Radio Flashcards
DAMA
Uhf satcom
Uhf satcom range
Directional beam
Satcom uhf crypto
Secure voice
Andvt -advanced narrowband digital voice terminal
Satcom uhf antennas
Oe-82 ant trashcans prt/aft/ fwd 06
Satcom uhf receivers
3 wsc
Uhf antennas los
AS1735
Secure non secure data
Uhf tansciever
7 wsc
Vhf
Range pwr output 20-30
Vhf transceiver
10 Sincgars src-45
3 prt stbd 1 aft of sps49
Crypto used for hf
ANDVT- advanced narrowband digital voice terminal
Hf Range/ what it provides
1500mi
Provides secure non secure
Bases
Blue recieve
Red transmit
Hf transmitter and reciever
(9) URT -23 transmit -35’ twin whips (helo tower) 14’ twin whips 06 level center aft
(14) R-2368 recieve prt/ stbd flt deck 06
HF-VUSE
Hf- 3-30 Vhf - 30-300 Uhf- 300-3 Shf-3g-30g Ehf-30g-300g
Cudix
Common user digital info exchange system
Satcoms uhf receiver
3 srr -1 eggbeaters
07 level fwd prtstbd
Fleet broadcast
Shf Transceiver
Wsc9
7ft dome / Raytheon ant Tacan
Shf provides
Message traffic, pots, nipr sipr
Range Shf
Directional beam
Ehf transceiver
WSC 9
Secure voice and data
Ehf antennas
Aft of ciws 1 focsle
Ehf call signs
Point to point
Sas2112- coke machine
Central management system for red phones
Adns
Automated digital networking system
Gateway for all IP
Network switches
6 total 2 sipr(radio); 4 nipr (tacklog, ic gyro, log room/adp
Network servers
19 nipr 19 sipr
Network programs
Compose (software suite)
Opsecon
4 categories (river city)
Message precedence
Z -flash <10
O-immediate <30
P- priority< 3 hrs
R - routine < 6hrs
Minimize
Reduces voice and records traffic
EEFI
Essential elements of friendly info
Specific items that could degrade military security
Bead window
Alert unauthorized disclosure
Gingerbread
Intruder
EAP
Emergency action plan (emergency destruction)
Precaution
Complete
No forn
No foreign nationals
Fouo
For official use only
Ekms
Electronic key management system
Keeps unauthorized persons out of the need to know
Comsec
Communication security
Access
Ability to obtain/ gain info
Need to know
Not soley on rank
Clearance
Prior to granting access to classified info
Compromise
Disclosure of info not authorized
Suspected and confirmed
Restricted areas
Cic, radio, vault