How can we help?

You can also find more resources in our Help Center.

460 terms

EIDWS 100s

100 series
STUDY
PLAY
Concept of ORM
Lowering risks to acceptable levels
ORM "IAMIS"
Identifying hazards
Assessing Hazards
Making risk decisions
Implementing controls
Supervising
Identifying Hazards
Outline all steps in the operations and identify their hazards
Assessing Hazards
Determine the degree of each risk in terms of probability and severity
Making Risk Decisions
Determine whether the benefits outweigh the risks of each step
Implementing Controls
Implement engineering, administrative, and PPE controls to reduce/eliminate risks.
Supervising
Conduct evaluations of controls to ensure they are effective, take corrective actions when necessary. MONITOR; REVIEW; FEEDBACK
Instruction that governs safety and mishap reporting
OPNAVINST 5102.1D
4 Categories of Hazard Severity
(I) Death, grave damage
(II) Severe injury, significant degradation
(III) Minor injury, degradation
(IV) Minimal threat
4 Subcategories of Mishap Probability
(CAT. A) Likely to occur immediately
(CAT. B) Probably will occur in time
(CAT. C) May occur in time
(CAT. D) Unlikely to occur
RAC
Risk Assessment Code
5 RACs
Critical
Serious
Moderate
Minor
Negligible
4 Mishap reportable items
Gov property damage
On-duty DoD civ and mil on/off-duty mishaps
Work-related illness/injury needing more than first aid
Incidents of interest for prevention purposes
Objectives of First Aid
Save Life
Prevent further injury
Prevent Infection
3 methods of controlling bleeding
Direct Pressure
Pressure points
Tourniquet (last resort)
11 Pressure Points
Jaw, Temple, Collar Bone, Neck, Inner-upper arm, inner elbow, wrist, upper thigh, groin, knee, ankle
Symptoms and Treatment for Shock
Dilated pupils, shallow/irregular breathing, clammy skin, nausea, weak/absent pulse
Lay victim down w/ feet elevated, keep victim warm, reassure/calm them
Open (compound) fracture
Open wound in the tissue or skin, bone may be protruding
Closed (simple) fracture
Break is internal and there is no tear in the skin
Clearing an obstructed airway
Heimlich maneuver and reclining abdominal thrust
Hypothermia
General cooling of the body caused by rapidly falling low-temp exposure
pale and unconscious, may be taken for dead, slow/shallow breathing
body temp to normal, no drinks/stimulants til conscious
Heat Stress
body becomes over heated and depending on severity, can lead to numerous heat disorders
Heat Exhaustion
serious disturbance of blood to the brain, heart, and lungs
moist clammy skin, dilated pupils, normal/subnormal temp
get out of heat, keep cool, medical attention
Heat Stroke
Very Serious! caused by a breakdown in the sweating mechanism of body
dry, hot skin, constricted pupils, high blood pressure
keep cool, seek medical emergency help
HERO
Hazardous Electromagnetic Radiation to Ordinance
HERP
Hazardous Electromagnetic Radiation to Personnel
HERF
Hazardous Electromagnetic Radiation to Fuels
Electromagnetic Radiation
energy that travels through space in the form of waves
PPE
Respirators, Hand protection (gloves), Foot protection (steel-toe boots), Eye protection (goggles), Face protection (face shield), Skin/body protection (apron, coveralls), hearing protection (ear muffs/plugs)
Goal of US Navy's Hearing Conservation Program
Prevent occupational hearing loss for all Sailors
6 Areas that Comprise Naval Doctrine "COWLIP"
Command and Control
Operations
Warfare
Logistics
Intelligence
Planning
7 Principles of Naval Logistics "FEARSSS"
Flexibility
Economy
Attainability
Responsiveness
Sustainability
Survivability
Simplicity
US Navy birthday
October 13, 1775
3 Classes of Naval Vessels
Ships of the Line
Frigates
Sloops of War
Ships of the Line
Battleships of the sailing days
largest
64-100 Guns
Frigates
Cruisers of the 18th century
Smaller but faster
28-44 guns
Sloops of war
Smallest sailing war ship
10-20 guns
Hand salute
Men in armor raised their helmet visors so they could be identified
Gun Salute
Only by ships and stations designated by SECNAV
21- Washington's Bday, Memorial Day, Independence Day, honor POTUS & Foreign heads of state
17- Admiral
15- Vice Admiral
13- Rear Admiral
11- Commodore
intervals of 5 seconds, odd numbers
Battle of the Coral Sea
World's first Carrier on carrier battle
Battle of Normandy
Largest Amphibious assault in world history
Midway
Turning point in the battle of the pacific War
Guadalcanal
5 Sullivan Brothers on the USS Juneau, ship was torpedoed, all brothers died. Southern Solomon Islands came under Allied control, Australia was in less danger of attack
Mercury 3
First manned spaceflight program
CDR Alan Shepard
Gemini 3
First 2-person spaceflight, first to maneuver from one orbit to another
LCDR John W Young & CDR Grism
Apollo 11
First ever manned lunar landing
Neil Armstrong & Buzz Aldrin
Apollo 17
7th and final lunar landing mission
Eugene A Cernan & Ronald E Evans
STS-1
First orbital test flight of space shuttle
All Navy Crew
John W Young & Robert L Crippen
On-the-Roof Gang
176 (150 Navy & 26 marines) enlisted radio operators
laid the cornerstone of Naval Cryptology
USS Liberty
6 day war between Israel and several Arab nations
Due to ineffective message handling and routing the CPA change messages were not received until after struck by Israeli aircraft
Poor Communications
USS Pueblo
Attacked by North Korean Patrol boats
Ship was retained by North Korea and is now at the museum in Pyongyang, the North Korean capital city
D-Day Landing
Germans were fooled into believing that Allied Forces would land elsewhere
Bletchley Park
Britain's Cryptology Center, Cypher School
Landing at Inchon
Intelligence efforts allowed US Army to route the North Korean Army
Hainan Island EP-3 Incident
Chinese J-811 Interceptor collided with an EP-3, which was forced down. Emergency destruct occured on EP-3.
Mid-air collision with a chinese fighter that sparked intl. debate
Navajo Code Talkers
"WINDTALKERS" Used Native American language to transmit battle messages in the Pacific.
Japanese never broke the code
USS Stark
Attacked by Iraqi Mirage F1 fighter while outside Iragi and Iranian declared warzones (STARK was in international waters)
No indication of attack (Early Warning Failed)
US failed to detect the attack, Stark crew assumed fighter was benign and by the time they decided to take precautions it was too late
EC-121 Shoot-down
EC-121 was attacked without warning by North Korean MIG while flying its last mission with a double crew (31 Sailors) Everyone died
3 Levels of War
Strategic
Operational
Tactical
National Security Act of 1947
Signed by President Truman
Established the CIA
War Dept and Navy Dept merged into DoD
Created Dept of the Air Force
Navy Core Values
1992
Sailor's Creed
1993 Admiral Boorda
RADM Grace Hopper
First Female Admiral
Oldest Admiral in the Navy
Retired on oldest commissioned ship in the navy
First computer and where it was located
ENIAC (Electronic Numerical Integrator and Computer)
1942 University of Pennsylvania
ARPANET
Advanced Research Products Agency NETwork
World's first packet-switching network
ONI
Established in 1882 by SECNAV William H Hunt
First CIO/DNI
LT Theodorus Bailey Myers Mason
2 Depts that Formed ONI
Dept Library and Office of Intelligence
Mission of US Navy
Train, Maintain, equip combat-ready naval forces capable of winning wars, maintaining freedom of the seas
NCA, members, functions
National Command Authority
Ultimate lawful source of military orders (collectively, President and SECDEF)
Use of US Military Forces
Use of Nuclear weapons
OPCON
Operational Control, having operational responsibility
ADCON
Administrative Control, having administrative responsibility
COCOM
Combatant Command
Broad continuing mission under a single commanger (2+ military depts)
Navy COCOM
maritime mission under a single commander
FLTCOM
Fleet Command
Parent command for all naval units
subordinate to a specific fleet (operational control)
TYCOM
Type Command
administrative chain of comman, various ships report to appropriate forward-area commanders
PACOM
Pacific Command (OAHU) 3rd and 7th fleet
EUCOM
European Command (Stuttgart, Germany) AOR almost 1/5th of planet, Europe/E Atlantic Arctic, and Atlantic Oceans/Med
JFCOM
Joint Forces Command (Norfolk)
Coordinate joint efforts
SOUTHCOM
Southern Command (Miami) South America and Central America
CENTCOM
Central Command (Bahrain) Middle East
NORTHCOM
Northern COmmand (Peterson AFB, CO) US Interests
SOCOM
Special Operations Command (Tampa) US special operations activities
TRANSCOM
Transportation Command (Scott AFB, IL)
Ensures timely, customer-forcused flobal mobility in Peace and Wartime with efficient, effective and integrated transportation
STRATCOM
Strategic Command (Offutt AFB, NE) Detect, deter, and prevnt attacks against US and Our Allies
AFRICOM
Africa Command (Stuttgart, Germany) Africa
USCYBERCOM
Cyber Command (Ft Meade), Worldwide
CNO N2/N6
Chief of Naval Operations - the senior military officer of the DON for Information Dominance/ Meteorology and Oceanography/Space
CNMOC
Commander, Naval Meteorology and Oceanography Command
NNWC
Naval Network Warfare Command
Mission includes operations to secure the Navy's portion of Global Information Grid and deliver reliable and secure net-centric and space warfighting capabilities
National Oceanic Atmospheric Administration (NOAA)
Daily weather forcasts, severe storm warnings and climate monitoring to fisheries, coastal restorations and supporting marine commerce
Navy Cyber Forces (NAVCYBERFOR)
Navy's Type Commander (TYCOM)
Office of Naval Intelligence (ONI)
HQ in Suitland, MD
ONI produces meaningful maritime intelligence and moves that intelligence rapidly to key strategic, operational, and tactical decision-makers
2nd Fleet
East coast to Mid-Atlantic (Norfolk)
3rd Fleet
West coast to IDL (San Diego)
4th Fleet
Central and South America (Mayport)
5th Fleet
Middle East to include the Persian Gulf (Bahrain)
6th Fleet
Mediterranean (Solerno, Italy)
7th Fleet
West of IDL to Pakistan (Japan)
10th Fleet
Worldwide cyber responsibility (Fort Meade)
TF
Task Force
Subdivision of a Fleet
TG
Task Group
Division of a TF
TU
Task Unit
Division of a TG
TE
Task Element
Division of a TU
Four IDC Core ratings
AG, CT, IS, IT
NCTAMS
Naval and Computer Telecommunication Area Master Stations
NCTAMS LANT
(Norfolk) Provides classified and unclassified voice, messaging, data and video to ships, submarines, aircraft and ground forces operating worldwide in support of Naval and joint missions
C4ISR
Command, Control, Communication, Computers, and Intelligence Surveillance Reconnaissance
gather, process, disseminate, evaluate and display data
DISA
Defense Information System Agency
Engineers and provides C2 capabilities and an infrastructure to continuously operate a global net-centric enterprises
NASIC
National Air and Space Intelligence Center
foreign aerospace intelligence via surveillance and reconnaissance
NCDOC
Navy Cyber Defense Operations Command
Provides 24/7 protection to Navy's Cyber systems
ODNI
Office of the Director of National Intelligence
head of the US IC principle advisor to the President, NSC, and Homeland Security
DIA
Defense Intelligence Agency
cogent military intelligence to warfighter, defese planner
NSA
National Security Agency
Protect US national security systems and produce foreign signals intelligence information
CIA
Central Intelligence Agency
Focal point for the collection, analysis, and dissemination of all US intelligence (HUMINT)
NGA
National Geospatial Intelligence Agency
GEOINT in support of national security
DHS
Department of Homeland Security
tasked with preventing terrorist attacks
FBI
Federal Bureau of Investigation
protects and defends the US against terrorist and foreign intelligence threats, enforces criminal laws, provides services to federal, state, agencies and partners
DEA
Drug Enforcement Administration
combat the flow of narcotics
DOE
Department of Energy
Responsible for energy policy and nuclear safety
DOS
Department of State
conduct of the nation's foreign relations
DOT
Department of Treasury
Analyzes foreign intel related to US economic policy
NASA
National Aeronautics and Space Administration
responsible for education, research, and scientific discovery regarding aerospace
NRO
National Reconnaissance Office
provides overhead intelligence systems for national security
Secretary of Defense
Principle defense advisor to President
responsible for formulation of general defense policy
CCRI
Command Cyber Readiness Inspection
Formal inspection
holds commanders accountable for their respective security posture
EDVR
Enlisted Distribution Verification Report
monthly statement of an activity's enlisted personnel account
1 Prospective Gains
2 Prospective Losses
3 Alpa roster (to include temp duty/deserters etc)
4 Total personnel onboard by rate
AMD
Activity Manpower Document
single official statement of funded and unfunded requirements (manpower authorizations of B/A) for each UIC
Page 2
Dependency/emergency data
Page 4
Enlisted Qualification
SGLI
Servicemen's Group Life Insurance
Page 13
Administrative remarks
OPREP-3 Navy Unit SITREP
notify appropriate operational commanders and other higher authority of incidents not meeting OPREP-3 Navy lue reporting criteria
OPREP-3 Navy Blue
high Navy, vice national level, interest
OPREP-3 Pinnacle
national-level interest
IG
Inspector General, serves as principle advisor to SECDEF on all audit and criminal investigative matters relating to prevention and detection of fraud, waste, and abuse in programs and operations of the Dept of Defense
Navy Correspondence manual
perparation of correspondence
PTS
Long range force shaping tool that aids in leveling rating manning between overmanned and undermanned ratings, while managing the quality of reenlistment applicants
Officer accession programs that are available to enlisted personnel
LDO, Warrant Officer, MECP, STA-21, OCS, Naval Academy
DLPT
Defense Language Proficiency Test
Tests intended to assess the general language proficiency of native English speakers in a specific foreign language
DLPT Scoring
0-5 in the following categories
Speaking
Listening Comprehension
Reading comprehension
writing
Command ESO
Supervise the administration of the training office and training aids
US Navy's Drug Screening Program
Deterrent against drug use
6 Programs of Brilliant on the Basics
Mentorship
Indoc
Career Development Boards (CDB's)
Recognition
Ombudsmen
Sponsorship
PAO
Public and Media Affairs
DPAS
Defense Property Accountability System
web enabled system that tracks lifecycle of an asset from receipt to disposition
MOV Program
Material Obligation Validation
DLRs
Depot Level Repair
manages high-calue (cost) items
cannont be repaired or reused
Turn-in (NRFI DLRs)
For exchange basis only
RIP (NRFI DLRs)
Return in Place
Part may be degraded, it is required to remain in use until the new item arrives
MAMs
Maintenance Assist Module
used for troubleshooting only
Bulkhead mounted spares
Spares that are kept in the work center due to size or cost
CASREP
Casualty Report
equipment malfunction or deficiency which cannot be corrected within 48 hours
reduces unit's ability to perform a primary mission, secondary mission, or training commands mission
CAT I (CASREP 4 Categories)
training commands
CAT II (CASREP 4 Categories)
degradation in any primary mission, or a major degradation or total loss of a secondary mission
CAT III (CASREP 4 Categories)
deficiency exists in mission essential equipment which causes a major degradation but not the loss of a primary mission
CAT IV (CASREP 4 Categories)
causes a loss of at least one primary mission
NSN
Naational Stock Number
13 digit number
identify an item of material in supply distribution system
COG
Cognizance
2 character symbol
APL
Allowance Parts List
AEL
Allowance Equipage List
NC
Not Carried
NIS
Not in Stock
SIM
Selected Item Maintenance
DD Form 1348-6
NON-NSN (anywhere)
NAVSUP 1250-2
NON-NSN (Navy Supply Source Only)
SF 44
Purchase Order/Invoice/Voucher
DD Form 200
Financial Liability Investigation of Property Loss (FLIPL)
CHRIMP
lifecycle control and management of Hazardous Material
DRMS
Defense Reutilization and Marketing Service
disposition of excess and surplus military equipment and supplies
OPTAR
Operating Target
Check book sort of speak or running balance
2 sections/components OPTAR
Repairable and Consumable
Directives that govern personnel security
NAVSUP to DoD DIR 5105.21.M-1
SECNAV M5510-30
ICD 704
Need to know
knowledge, possession of, or access to classified information is not provided to any individual solely by virtue of the individual's office, rank, position, or clearance eligibility
Top Secret
SSBI every 5 years
Secret
NACLC every 10 years
Confidential
NACLC every 15 years
SCI
SSBI 5 years
SAER
Security Access Eligibility Report
any info that might affect someone's continued eligibility for access to SCI
Events reportable to SSO
Unexplained excessive indebtedness
Alcohol Abuse
Illegal drug use
mental disorder
criminal conduct
Overall authority of and controls access to a SCIF
CO
SF700
Security container envelope
SF701
Activity security checklist
SF702
Security container checksheet
SF703
TOP SECRET coversheet
SF153
COMSEC material report
SF312
Classified nondisclosure agreement
When Safe Combo needs to be Changed
Lock is placed
person no longer requires access knows code
combination compromise
combination is out of service
maintenance was performed on lock
designated by the CSA/SIO or owner of safe
FDO
Foreign Disclosure Official
approves the disclosure of classified and controlled unclassified military information to foreign representatives
DCS
Defense courier service
DCS-Double wrapped
properly marked classification (Inside inner wrapping) NO CLASSIFICATION MARKING ON OUTSIDE WRAPPING
single items < 150lbs, cant be > 300lbs total
TSCO
Top Secret Control Officer
responsible for the safe keeping/storage of TS material within a command
RAM
Random Antiterrorism Measure
EAP
Emergency Action Plan
minimize the risk of personal injury or loss of life
SCI destroyed First!
Priority 1 (Emergency Destruction)
All cryptographic equipment and documents
Priority 2 (Emergency Destruction)
All operational SCI codeword material which might divulge targets and successes, documents deaing with US SCI activities and documents, TOP SECRET material, and other sensitive material
Priority 3 (Emergency Destruction)
Less sensitive administrative SCI material and collateral classified material not included above
COMSEC
Protecting our communications
INFOSEC
ensuring information is not compromised
COMPUSEC
ensuring our computers are secure
PSP
personnel, ensuring there is no unauthorized access to SCIFs or classified information
ATFP
Antiterrorism force protection
SSO Navy
Director, security and corporate services, oversees SSO operations
Who can be a CSM
Must be officer or civilian emplyee (GS-11+)
US Citizen
Completed SSBI
Duties and responsibilities of CSM
Command Security Manager
Responsible for the administration of the command's information and personnel security programs
JPAS
Joint Personnel Adjudication System
DoD managed, official personnel security migration database/system
DONCAF
Dept of the Navy Central Adjudication Facility
determining who withing the DoN is eligible to hold a security clearance
How long can CO administratively suspend access
90 days
180 days for interim clearance
INFOCON 1
attacks are taking place
Computer Network Defense system is at maximum alertness
INFOCON 2
attack has taken place
Network Defense system isnt at its highest alertness
INFOCON 3
risk has been identified
INFOCON 4
increased risk of attack on computer networks
INFOCON 5
no apparent hostile activity against computer networks
IA
info ops that protect and defend data and info systems by
availability, integrity, authentication, confidentiality, and non-repudiation (using the 5 attributes)
Certification
comprehensive evaluation of the technical and non-technical security features of an IS
Accreditation
official management decision to operate an IS in a specified environment
5 Attributes of IA
Confidentiality, Integrity, Availability, Non-repudiation, Authentication
Confidentiality (IA)
Assurance that info is not disclosed to unauthorized persons
Integrity (IA)
Assurance that info is not modified by unauthorized parties or in an unauthorized manner
Availability (IA)
Assurance of timely, reliable access to data and information systems by authorized users
Non-repudiation (IA)
Assurance that the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity
Authentication (IA)
Assurance of identify of a message sender or receiver
Root Level Intrustion
unauthorized (administrative) privileged access to a DoD system
User level intrusion
unauthorized non-privileged access to DoD system
Denial of Service
denies, degrades, or disrupts normal functionality of a system or network
Malicious Logic
installation of software designed and/or deployed by adversaries w/ maicious intentions of gaining access
Unsuccessful Activity Attempt
deliberate attempts to gain unauthorized access to DoD system, attacker fails
Non Compliance Activity
potentialy exposes DoD systems to increased risk as a result of action/inaction of authorized users
Reconnaissance
seeks to gather info used to characterize DoD systems, apps, networks, and users
Investigating
events that are potentially malicious, warrant/are undergoing further review
Explained Anomaly
do not fit criteria for any other categories
IAVA
Info Assurance Vulnerability Alert
high risk
IAVB
Info Assurance Vulnerability Bulletin
medium risk
IAVT
Info Assurance Vulnerability Technical Advisory
low risk computer software, form of an advisory
CTO (Comms Tasking Order)
DoD-wide instruction that promulgates mandatory changes in standing instructions on how comms are handled
Vulnerability
actual weakness in an info system
Threat
circumstance or event w/potential to adversely impact
Host/Client
Main computer that's connected to other computers, provides data services via a network
Application Server
Specialized server in a client network that runs only specific applications within that network
Hub
Common connection point for devices in a network
Switch
Same as HUB but smarter, only forwards packers to intended recipient port
Router
Physical device that joins multiple wired or wireless networks together
WAP
Wireless Access Protocol
Open international standard for application-layer network communications
Proxy Server
Internet server that controls client access to the internet
Firewall
Configured to permit or deny computer applications upon a set of rules. Blocks unauthorized access while permitting authorized communications
VPN Concentrator
Virtual Private Network
Back-up
Process of backing up refers to making copies of data so that additional copies may be used to restore the original after a data loss event
Repeater
Regenerate signals. Attempt to preserve signal integrity and extend the distance
Bus
Set of clients are connected via a shared communictions line
Star
All devices are connected to a central hub
Ring
network in which each node connects to exactly two other nodes
Mesh
network in which all components are connected to every component
LAN
Computer network covering a small physical area (home, office)
WAN
network covering a broad area (NSAnet/NMCI)
MAN
larger computer network, spans city or large campus (college campus)
GAN
composed of different interconnected computer networks and covers an unlimited geographical area (Internet/Google)
OSI Model
Application, Presentation, Session, Transport, Network, Data Link, Physical
IPv6
128-bit address
IPv4
32-bit address
NIPRnet
Non-secure Internet Protocol Router Network
SIPRnet
Secure Internet Protocol Router Network
JWICS
Joint Worldwide Intel Comms System
GIG
Global Information Grid
DoDN GIG
Blobally interconnected end-to-end set of information capabilities managing info on demand to the warfighter, policy makers, and support personnel
Assembly Language
low level programming language using the human readable instructions of CPU
High level language
enables a programmer to write program
Operating System
Acts as a host for computing applications run on machine
Application
Program designed to perform a specific function directly for the user
Virus
Software program, script, or macro designed to infect, destroy, modify, or cause other problems
Worm
self-replicating virus, does not alter files, resides in active memory and duplicates itself. Causes system to slow or halt completely
Trojan
appears legit but performs some illicit activity when run, used to locate password info, destroy data on hard drive
Backdoor
remote admin utility, allows a user access and control it over a network
Phishing
illegal process of attempting to acquire sensitive infor such as usernames, passwords, and credit card infor
Network Enumeration
computing activity in which usernames and infor on groups, shares and services of networked computers are retrieved to later exploit
Buffer Overflow
stores data in a buffer outside the memory the programmer set aside for it
SQL Injection
malicious code is inserted into strings, passed to an instance of SQL Server for parsing and execution
Dictionary Attack
method of breaking into a password-protected computer by entering every word in dictionary as password
Privilege Escalation
exploiting a bug or design flaw in a software application
Brute Force Attack
used to break an encryption or authentication system by trying all possibilities
Social Engineering
tricking a user into giving access to sensitive information, thereby bypassing most or all protection
DNS
translates domain names into the numerical identifiers associated with networking
Red Cross Message
message delivered 24/7/365 to military at any duty station. Used by family members to notify service members of emergency or other important event
ADNS
Advance Digital Network System
Connect Navy shipboard networks to other ship and shore networks for tranferring IP data
CUDIXS
provides a 2400 baud full duplex interface, over satellite link w/mobile platforms, for receipt and transmission of GENSER msg traffic
VERDIN
Broadcast system, provides highly reliable and secure system for worldwide delivery of operation, tactical, and admin msgs Fleet Submarine Broadcast System
NOVA
Automated Message Store and Forward System, relays messages to other commands outside immediate AOR
IBS
Integrated Broadcast System Integrated several existing systems into a single system of broadcast allowing receipt of data via single receiver
3 types of IBS
IBS-I (integrated) - System interactive
IBS-S(Simplex) - Used to transmit and receive data to and from the broadcast
IBS-N (Network) - Only receiving information
AMHS
Automated Message Handling System
Provides simple message drafting, coord, release of outgoing msgs, an internal distro and delivery function for incoming messages
GINGERBREAD
code word
intruder on the voice network
EEFI
Essential Elements of Friendly Information
EEFI 01
Position- Friendly or enemy position. Movement, position, course, speed, altitude, destination of air or ground forces
EEFI 02
Capabilities - Friendly or enemy for composition or identity, capabilities, limitations to specific equipment, weapon systems, sensors, units or personnel
EEFI 03
Operations - Friendly or enemy. Operation, intentions, progress, or results. Operational or logistic intentions. Assault objectives. Mission participants, situational reports
EEFI 04
Electronic Warfare - Intentions, progress, or results
EEFI 05
Personnel - Movement or identity of flag officers, distinguished visitors, unit commanders
EEFI 06
COMSEC - Breaches, linkage of codes or code words with plain language, compromise of changing freqs, changing call signs, compromise of encrypted call signs
EEFI 07
Wrong Circuit - Inappropriate transmission: info requested, transmitted, or about to be transmitted which should not be passed on
EEFI 08-10
NATO - assignment as required
EEFI 11-29
Reserved for COMUSNAVEUR
EEFI 30-49
Reserved for COMUSFLTFORCOM
EEFI 50-69
Reserved for COMPACFLT
BEAD WINDOW
attention of circuit operators the fact that an EEFI disclosure has occurred
RIVER CITY
Communications is cut/limited
1. CO,XO,CMC, key personnel
2. DH+
3. E7+
4. All hands
MIJI
Meaconing
Intrusion
Jamming
Interference
Meaconing
Intentional transmission of signals designed to deceive users of navigational aids
Intrusion
Intentional insertions of EM energy into transmission paths in any manner
Jamming
Deliberate radiation, re-radiation, or reflection of EM energy for the purpose of preventing an enemy's effective use of the EM spectrum
PLA
Plain Language Address
used to denote the command short title and sometimes geographic location used in message addressing
DTG
Date Time Group
A time stamp used in Naval Messages to help track and reference indicidual message traffic
DDHHHH ZMMMYY
FL/2 (Standard Navy Message)
Message Header
FL/4 (Standard Navy Message)
Classification
FL/5 (Standard Navy Message)
DTG
FL/6 (Standard Navy Message)
From
FL/7 (Standard Navy Message)
TO
Fl/8 (Standard Navy Message)
INFO
FL/12 (Standard Navy Message)
Subject, Classification, Body
R (Message Precendence)
Routine, 6 hours, for messages of all types
P (Message Precendence)
Priority, 3 hours, Essential info for operations in progress, highest precedence for admin messages
O (Message Precendence)
Immediate, 30 min, Messages relating to situations that gravely affect the national forces
Z (Message Precendence)
Flash, 10 min or less, extreme urgency, reserved for initial enemy contact
W (Message Precendence)
Flash Override, 10 min or less, overrides all other codes
EKMS
Electronic Key Management System
basic guidelines for handling COMSEC material
TEMPEST
unclassified codename
referring to investigations and studies of compromising emanations
EMCON
Condition set for specific purpose of reducing or limiting the electronic signature of the ship for a specific reason
4 EMCON Conditions
A- Radio Silence
B- Hide from Satellites
C- Reduce targeting signature for adversaries'
D- Essential equipment is authorized
ASW
Anti Submarine Warfare - destruction or neutralization of enemy subs by aircraft, surface, and other subs
SUW
Surface Warfare - ASUW - destruction or neutralization of enemy surface combatants and merchants
IW
Information Warfare - actions taken to achieve info superiority over adversary by influencing info-based processes, systems, and computer networks
AW
Air Warfare - action required to destroy or reduce enemy's air and missile threat. Includes use of interceptors, bombers, SAMs, AAMs, and EA
STW
Strike Warfare - destruction or neutralization of enemy land-based targets w/conventional or nuclear missiles
NSW
Special Warfare - distinguished by unique objectives, weapons and forces and characterized by
Principally offensive, high physical and political risk
Directed at high-value, critical, and often perishable targets
Principally politico-military in nature, frequently covert or clandestine
Direct Support
DIRSUP used for short-duration requirements that require specialists not normally included in a ship's PCS complement
PSYOPs
Psychological Operations (MISO) convey selected information (selective truths) to targeted foreign audiences to influence their emotions, motives, objective reasoning, and ultimately behavior
MILDEC
Military Deception
false information
OPSEC
Operational Security
EW
Electronic Warfare
CNO
Computer Network Operations
Red Team
Threat actor's point of view
Blue Team
Assisting in the protection of targeted assets and conducting training to local personnel
FES
FES is responsible for installation, removal, and maintenance and repair of Cryptologic Direct Support Element (CDSE) electronic equipment, both surface and subsurface combatants
USC Title 10
Outlines role of armed forces in US Code. Provides legal basis for roles, missions, and organizations of each service as well as DoD
USC Title 50
Outlines the role of War and National Defense in the United States Code
CRITIC
Reporting vehicle used to notify President and the national Security Council of critical information, such as an attack on US Vessel or territory, Threat to US Assets, Terrorist Attack, of I&W of Terrorist Attack etc, sent at the highest message precedence by most rapid means possible, within 10 minutes
CCOP
Cryptologic Carry-On Program
NITES
Navy Integrated Environmental Support Subsystem
Set of meteorology and oceanography forecast, database, and decision aid tools tailored for specific platforms and uses
JDISS
Joint Deployable Intelligence Support System
Maritime Operations Center
Critical support in execution of nation's Maritime Strategy
5 Step Planning Process (OPSEC)
Identify Critical Info (CI)
Conduct Threat Assessment (TA)
Conduct Vulnerability Analysis (VA)
Conduct Risk Assessment (RA)
Apply Contermeasures (AC)
WRA
Web Risk Assessment
risk assessment conducted on all DON websites to identify and report OPSEC vulnerabilities
OPSEC Program
CO, XO, DH, OPSEC Officer, Dept and Div OPSEC Rep's
6 steps of Intelligence
Planning and Direction
Collection
Processing and Exploitation
Analysis and Production
Dissemination and Integration
Evalutation and Feedback
3 Categories of Intelligence
Strategic
Operational
Tactical
Publications that govern IO
EO 12333
DoD Regulation 5240.1-R
NSA Policy 1-23
USSID SP0018
US Person
A) Citizen of US
B) Alien lawfully admitted for permanent residence
C) unincorporated association w/ a substantial # of members who are either a or b
D) corporation that is incorporated in the US
Mission of Fleet Intelligence Office
Provide intel necessary to plan, build, train, equip, and maintain naval forces. The National Maritime Intel Center consists of ONI, USCG Intel Coordination Center, NIOC, and detachments of the Marine Corps Intel Activity and NCIS
MASINT
Measurement and Signature Intelligence
scientific and technical intelligence information obtained by quantitative and quallitative analysis of data (metric, angle, spatial, wavelength, time dependence, modulation, plasma, and hydromagnetic)
SIGINT
Signals Intelligence
intelligence-gathering by interception of signals whether between people (COMINT), involving electronic signals not directly used in communication (ELINT), or combinations of the two.
FISINT
Foreign Instrumentation Signals Intel
ELINT
Electronic Intelligence
Intentionally vague term actually refers specifically to interception and analysis of radar signals
IMINT
Imagery Intel
3 examples of intel briefs
Deployment Briefs
Debreifings
Aircre briefs
Port briefings
ELF
3-30Hz
subs
SLF
30-300Hz
ULF
300Hz-3Khz
sub comms
VLF
3-30Khz
long range signals to subs operating at normal mission speeds and depths
LF
30-300Khz
Fleet multi-channel broadcast system
MF
300Khz-3Mhz
primarily by Navy for ground wave transmissions
Commercial AM broadcasts
internation distress freqs (500Khz/484Khz)
HF
3-30Mhz
VHF
30-300Mhz
bridge to bridge
UHF
300Mhz-3Ghz
LOS comms
SHF
3-30Ghz
RADAR and Satellite comms
EHF
30-300Ghz
Frequency
Number of cycles that occur in one second
usually in hertz
Wavelength
distance from crest of one wave to crest of the next, or from any two similar points on adjacent waves
Ducting
Temperature of moisture conditions in Atmosphere that allow a greater bending of radio waves which can greatly extend the radio wave horizon
Refraction
wave that changes direction when passing from one medium into another
Multiplexing
simultaneous transmission of two or more signals (either in time or freq) over a common carrierwave
Modulation/Demodulation
Impressing intelligence upon a transmission medium/Removal of intel from a transmission medium
Bandwidth
space within the radio frequency spectrum that a signal occupies
keying
inserting noise or data onto a freq
Troposphere
located between surface of Earth to about 3.7 miles at North pole or South Pole and 11.2 miles at the equator.
Almost all weather conditions occur here and greatly affect radio waves
Stratosphere
Located between troposphere and ionosphere. Almost constant temp and little water capor. Little to no effect on radio waves
Ionosphere
located upward from about 31.1 miles to about 250 miles
4 cloud-like layers of electrically charged ions which enable radio waves to be propagated to great distances around Earth
Most important for long distance point-to-point comms
Propagation
movement through a medium
Azimuth Angle
angular measurement in the horizontal plane in a clockwise direction
CW (carrier Wave)
modulating wave
radio freq which facilitates the transmission of intel across a medium
fundamental freq or transmitter freq
CW (continuous wave)
unmodulated freq, does not carry additional modulated intel, transmitted for use in some radio transmissions such as morse code or radio beacons
PRI
Pulse Repetition Interval
duration of time from the leading edge of one pulse to the leading edge of another pulse (Total Time)
PRF
Pulse Repetition Freq
rate at which pulses are transmitted (Inverse of PRI)
RF
energy is transmitted to and relects from reflecting object (Operating Frequency)
Bearing
angle measured clockwise from true north in the horizontal plane
azimuth
angular measurement in the horizontal plane in a clockwise direction
RADAR
RAdio Detecton And Range
Half Duplex
shared transmission medium, comms in each direction but can't proceed simultaneously (walkie-talkies)
Duplex
allows transmission in two directions simultaneously (telephone)
Simplex
Can only transfer data in a single direction (broadcast radio)
Air Search
detect and determine position, course, and speed of air targets; max range can exceed 300 miles; used as early warning devices
Surface Search
used to detect presence of surface craft and low flying aircraft/ navigational aid in coastal waters and poor weather conditions
METOC
Meteorology and Oceanography
Geostationary Operational Environmental Satellite (GOES)
operated by US National Environmental Satellite, Data, and Infor Service (NESDIS), supports weather forecasting, severe storm tracking, and meteorology research
Polar Operational Environmental Satellite (POES)
operates a constellation of weather satellites in polar orbits around Earth
Defense Meteorological Satellite Program (DMSP)
monitors meteorological, oceanophic, and solar-terrestrial physics for the US DoD. Provide cloud cover imagery from polar orbits, relay important weather and climate data to warfighters for more effective military ops
National Polar-orbiting Operational Environmental Satellte System (NPOESS)
was to be US next-generation satellite system
Tropical Rainfall Measuring Mission (TRMM)
joint space mission between NASA and Japan Aerospace Exploration Agency to monitor and study tropical rainfall
Ambiant air
temperature of surroundings
Wind chill
air temp felt on exposed skin due to wind, usually lower than air temp
Precipitation
all forms of water, liquid or solid, that falls from clouds to the ground
Sky condition
a description of the appearance of the sky
atmospheric pressure
pressure exerted by atmosphere at a given point
Restricted Visibility
condition of limited visibility due to mist, fog, rain, etc.
Sunrise/Sunset
Sun rises in the East and sets in the West
Moonrise/Moonset
first appearance/disappearance of moon over Earth's horizon
Lunar Illumination
the reflection of moonlight from clouds and terrain and must be accounted for to produce uniform imagery of clouds
Tropical Depression
max sustained surface winds are 38MPH
Tropical Storm
winds between 39-73MPH
Hurricane/Typhoon
sustained winds of at least 74MPH
Tornado/Waterspout
violent, dangerous, rotating column of air, in contact w/both surface of earth and a cumulonimbus cloud. Most have wind speeds less that 110MPH. (funnel-shaped cloud) that occurs over water
Funnel Cloud
funnel-shaped cloud, column of wind and extending from base of a cloud but not reaching ground
Ocean Eddies
swirling of a fluid and reverse current created when fluid flows past an obstacle
Cold Ocean Eddies
seen to south of Gulf Stream. spin w/ cyclonic circulation (counterclockwise)
Warm Ocean Eddies
spin with anticyclonic circulation (clockwise)
Bathythermograph
small torpedo-shaped device that holds temp sensor and transducer; detects changes in water temp vs depth. Records pressure and temp changes as it drops through water
Bioluminescence
production and emission of light by living organisms; 90% of deep-sea marine life are estimated to produce bioluminescence
Sea Wave
waves generated by the wind in the local area
Wave Height
difference between elevation of a crest and a neighboring trough
Wave Period
measures size of wave in time (measured by picking a stationary point and counting seconds it takes for two consecutive crests or troughs to pass it)
Swell Wave
seas that have moved out and away from area in which they were formed
Ebb tide
the receding or outgoing tide
Flood
incoming or rising tide
High tide
if on coast and moon is directly overhead, should experience a high tide
Low tide
tide is at its lowest level at a particular time and place; when moon and sun directly aligned w/respect to earth
Open ocean Current
organized flows that persist over some geographical region and over some time period uch that water is transported from one part of ocean to another. Extrememly important for marine ops involving navigation, search and rescue, etc.
Littoral Current
Wave refraction occurs when a wave train strikes a beach at an angle
Rip Current
strong channel of water flowing seaward from near the shore
Thermal layers w/in the ocean
Mixed layer, Thermocline, Deep layer
Salinity
effect is slight in open ocean because salinity values are nearly constant. The affect of salinity on sound speed is greatest where there is a significant influx of fresh water or surface evaporation creates high salinity
COR
Tropical Cyclone Conditions of Readiness
COR 5
destructive weather (winds > 50 knots) is not anticipated w/in the next 96 hours
COR 4
possible threat of destructive winds w/in 72 hours
COR 3
destructive winds possible w/in 48 hours
COR 2
destructive winds anticipated w/in 24 hours
COR 1
destructive winds anticipated w/in 12 hours
The SUn
the biggest effect on space environment
Solar Wind
electrically charged particles that stream continuously from sun form Solar Wind
Solar Cycle
solar activity is cyclic in nature, following 11-year cycle called solar cycle
Van Allen Radiation Belts
two concentric, donut-shaped regions of stable, trapped charged particles.
radiation belts can have serious impact on satellite ops
Atmospheric Drag
energy deposited in earth's upper atmosphere by charged particle bombardment heats atmosphere, causing it to expand outward over a period of time, produces more frictional drag on a satellite
Low Earth Orbit
altitudes between 150 and 800 miles above earth's surface
Semi-synchronous orbit
purpose of satellites in orbit is to allow a user to receive signals from multiple satellites at any time
Sun-synchronous orbit
takes advantage of precession of orbital plane. Will pass over same point on earth;s surface at same local time, at a regular interval
Highly Elliptical Orbit
provides comms in Northern Hemisphere for nearly 75% of satellite's orbital period; shifted 180 degrees to cover Southern Hemisphere
Geosynchronous Orbit
average altitude of 19,300 nm; will have period of approx one day (meaning satellites remain over same area of earth)
Polar Orbit
used extensively by imagery satellites
ability to pass over entire surface of earth throughout several days
Apogee
point on the orbit farthest from the center of the earth
Perigee
point on the orbit closest to the center of the earth
Two main Space launch facilities in US
Kennedy Space Center, FL
Vandenberg AFB, CA
Global Positioning System
space-based radio positioning systems that provide 24/7 3-dimensional position
Refraction
the bending of a wave caused by a change in its speed as it moves from one medium to another
Reflection
the bouncing back of a wave when it hits a surface through which it cannot pass