one full revolution
  • Inclination - Angle between equatorial plane and orbital plane (measured counter-clockwise)
  • Altitude - Distance above the earth
  • Perigee - Closest distance from earth in orbit (for elliptical orbits)
  • Apogee - Furthest distance from earth in orbit (for elliptical orbits)
  • Eccentricity - Shape of ellipse satellite follows in orbit
    o Elliptical orbits create ellipse
    o Circular orbits - distance from Earth remains consistent throughout orbit
175
Q

112.10 Define the following space payload parameters: [ref. j]
a. Resolution/Ground Sample Distance
b. Field-of-View
c. Footprint
d. Earth coverage beam
e. Spot beam

A
  • Resolution/Ground Sample Distance (GSD)
    o Distance between pixel centers measured on the ground in a digital photo
    ■ The bigger the GSD, the lower the resolution/less visible the details
    ■ GSD of 5 cm. means 1 pixel = 5 cm on the ground (5 x 5 = 25 sq. cm)
  • Field-of-View
    o Extent of observable world seen at any given moment
  • Footprint
    o Area of “coverage” by satellite
  • Earth Coverage Beam
    o Satellite antenna beam that allows for maximum area to be covered by a satellite
    ■ Vs. Spot Beam, which focuses transmission/reception on a certain area
  • Spot Beam
    o Generally harder to jam, but require more satellites to cover a given area
176
Q

112.11 Discuss the advantages and limitations of the following orbits to include coverage areas, resolution/sensitivity, and revisit time: [ref. j, ch. 6]
a. Low Earth Orbit
b. Medium Earth Orbit
c. Highly Elliptical Orbit
d. Geosynchronous and Geostationary Orbit
e. Sunsynchronous Orbit
f. Polar Orbit

A
  • Low Earth Orbit (LEO)
    o Up to about 1500-2000 km
    o Period: 90-120 min.
    o No persistent coverage, short dwell time
    ■ IMINT, ELINT
  • Medium Earth Orbit (MEO)
    o Between 2000-35,786 km (usually 8000-
    20,000 km)
    o Can cover more with fewer satellites than LEO, but not as low power/cannot have as small of antennas
    o Most common use: Navigation (ex. GPS)
  • Highly Elliptical Orbit (HEO) - “Molniya”
    o Low-altitude perigee, high-altitude (35,786+ km)
    ■ Molniya - Russian for lightning
    ■ Long dwell on apogee and whips around on perigee (hence “lightning”)
  • Apogee ➔ approx. 8 hours of a 12 hour orbit
    o Uses: Communications, Reconnaissance
    ■ Useful for polar communications
  • Covers polar “hole” left by GEO constellation
  • Geosynchronous and Geostationary Orbit
    o HEO orbit, period matches the rotation rate of earth
    ■ Satellite appears stationary with respect to a fixed point on rotating earth (allows fixed antenna to maintain link with satellite)
    o Geosynchronous:
    ■ Sync w/ rotation of Earth, can stray away from equator
    o Geostationary:
    ■ Sync at/on any point on Earth’s equator (is a geosynchronous orbit)
    o Pros: Constant dwell time, period of 24 hours
    o Use: Almost all communications satellites
    o Can cover everything other than the poles (would just fall to earth)
  • Sunsynchronous Orbit
    o LEO orbit that maintains constant orientation to the sun
    ■ Passes equator and each line of latitude at the same time each day
    ■ Orbital plane must rotate approx. 1 degree each day
    (eastward) to keep with Earth’s revolution around the
    sun
    o Uses: Reconnaissance
    ■ Used by NOAA to see when we might get poor space weather
  • Polar Orbit
    o Passes above both poles on each revolution
    o Uses: Earth mapping, Earth observations, Iridium satellite constellation
    ■ Cons: No one spot on Earth can be sensed continuously
177
Q

112.12 Describe the difference between:
a. Space system and space effect [ref. j, ch. 11]
b. Space operations and satellite operations [ref. a, ch. II]
c. Satellite bus operations and payload operations [ref. a, ch. II]

A

o Space Systems
■ Equipment (comprised of nodes and links) we put into space, use as ground/airborne stations, data links
o Space Effects
■ Integrating space systems into planning to conduct global and theater operations (ex. comms, imagery, etc.)

o Space Operations
■ Space force enhancement, space support, space control, space force application
o Satellite Operations
■ Spacecraft and payload operations
* Spacecraft - telemetry, tracking, and commanding (TT&C), maneuvering, etc.
* Payload - monitoring/commanding payload to collect data or provide capabilities in operational environment

o Platform
■ “Bus” - satellite itself
* 5 supporting systems: structures, thermal control, electrical power, altitude control, TT&C
o Payload
■ Includes spaceborne people and instruments that perform primary mission

178
Q

112.13 Describe the five primary Space mission areas: [ref. a, ch. II]
a. Space Control
b. Space Force Enhancement
c. Space Support
d. Space Force Application
e. Space Situational Awareness

A
  • Space Control
    o Offensive Space Control (OSC) - deny adversary freedom of action in space
    o Defensive Space Control (DSC) - protect blue space capabilities
    o Space Situational Awareness (SSA) - characterizing space capabilities operating within terrestrial environment, space domain
  • Space Force Enhancement
    o Multiply joint force effectiveness - 5 force enhancement functions - afford commanders access to denied areas and increase combat potential of force
    ■ ISR
    ■ Missile warning
    ■ Environmental monitoring
    ■ Satellite communications
    ■ Space-based positioning, navigation, timing
  • Space Support
    o Space lift operations (launching/deploying satellites)
    o Satellite operations
    o Reconstitution of space forces (replenishing lost/diminished satellites)
  • Space Force Application
    o Attacks on terrestrial-based targets carried out by military weapons systems operating in or through space (ex. ICBMs)
  • Situational Awareness
    o Characterize space capabilities operating in space and terrestrial environment
    ■ Space surveillance, collection, processing
    ■ Status of U.S. satellite systems, U.S./multinational space readiness
179
Q

112.14 Discuss how satellite vulnerability information may support maritime maneuver and EMCON operations. [ref. j, ch. 19]

A
180
Q

112.15 Discuss space related planning associated with operations and exercises.
[ref. a, ch. V]

A
181
Q

112.16 Explain (with respect to the Geographic Combatant Commanders and/or Joint Task Forces) the roles and responsibilities of the theater Space Coordinating Authority. [ref. a, ch. III]

A

o Space Coordinating Authority (SCA) recommends guidelines for employing space capabilities (incl. ROE)
o Authority to coordinate joint space operations, integrate space capabilities
■ Primary responsibility for joint space ops planning within joint force
■ Designated by Joint Force Commander

182
Q

112.17 Describe the general capabilities/limitations and missions for each of the following SATCOM systems [ref. j, ch. 14]
a. AEHF
b. MILSTAR
c. WGS
d. DSCS
e. UFO
f. MUOS
g. GBS
h. CBSP

A

a. AEHF - constellation of comm satellites
b. MILSTAR - constellation of comm satellites in geosynchronous orbit
c. WGS - wideband global system - lots of bandwidth
d. DSCS - defense satellite communication system - contested environments
e. UFO - UHF follow-on - support for ships
f. MUOS - mobile user objective system - supports a worldwide, multi-service population of mobile users
g. GBS - global broadcast service - supports ISR/FMV, etc
h. CBSP - commercial broadband satellite program - complex and worldwide end-to-end commercial satellite communications

183
Q

112.18 Describe the process used to report instances of space electromagnetic interference or jamming. [ref. m]

A
  • Joint Spectrum Interference Resolution (JSIR) Procedures
    o Operator/user experiencing interference is responsible for submitting the initial EMI report
    ■ Occurs via the JSIRO collaboration portal
  • Web-based application, keeps track of who has jamming capabilities, reported interference, jamming incidents, etc. dating back to 1970
184
Q

112.19 Describe the nominal GPS constellation (number of spacecraft and orbital parameters) and the three main functions of the satellites. [ref. j, ch. 16]

A

24 satellites - period of 12 hours, MEO

provide latitude, longitude and altitude (also can provide time)

185
Q

112.20 Describe the vulnerabilities of GPS and state actions to mitigate those vulnerabilities. [ref. n, app C]

A

spoofing and jamming

One of the main GPS vulnerabilities is spoofing, which is when a malicious actor sends false GPS signals to a receiver, tricking it into thinking it is in a different location.

186
Q

112.21 Describe the general capabilities/limitations, locations/orbits, missions, and responsible organizations for each of the following:
a. Space-Based Infrared System (SBIRS) [ref. o, ch. 5]
b. Defense Support Program (DSP) [ref. o, ch. 5]
c. Ground-based radars [ref. o, ch. 6 thru 8]
d. Mission Control Station (MCS) [ref. p, ch. 4]
e. Joint Tactical Ground Station (JTAGS) [ref. p, ch. 5]
f. Mobile Ground Stations [ref. p, ch. 6]
g. Overhead Persistent Infrared / Missile Warning (OPIR/MW) resources [ref. p]

A
187
Q

112.22 Describe the difference between strategic and theater missile warning.
[ref. p, ch. 3]

A
188
Q

112.23 Discuss available sources of space related training. [ref. h]

A
  • NSSI (National Security Space Institute) - Peterson AFB, CO
    o DoD’s single focal point for space education and training
    ■ Complement space programs at Air University, NPS, etc.
189
Q

112.24 Discuss how space is a congested, contested, and competitive environment. [ref. a, ch. 1]

A
190
Q

112.25 Discuss the unique aspects of space acquisitions as compared to the traditional acquisitions process. [ref. k]

A

National Security Space (NSS) Acquisitions Process
* Phase A: Concept Development
o Concept studies, assessments, requirements

  • Phase B: Preliminary Design
    o Assess risk levels and projected performance at a detailed engineering level
  • Phase C: Complete Design
    o Baseline design and support concept of detail for critical design review/document development
  • Phase D: Build and Operations
    o System-level fabrication, integration, testing, deployment, operational support