STUDY ME Flashcards

1
Q

Naval Doctrine

A

COWLIP

  • command��
  • operations
  • warfare��
  • logistics��
  • intelligence
  • planning��
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Principles of Naval Logistics

A
SERF ASS
Simplicicity
Economy
Responsiviness
Flexiblitity
Atainability
Sustainability
Survivability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MISHAP Classification Class A:

cost / injury / disability?

A

(1m or more / Fatality / permanent / total disability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MISHAP Classification Class B:

cost / injury / disability?

A

(200k less than 1m / permanent / partial disability — three or more hospilitized)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MISHAP Classification Class C:

cost / injury / disability?

A

(20k less than 200k / None fatal injury)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Hazard Severity (CAT I)
Persons / Naval System?
A

Death / grave damage to Naval System / Loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Hazard Severity (CAT II)
Persons / Naval System?
A

May cause severe injury / damage to Naval System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Hazard Severity (CAT III)
Persons / Naval System?
A

Minor injury / damage to naval system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Hazard Severity (CAT IV)
Persons / Naval System?
A

minimal threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Hazard Severity

A

An assessment of the worst credible consequence that can occur as a result of a hazard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Mishap Probability

A

The probability that a hazard will result in mishap based on assessment of some factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sub CAT “A”

when will it occur?

A

Likely to occur immediately or within short time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sub CAT “B”

when will it occur?

A

Probability will occur in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sub CAT “C”

when will it occur?

A

May occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sub CAT “D”

when will it occur?

A

Unlikely to occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Risk Assessment Codes (RAC’s)

A

It combines the element of Hazard Severity and Mishap Probability (in a grid)

  1. Critical Risk
  2. Serious Risk
  3. Moderate
  4. Minor
  5. Negotiable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is ORM

A

Operational Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the Steps of ORM

A
I AM IS...
Identify 
Assess
Make risk decisions
Implement controls
Supervise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is OPSEC

A

Operational Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

5 Attributes of Information Assurance

A
CIANA
Confidentiality
integrity
availability
non-repudiation
Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Information Operation (IO) Core Capabilities

A

Offensive & Defensive

  1. Psychological operations
  2. Military deception
  3. Operational Security
  4. Computer Network operations
  5. Electronic warfare
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Meteorology teams

A
  1. Mine warfare UUV platoon
  2. Naval Oceanography ASW Team (NOAT)
  3. Strike Group Oceanography Team (SGOT)
  4. Mobile Environmental Team (MOE)
  5. Fleet Survey Team (FST)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Objectives of First Aid

A
  1. Maintain Breathing
  2. Stop bleeding
  3. Prevent farther injury
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

SITREP

A

Situational Report

  1. OPREP 3 Navy Pinnacle (national Lvl interest)
  2. OPREP 3 Navy Blue (High Navy Interest , CNO)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
``` 6 PURPOSES OF NAVAL INTELLIGENCE CG CV P EO PF CA ```
- Identifying Centers of Gravity - Identifying Critical Vulnerabilities - Supporting Planning - Execution of Operations - Protecting the Force - Supporting Combat Assessment
26
6 steps of intelligence
``` planning directing collection processing production dissemination ```
27
NAME THE STEPS: INTELLIGENCE PREPARATION OF BATTLE SPACE (IPB)
1. Define Battlespace Environment (area of operation) 2. Describe Battlespace's Effects (physical characteristics on friendly & adversary capabilities) 3. Evaluate the Threat (adversary capability & vulnerabilities) 4. Determine the Course of Action
28
It is the systematic & continuous analysis of adversary, terrain & weather in the assigned or potential battlespace.
INTELLIGENCE PREPARATION OF BATTLE SPACE (IPB)
29
MISSION OF THE NAVY
1. Maintain, train, equip combat-ready Naval Forces capable of winning wars 2. Deter aggressions 3. Maintain freedom of the sea
30
It is a layout pattern of interconnection of various elements in a network.
Tropology
31
Elements of tropology
1. Bus (each machine is connected to a single cable) 2. Star (all machines connected to a central hub) 3. Ring (data travels around the ring in one direction. Each device acts as a repeater) 4. Mesh (value of a fully meshed network is proportional to exponent number of subscribers. Reed's Law
32
Name three Navy Networks
- NIPRNET (sensitive but unclassified) - SIPRNET (up to secret) - JWICS (top secret)
33
CLASSIFICATION COLOR CODES
- SCI: Yellow - Top Secret: Orange - Secret: Red - Confidential: Blue - Unclassified: Green
34
TRANSPORT OF CLASSIFIED MATERIAL
DCS: Defense Courier Service (Not to exceed 300lbs or specific dimensions/items will be addressed with standard DCS two item line/no classification info on outer wrapper) -Hand Carry: Only in continental US when other methods are deemed impractical/no intermediate stops.
35
CHARACTERS OF WAVE
Wavelength Frequency Altitude
36
What is the wavelength formula?
Wavelength = Velocity/Frequency
37
It is the "physical space" occupied by one cycle in a given time
Wavelength
38
What is frequency?
"number of cycles" in a given time
39
It is the strength or power of a signal
amplitude
40
It is the ability to impress intelligence upon a transmission medium.
Modulation
41
What are the transmission mediums of modulation
``` Carrier Wave (CW) Alternating Amplitude (AM) Alternating Frequency(FM) SSB: Single Side Band USB: Upper Side Band LSB: Lower Side Band ``` *SSB avoids bandwidth doubling & power waste. The other side is a mirror image that can be cut & produced later.
42
What is a Carrier Wave?
Carrier Wave (CW) - Continuous Wave - is switched on/off, key/Morse Code/RF
43
5 THINGS THAT AFFECT PROPAGATION
(RADAR) Movement through a medium -Reflection -Absorption -Diffraction (bending of signal around something or spreading a wave by passing it through an opening or aperture) -Attenuation (weakening of signal) -Refraction (change of direction moving through a medium)
44
INFOCON
1. INFOCON 5: Normal Readiness 2. INFOCON 4: Increased 3. INFOCON 3: Enhanced 4. INFOCON 2: Greater 5. INFOCON 1: Maximum
45
ATMOSPHERIC LAYERS
1. Troposphere (clouds & weather affect radio waves) 2. Stratosphere (middle layer, little to no effect on radio waves) 3. Ionosphere (act as propagation to electromagnetic wave)
46
IONOSPHERE LAYER
* Only E & F2 layers exist day & night* 1. D Layer (lowest layer/only during day, disappears at night) 2. E Layer (after D/exists day & night) 3. F1 Layer (only day) 4. F2 Layer (day & night)
47
THREATCON & FP LEVEL
- FPCON Normal - FPCON Alpha: Small threat, not predictable - FPCON Bravo: Somewhat predictable - FPCON Charlie: Imminent attack - FPCON Delta: Attack taking place or just occurred
48
EMERGENCY DESTRUCTION PROCEDURE (EDP)
- Priority 1: Destroy yellow, orange, crypto label (SCI/TS/COMSEC) - Priority 2: Destroy with/after Pri 1,(Secret-red label) - Priority 3: Destroy with/after Pri 2 (Confidential-blue label) - Priority 4: Destroy last if condition permits & resources available (Sensitive & FOUO-green label
49
MODES OF TRANSMISSION
- Simplex: Data transfer in single direction, eg TV - Full-Duplex: Bidirectional simultaneous, eg phone - Half-Duplex: Bidirectional, non-simultaneous, eg walkie-talkie
50
What is RADAR?
Radio Detection and Ranging
51
Types of Radar
- Air Search - Surface Search/Navigation Search - Fire Control (3 phases) * Designation Phase * Acquisition Phase * Tracking Phase
52
What's a CLUTTER?
Unwanted echoes in RADAR | -Ground & Sea Clutter
53
Types of Radio Waves
1. Sky Waves: Reflected from Ionosphere 2. Ground Waves: Near earth 3. Surface Waves: Along surface of ground 4. Space Wave:
54
CHARACTERISTICS OF SOUND
Pitch Intensity Quality
55
It is the frequency rate of the wave. HINT: one of the characteristics of sound
Pitch
56
It is the amplitude of the wave. HINT: one of the characteristics of sound
Intensity
57
A characteristic of sound that depends on the form of the wave.
Quality
58
NAVY OCEANOGRAPHY PORTAL (NOP)
1. Earth Orientation Products 2. GPS Products 3. VLBI Products (Very Long Baseline Interferometry) 4. Astronomy Products 5. Oceanography 6. Ice
59
FUNNEL CLOUDS
Develop during thunderstorms. Columns of swirling air, when rotating winds become strong enough, funnel will touch down. 2 types: 1. Tornado (touched land) 2. Waterspout (over bodies of water
60
TROPICAL CYCLONE
Storm characterized by large, low pressure center, thunderstorm that produces strong winds & heavy rains
61
Low pressure center, winds less than 38MPH
Tropical Depression
62
Differentiate Hurricanes, cyclones and typhoon
Wind storm of at least 74MPH, have an "eye" which is an area with calm winds & no clouds - Hurricane: Atlantic & Easten Pacific - Cyclone: Indian Ocean & Australia (southern hemisphere) - Typhoon: West Pacific & Asia
63
BREAKER TYPES
Types of breaking water (waves): 1. Spilling (gradual break) 2. Plunging (violent break) 3. Surging (goes on beach)
64
TIDES
1. Ebb (outgoing/receding) 2. Flood (overflow & submerge land) 3. High Tide (water risen to its highest level) 4. Low Tide (water lowered to its lowest level)
65
CURRENTS
1. Open Ocean (created by wind) 2. Littoral (parallel to shoreline) 3. Rip (finds an exit and returns to ocean)
66
OCEAN THERMAL LAYER
1. Mixed: Top 2. Thermocline: Middle, thin, temp change rapidly 3. Deep: Bottom, 1000 fathoms
67
TRANSMISSION OF SOUND IN OCEAN
Aids/Inhibitors: 1. Temperature ( higher temp = faster sound) 2. Pressure (More pressure/depth = faster sound) 3. Salinity
68
ENVIRONMENT AFFECT FOLLOWING WARFARE AREAS
1. Anti-Submarine 2. Naval Special Warfare 3. Mine Warfare 4. Air Defense 5. Humanitarian 6. Chemical, Biological, Nuclear (dispersion by weather) 7. Information Warfare
69
EFFECTS OF ATMOSPHERE ON RADAR BEAM
1. Standard Refraction 2. Super Refraction (target appears higher than normal) 3. Sub-Refraction (RADAR overshoots target)
70
TROPICAL CYCLONE CONDITIONS OF READINESS (COR)
- COR 5 (destructive weather not anticipated within 72hrs, set during hurricane season) - COR 4 (wind in excess of 50MPH, within 72hrs) - COR 3 (wind in excess of 50MPH, within 48hrs) - COR 2 (wind in excess of 50MPH, within 24hrs) - COR 1 (wind in excess of 50MPH, within 12hrs) * Base CO sets COR.
71
EARTH ORBITS
1. Low Earth Orbit (LEO)/environmental 2. Medium Earth Orbit (MEO, covers N & S Poles) 3. High Elliptical Orbit (MOLNIYA)/longer at N Pole 4. Geosynchronous Orbit (GEO)/Best/24hrs/surveillance/not in polar) 5. Polar Orbit (Imagery satellite/covers whole earth
72
SPACE LAUNCH FACILITIES
1. Wallops Island, VA 2. Vandenberg Air Force Base, CA 3. Kennedy Space Center, FL
73
MESSAGE PRECEDENCE
1. R-Routine 2. P-Priority 3. O-Immediate 4. Z-Flash 5. W-Flash Override
74
COMPONENTS OF NAVY MESSAGE
1. Preamble 2. Text 3. Postamble Note: DTG: DDHHMMZ MON YY 271545 Z FEB08
75
MILITARY COMMUNICATION SYSTEMS
1. ADNS (Automated Digital Network System) 2. CUDIXS (Common User Digital Information Exchange System) 3. VERDIN (for submarines LF-VLF) 4. NOVA (store & FWD switching) 5. IBS (Integrated Broadcast System) 6. INMARSAT: International Maritime Satellite
76
What's DMS?
Defense Messaging System
77
What is NREMS?
Navy Regional Enterprise Messaging System
78
What is AMHS?
Automated message handling system
79
What is VTC?
Video Teleconferencing | - Video conferencing
80
What is DCO?
Defense Control Online
81
BREVITY CODES
* GINGERBREAD: Voice Imitative Deception is suspected on the net/It is joint Brevity. All stations may be required to switch the net. * BEAD WINDOW: EEFI disclosure has or may have occurred over the net. Response will be "ROGER OUT" * TEMPEST: Code name for investigation & studying compromising emissions (CI)
82
RIVERCITY
It is a type of EMCON & is used to control outgoing emissions from ships system for OPSEC & Force Protection. - River City 4 (Least Restrictive) - River City 3 (Restricted Access) - River City 2 ( More Restrictive/VIP visits) - River City 1 (More Restrictive)
83
TYPES OF SCIF
1. SCIF: Permanent 2. TSCIF: Temporary. For operations no longer than 40 Hours per month. Will not store SCI. Access to people with SECRET clearance
84
QUALITY OF NAVY/MARINE CORPS
1. Readiness 2. Flexibility 3. Self-Sustainability 4. Mobility
85
THREE LEVELS OF WAR
1. Tactical 2. Operational 3. Strategic
86
``` Explain: COMSEC INFOSEC COMSEC COMPUSEC ```
1. COMSEC: Communication Security 2. COMPUSEC: Computer Security 3. INFOSEC: Replaced both COMSEC & COMPUSEC when they merged into INFOSEC. Now been replaced by Information Assurance. 4. Information Assurance: replaced INFOSEC. It protects Information systems.
87
ATFP/RAM/FPCON/ICD
1. ATFP: Antiterrorism Force Protection 2. RAM: Random Antiterrorism Measures. 3. FPCON: Force Protection Conditions. 4. ICD: Intelligence Community Directives. Delegates responsible to Deputy Director of NI, establishes a system of IC Directives
88
EKMS/OTAR/OTAT
• EKMS: Electronic Key Management system. To ensure proper issuing, accounting, handling, safeguarding, destruction of COMSEC. CO is responsible for any CMS onboard. • OTAR: Over-The -Air-Rekey • OTAT: Over-The -Air-Transfer. Note: Both allow crypto systems to get new updated key via secure communication circuit. Reduce distribution of physical keying material. They are transferred as they needed (Key Tapes)
89
BATTLE OF CORAL SEA
• Date: 4-8 May 1942 • Where: Pacific Significance: • Strategic Victory for Allies • 1st Carrier Vs. Carrier • It was first step for Japanese to invade Australia • US Carrier Lexington was sunk while US Carrier Yorktown was damaged. Japanese never threatened Australia again
90
BATTLE OF MIDWAY
• Date: 4-7 June 1942 • Where: Pacific Significance: • Turning point of war • Brought Equity of forces between Allies & Japan • US Knew of attack on Midway because of Code Breaking. • 4 Japanese carriers were sunk & US Carrier Yorktown was sunk. 3 US Carriers were: Enterprise, Hornet, & Yorktown.
91
BATTLE OF GUADALCANAL
• 12—15 November 1942 - NAVAL Date: August 1942- February 1943 • Where: Pacific Significance: • MacArthur's return to the Phillipines • 1st major offensive actions for the allies/ Marked Transition into offensive strategic • Fought 3 major land battles & 7 Naval Battles
92
BATTLE OF LEYTE GULF
• Date: 23-26 October 1944 • Where: Pacific Significance: • Part of Philippines Battle Campaign • 4 Major Naval Battles • Japanese First Kamikaze Attack (Suicide A/C) • Japan was cut off its major supplies in the south & lost 100 trained pilot which was never replaced
93
D-DAY LANDING
• Date: 6 June 1944 on Tuesday at 0630 • Where: Europe/English Channel Significance: • Refers to Allied Invasion to Normandy Beaches in France. • Biggest Military Deception operation • General Eisenhower was the US Commander • 160,000 troops landed & 5,000 ships were involved
94
USS LIBERTY
• Date: 8 June 1967 • Where: East of Mediterranean Significance: • It was during 6 Days Israel-Arab War • It was attacked by Israel's Fighters & Torpedo boats. • 34 Men Killed • It constitutes the largest loss of life in American Cryptological History.
95
USS PUEBLO
• Date: 23 January 1968 • Where: Off the Coast of N.K in international water Significance: • 1 man died 3 men wounded • 82 men were held captive for 11 months • Constituted the largest single loss of sensitive material.
96
USS STARK
``` • Date: 17 May 1987 • Where: In the Persian Gulf Significance: • During Iraq-Iran war • An Iraq A/C attacked the ship with 2 anti-surface missiles • 37 American Sailors died • The ship failed to defend itself. ```
97
EC-121
• Date: 15 April 1969 • Where: Over Sea of Japan Significance: • Was shot down by North Korea • 31 Americans on plane died (8 officers & 23 enlisted) • 9 of the crew were Naval Security Group technicians (CTs) & linguists in Russian & Korean • Plane belongs to VQ-1 Squadron
98
HAINAN ISLAND
• Date: 01 April 2001 • Where: 70 miles away of Hainan Significance: • Collision in the air between US Navy EP-3E & a Chinese Fighter plan J-8II • EP-3E had 26 minutes to carry out Emergency plan including sensitive material • 24 Crewmembers were detained & interrogated by Chinese government until a letter of apology was issued by President George Bush. • Plane belongs to VQ-1
99
LANDING AT INCHON
``` • Date: 15 September 1950 • Where: West Coast of South Korea Significance: • N.K invaded S.K • General MacArthur was the Commander. • Landing at Inchon would enable UN to mount major attack on Seoul, major roads & rail links in NKPA's line of communication • The highest tides occurred in mid of month. • Chromite was code name • Intelligence was a key ```
100
SPACE MISSIONS
* Mercury 3: May 1961/Alan Shepard/ First US manned space flight * Gemini 3 : March 1965/ John W. Young/ First US 2 man space mission * Apollo 11: July 1969/Neil Armstrong/First manned lunar landing * Apollo17: December 1972/USN 7th & final Lunar landing mission * STS-1: April 1981/John W. Young/ First orbital test flight of space shuttle.
101
NAVAL NETWORK WARFARE COMMAND
Operation of Navy Portion of GIG/Space war fighting capabilities. 1. Naval Network & Space Operation Command (NNSOC) 2. Navy Information Operations Command Norfolk (NIOC Norfolk) 3. Navy Component Task Force Computer Network Defense (NCTF-CND)
102
DEPOT LEVEL REPAIR (DLR)
When a part goes bad, it becomes Not Ready for Issue (NRFI), you turn it to DEPOT Level Repair to get a reduced price. Navy has O Level, I Level, & Depot level. 1. Turn-in: Turn it & get a reduced price. 2. RIP: Remain in place till you get a replacement because equipment cannot function without it.
103
PSYOPS/DECEPTION OPERATION
* Psychological Operations: Is propaganda and not toward a specific target * Deception: Is deceiving and targeted towards military Note: D-Day landing operation was the biggest Military Deception in history.
104
EEFI/CI
* EEFI: Information adversaries will inquire about to obtain answers critical to their own operational effectiveness. * CI: Information if revealed will give the adversary an advantage. It can complicate or prevent a mission, damage friendly resources and cause a loss of life.
105
WARFARE DOMINANCE RATINGS
1. CTI 2. CTT 3. CTR 4. CTN 5. CTM 6. IS 7. IT 8. AG
106
USC TITLE 10/50
1. USC 10: Laws & policies of how DOD & each of services will administratively conduct itself • Subtitle C: Navy & Marine Corps 2. USC 50: Laws on how US will act will involved in Combat, Crisis, and war, other than combat operations, National defense, & hostile Eng. • Chapter 4B: Disclosure of Classified information • Chapter 22: UCMJ
107
MARITIME DOMAIN/OPERATION CENTER
* Maritime Domain Awareness: The effective understanding of anything associated with maritime domain that could impact the security, safety, economy, and environment. * Maritime Operation Center: Allows Navy to maintain a state of readiness, provide commanders with resources, & be able to transit from peacetime operation to crisis and disaster relief operation.
108
DEFENSE PRIORITIES & ALLOCATIONS SYSTEM
DPAS: A system to ensure available industrial resources to meet National Defense emergency program Requirement. It provides an operating system to support industrial response in National emergency. 1. Rated Order: Preferential Treatment/ certified for National Defense use/assigned a rating to assure that they are afforded production priorities ahead of unrated orders. There is a Peace Time/War Time Rating (DX/DO) 2. Non-Rated Order: Commercial Orders
109
JOINT SPECTRUM INTERFERENCE RESOLUTION (JSIR)
* Meaconing * Intrusion * Jamming * Spectrum Management
110
9 CATEGORIES OF COMPUTER INCIDENTS
1. Root Level (Incident) 2. User Level (Incident) 3. Unsuccessful Activity Attempt (Event) 4. Denial of Service (Incident) 5. Non-Compliance Activity (Event) 6. Reconnaissance (Event) 7. Malicious Logic (Incident) 8. Investigation 9. Explained Anomaly (Event)
111
CASUALTY REPORT (CASREP)
It is primary means used to report status of unit with a reduced combat readiness caused by causality. 4 categories: 1. Categ. 1: Loss or degradation of training mission/No CASREP, just an Equip. failure 2. Categ. 2: minor degradation of Primary mission/deficiency exist 3. Categ. 3: Major degradation of primary mission but not a loss. 4. Categ. 4: Loss of at least 1 primary mission/ severe degradation in training mission.
112
IA/OPSEC
* IA: Protect & defend data & Information systems (IS). | * OPSEC: deals with sensitive but unclassified information (EEFI & CI)
113
COMPUTER NETWORK OPERATION
1. CND (Defense) 2. CNE (Exploit) 3. CAN (Attack)
114
3M/PMS/MOV
* 3M: Maintenance & Material management. To achieve maximum equipment operational readiness * PMS: Planned Maintenance System. Preventive maintenance * MOV: Material Obligation Validation
115
IS NEC
* 3910: Naval Imagery * 3912: NSW IS * 3923: Strike Planning Application * 3924: Operational Intelligence Analyst.
116
CTI/CTT NEC
* CTI 9209: Persian * CTI 9215: Hebrew * CTI 9216: Arabic * CTT 9102: National OPELINT Analyst * CTM 9103: Crypto. Fleet system Maintenance Tec. * CTT 9135: Subsurface TECELINT * CTT 9141: Intermediate TECELINT Analysis Technician
117
CTR/CTN
* CTR 9105: (TDNA) Target development & Data Analysis * CTR 9138: Collection Management & Reporting * CTR 9147: Intermediate SIGNS * CTR 9149: Advanced (Special) SIGNS * CTR 9169: Morris Code * CTN 9138 * CTN 9139
118
WARFARE MISSIONS
* ASW: Antisubmarine Warfare * SUW: Surface Warfare * IW: Information warfare * AW: Air Warfare * STW: Strike Warfare * NSW: Naval Special Warfare
119
COMPUTER LANGUAGES
1. Machine Language (set of instructions by CPU/Lowest representation of instructions) 2. Assembly Language (Low level programming language/ uses mnemonic codes) 3. High Level Language (programming language with strong abstractions from details of the computer, e.g. C++)
120
IMPORTANT OCEAN/SEA STRAITS
* Strait of Hormuz: Between Persian Gulf & Gulf of Aden * Strait of Gibraltar: Between Mediterranean & Atlantic * Bab-El- Mandeb: Between Red Sea & Gulf of Aden * Dardanelles: Between Sea of Marmora & Aegean Sea * Bosporus: Between Black sea & Sea of Marmora
121
IMPORTANT OCEAN/SEA BODIES
* Mediterranean Sea * Red Sea / Suez Canal * Black Sea / Caspian Sea * Marmora Sea * Aegean Sea * Gulf of Aden * Gulf of Oman * Arabian Sea * Persian Gulf * Gulf of Aqaba/Suez
122
TYPES OF FRACTURES
1. Open Fracture | 2. Closed Fracture
123
CROSS DOMAIN PROCESS
A reliable review process for transferring from high to low side to protect information. 1. Manual (human) 2. Automated (program) 3. Combination of both (preferred method)
124
CHARACTERISTICS OF ANTENNAS
1. Reciprocity: Interchangeability between transmission & receiving 2. Gain: Focuses radiated RF into narrower Pattern • Higher Gain, the smaller effective angle of use • Lower the gain, the bigger the effective angle of use 3. Polarization: Orientation of Electric Field vector of electromagnetic wave produced by antenna: Vertical/Horizontal/Elliptical 4. Radiation Resistance: If placed instead of antenna, would consume same amount of power radiated by an antenna.
125
METHODS TO CONTROL BLEEDING
1. Direct Pressure 2. Pressure Points (22) 3. Constricting Band Note: Do not use constricting band for head, neck, face, or body. Only for limbs.
126
SYMPTOMS OF SHOCK
1. Weak & rapid pulse 2. Shallow Breathing 3. Face, arms, legs feel cold 4. Sweating 5. Pale Skin 6. Dilated Pupils 7. Thirst, dizziness, weakness 8. May be unresponsive, unconscious.
127
METHODS OF CLEARING OBSTRUCTED AIRWAY
1. Standing Abdominal Thrust 2. Reclining Abdominal Thrust 3. Standing Chest Thrust 4. Reclining Chest Thrust
128
TYPES OF HEAT INJURIES
1. Hypothermia 2. Frostbite 3. Heat Stress 4. Heat Exhaustion 5. Heat Stroke
129
HAZARD OF ELECTROMAGNETIC RADIATION
1. HERO: Hazard of Electromagnetic radiation of Ordnance 2. HERF: Hazard of Electromagnetic Radiation to Fuels 3. HERP: Hazard of Electromagnetic Radiation to Personnel.
130
PERSONAL PROTECTIVE EQUIPMENT (PPE)
1. Respirator 2. Gloves (hand protection) 3. Foot Protection (boots) 4. Eye Protection (goggles/face shield) 5. Skin/Body Protection (apron/coverall) 6. Hearing Protection Note: HCP is the Hearing Conservation Program. Hearing loss is the fleets number one occupational health hazard.
131
ELECTRIC SHOCK
* Remember never touch a person who has been electrocuted without securing power first. If you cannot secure power, use an electric insulator like rubber or wood to push victim away from electric source. * Make sure you have an observer
132
NIOC MISSION STATEMENT
To provide Information Warfare/Cryptologic expertise and personnel to Fleet Air, Surface, Submarine and Special Warfare Combatants and NSA/CSS Georgia. To provide reachback/extended staff support to C/JFMCC CENT/EUR requirements.
133
HISTORY
* 1995: Naval Security Group Activity (NSGAFG) was commissioned * 2005: NSGAFG was renamed Naval Information operation Center (NIOC-G) * 2005: NIOC-G was realigned under NETWARCOM * 2010: 10th Fleet was re-established. It was established between 1941-1945 (officially in 1943). It was an ASW & originally had 50 people. * 1st CNO: Admiral William Benson (1855-1932) * 1st MCPON: Master Chief Delbert Black (1967-1971) * 1st ONI: Lt. Theodorus B. M. Mason * National Security Act 1947: Created DOD/NSC/CIA
134
IMPORTANT PEOPLE | *** UPDATE ME
IMPORTANT PEOPLE • POTUS: President of the US; President Barrack Obama • Vice President: Joe Biden • SECDEF: Secretary of Defense; Leon Panetta • SECNAV: Secretary of the Navy; Ray Mabus • CNO: Chief of Naval Operations; Admiral Michael Greenert • DNI: Director of National Intelligence; James R. Clapper • DIRNSA: Director of National security Agency; General Keith Alexander • DIA: Director of Defense Intelligence; Agency; Lieutenant General Ronald Burgess • ONI: Office of Naval Intelligence; Vice Admiral Kendall L. Card • CJCS: Chairman of joint Chief of Staff; Admiral Michael Mullen • MCPON: Master Chief Rick West
135
METEOROLOGICAL ELEMENTS
1. Wind (Direction/Speed) 2. Temperature (Ambient/Wind Chill/Heat Stress) 3. Precipitation 4. Relative Humidity 5. Sky Condition 6. Atmospheric Pressure 7. Air Mass 8. Weather Fronts (cold/warm/occluded) 9. Restricted Visibility (Fog & Mist)/3nm or less 10. Sunrise/Sunset 11. Lunar Illumination 12. Moonrise/Moonset 13. Tropical Cyclone
136
CODES
* Chromite: Landing at Inchon * AF: Midway. "AF is short of water" * Ultra: Station X/Bletchley Park/the site of UK main decryption establishment & Gov. code * JN-25: Japanese code during WW II/consisted of 45,000 five digit numbers * Purple Code: Japanese cipher machine for communication between major diplomatic establishment prior to WWII
137
WHO IS JOHN BARRY?
1st American Commissioned Naval Officer & 1st Flag Officer
138
Who is Joshua Humphreys?
Designed 6 original frigates (including USS Constitution)
139
Who is the father of nuclear navy?
Hyman George Rickover
140
Who is Eugene Bennett Fluckey?
A submarine commander who received Medal of Honor during WWII. Also received 4 Navy Crosses
141
* Took a part in every assault the US Marines conducted in Pacific from 1942-1945 * They transmitted messages by telephone & radio in their native language code that Japanese never broke.
Navajo Code Talkers
142
SP/CR/SE
* SP: SIGINT Policy * CR: Customer Relationships (regarding reporting) * SE: SIGINT Enterprise
143
CRYPTOLOGICAL SERVICE GROUPS (CSGS)
1. Permanent (Military & Department/Agency) 2. Military 3. Expeditionary
144
AREAS OF COMSEC
1. Cryptosecurity 2. Transmission Security 3. Emission Security 4. Physical Security
145
RULES OF WAR
* Rules of Engagement: Rules & directives that US will follow during combat * Law of Armed Conflict (LOAC): Part of International Law that regulates the conduct of armed hostilities. * No-Strike List (NSL): List of objects or entities that are protected from military operation under international law * Restricted Target List (RTL): Restricted targets by joint force commander * Battle Damage Assessment (BDA): Physical damage assessment, functional & target system assessment
146
TIME SENSITIVE TARGET (TST)
A Joint Force Commander designated target requiring immediate response because its window of opportunity or it poses or will pose danger to friendly forces. 1. Find 2. Fix 3. Track 4. Target 5. Engage 6. Assess
147
EHF
30 - 300 GHZ | -Astronomy/Space
148
SHF
3 - 30 GHZ | -Microwave/WLAN/Radar/Satellite Communication
149
UHF
300 MHZ -3 GHZ | -CUDIX/TV Signal/ Cell Phone/2 way radio communication (maneuvering ships)/GPS
150
VHF
30 - 300 MHZ | -Short range/Local area/Tactical use/less affected by ionosphere & buildings (than UHF)
151
HF
30 - 300 MHZ | -Short range/Local area/Tactical use/less affected by ionosphere & buildings (than UHF)
152
MF
300 KHZ - 3 MHZ | -Commercial AM Radio/International Distress Frequency (500 & 448 KHZ)
153
LF
30 - 300 KHZ | -Less affected by Ionosphere/communications in northern latitudes (Polar Regions)
154
VLF
3 - 30 KHZ | -Broadcast: One way transmission/no response required/Fleet communication or Navigation/VERDIN (Subs communication)
155
ULF
300 HZ - 3 KHZ | -Used in WWI/Earth Mode/Mine Communication/Penetrate Earth
156
SLF
30 - 300 HZ -Radio Services Seafarer (USA) & ZEVS (Russian) operate in this range/ subs communication/uses PC sound card as receivers
157
ELF
3 - 30 HZ -To send short Phonetic Letter Spelled Out (PLSO) to communicate with Subs while operating at normal mission speeds/depths
158
ARTICLE 1007
"Each person in the Naval Service, coming on board a ship of the Navy, must salute the National Ensign".
159
NAVAL VESSELS
Dip the Ensign only to answer a salute; they never salute first.
160
OP-20-G
The Navy radio intelligence organization tasked with providing communication intelligence on the Japanese Navy. It was the key to Nimitz's planning. Commander Joseph Rochefort was in command of station Hypo, the Navy's code breaking organization in Pearl Harbor, Hawaii.
161
AF
Was refering to Midway. The Japanese message was used..."AF- is short of water."
162
USS LIBERTY
08 June 1967, during 6 Day, Arab-Israeli, War; 34 men killed, constituting the largest loss of life in American Cryptolgical History.
163
USS PUEBLO
23 January 1968, off the coast of N.K in international water, NK attacked ship, 1 man died, 3 men wounded, and 82 men were held for 11 months before released. It constituted the largest single loss of sensitive material.
164
CHROMITE
Was the Codename for General MacArthur operation plan to land on the west coast of Inchon on 15 September 1950, where tides were the highest.
165
HAINAN ISLAND
01 April 2001, an EP-3E Aries II collided with a Chinese J-8II Fighter. The crew had 26 minutes to carry out Emergency Destruction Plan. The 24 crew members were detained til a letter of apology was issued by US.
166
CODENAME ULTRA
The high level intelligence produced at Station-X (Bletchley Park), provided crucial assistance to the allied effort and is credited with shortening the war by 2 years, so saving many lives.
167
USS STARK
17 May 1987, during Iraq-Iran war, an Iraqi aircraft attacked the ship with 2 anti-surface missiles, 37 American Sailors died.
168
EC-121
15 April 1969, shot down by NK over the Sea of Japan, 31 men were killed (8 officers & 23 enlisted), 9 of the crew were CT, Naval Security Group.
169
CORE VALUES
Adopted by Adm. Frank B. Kelso II in 1992 after the Tail-Hook incident in 1991.
170
SAILOR'S CREED
Written by "Blue Ribbon Recruit Training Panel" in 1993 at Direction of CNO Adm. Kelso II.
171
FOUNDER AND THE FIRST HEAD OF THE USA OFFICE OF NAVAL INTELLIGENCE
LT. Theodorus Bailey Mayers Mason
172
5102.1
Navy and Marine Corps Mishap and Safety Investigation, Reporting, and Record Keeping.
173
HAZREP
Significant but do not require submission of Safety Investigation Report (SIREP).
174
HERO
Hazards of Electromagnetic Radiation of Ordnance
175
HERP
Hazards of Electromagnetic Radiation to Personnel
176
HERF
Hazards from Electromagnetic Radiation to Fuels
177
HCP
Hearing conservation Program. Noise Induced Hearing Loss is the fleet's number one occupation Health Hazard.
178
CERTIFICATION
Saying an IS does meet a specified security requirements while Accreditation is saying an IS is good to operate in a specified requirements.
179
DAA
Designated Approving Authority.
180
IATO
Interim Approval to Operate. The DAA may grant an interim approval to operate an IS before Accreditation is issued only for no longer than 90 Days. Another extension can be granted but only for another 90 Days, so the total length will not exceed 180 Days.
181
CROSS DOMAIN TRANSFER
From High Side to Low side. This Process is Review Process and may be Manual (reliable Human Review) and/or Automated (machine).
182
ARPANET
Advanced Research Project Agency Network., was the world's 1st operation packet switching network, and one of the networks that came to compose the global internet. President Eisenhower formed the agency as response to the launch of the Sputink by the USSR. In October 1969, the 1st message was sent and received across the networks between 2 nodes.
183
VULNERABILITY
Weakness or flaw in an operating system that the threat tries to exploit.
184
INFORMATION ASSURANCE MANAGER (IAM)
Responsible for the information assurance program within the command, site, and system.
185
OPSEC
Deals with critical but unclassified information. It also establishes EFFI's. -The OPSEC Officer should review the command OPSEC plan annually and complete an OPSEC survey every two years (minimum). You should do an OPSEC initial brief within 30 days of checking into command.
186
PA
A valuable tool in OPSEC planning and implementation in countermeasures. It is essential that the PA maintains its credibility so it remains an effective tool in unit & OPSEC support
187
WRA
Web Risk Assessment, applying OPSEC to the World Wide Web & global information systems.
188
OMBUDSMAN
Coordinate with the OPSEC Officer to provide training to the families
189
REAR ADMIRAL EUGENE BENNETT FLUCKEY & GUNNER'S MATE 1ST CLASS OSMOND INGRAM
Received the Medal of Honor. Rear Admiral Fluckey received Medal of Honor as a Captain when he a commander of a submarine in the Sea of China & encountered 30 enemy vessels. He also received 4 Navy Crosses. Osmond Ingram is the 1st enlisted man to die in WWI. He was also the first enlisted man to have a ship named after him, DD-255 (USS Osmond Ingram), commissioned 28 February 1919.
190
CTO
Computer Tasking Order is an advisory summarizing computer incidents.
191
DIRSUP
To augment existing units with specific set of skills.
192
ARI
Active Reserve Integrated Officers; they are present at all major commands to facilitate the use and employment of reservists during activation.
193
CCOP
Cryptological Carry-on Program, to augment platforms when equipment is needed.
194
NITES
Naval Integrated Tactical environmental System; it has a weather processing & ocean forecasting capabilities and displays it in a graphic fashion.
195
JDISS
Joint Deployable Intelligence Support Systems; it provide hardware & software that connects, syncs different networks with intelligence systems supporting forces and deployed forces during peace, crisis, war.
196
MARITIME DOMAIN AWARENESS
Command Cyber Readiness Inspection; is a formal inspection process that holds commanders accountable for the security posture of their command. It is done by NAVYCYBERFOR on behalf of Defense System information Agency (DSIA).
197
IPB
Intelligence, Surveillance, and Reconnaissance; are the principle elements of US defense capabilities and encompasses a wide variety of systems from Hand Held Radios to orbiting satellites to acquire and process information needed by our National security Decision makers & military commanders.
198
2ND FLEET
NORFOLK, VA
199
3RD FLEET
SAN DIEGO, CA
200
4TH FLEET
MAYFORT FL
201
5TH FLEET
BAHRAIN
202
6TH FLEET
NAPLES, IT
203
7TH FLEET
YOKOSUKA, JAPAN
204
10TH FLEET
FT MEADE, MD
205
Which President signed the National Security Act of 1947?
Harry S. Truman
206
What year did the Defense Intel Agency (DIA) become operational?
1961
207
Which U.S. Navy ship continues to be held captive?
USS PUEBLO
208
What year did the Navy first transmit radio voice comms from air to ground?
1919
209
CVN
Support/operate aircraft Sustained operations in support of other forces
210
CG
Multi-mission surface combatants capable of supporting battle groups
211
DDG
Multi-mission surface combatants capable of acting independently
212
LCC
Provide command and control for Fleet Commanders
213
SSN
Seek and Destroy Subs and Surface ships with Tomahawk missiles
214
LHA/LHD
Transport and land elements of marine expeditionary brigade
215
PC
Coastal Patrol surveillance Forward deployed in support of war on terrorism
216
P-3C(ORION)
Anti-Sub warfare | Maritime surveillance
217
EP-3E(ARIES II)
Land-based SIGINT recon aircraft
218
FFG
Protection of shipping (POS) mission
219
SSGN
Conduct strike and Spec OPS missions through use of missiles
220
SSBN
Strategic deterrence and precise delivery of nuclear warheads
221
Define tropical cyclone conditions of readiness
``` COR 5 - destructive winds within 96 hrs COR 4 - 72 hrs COR 3 - 48 hrs COR 2 - 24 hrs COR 1 - 12 hrs ```
222
Discuss Geosynchronous Orbit
22,300 miles above earth | 1 day period
223
Main Space Launch facilities
Vandenberg AFB | Kennedy Space Cente
224
Layers of Earth's Atmosphere
``` TOP ****************** Thermosphere/Ionosphere Mesosphere Stratosphere 10-25 miles above earth surface Troposphere 7-10 miles above earth surface ****************** BOTTOM ``` TIM ST
225
Cycle
One complete alternation of a sine wave that has maximum value above and maximum value below the reference line
226
Amplitude
Portion of a cycle measured from reference line to a maximum value above or below the line
227
WAVELENGTH
Distance in space occupied by one cycle of a radio wave at any given instant
228
SF700
Security Container Information
229
SF701
Activity Security Checklist
230
SF702
Security Container Checklist
231
5 Steps of OPSEC Process
Identify Critical Information, Threat Analysis, Vulnerability Analysis, Risk Assessment, Measures/Countermeasure
232
9 Categories of Computer Incidents
``` 1-root access 2-user access 3-unsuccessful attempt 4-denial of service 5-poor security 6-scan/probe 7-malicious logic 8-investigating 9-explained anomoly ```
233
Battle of Coral Sea
4-8 May 1942 | USS Lexington Lost
234
Storm
Sustained 50 knots wind speed
235
IDS
Intrusion Detection System | Passive, Alerts only
236
IPS
Intrusion Prevention System | Active, Detects and Stops attacks
237
Three common IP Classes
Class A: 1.0.0.1 to 126.255.255.254 Class B: 128.1.0.1 to 191.255.255.254 Class C: 192.0.1.1 to 223.255.254.254
238
IRT Network Security, Define CIA
Confidentiality, Integrity, Availability
239
VIRUS
Malicious Logic Attached to a Program
240
WORM
SELF-REPLICATING
241
How to verify the integrity of an image file?
MD5 Hash Algorithm
242
IRT OPSEC, define WRA
Web Risk Assessment | Determines whether critical information is placed on command's public facing web site
243
What categories of Indicents require closure messages?
1,2,4,7
244
DEFINE IA
Information Assurance-Protect/Defend data | Confidentiality, Integrity, Availability, Authentication, non-repudiation
245
OPREP 3 Pinnacle
NATIONAL LEVEL OF INTEREST
246
OPREP 3 NAVY BLUE
Provide CNO High Navy interest information
247
OPREP 3 Navy Unit Sitrep
Inform Operational Commander of incidents not meeting Navy Blue criteria
248
3 categories of Intel
Strategic, Operational, Tactical
249
Security Violation vs. Practice Dangerous to Security
Security Violation - Loss or compromise of classified info | PDS - Could result in security violation. Potential to jeopardize security
250
Purpose of COMSPOT
Submitted any time comms outages or degradation is encountered
251
3 types of proof supporting authentication
something you know - password something you have - CAC something you are - fingerprint
252
Define Incident Handling
Mitigation, Containment, Detection, Eradication, Recovery
253
SF 44
Over the counter purchases less than $2,500 | Purchase order/receipt/invoice
254
3 methods for controlling bleeding
direct pressure, indirect pressure, tourniquet
255
DD Form 1348-6
Requisition of items not Identified by NSN
256
Identify the 11 Pressure Points
Ankle, temple, jaw, neck, clavicle, arm(above/below elbow), hand, groin, thigh, knee
257
DD Form 1149
Used to transfer material from one command to another
258
DPAS
Inventory system used to track computer equipment
259
Apogee
Point of orbit furthest away from center of earth
260
Perigee
Point of orbit closest to center of earth
261
Solar Cycle
11 YEAR CYCLE
262
On-the-roof Gang
October 1, 1928 First class of Navy radiomen trained for intercept operations
263
-SF700
-SF700: Security Container info (location/container #/label)
264
-SF701
Activity Security Checklist (filled @ end of day to ensure security...accountability)
265
-SF702:
Security Container Checksheet (who/when opened & closed)
266
SF703
TS Cover Sheet
267
-SF153
COMSEC Material Report (2 signatures)
268
-SF312:
Classified Info Non-Disclosure Agreement