Create an account
Define intelligence preparation of battle space environment.
systematic and continuous analysis of adversary, terrain, and weather in the assigned or battle space.
What are the sources of intelligence
HUMINT- human intel
ASINT- open source intel
MASINT- measurement and signature intel
SIGINT- signals intel
COMINT- communications intel
FISINT- foreign instrumentation intel
ELINT- electro-optical intel
IMININT- imagery intel
ACINT- acoustic intel
Defense Meteorological Satellite Program
designs, builds, launches, and maintains satellites
Define Space Force Application.
Combat operations from space against terrestrial targets to influence the course and outcome of conflict.
Where are the two main space launch facilities?
NASA Kennedy Space Center. Cape Canaveral, Florida
Wallops Flight Facility. Wallops Island, Virginia.
Broadcast Controlling Assign
Broadcast Keying Station
Broadcast Control Station
Broadcast Relay Station
Ten DSCS teleport/STEP sites
Lago di Patria
What are the 3 types of incidents?
Cryptographic - using superseded,defective keying material
Personnel - espionage, defection
Physical - loss of comsec material
What is the Niscemi Supervisor's duties and responsibilities?
Responsible for transmitters and antennas.
What is the Base Communications Operator's duties and responsibilities?
Base comms. Liason to Telecom Italia.
DAMA modes of operation (2)
AC - automatic control, developed with TD-1271
DC - distributed control, not encrypted, provides frame sync (for torubleshooting)
EKMS Manager's duties
Advises CO on matter concerning security and handling of COMSEC material and associated records, reports and audits
Procedures for correcting spillage (4)
(1) EKMS Manager
(2) Security Manager
(4) Notify IA manager when spillage is identified
Converts a computer digital signal to analog signal for travel over phone lines
Virtual Local Area Network
A network that adds network services without adding physical equipment
Redundant Array of Independent/Inexpensive Disks
A way of storing data on multiple redundant hard drives
Tiers at NOC's (4)
Tier 1 - 24/7 basic troubleshooting watch floor
Tier 2 - System administrators, field services
Tier 3 - System engineers for specialized tech support
Tier 4 - SPAWAR
Common Ports (9)
20 - FTP
21 - FTP
22 - SSL
23 - TELNET
25 - SMPT
53 - DNS
80 - HTTP
110 - POP3
443 - HTTPS
Communications Control Ship
A ship in a battlegroup that is assigned as the net control station for all strike group circuits
Authorized Service Interruption
A scheduled interruption known in advance for maintenance on networks or circuits
Joint Fleet Telecommunications Operations Center
24/7 POC for any and all telecom services at a NCTAMS
Afloat Electromagnetic Spectrum Operations Program
A computer program that automates frequency planning for radar & weapon systems as well as the process for generating comm plans.
Commercial Wideband Satellite Program
Utilitizes commercial satellite to provide services to the military
High Speed Global Ring
Provides high speed transport link between five locations. Interfaces with TNX-1100 and PSAX; connected via OC3
Military Only, EHF SATCOM
Can crosslink between other MILSTAR satellites without the requirement to connect to another shore station first
Contains equipment necessary for reliable exchange of information, data and voice. Answers to JFTOC
Criteria to receive IP service from FLTNOC (3)
(1) Must have approved ATO or IATO
(2) Must submit IP request to the NOC in the region
(3) Must have approved SAA
UARNOC-Atlantic (Hampton Roads)
ECRNOC-Europe and Med (Naples)
Theatre Network Operations Security Center
Provide command and control for theatre wide network operations
Fleet SIPRNET Messaging
A fleet secret internet messaging system used to send general service messages up to SECRET.
Pacific Multi-User Link
atLantic Multi-User Link
Indian Multi-User Link
For fleet units, they are receive only
Master Update Authority
A single point for messaging directory address updates. NCTAMS PAC is primary; NCTAMS LANT is secondary
Defense Satellite Communication System
Provides worldwide, jam-resistant, secure voice and high data comms.
Navy UHF Follow-on
Links ships, mobile unites and shore sites together via satcom
Solar wind affecting comms
Present during daylight; causes irregular perturbations of a satellite orbit
Geostationary Operational Environment Satellite
Provides continuous monitoring necessary for intensive data analysis
Polar Operational Environment Satellite
Offers a daily global coverage making polar orbits 14 times a day
When density contrast in the atmosphere is weak due to water vapor increases and/or temperature decreases rapidly with height
Tropical Cyclone Conditions of Readiness (5)
COR 5 - Destructive weather isn't anticipated and winds not over 50 knots for 72 hours
COR 4 - Excess of 50 knots in 72 hours
COR 3 - 50 knots, 48 hours
COR 2 - 50 knots, 24 hours
COR 1 - 50 knots, 12 hours
METOC products from NOP
Astronomical data and products
Tropical cyclone warnings
Ocean and atmospheric conditions
Meteorology and oceanography support
ELF: 3-30 Hz
SLF: 30-300 Hz
ULF: 300 Hz - 3 KHz
VLF: 3-30 KHz
LF: 30-300 KHz
MF: 300 KHz - 3 MHz
HF: 3-30 MHz
VHF: 30-300 MHz
UHF: 300 MHz - 3 GHz
SHF: 3-30 GHz
EHF: 30-300 GHz
Layers of the atmosphere
Troposphere: 3.7 miles
Stratosphere: 3.7 - 31.1 miles
Ionosphere: 31.1 - 250 miles
Priority Intelligence Requirement
Intelligence that the Commander and Staff need to understand an operational environment
Steps of Intelligence (5)
(1) Planning and direction
(2) Dissemination and Integration
(3) Analysis and Production
(4) Processing and Exploitation
Purpose of Naval Intelligence (4)
(1) Protect the Force
(2) ID centers of gravity and critical vulnerabilities
(3) Support the Commander
(4) Support planning and execution of Operations
Essential Elements of Friendly Information
Key information enemies will acquire regarding our capabilities
Process that identifies critical info, outlines potential threats, and develops counter measures to safeguard critical info
OPSEC Planning Process (5 steps)
(1) Vulnerability analysis
(2) Threat assessment
(3) Risk assessment
(4) Identify critical info
OPSEC Officer responsibilities (4)
(1) Coordinate development of OPSEC Ops
(2) Advise CO
(3) Maintain OPSEC program
(4) Advise external inspectors of program
Fleet Survey Team
Enables commanders around the world in littoral regions with operation hydrography
Mobile Environment Team
Support special warfare forces with weather data & mapping, ocean charting, and geodesy support
IO Core Capabilities (5)
Computer Network Ops
Navy Red and Blue Teams
Red = Offense; Blue = Defense
Test the vulnerability of networks and passwords
Primary Warfare Areas (6)
ASW - Anti-sub warfare
SUW - Surface warfare
IW - Information warfare
STW - Strike warfare
AW - Air warfare
NSW - Naval Special warfare
Common User Digital Information Exchange System
Used to transfer general service messages with NAVMACS
Message Precedence (4)
R - Routine - 6 hours
P - Priority - 3 hours
O - Immediate - 30 minutes
Z - Flash - 10 minutes or less
"Code name" given to the investigation, study and control of compromising products from a telecom and automated information processing system
Essential Elements of Friendly Information
Specific Items or information that if aquired by an adversary would degrade the security of operations
Prevents the unauthorized disclosure of information.
Set 1-4, and secures different telecomm/IP services.
Red Cross message
Provides emergency support for service members on matter pertaining to their family
Process/Application - Application, Presentation, Session
Host-to-Host - Transport
Internet - Network
Network Access - Data Link, Physical
DoN World Wide Web Security Policy
Policy and guidelines to get on the internet and contents to put on it
Categories of Computer Incidents (9)
Unsuccessful Acitivity Attempt
Denial of Service
Root Level Intrusion
User Level Intrusion
Sensitive Compartmental Information
Classified information and handling protocols from Director of Central Intelligence.
How, and in what order, material is destroyed during ED
1.) Precautionary destruction
2.) Keying material
3.) Non-essential manuals
--Complete destruction - follow EAP / EDP
Items prohibited in SCIF
Personal electronics due to the ability to download/record and transport classified information
Secret and Confidential Investigations
NACLC or ANACI every 10 years for Secret; 15 for Confidential
Foreign Disclosure Officer
Determines what classified information can be released to foreign activities
Emergency Destruction Procedures
Explains step by step procedures and priorities for destruction of sensitive material
Joint Personnel Adjudication System
Uses NIPRNET to connect all DoD security personnel around the world with Central Adjudication Facility.
Security Access Eligibility Report
A report stating all facts pertaining to an incident. Sent through JPAS
Used in the event of an equipment malfunction or deficiency. Sent out via naval message to COMTENTHFLEET
CASREP categories (4)
C-1 - Training
C-2 - cause minor degradation
C-3 - cause major degradation
C-4 - cause loss to at least one primary mission
Defense Property Accounting System
A barcode system used to track command assets.
Mario is the manager.
Consolidated Hazardous Re-utilization Inventory Management Program
Location for issue, disposal and storage of HAZMAT.
Material Obligation Validation
Determines if outstanding material requirements still exist and are still valid.
NAVCYBERFOR's role in CCRI
To conduct readiness inspections ensuring all IA policies are enforced within a command.
Enlisted Commissioning Program
Civic Engineer Corps ECP
Force Master Chiefs (10)
Naval Education and Training
Bureau of Medicine
Naval Reserve Force
Naval Air Force Pacific
Naval Air Force Atlantic
Naval Surface Forces Pacific
Naval Surface Forces Atlantic
Naval Submarine Forces Pacific
Naval Submarine Forces Atlantic
Force Master Chief Petty Officer of the Seabees
Enlisted Distribution Verification Report
Monthly statement of an activity's enlisted personnel account
Navy Correspondence Manual
Prescribed uniform standards for management and preparation of all correspondence
Navy Cyber Defense Operating Command
To coordinate, monitor and oversee the defense of Navy computer systems and networks.
Component of a fleet organized by the commander of a task fleet or higher authority for the accomplishment of a specific task or tasks.
Defense Information System Agency
Support agency and engineers that provide command and control and enterprise infrastructure to operate a global centric network.
Mission of the Navy
To maintain, train, and equip a combat ready naval force that is capable of winning wars, deterring aggression and maintaining freedom of the seas.
On the roof gang
Radio operators trained on top of Navy Department building
Intercept and analyze foreign communications.
Battle of Midway
June 3-5, 1942
Turning point of the Pacific war. The US broke the Japanese naval code.
Battle of the Coral Sea
May 7-8, 1942
First carrier versus carrier battle.
The Lexington was sunk, and the Yorktown was damaged.
November 12-15, 1942
-Japanese naval forces retreated and U.S. Marines secured the island of Guadalcanal.
-The Japanese lost 2 cruisers and 6 destroyers.
Fired only by certain ships and stations as prescribed by the SECNAV. In olden days, it used to take up to 20 minutes to load and fire a gun.
Dipping the ensign
Merchant ships salute Navy ships by lowering (dipping) their ensign. The US NEVER salutes first.
National Security Act of 1947
reorganization of the foreign policy and military establishments
-Created the CIA and National Security Council (NSC)
-Merged the War and Navy departments into the DoD
-Created the USAF
John Walker espionage case
Provided enough code-data information that significantly tipped the balance of power between US and Russia.
Two departments that merged to form ONI
Director of Naval Intelligence
DCNO for Information Dominance
Principles of Naval Logistics (7)
Electrical shock personnel rescue procedures
(2)If power cannot be removed, use non-conductive material to free the victim.
Effects and treatment of Hypothermia
Exposure to extreme cold.
Minimize heat loss from head, neck, sides and groin.
Treatment for electrical shock
Administer CPR and take into account any possible spinal injuries or fractures.
Goal of Navy's Hearing Conservation Program and dB ranges
Prevent hearing loss.
Single - 84 dB
Double - 104dB
Max - 140dB
Steps to ORM (5)
(1) Identify hazards
(2) Assess hazards
(3) Make risk decisions
(4) Implement Controls
Methods of clearing an obstructive airway (4)
Standing abdominal thrust
Reclining abdominal thrust
Standing chest thrust
Reclining chest thrust
Required mishap reportable items (4)
1.) On duty DOD civilians military personnel
2.) Government property damage
3.) Work related injury beyond first aid
4.) Any other incidents of interest
Difference between open and closed fractures
Open - Bone protrudes from skin
Closed - Skin remains intact
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together