What is Network Enumeration?
Program that scans networks for vulnerabilities.
What is Critical Information?
Info is compromised could cause mission degradation.
What document governs OPSEC?
Define intelligence preparation of battle space environment.
systematic and continuous analysis of adversary, terrain, and weather in the assigned or battle space.
What is Intelligence Fusion Cell?
Process of examining all source of intel for complete assessment.
What are the sources of intelligence
HUMINT- human intel
ASINT- open source intel
MASINT- measurement and signature intel
SIGINT- signals intel
COMINT- communications intel
FISINT- foreign instrumentation intel
ELINT- electro-optical intel
IMININT- imagery intel
ACINT- acoustic intel
United States Naval Observatory
provide a wide range of astronomical data and products
Joint Typhoon Warning Center
Issues tropical cyclone warnings
Defense Meteorological Satellite Program
designs, builds, launches, and maintains satellites
Define Space Force Enhancement.
support operations to improve the effectiveness of military forces.
Define Space Support.
support operations to deploy and sustain military and intelligence systems.
Define Space Control.
support operations to ensure freedom of action in space.
Define Space Force Application.
Combat operations from space against terrestrial targets to influence the course and outcome of conflict.
Define Van Allen Belts
concentric, donut-shaped regions of stable, trapped charged particles
Where are the two main space launch facilities?
NASA Kennedy Space Center. Cape Canaveral, Florida
Wallops Flight Facility. Wallops Island, Virginia.
Broadcast Controlling Assign
Broadcast Keying Station
Broadcast Control Station
Broadcast Relay Station
Multi service access concentrator.
Ten DSCS teleport/STEP sites
Lago di Patria
What are the VTC mediums?
ISDN, VIXS, DVSG.
What are the 3 types of incidents?
Cryptographic - using superseded,defective keying material
Personnel - espionage, defection
Physical - loss of comsec material
What is ISR?
Intelligence Surveillance Reconnaissance
What is a Wave Period?
Frequency of waves
Automated Network Controled Center
Joint UHF MILSATCOM Network Integrated Control System
Define of routing.
What does MCS stand for?
Master Conversion System
What is FRI?
Fleet Routing Indicator
List are sites that have CUDIXS.
Functions of TSCOMM.
Flight comms. Support CTF 67.
Primary Circuits in TSCOMM?
Link 11, Safety of Flight, Cronus, Command Net.
Action required TSCOMM power outage.
shift comms to Tech Control.
Primary Equipments in TSCOMM.
VICS, ACAS Terminal, Link 11, Scope
What is the CDO's duties and responsibilities?
Responsible for anything administrative.
What is the CWO's duties and responsibilities?
What is the Tech Control Supervisor's duties and responsibilities?
Assist CWO in technical aspects
What is the Messege Center Supervisor duties and responsibilities?
Ensure messeges go out.
What is the TSCOMM Supervisor's duties and responsibilities?
Comms for CTF 67.
HF SOF, Link 11
What is the Niscemi Supervisor's duties and responsibilities?
Responsible for transmitters and antennas.
What is the Base Communications Operator's duties and responsibilities?
Base comms. Liason to Telecom Italia.
Afloat Personal Telecomm System (sailor phone)
(Digital Modular Radio)
750 software defined channels
2 MHz - 2 GHz
Demand Assigned Multiple Access
Multiplexes multiple subsystems on one SATCOM channel
Defense Red Switch Network (encrypted)
Defense Switch Network
Plain Old Telephone System
16 port configuration
Operates in synchronous or asynchronous
Secure Telephone Equipment
Voice Over IP
ADNS for ships
DAMA modes of operation (2)
AC - automatic control, developed with TD-1271
DC - distributed control, not encrypted, provides frame sync (for torubleshooting)
WSC-3 modes of operation (2)
Leak of info to an unauthorized recipient
EKMS 1B Chapters for Incidents and PDS's
Chapter 9 - Incidents
Chapter 10 - PDS's
EKMS Manager's duties
Advises CO on matter concerning security and handling of COMSEC material and associated records, reports and audits
CMS Advise and Assist are conducted...(how often)
Every 18 months
CO CMS inspections are conducted...(how often)
ISIC inspections are required...(how often)
Every 2 years
Procedures for correcting spillage (4)
(1) EKMS Manager
(2) Security Manager
(4) Notify IA manager when spillage is identified
Consolidated Afloat Network Exchange System
Centralizes all networks on a ship
Fleet Network Operations Center
Provides IP services to the fleet
Converts a computer digital signal to analog signal for travel over phone lines
Virtual Local Area Network
A network that adds network services without adding physical equipment
Outlook Web Access
Allows users to remotely check email via web browser
Redundant Array of Independent/Inexpensive Disks
A way of storing data on multiple redundant hard drives
Tiers at NOC's (4)
Tier 1 - 24/7 basic troubleshooting watch floor
Tier 2 - System administrators, field services
Tier 3 - System engineers for specialized tech support
Tier 4 - SPAWAR
Equipment at FLTNOC (6)
DNS Mail Server
Server for network printers and queues
Command Share Folders
Runs Exchange for email
Proxy server that controls web traffic
Institute for Electrical and Electronics Engineers
Set standards for IT and electronics
Common Ports (9)
20 - FTP
21 - FTP
22 - SSL
23 - TELNET
25 - SMPT
53 - DNS
80 - HTTP
110 - POP3
443 - HTTPS
Sends small packet of data to network device to test connectivity
Connects two or more networks via IP address
A ping, but marks all of the hops en route
Unshielded Twisted Pair
Shielded Twisted Pair
Standard cable TV
Glass, most secure
Relay station for NCTAMS
Communications Control Ship
A ship in a battlegroup that is assigned as the net control station for all strike group circuits
Authorized Service Interruption
A scheduled interruption known in advance for maintenance on networks or circuits
Joint Fleet Telecommunications Operations Center
24/7 POC for any and all telecom services at a NCTAMS
Lessons learned from previous experiences
Satellite Access Request
Satellite Access Authorization
TDMA Interface Processor
ethernet bridge for battlegroup
Afloat Electromagnetic Spectrum Operations Program
A computer program that automates frequency planning for radar & weapon systems as well as the process for generating comm plans.
INMARSAT Stations (3)
Santa Paula, California
Commercial Wideband Satellite Program
Utilitizes commercial satellite to provide services to the military
Commercial Broadband Satellite Program
Replaces CWSP and INMARSAT
Defense Satellite Communications System
Utilizes military satellies for services
High Speed Global Ring
Provides high speed transport link between five locations. Interfaces with TNX-1100 and PSAX; connected via OC3
Covers a large area of the footprint
Small foot print directed to a specific location
Military Only, EHF SATCOM
Can crosslink between other MILSTAR satellites without the requirement to connect to another shore station first
Where multiple terminals are connected for voice or data
Contains equipment necessary for reliable exchange of information, data and voice. Answers to JFTOC
UFO7 - Atlantic Ocean
UFO10 - Indian Ocean
UFO8 - Pacific Ocean
HSGR Locations (5)
NCTS SAN DIEGO
4.8 kbps - 1.544 Mbps
Wideband Global Satellite
Criteria to receive IP service from FLTNOC (3)
(1) Must have approved ATO or IATO
(2) Must submit IP request to the NOC in the region
(3) Must have approved SAA
Joint Service Imagery Processing System
Collaboration at Sea
Allows ships in a battlegroup to share information in real time
(JSIPS-N) Concetrator Architecture
8 mbps imagery for intel
Microsoft Office Sharepoint Server
UARNOC-Atlantic (Hampton Roads)
ECRNOC-Europe and Med (Naples)
CIB for NIPR/SIPR
Global CIB 3A
CIB for SI
Global CIB 20H
Instruction governs computer network incident responses
Defense Information System Agency
Provide C4I to the war fighter, worldwide
Navy Cyber Defense Operating Command
Cyber defense for Navy networks worldwide
Theatre Network Operations Security Center
Provide command and control for theatre wide network operations
Fleet SIPRNET Messaging
A fleet secret internet messaging system used to send general service messages up to SECRET.
Destination Station Routing Indicator
6 or 7 characters
Originating Station Routing Indicator
Format in line 2
Function as messaging station ID
Pacific Multi-User Link
atLantic Multi-User Link
Indian Multi-User Link
For fleet units, they are receive only
Master Update Authority
A single point for messaging directory address updates. NCTAMS PAC is primary; NCTAMS LANT is secondary
Multilevel Messaging Server
Provides secure dial-up messaging service. Usually via STU-III.
Routing path for a command (how to get there)
Command location inside the directory (location of where it is)
Gateguard is used to dial into ...
MMS (Multilevel Messaging System)
2 Directory Update & Service Center
NCTAMS LANT and NCTAMS PAC (primary)
Action address (who needs to respond)
Line 11 & 13
Break (or BT)
Text (Actual Message)
Device that enables NCTAMS LANT & NCTAMS PAC to radiate CUDIXS to each other
Defense Information Tree
Fleet Message Exchange
Connect CUDIXS and Fleet Broadcast Keying System (FBKS) to NOVA
Broadcast Relay Satellite
Radiates the broadcast signal to the fleet via satellite (EHF)
Request you acknowledge message
Point in orbit furthest from Earth
Point in orbit closest to Earth
measurement and explanation of stars and celestial bodies
frictional drag on satellites
Creates geomagnetic storms
11 year cycle
Global Positioning System
Defense Satellite Communication System
Provides worldwide, jam-resistant, secure voice and high data comms.
Global Broadcast Service
Incorporated in UFO 8, 9, 10
Navy UHF Follow-on
Links ships, mobile unites and shore sites together via satcom
Solar wind affecting comms
Present during daylight; causes irregular perturbations of a satellite orbit
Sun affecting comms
Electromagnetic radiation and electrically charged particles
In sync with Earth's orbit
Low Earth Orbit
150-800 Miles above Earth's surface
Passes over entire surface of earth; used extensively by imagery satellites
Force exerted by the weight of the air
Measures water temp vs depth. Torpedo shaped device.
Emission of light by a living organism (i.e. algae)
The movement of the tide back to the sea
Collect of water droplets and ice crystals suspended in the air
Geostationary Operational Environment Satellite
Provides continuous monitoring necessary for intensive data analysis
Part of a body of water that is close to the shore
Surface layer and a certan depth that have the same density. 25-200m
Swirling of fluid and reverse current when passing an obstacle
Polar Operational Environment Satellite
Offers a daily global coverage making polar orbits 14 times a day
Amount of water vapor that exists in gaseous mixture
When density contrast in the atmosphere is weak due to water vapor increases and/or temperature decreases rapidly with height
Dramatic temperature change.
Study of earth's surface, shape and features
The felt air temperature on the skin due to wind
Movement of air or other gases in an atmosphere
Tropical Cyclone Conditions of Readiness (5)
COR 5 - Destructive weather isn't anticipated and winds not over 50 knots for 72 hours
COR 4 - Excess of 50 knots in 72 hours
COR 3 - 50 knots, 48 hours
COR 2 - 50 knots, 24 hours
COR 1 - 50 knots, 12 hours
Pressure affects sound
Higher pressure requires more power to travel same distance
Salinity affects sound
Sound is deflected off the salt in water
Temperature affects sound
Lower temps, sound travels slower
Visibility affects operations
Need to rely more on equipment
METOC products from NOP
Astronomical data and products
Tropical cyclone warnings
Ocean and atmospheric conditions
Meteorology and oceanography support
The trapping of RF waves in 2 layers of the atmosphere
Number of cycles per unit of time
Compressing multiple signals into one SATCOM signal
Bending of RF waves as it passes through different density
ELF: 3-30 Hz
SLF: 30-300 Hz
ULF: 300 Hz - 3 KHz
VLF: 3-30 KHz
LF: 30-300 KHz
MF: 300 KHz - 3 MHz
HF: 3-30 MHz
VHF: 30-300 MHz
UHF: 300 MHz - 3 GHz
SHF: 3-30 GHz
EHF: 30-300 GHz
Distance in space occupied by one cycle of a radio wave
Layers of the atmosphere
Troposphere: 3.7 miles
Stratosphere: 3.7 - 31.1 miles
Ionosphere: 31.1 - 250 miles
Encoding information onto a carrier signal for transmission
Decoding information from a received carrier signal
Pulse Repetition Frequency
Number of pulses per unit of time
Pulse Repetition Interval
Time between pulses
Commander's Critical Information Requirement
Fleet Level Intelligence Organizations
Intelligence in a specific fleet
National Intelligence Organizations
All intelligence that involves threats to US
Priority Intelligence Requirement
Intelligence that the Commander and Staff need to understand an operational environment
Theater Intelligence Organizations
Intelligence in a specific theater
Instruction for Intelligence Oversight
DoD Directive 5240.1
Categories of Intelligence (3)
Steps of Intelligence (5)
(1) Planning and direction
(2) Dissemination and Integration
(3) Analysis and Production
(4) Processing and Exploitation
Purpose of Naval Intelligence (4)
(1) Protect the Force
(2) ID centers of gravity and critical vulnerabilities
(3) Support the Commander
(4) Support planning and execution of Operations
Essential Elements of Friendly Information
Key information enemies will acquire regarding our capabilities
Process that identifies critical info, outlines potential threats, and develops counter measures to safeguard critical info
OPSEC Planning Process (5 steps)
(1) Vulnerability analysis
(2) Threat assessment
(3) Risk assessment
(4) Identify critical info
OPSEC Officer responsibilities (4)
(1) Coordinate development of OPSEC Ops
(2) Advise CO
(3) Maintain OPSEC program
(4) Advise external inspectors of program
Web Risk Assessment
Identifies and assesses risks and applies protection
immediate attention of the commander
Fleet Survey Team
Enables commanders around the world in littoral regions with operation hydrography
Mobile Environment Team
Support special warfare forces with weather data & mapping, ocean charting, and geodesy support
Mine Warfare UUV Platoon
Unmanned underwater vehicle
Located at Stennis Space Center Mississippi
Naval Oceanography ASW Team
Stennis Space Center Mississippi and detachment in Mayport
Strike Group Oceanography Team
Provide METOC products and services to the fleet
IO Core Capabilities (5)
Computer Network Ops
Navy Red and Blue Teams
Red = Offense; Blue = Defense
Test the vulnerability of networks and passwords
Primary Warfare Areas (6)
ASW - Anti-sub warfare
SUW - Surface warfare
IW - Information warfare
STW - Strike warfare
AW - Air warfare
NSW - Naval Special warfare
Cryptological Carry On Program
Provides tactical weather prediction on ships
Mobile attachment purpose
Flexibility and Adaptability
Direct Support Assets
Force supporting another specific force
Advanced Digital Network System
Connects shipboard IP network to ships and shore.
Common User Digital Information Exchange System
Used to transfer general service messages with NAVMACS
Message Precedence (4)
R - Routine - 6 hours
P - Priority - 3 hours
O - Immediate - 30 minutes
Z - Flash - 10 minutes or less
"Code name" given to the investigation, study and control of compromising products from a telecom and automated information processing system
Essential Elements of Friendly Information
Specific Items or information that if aquired by an adversary would degrade the security of operations
Prevents the unauthorized disclosure of information.
Set 1-4, and secures different telecomm/IP services.
Automated message and store forward. UNIX based system
Electronic Key Management System
Ensures command obeys keymat handling procedures
Messaging system for VLF/LF sub comms
Unauthorized voice on the net. Gingerbread 3x Roger OUT
Report of a comms outage or degradation.
Sent to ISIC commander within 30 minutes.
Over the Air Transfer/Rekey
The controlling of all electromagnetic and acoustic radiation
Insertion of EM energy into transmission to cause confusion
The deliberate radiation to block out communications
Joint Spectrum Intrusion Resolution
The intentional transmission of signals designed to deceive user of navigational aids
Plain language address
Monitoring of frequencies throughout the ranges
VTC vs. DCO
DCO is only data and voice
Red Cross message
Provides emergency support for service members on matter pertaining to their family
OPs plan per specefic command.
COMM Plans used by navy and allies
Message used to distribute communication plans.
Telecomm Service Order
Authorization from DISA to start, change, or stop a circuit or trunk
Telecomm Service Request
Requestion Action of circuit/trunk.
Universal Time Clock (Zulu)
Brute Force Attack
Checking all passwords until one works; ("cracking")
Any network device with an IP address
Handles web traffic
controls the flow of internet traffic between LAN and cloud.
Connects networks together with IP addresses
Connects segments of network via MAC addresses.
Server that holds all applications
Defense Information System Network
A secure network for TS/SCI multimedia intelligence communications worldwide
Navy Marine Corps Intranet
Dependent; user must do something to initiate
Independent; does not need to attach to a program
Buffer overwrites the adjacent memory
Commonly uses C and C++
Shows how data navigates through its network layout
OSI Model (7)
Using fake website to steal a users information
Act of exploiting a flaw to gain access to protected elements
IPv4 versus IPv6
IPv4 is 32 bit encryption
IPv6 is 128 bit encryption
Domain Naming System
A naming system that associates plain text with an IP address for websites
Process/Application - Application, Presentation, Session
Host-to-Host - Transport
Internet - Network
Network Access - Data Link, Physical
A method of bypassing normal authentication
Public Key Infrastructure
Malware that lets unauthorized access to a computer
UNCLASS IP data communications.
Manipulating people to give up confidential information
Authorization of IS in space.
Authority to Operate
Lasts 3 years
An Information System (IS) meets specific security requirements
measures that protect and defend information and information systems
Attributes of IA (5)
Interim authority to operate
Lasts only 180 days
DoN World Wide Web Security Policy
Policy and guidelines to get on the internet and contents to put on it
Assesses IS's security measures
Information Assurance Vulnerability Alert
Information Assurance Vulnerability Bulletin
Information Assurance Vulnerability Technical
Categories of Computer Incidents (9)
Unsuccessful Acitivity Attempt
Denial of Service
Root Level Intrusion
User Level Intrusion
Actual weakness/flaw in system
Possibility of attack.
Sensitive Compartmental Information
Classified information and handling protocols from Director of Central Intelligence.
Instruction for Information Security
Instruction for Personnel Security
Need to Know
Individual requires access to information in order to perform duties
Emergency action plan for safeguarding COMSEC material
Department of the Navy Central Adjudication Facility
Determines who can have clearance
How, and in what order, material is destroyed during ED
1.) Precautionary destruction
2.) Keying material
3.) Non-essential manuals
--Complete destruction - follow EAP / EDP
SCIF, overall authority of and controls access to
Special Security Officer (SSO)
Reportable events to the SSO
Practices Dangerous to Security
Security Violation vs PDS
Security violations are intentional
Items prohibited in SCIF
Personal electronics due to the ability to download/record and transport classified information
Secret and Confidential Investigations
NACLC or ANACI every 10 years for Secret; 15 for Confidential
SSBI, SSBI-PR, PPR every 5 years
COMSEC Material Report
Nondisclosure Agreement (NDA)
Security Container Information
Activity Security Checklist
Security Container Check Sheet
Top Secret Cover Sheet
Orange - Exceptionally grave damage
Blue. Damage or be prejudicial
No current terrorist threat
A small and general terrorist attack
A somewhat predictable terrorist threat exists
Intelligence reports that a terrorist threat is imminent
A terrorist attack is taking place or has happened
Top Secret Control Officer
Responsible for TS material
Foreign Disclosure Officer
Determines what classified information can be released to foreign activities
Emergency Destruction Procedures
Explains step by step procedures and priorities for destruction of sensitive material
Joint Personnel Adjudication System
Uses NIPRNET to connect all DoD security personnel around the world with Central Adjudication Facility.
Security Access Eligibility Report
A report stating all facts pertaining to an incident. Sent through JPAS
Defense Courier Service
UPS for classified material
Financial Liability Investigation of Property Loss (Survey)
Military Interdepartmental Purchase Request (MIPR)
Order for supplies and services
Open purchase form for non-NSN items
Used in the event of an equipment malfunction or deficiency. Sent out via naval message to COMTENTHFLEET
CASREP categories (4)
C-1 - Training
C-2 - cause minor degradation
C-3 - cause major degradation
C-4 - cause loss to at least one primary mission
Defense Property Accounting System
A barcode system used to track command assets.
Mario is the manager.
Request for contract
Used to order NSN
Amendment of Solicitation/Modification of Contract
Multipurpose form. To pay commercial business.
Report of Discrepancy (ROD)
Quality Deficiency Report (QDR)
Selected Item Management
2 or more requests in a 6 month period of an NC item.
Allowance Equipage List
Onboard allowance for equipage and supplies
Consolidated Hazardous Re-utilization Inventory Management Program
Location for issue, disposal and storage of HAZMAT.
Depot Level Repair
5A - Survey
5D - Initial Issue
5G - 1 for 1 turn in
5S - RIP chit
Defense Re-utilization Marketing Office
Self service store for supplies, i.e. NEXDepot
GOV Purchase Card Limit
$3000 limit per transaction
Material Obligation Validation
Determines if outstanding material requirements still exist and are still valid.
2 and 7 are DLR
9Q is GSA
Command Cyber Readiness Inspection
NAVCYBERFOR's role in CCRI
To conduct readiness inspections ensuring all IA policies are enforced within a command.
Used to notify operational commanders of a significant event or incident.
Categories of SITREP (3)
OPREP 3 Pinnacle
Navy Unit SITREP
Enlisted Commissioning Program
Civic Engineer Corps ECP
Force Master Chiefs (10)
Naval Education and Training
Bureau of Medicine
Naval Reserve Force
Naval Air Force Pacific
Naval Air Force Atlantic
Naval Surface Forces Pacific
Naval Surface Forces Atlantic
Naval Submarine Forces Pacific
Naval Submarine Forces Atlantic
Force Master Chief Petty Officer of the Seabees
Fleet Master Chiefs (How many?)
Dependents, PNOK, SNOK, Home of record
Qualifications and schools
Used for administrative data pertaining to current enlistment
Servicemembers' Group Life Insurance Beneficiaries
Brilliant on the Basics (6)
Enlisted Distribution Verification Report
Monthly statement of an activity's enlisted personnel account
Officer Distribution Control Report
Lists all officer billets for a command
Activity Manpower Document
Official statement of funded and unfunded requirements for each UIC
Records service and performance of duties for enlisted personnel E1 to E6
Records of service and performance of duties for all personnel E7 and above
Navy Correspondence Manual
Prescribed uniform standards for management and preparation of all correspondence
San Diego, CA
Caribbean, Central and South America with surrounding waters
Arabian Gulf, Indian Ocean and Persian Gulf
Mediterranean and Black Sea areas
Western Pacific and Indian Ocean
Fort Meade, Maryland
Fleet Cyber Command
Navy Cyber Defense Operating Command
To coordinate, monitor and oversee the defense of Navy computer systems and networks.
Component of a fleet organized by the commander of a task fleet or higher authority for the accomplishment of a specific task or tasks.
Component of a task force
Component of a task group
Component of a naval task unit
Defense Information System Agency
Support agency and engineers that provide command and control and enterprise infrastructure to operate a global centric network.
Naval Air and Space Intelligence Center
Source of air and space intel for DoD
Mission of the Navy
To maintain, train, and equip a combat ready naval force that is capable of winning wars, deterring aggression and maintaining freedom of the seas.
NCTAMS LANT (Location)
NCTAMS PAC (Location)
Navajo Code Talkers
Unbroken code. Navajo language.
On the roof gang
Radio operators trained on top of Navy Department building
Intercept and analyze foreign communications.
July 16-24, 1969
First manned lunar landing
Neil A. Armstrong, former Navy pilot
1968, first internet.
First orbital test flight of Space Shuttle.
John W. Young
Robert L. Crippen
Formation of the USN
Taxation without representation
Battle of Leyte Gulf
October 23, 1944
The final blow to the Japanese navy.
Battle of Midway
June 3-5, 1942
Turning point of the Pacific war. The US broke the Japanese naval code.
Battle of Normandy
June 6, 1944
The largest amphibious operation in history.
Battle of the Coral Sea
May 7-8, 1942
First carrier versus carrier battle.
The Lexington was sunk, and the Yorktown was damaged.
November 12-15, 1942
-Japanese naval forces retreated and U.S. Marines secured the island of Guadalcanal.
-The Japanese lost 2 cruisers and 6 destroyers.
May 5, 1961
First US manned space flight.
LT Alan Shepard, USN
Fired only by certain ships and stations as prescribed by the SECNAV. In olden days, it used to take up to 20 minutes to load and fire a gun.
Dipping the ensign
Merchant ships salute Navy ships by lowering (dipping) their ensign. The US NEVER salutes first.
National Security Act of 1947
reorganization of the foreign policy and military establishments
-Created the CIA and National Security Council (NSC)
-Merged the War and Navy departments into the DoD
-Created the USAF
John Walker espionage case
Provided enough code-data information that significantly tipped the balance of power between US and Russia.
Office of Naval Intelligence
Founded by Secretary of the Navy, William H. Hunt in 1882
Two departments that merged to form ONI
Director of Naval Intelligence
DCNO for Information Dominance
Diplomatic cryptographic machine used by the Japanese that printed on purple paper
RADM Grace Hopper
Computer programmer that created COBAL and coined the term computer bug
1st Navy ship named after an enlisted man
Launched February 28, 1919
Levels of War (3)
Areas of Naval Doctrine (6)
Command and Control
Principles of Naval Logistics (7)
University of Pennsylvania
Oldest intelligence organization in US Navy
Naval vessels at inception (3)
First Chief Intelligence Officer/Director of Naval Intelligence
Theodorus Bailey Myers Mason
Hazards of Electromagnetic Radiation to Fuel
Hazards of Electromagnetic Radiation to Ordnance (LIMA FLAG)
Hazards of Electromagnetic Radiation to Personnel
Likelihood that an accident will result
Electrical shock personnel rescue procedures
(2)If power cannot be removed, use non-conductive material to free the victim.
Effects and treatment of Hypothermia
Exposure to extreme cold.
Minimize heat loss from head, neck, sides and groin.
Symptoms of shock (5)
Cold pale skin
Treatment for electrical shock
Administer CPR and take into account any possible spinal injuries or fractures.
Treatment of frostbite
Cover up in layers
Used to identify and manage hazards that endanger naval resources.
Pressure points (11)
Goal of Navy's Hearing Conservation Program and dB ranges
Prevent hearing loss.
Single - 84 dB
Double - 104dB
Max - 140dB
Methods to control bleeding (3)
Categories of HAZMAT (6)
Steps to ORM (5)
(1) Identify hazards
(2) Assess hazards
(3) Make risk decisions
(4) Implement Controls
Methods of clearing an obstructive airway (4)
Standing abdominal thrust
Reclining abdominal thrust
Standing chest thrust
Reclining chest thrust
Objectives of first aid (3)
Prevent and treat shock
Instruction that governs safety and mishap reporting
Required mishap reportable items (4)
1.) On duty DOD civilians military personnel
2.) Government property damage
3.) Work related injury beyond first aid
4.) Any other incidents of interest
Potential consequence that can occur as a result of a hazard
Hazard Severity CAT 1
May cause death or loss of facility/asset
Hazard Severity CAT 2
May cause severe injury, illness, property damage
Hazard Severity CAT 3
May cause minor injury, illness, property damage
Hazard Severity CAT 4
Presents a minimal threat to personnel safety or health property
Mishap Probability A
Likely to occur immediately
Mishap Probability B
Probably will occur in time
Mishap Probability C
May occur in time
Mishap Probability D
Unlikely to occur
Risk Assessment Code (RAC)
Combine the severity with the probability to determine RAC
RAC categories (5)
Difference between open and closed fractures
Open - Bone protrudes from skin
Closed - Skin remains intact
Material Safety Data Sheets
Information on how to use, store and dispose of hazardous materials
Please allow access to your computer’s microphone to use Voice Recording.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Your microphone is muted
For help fixing this issue, see this FAQ.