Ship Specific Flashcards
Discuss the operational chain of command from the level of element to the Fleet Commander using Task Force Organization designators (OPCON).
- Whenever a task organization is created, the Commander shall be named in the order creating it. A Fleet Commander is allocated a block of whole numbers the he/she assigns as task force numbers in accordance with his/her needs.
N0
Commander
N1
Manpower/Personnel
N2
Intelligence
Role:
Theater-Provides the systems and intelligence support for current and planned operations.
TYCOM - Provides systems and trained personnel.
N3
Operations
N4
Logistics
N5
Plans and Policy
N6
C4
Role:
Theater-Provides the systems and intelligence support for current and planned operations.
TYCOM - Provides systems and trained personnel.
N7
Training
N8
Resources
N9
Strategic Planning
Identify the IDC work centers onboard a CVN/LHD/LHA
- OZ: CVIC and SUPPLOT
- OS: SSES and EW Mod
- OA: METOC
- CS1: Main Comms
- CS2: Network Security
- CS3: ADP/EDP
SIO
Ship’s Intelligence Officer
ASIO
Assistant Ship’s Intelligence Officer
EWO
Electronic Warfare Officer
SIWO
Ship’s Information Warfare Officer
CSIO
Combat systems Information Officer
CSO
Combat Systems Officer
CSMO
Combat Systems Maintenance Officer
ADPO
Automated Date Processing Officer
8 Explain the clearance adjudication process to include:
a) Investigation - Background investigation of an individual (NACLC, SSBI, SSPR)
b) Appeals - May appeal an unfavorable personnel security determination
c) LOI - Letter of Intent
d) LOD - Letter of Denial
e) JCAVS - Joint Clearance and Access Verification System
Discuss JIC/CVIC interaction with the following:
CIC/CDC, TAO, EW, CO/bridge, Staff/N2, MEU/S2, Signal bridge, Weather Office, FOTC, SSES, SUPPLOT/EXPLOT
- CVIC and SUPPLOT provide indications and warnings (I&W) and in-depth analysis
State the procedures for sanitizing a SCIF for un-cleared visitors.
- Check visitor security clearance. Log visitor arrival/departure times. Remove all classified material from view. Escort un-cleared personnel 100% of the time.
State the responsibility of the person discovering a compromise or a suspected compromise.
- Report to chain of command, SSO/SSR, CO, or NCIS
Access
The ability and/or opportunity to obtain knowledge of classified information
Compromise
Security violation that has resulted in confirmed or suspected exposure of classified information
Personal For
Personal correspondence meant only for the eyes of the recipient
Physical Security
The physical safeguards in place to protect classified information
Discuss the requirements for transporting classified material.
- Two person integrity. For on-ship transportation, classified material must have an appropriate cover sheet. For off-ship, must have a valid courier card, and information must be in a locked case.
Discuss the procedures for creating classified working papers
Classified working papers must have appropriately marked coversheets front and back with date of creation with the notation Working Papers and a general topic.
State the requirements for storage, control, and safeguarding of each classification level of material.
- SENSITIVE COMPARTMENTED INFORMATION
- TOP SECRET
- SECRET
- CONFIDENTIAL
a) SENSITIVE COMPARTMENTED INFORMATION - GSA approved safe within a SCIF
b) TOP SECRET - GSA approved safe within a SCIF
c) SECRET - GSA approved safe within a controlled space
d) CONFIDENTIAL - GSA approved safe
Discuss the requirements for accrediting a SCIF
DCID 6/9- MANUAL
State how to properly dispose of the following:
- SCI Hard Drive
- GENSER Hard Drive
- UNCLASS Hard Drive
a) SCI hard drive - Remove circuitry with a chisel/scraper, smash hard drives with a hammer and scatter parts across a large area of the ship
b) GENSER hard drive - Remove circuitry with a chisel/scraper, smash hard drives with a hammer
c) UNCLASS hard drive - Smash hard drives with a hammer
PROCEDURE: Destruction of burn bags that contain classified material
Manually shred with an approved shredder
PROCEDURE: Destruction of classified CD/DVDs
Manually shred with an approved CD shredder
PROCEDURE: Visit request
To pass visitor(s) security clearance to receiving station VIA JPAS
PROCEDURE: Reporting a security violation or compromise
Report violations to SSO/SSR or chain of command
PROCEDURE: Self reporting
Report to SSO/SSR or chain of command
PROCEDURE: Unofficial foreign travel while holding a SCI clearance
Pass visit request and itinerary to SSO/SSR
PROCEDURE: SAER
Report sent to DONCAF concerning the ability of an individual to maintain access to classified information
Standard Form 700
Written record of lock combinations and POC
Standard Form 702
To sign the opening or closure of classified spaces or safes
HVT
High value target: normal timeline to strike
HPT
High Priority Target: time sensitive target
Define the eight categories of cultural awareness
- THOUGHT PATTERNS
- INTERACTION
- BASIC VALUES
- SOCIAL STRUCTURE
- CHARACTERISTICS OF CULTURE
- PSYCHOLOGICAL ORIENTATION
- PERCEPTION
- PHILOSOPHIC OUTLOOK
Describe the mission and function of EMIO
- Interception of material, personnel and/or resources intended for terrorist/extremist organizations before they can be used against U.S. forces or their allies.
OPLAN
Overall plan with what the Commander wants to achieve
OPORD
How the OPLAN will be achieved
WARNORD
Initial indication (or warning) of a possible operation
PLANORD
Order to begin the planning phase of an operation
EXORD
Order to begin execution of an operation
CONPLAN
Backup plan in the event that the OPLAN cannot be accomplished
Describe the mission and function of MIO.
The primary mission of a Maritime Interdiction Operation is to determine if a merchant ship is in compliance with international law.
Describe the relationship among CMF, MSO and Counter Piracy Operations.
- CMF (international) and MSO (U.S.) work closely together to perform counter piracy operations.