How can we help?

You can also find more resources in our Help Center.

idw board

STUDY
PLAY
what is ORM
Operatinal Risk Management
What are the Hazard Serverity Catergories
Cat 1 May cause death or loss of facility
Cat 2 May cause servere injury
Cat 3 May cause minor injury
Cat 4 Minimal threat
What are the probability of Mishap Subcategories
Sub Cat A Likely to occur immediately
Sub Cat B Probably will occur in time
Sub Cat C May occur in time
Sub Cat D Unlikely to occur
What are RAC's
Risk Assessment Codes
What are the 5 RAC'S
1- Critical
2- Serious
3- Moderate
4- Minor risk
5- Negligible
What are the 4 Mishap reportable items
1- Government property damage
2- On duty DOD Civilian and Active Duty
3- Injury/illness beyond first aid
4- Other interest for future prevention
What are the 3 objectives of first aid
1- Maintain breathing
2- Stop bleeding / maintain circulation
3- Prevent / treat shock
What are the 6 areas of Naval Doctrine
COWLIP
1- Command and Control
2- Operations
3- Warfare
4- Logistics
5- Intelligence
6- Planning
What are the 7 Principles of Naval Logistics
FEAR S-3
1- Flexibility
2- Economy
3- Attainability
4- Responsiveness
5- Simplicity
6- Sustainability
7- Survivability
What is the first ship named after an enlisted man
USS Osmond Ingram (DD255)
1st enlisted KIA in WW1
When was the US Navy formed
13 OCT 1775 (2 vessels purchased)
Who was the 1st Commander of the Navy
Esek Hopkins
What were the 3 Classes of ships at the Navy's inception
1- Ships of the Line
2- Frigates
3- Sloops of War
The Battle of Coral Sea
7 May 1947
1st Carrier VS. Carrier battle
Voyage of the Great White Fleet
16 Dec 1907 to Feb 1909 Pres. Theodore Roosevelt
Battle of Normandy
6 June 1944
Largest Amphibious Assult
Battle of Midway
3 June 1942
Turning point in war in the Pacific (3 Japanese carriers sunk)
Battle of Guadalcanal
13 November 1942
the loss of the 5 Sullivan Brothers
Battle of Leyte Gulf
23 October 1944
Largest Naval Battle in History
1st use of Kamakazies
Final blow to Japanese fleet
On the roof Gang
1st cryptology trained on the roof of Navy Dept. Bldg
Purple Code
Japanese code Broken in WW2
What are the 3 levels of war
TOS
1- Tactical
2- Operational
3- Strategic
National Security Act
Established CIA and merged War Dept and Navy Dept
Navy Core Values
Formally adopted by ADM Frank Kelso in 1992
Sailor's Creed
Developed by Recruit Training Panels in 1993
RADM Grace Hopper
Led Development of COBOL and termed phrases "Bugging" and "debuggin"
1st Computer
ENIAC ( Electronic Numerical Integrator and Computer), University of Pennsylvainia
APRANET
Advanced research Projects Agency Network
Predecessor of Internet
Created by ARPA of US DOD
John Walker
Led largest Russian spy network 1967-1985
ONI
Office of Naval Intelligence est. 1882
Merged Dept of Library and Office of Intelligence
Mercury 3
1st US manned spaceflight
Alan Shepard
Gemini 3
1st 2-man space mission
John Young
Apollo 11
1st Lunar Landing
Neal Armstron and Buzz Aldrin
Apollo 17
Last lunar landing
STS-1
Space Shuttle Columbia
John Young and Robert Crippen
USS Liberty
Sunk by Israel June 8 1967
USS Pueblo
Captured by N. Korea
1st CIO/DNI
LT Theodorus B.M. Mason
Mission of the Navy
To maintain, train and equip combat-ready Naval forces capable of winning wars, deterring aggression, and maintaining freedom of the seas
NCA
National command Authority (Pres and SECDEF)
(ULTIMATE LAW SORCE OF MILITARY ORDERS)
what is NSC
National Security Council
OPCON
Operational Control - provides authority to organize commands
ADCON
Administrative Control - provides authority to organize commands
ADCON
Administrative Control - provides authority over subordinate or other organizations
COCOM
Combatant Commander
FLTCFOM
Fleet Command ( Operational )
TYCOM
Type Commander (Training)
PACOM
US Pacific Command (Pearl Harbor, HI)
EUCOM
US European Command (Stutgart, Germany)
CENTCOM
US Central Command (MacDill AFB,FL)
NORTHCOM
US Northern Command (Pertson AFB, CO)
JFCOM
US Joint Forces Command (Norfolk, VA)
SOUTHCOM
US Southern Command (Scott AFB, IL)
SOCOM
US Special Operations Command (MacDill AFB, FL)
TRANSCOM
US Transportation Command (Scott AFB, IL)
STRATCOM
US Strategic Command (Offutt AFB, NE)
AFRICOM
US Africa Command (Stuggart, Germany)
SPAWAR
Space and Naval Warfare Systems Command (Virginia Beach, VA)
JSPOC
Joint Space Operations Center (Cheyenne Mountain AF Station, CO)
NOAA
National Oceanic and Atmospheric Administration (Dept of Commerce) (Silver Springs, MD)
ONI
Office of Naval Intelligence (Suitland,MD)
NAVSPOC
Navy Space Operations Center (Dahlgren, VA)
NAVCYBERFOR
Navy Cyber Forces (Virginia Beach, VA)
What are the USN Fleets
2nd - Atlantic (Norflok, VA)
3rd - Eastern Pacivic (San Diego, CA)
4th - Southern Command (Mayport, FL)
5th - Indian Ocean (Manama, Bahrain)
6th - Europe (Naples, Italy)
7th - Western Pacific (Yokosuka, Japan)
10th - USCYBERCOM
7 Information Dominance ratings
1 - AG (Aerographer's Mate)
2 - CTI (Cryptologic Technician - Interpretive)
3 - CTN (Cryptologic Technician - Networks)
4 - CTM (Cryptologic Technician - Maintenance)
5 - CTR (Cryptologic Technician - Collection)
6 - CTT (Cryptologic Technician - Technical)
7 - IS (Information Specialist)
8 - IT (Information Systems Technician)
C4ISR
Command, Control, Computer, Communications and Intelligence, Surveillance, Reconnaissance
NCTAMS
Naval and Computer Telecommunications Area Master Stations
NCTAMS PAC - Wahiawa, HI
NCTAMS LANT - Norfolk, VA
DISA
Defense Information Systems Agency Provides command and control capabilities and enterprise infrastructure
NASIC
National Air and Space Intelligence Center
NCDOC
Navy Cyber Defense Operations Command
ODNI
Office of the Director of National Intelligence
Serves as head of intelligence community
DIA
Defense Intelligence Agency
NSA
National Security Agency
NGA
National Geospatioal Agencu
CIA
Central Intelligence Agency
DHS
Dept of Homeland Security
FBI
Federal Bureau of Investigation
DOE
Dept of Energy
DEA
Drug Enforcement Agency
DOS
Dept of State
DOT
Dept of Treasury
NRO
National Reconnaissance Office
NASA
National Aeronautical and Space Administration
CIC
Commander in Chief/President-HON Barrak Obama
SECDEF
Secretary of Defense - HON Leon Panetta
SECNAV
Secretary of the Navy - HON Ray Mabus
CNO
Chief of Naval Operations - ADM Jonathan Greenert
CINC
Fleet Commander in Charge - CENTCOM GEN James Mattis
MCPON
Master Chief Petty Officer of the Navy - MCPO Michael Stevens
EDVR
Enlisted Distribution verification Report
AMD
Activity Manpower Document
Displays qualitative and quantitative manpower requirements
CCRI
Command Cyber Readiness Inspection
"quick look" methodology for conduction compliance validations conducted by NAVCYBERFOR
SITREP
Situational Report
What are the categories of SITREP
1 - OPREP 3 Navy Unit SITREP (significant, not high interest to navy or national security)
2 - OPREP 3 Navy Blue (significant, high interest to navy)
3 - OPREP 3 Pinnacle ( national level)
4 - OPREP 3 Bent Spear ( nuclear weapons)
Navy Correspondence manual
SECNAVINST 5216.5D
DLPT
Defense Language Proficiency Test
6 Programs of Brilliant on the Basics
MR SICO
1 - Mentorship
2 - Recognition Programs
3 - Sponsorship/ first 72 hours
4 - Indoctrination
5 - CDB
6 - Ombudsman
3-M
Maintenance and Material Management
DPAS
Defense Property Accountability Sytem
MOV
Material obligation Validation (back order)
DLR
Depot Level Repairables
NRFI
Not Ready for Issue ( turn in or RIP/ remain in place)
MAM'S
Maintenance Assistance Modules (replaceable parts to identify probems not spare/repair parts)
CASREP
Casualty Report ( equip cannot be repaired within 48 hours)
CASREP report types
- Initial
- Update
- Cancel
- Correction
CASREP Categories
C-1
C-2: minor degradation of primary mission
C-3: major degradation of primary mission
C-4: loss of primary mission
CHRIMP
Consolidated Hazardous Material Reutilization and Inventory Management Program
DRMS
Defense Reutilization and Marketing System
Top Secret
Orange - Grave damage to national security
Secret
Red - Serious damage to national security
Confidential
Blue - Damage to national security
Unclassified
Green - Not classified and freely available to public
SAER
Security Access Eligibility Report
SSO
Special Security Officer ( has overall authority of , and controls access to, a SCIF)
Events reportable to SSO
UP SIR
1 - Unauthorized space access
2 - PDS
3 - Security violations
4 - Information spillage
5 - Report of major medical evaluations
SF 700
Security container information form
SF701
Activity security checklist
SF702
Security container check sheet
SF703
Top Secret cover sheet
SF 153
COMSEC Material Report
SF 312
Classified Nondisclosure Agreement
FDO
Foreign Disclosure Officer
DCS
Defense Courier Service
TSCO
Top Secret Control Officer
RAM
Random Antiterrorism Measures
EAP/EDP
Emergency Action Plan/Emergency Destrution Procedures
SCI
Sensitive Compartmented Information
PDS
Practice Dangerous to Security
COMSEC
Communications Security
INFOSEC
Information Security
COMPUSEC
Computer Security
PSP
Personnel Security Program
ATFP
Antiterrorism/ Force Protection
CSM
Command Security Manager (officer of GS-11 or above)
ICD
Intelligence Community Directive
JPAS
Joint Personnel Adjudication System
DONCAF
Department of the Navy Central Adjudication Facility
What are the Levels of INFOCON
INFOCON 5 - routine NetOps There is no apparent hostile activity
INFOCON 4 - Increased risk of attack
INFOCON 3 - A risk has been identified
INFOCON 2 - An attack has taken place
INFOCON 1 - Attacks are taking place
ISSM
Information Systems Security Manager
FPCON ALPHA
General threat of possible terroist activity
FPCON BRAVO
Increased and more predictable threat of terrorist activity
FPCON CHARLIE
Incident occurs or is immenent for received intelligence
FPCON DELTA
Immediate area where a terrorist attack has occured
IA
Information Assurance
- Information Operations that protect and defend data and IS
Certification
Comprehensive evaluation of technical and non-technical security features of an IS and other safeguards
Accreditation
Formal declaration by DAA That an information system is approved to operate in a particular security mode
DAA
Designated Approving Authority
System Security Plan
Formal document that fully describes the planned security tasks required to meet system or network security requirements
SSAA
System Security Authorization Agreement
ATO
Authorization to Operate
IATO
Interim Approval to Operate
Configuration Management
Management of security features and assurances through control of changes made throughout the development and operational life of the system
Five Attributes of Information Assurance
CAN I Authenticate
- Confidentiality
- Availability
- Non-repudiation
- Integrity
- Authentication
9 Categories of computer Incidents
1 - Root level intrusion (Incident)
2 - User level Intrusion
3 - Unsuccessful Activity Attempt (Event)
4 - Denial of Service (Incident)
5 - Non-Compliance Activity (Event)
6 - Reconnaissance (Event)
7 - Malicious Logic (Incident)
8 - Investigating (Event)
9 - Explained Anomaly (Event)
IAVA
Information Assurance Vulnerability Alert
IAVB
Information Assurance Vulnerability bulletin
IAVT
Information Vulnerability Technical
CTO
Communications Tasking Order
NTD
Navy Telecommunications Directive
Service Pack
Collection of updates, fixes and /or enhancments to a software program
Vulnerability
Weakness in an information system that could be exploited by a threat source
Threat
Any circumstance or event with the potential to adversely impact organizational operations
IAM
Information Assurance Manager
Host
A computer connected to the Internet or any type of data network
Client
Application or system that access a romote service on another computer system (server)
Application Server
Software Framework dedicated to the efficient execution of procedures for supporting the construction of applications
HUB
Device for connecting multiple twisted pair of fiber optic Ethernet devices togeather and making them act as a single network segment
Switch
Computer networking device that connects network Segments
Router
Device that interconnects two or more computer networks
WAP
Wireless Access Point
- device that allows wired communication devices to connect to a wireless network
Proxy Server
Server that acts intermediary for repuests from clients seeking resources from other servers
Firewall
Part of computer system or netwok that is designed to block unauthorized access while permitting authorized communications
VPN Concentrator
Virtual Private Network Concentrator
_incorporate most advanced encrytion and authentication techniques avilable
Repeater
Electronic device that receives a signal and retransmits it at a higher level and or higher power to vocer longer distances
Access
AKA Desktop Layer
-provides access to networks
Distribution
AKA Workgroup Layer
-routes between LAN's and VLAN's
Core
Switches traffic as fast as possible using high speed technology
Bus Topology
Network architecture in which a set of clients are connected via shared communications line
Star Topology
-most common computer topologies
-utilizes center hub which acts as a conduit to transmit messages
Ring Topology
Each node connects to exactly two other nodes forming a single continuous pathway for signals
Mesh topology
Each node may act as an independient router
LAN
Local Area Network
- Computer network covering a small physical area
WAN
Wide Area Network
MAN
Metropolitan Area Network
GAN
Generic Access Network (think mobile carriers)
7 Layers of OSI Model
1 - Physical
2 - Data Link
3 - Network
4 - Transport
5 - Session
6 - Presentation
7 - Application
4 Layers of TCP/IP Model
1 - Network Access
2 - Internet
3 - Host-to-Host
4 - Process/ Application
IPv
Internet Protocol version
IPv4
32 bit IP address
IPv6
128 bit IP ADDRESS
NIPRNET
Non-Classified Internet Protocol router Network (unclassified)
SIPRNET
Secret Internet Protocol Router Network (Secret)
JWICS
Joint Worldwide Intelligence Communications System (top secret)
DoDN (GIG)
Department of Defense Network (Global Information Grid)
DISN
Defense Information Systems Network
IT21
Information Technology for the 21st Century
Machine Language
System of instructions and Data executed directly by a computer's central processing unit
Assembly Language
Programming language with strong abstraction from the details of the computer
Operationg System
Software that runs on computers and manages the computer hardware
Application
Software designed to help user to preform singular or multiple related tasks
Virus
Malicious computer program that can infect a computer
Worm
Self-replicating malware that can act/infect without any user intervention
Trojan
Malware that appears to perform a desirable function but facilitates unauthorized access of the computer system
Backdoor
A method of bypassing normal authentication obtaining access
Phishing
Attempting to acquire sensitive information by masqerading as a trustworthy entity
Network enumeration
Computing activity in which user names, and info on groups, share and services of networked computers are retrieved
Buffer Overflow
Anomaly where a program overruns the buffer's boundary and overwrites adjacent memory
SQL Injection
Code injection technique that exploits a security vulnerability occurring in th edatabase layer of an application
Dictionary Attack
Attempting to determine a decryption key or passphrase by searching likely possibilities
Privilege Escalation
A user obtains access to a resorce they normally wouldn't be able to access
Brut Force Attack
Attack that relies on trial and error
Social Engineering
Act of manipulating people into preforming actions or divuldging confidential information
ADNS
Automated Digital Network system
-Connects Navy shipboard networks to other ship and shore networks
CUDIXS
Common User Data Information Exchange System
- Shore-based, computer controlled, message store and forward systems that automates the message exchange between ship/shore/ship
VERDIN
VFL Digital Information Network
-Highly reliable and secure system for worldwide delivery of operational, tactical, and administrative messages (used by submarines)
NOVA
Stroe and forward switching system that provides automated readdressal and quote functions for authorzed users
IBS
Integrated Broadcast System
-Integrates several existing intelligence and information dissemination systems into a single system of broadcasts
INMARSAT
International Maritime Satellite
-Critical communications path for SIPRNET, MIPRNET, and telephone ship-to-shore accrss for Navy ships.
-Supports QOL communications
DMS
Defense Messaging System
NREMS
Navy Regional Enterprise Messaging System
-Initiative to reduce the number of Navy DSP sites
-replacing DMS and AMHS
AMHS
Automated Message Handling System
-Provides simplified message drafting, coordination, and release of outgoing messages
VTC
Video Tele-Conference
-DSN is preferred network
DCO
Defense Collaboration Online
-Provides web conferencing anybody can access instantly
GINGERBREAD
notify that a breach of security has been make over the network
EEFI
Essential Elements of Friendly Information
-identify specific items of information which, if acquired by adversary, would degrade the security of military operations, special projects, etc.
RIVER CITY
Conditions that provide procedures to control outgoing paths from ships and shore systems for OPSEC and force protection
JSIR
Program to resolve interference incidents at the lowest feasible level
Meaconing
Intentional transmission of signals designed to deceive users of navigational aids
-interception and rebroadcast of navigational signals
Intrusion
Intentional insertion of EM energy into transmission paths in any manner, with objective of deceiving operators or cause confusion
Jamming
Deliberate Radiation, Re-Radiation, or Reflection of EM energy for the purpose of preventing or reducing enemy's effective use of the EM spectrum with intent to degrade or neutralize the enemy's combat capability
Spectrum Management
Process of regulating the use of radio frequencies to promote efficient use
PLA
Plain Language Address
-Component used to denote the command short title and sometimes geographic location used in message traffic
DTG
Date Time Group
-DDTimeZ MMM YY
-zulu time Greenwich England
UTC
Coordinated Universal Time
- ZULU Time or Greenwich Mean Time
MESSAGE PRECEDENCE'S
- R - routine (6h)
- P - Priority (3h)
- O - Immediate (30min)
- Z - Flash (ASAP objective<10 min)
- W - WELFARE
OPTASK COMMS
Means used by USN and Allied Navies distibute afloat communication plans
TSO
Telecommunications service Order
-authorization to start, change or discontinue circits or trunks and to effect administrative changes
TSR
Telecommunications Service request
-valid, approved, and funded telecommunications requirement request
COMSPOT
Communications spot
-Report of communication outage or degradation
EKMS
Electronic Key Management System
-Manage all components of electronic key andother types of COMSEC material (from planning to destruction)
OTAT/OTAR
Over-The-Air-Transfer / Over-The-Air-Rekeying
-the method of changing or updating encryption keys in two-way radio system over the radio channel
TEMPEST
Code name given to investigation, study, and control of compromising emanations from telecommunications and automated information processing systems
EMCON
Emissions Control
-control of all electromagnetic and acoustic radiations
-used to prevent enemy detection and minimize interference of friendly forces
6 Primary Warfare Areas
1 - Anti Submarine Warfare (ASW)
2 - Surface Warfare (SUW)
3 - Information Warfare(IW)
4 - Air Warfare (AW)
5 - Strike Warfare (STW)
6 - Naval Special Warfare (NSW)
Mobile Detachment
Units with specific skills that can be deployed on a moments notice to fulfill a requirement by a commander
Integration
Navy will employ Reserve forces and personnel to relieve the stress on Active Operating Tempo (OPTEMPO) and Personnel Tempo (PERSTEMPO)
Direct Support Assets
Used by FLTCOMs to deploy in a moments notice to meet quick reaction mission requirements
5 METOC teams
1 - Mine warfare UUV Platoon
2 - Naval Oceanography ASW Team
3 - Strike Group Team
4 - Mobile Environmental Team
5 - Fleet Survey Team
Mine Warfare UUV Platoon
Conduct research and development with unmanned underwater vehicles to further tactics and techniques for mine disposal
Naval Oceanography ASW Team
Supports SPECOPs by providing weather, oceanographic, mappin, charting and geodesy support
Fleet Survey Team
Gather Hydrographic information for littoral operations
the 7 Information Operations Capibilities
1 - Operational Security
2 - Psychological Operations
3 - Military Deception
4 - Electronic Warfare (attack, Protection, Support)
5 - Physical Attack/Destruction
6 - Civil Affairs
7 - Public Affairs
US Navy Blue and Red Teams
Cyber Wargames to analiyze cyber security
- Red: emulate attacks
- Blue: (defender) identifies security threats and risks
FES
Fleet Electronic Shop
-direct support unit trained to provide assistance in cytological replacement due to casualties
US Code - Title 10
Provides legal basis for the roles, missions and organizations of each service and DoD
US Code - Title 50
Outlines the role of War and National Defense
Critical Information
Information concerning possible foreign threats to U.S. national security
CRITIC
-Critica Information reporting system
-Short message containing all essential facts about the situation in electronic format allowing dissemination within 10 min
CCOP
Cryptologic Carry-on Program
-provide exploitation capability by augmenting existing Ships Signal Exploitation Space (SSES) or provide capabilities where one does not exist
NITES
Navy Integrated Tactical Environmental System
-portable system allowing USN and USMC to access meteorology and oceanography support in remote locations
JDISS
Joint Deployable Intelligence Support system
-provides on site automation support and the connectivity to make the best use of Intelligenc Community's resorces
MDA
Maritime Domain Awareness
-the collection, fusion, and dissemination of intelligence for protection of oceans, rivers and water ways from piracy, terrorism, brug smuggling and any other outside threats
MOC
Maritime Operation Center
OPSEC
Operations Security
-process that identifies, controls, and protects generally sendsitive but unclassified information about a mission, operation or activity
5 OPSEC Planning steps
1 - Identify Critical Information
2 - analyze Threat
3 - Analyze Vulnerabilitise
4 - Assess Risk
5 - Apply Countermeasures
WRA
Web Risk Assessment
who is overall responsible for OPSEC at the command
CO
Purpose of Naval Intelligence
Provide Evaluated intelligence on an adversary's capabilities and intentions to support planning and operations at all levels of warfare
6 Steps of Intelligence
1 - Planning and Direction
2 - Collection
3 - Processing and Explotation
4 - Analysis and Production
5 - Disseminationa and Integration
6 - Evaluation and Feedback
3 Categories of Intelligence
TOS
- Tactical
- Operational
- Strategic
PIR
Priority Intelligence Requirement
-Critical pieces of intelligence commander must know by a particular time to plan and execute a successful mission ("wake me up if this happens")
CCIR
Commander Critical Information requirement
-comprehensive list of information requirements identified by commander as being critical in facilitating timely information management and the decision-making process that affect successful mission accomplishment
Intelligence oversight
All collection of intelligence to be dondicted in a manner consistent with the Constitution and applicable law
IPB
Intelligence Preparation of the Battlespace
-continuous analysis of adversary, terrain and weather in assigned or potential battlespace
FIO
Fleet Intelligence Officer
ISR
Intelligence, Surveillance, and Reconnaissance
-activity that synchronizes and integrates planning, operation of sensors, assets, processing, exploitation, and dissemination systems in direct support of current and future operations
HUMINT
Human Intelligence (DIA)
-provided by human sources
OSINT
Open Source Intelligence
-information of potential intelligence value that is available to the general public
MASINT
Measurement and Signature Intelligence
- scientific and technical intelligence
SIGINT
Signals Intelligence (NSA)
-communications, electronics, and or foreign instumentation signals intelligence
COMINT
Communications Intelligence
FISINT
Foreign Instuments Intelligence
ELINT
Electronics Intelligence
IMINT
Imagery Intelligence (NGA)
ACINT
Acoustic Intelligence (DIA/ONI)
ELF
extremely Low Frequency (up to 3 KHZ) (SUBS)
VLF
Very Low Frequency (3-30KHz) (SUBS)
LF
Low Frequency (30-300 KHz) (Radio/Nav)
MF
Medium frequency (300KHz- 3MHz) (AM Radio)
HF
High Frequency (3MHz-30MHz) (Short Wave Radio)
VHF
Very High Frequency (30MHz-300MHz) (FM Radio)
UHF
Ultra High frequency (300MHz-3GHz) (SATCOM)
SHF
Super High Frequency (3-30GHz) (DSCS)
EHF
Extremely High Frequency (30-300 GHz) (Navy EHF)
Frequency
The number of waves that pass a fixed place in a given amount of time
-the higher the frequency the more information that can be transmitted
Wavelength
-Forms of EM radiation (radio, light, infrared) make characteristic patterns, shape and length, as they travel through space.
-wavelengths = the space between the peaks or high points
Ducting
Bending of RADAR waves passing through abnormal conditions
- may affect radar preformance
Refraction
The deviation of EM waves from a straight line as it passes through the atmosphere due to variation of air density
Multiplezing
Method for simultaneous transmission of two or more signals over a common carrier wave
Modulation/Demodulation
The process of varying one or more properties of high frequency periodic waveform
Bandwidth
Information-carrying capacity of a communication channel
Keying
Method of a continuous wave keying using punched tape or other mechanical means to key a transmitter
FSK
Frequency-shift keying
-frequency modulation scheme in which digital information is transmitted through discrete frequency changes of a carrier wave
PSK
Phase-shift keying
- digital modulation scheme that conveys data by changing, or modulating, the phase orf a reference signal
Layers of the atmosphere
1 - Troposphere (weather takes place)
2 - Stratosphere
3 - Ionosphere (outer most layer)
Propagation
Waves traveling through a medium, i.e. water, air
Azimuth Angle
The angle measure clockwise from true north in the horizontal plane
Elevation Angle
the angle between the horizontal plane and the line of sight
CW
Continuous Wave
-1st type of modulation used
-still used for long-range communications
AM
Amplitude Modulation
-oldest method of transmitting human voice electronically
FM
Frequency Modulation
RADAR
Radio Detection and Ranging
PRI
Pulse repetition interval
-rate at which pulses are transmitted
RF
Radio Frequency
-energy that is transsmitted to and reflects from the reflecting object
BW
Bandwidth
-the frequency spread betwwn the half-power points on the response curve
CW (RADAR)
Continuous Wave
-transmitting a constant frequency and detects moving targets by detecting changge of frequency by EM energy reflecting from a moving target
PW
Pulse Width
-duration of time between the leading and trailing edges of a pulse
Scan
Systematic movement orf a radar beam in a definite pattern while searching for or tracking a target
Types of RADAR
1 - Air Search (air Targets)
2 - Surface Search (surface objects and low-flying aircraft)
3 - Fire Control (tracking RADAR)
OPELINT
Operational Electronic Intelligence
-determines the locations and readiness of target emitters
TECHELINT
Technical Electronic Intelligence
-determines the capabilities and limitations of target emitters
HALF DUPLEX
one way flow of information between terminals in either direction but not simultaneously (send only or receive only)
DUPLEX
Two way flow of information between terminals in both directions simultaneously using two separate frequencies
Simplex
uses a single frequency to exchange information, one way flow
NOP
Navy Oceanography Portal
-oceanography webpage
NOP Available products
- Time
- Earth Orientation
- Stronomy
- Meteorology
- Oceanography
USNO
U.S Naval Obervatory
USNO available products
- Astronomy
- Astronomical Applications
- Earth Orientation
- Pricese Time
JTWC
Joint Typhoon Warning Center
NOOC
Naval Oceanography Operations Command
NOOC available products
- Aviation Digital Data Service Prducts
- Tropical information
- warnings (wind and seas)
- forecasts
- Analysis
- Satellite Imagery
- Doppler radar
FNMOC
Fleet Numerical Meteorology and Oceanography Center
-provides highes quality, most reevant and timely worlwide meteorolgy and oceanography
NAVO
Naval Oceanographic Office
NAVO avilable products
- Operational products ( altimetry, currents, oceanography)
- Naval/ Natioal Ice Center
GOES
Geostationary Operational Environment Satellite
-mainstay of weather forecasting
-equatorial orbit
POES
Polar Operational Environmental satellite
- N/S orbit
DMPS
Defense Meterological satellite program
- "see" environmental features (clouds, snow, fire, pollution)
NPOESS
National Polar-Orbiting Environmental Satellite System
-provide global coverage
TRMM
Tropical Rainfall Measuring Mission
Wind Direction
Average direction from which wind is blowing
Wind speed
Average rate of air motion
Occluded front
When a cold front overtakes a warm front
Lunar Illumination
Illumination of the boon by the sun
Bathythermograph
Instrument used to measure subsurface water temp
SST
Sea Surface Temperatrue
Effect on sound by water temperature
Speed decreases at lower temps
Effect on sound by water pressure
Speed increases with higher pressure
Effect on sound by water salinity
Speed decreases at high salinity
Slight in open ocean
Standard refraction
Refraction (truning/bending) that wold take palce in ideal atmosphere
Super-refraction
Radar Beams bend tward ground
Sub-refract
Radar over shoots targets
Trapping
- extension of supper-refracting
- produces greatest extremes in radar preformance
Tropical cyclone conditions of readiness
- COR V within 96 hr
- COR IV within 72 hr
- COR III within 48 hr
- COR II within 24 hr
- COR 1 withing 12 hr
Nautical Almanac
reference system for GPS an other terrestial mapping of earth's surface
Astronomical Almanac
Astronomical reference frames fro celestrial naviation and orientation of space systems
Space Force Enhancement
- ISR (Intelligence, Surveillance, Reconnaissance)
- Missile warning
- SATCOM
- GPS
- METOC
Space Support
Operations to deploy and sustain military/ intel systems in space
Space control
Ensures freedom of action n space for friendly forces
Space Force Applications
Operations consist of attacks against Terrestrial-based targets from space
Solar-cycle
11yr cycle (4yr rise - 7yr decline)
SEU
Single event upset (i.e. Solar Flare)
Van Allen radiation Belts
2 Concentric, donut-shaped regions of radiation
Atmospheric drag
Radiation heats atmosphere, decreasing satellite altitude and increasing speed
LEO
Low Earth Orbit 150-800 mi
MEO
Medium Earth Orbit Below 22,300 mi (GEO) and above LEO
High Elliptical Orbit (Molniya Orbit)
Apogee (n. Hem) Slows and Perigee (S.Hem)speeds
GEO
Geosynchronus orbit Stays in same rotation as earth
Polar Orbit
Passes over poles
Apogee
Point furthers from center of earth in orbit
Perigee
Point closest to center of earth in orbit
Space Launch Facilities
- NASA Kennedy Space Center FL
- Johnson Space Center Houston, TX
- Vanderberg CA
NAVY UFO
Navy UHF Follow-on Satellite
- carries GBS
DSCS
Defense Satellite Communications System
-oldest satellite systems
- bulk of satellite system
GBS
Global Broadcast Service
WGS
Wideband Global system
- newest satellite system
- 1 satellite = entire DSCS system
GPS
Global Positioning System
- can tell NPT ( Navigation, Position, Time)
- uses master clock / ZULU Time
- 32 satellites in system
- 3 needed for position 44th for elevation
U.S Naval Forces Central Command
Est. 21 JAN 1983
- coordinate administrative and logistic support
when was 5th Fleet re-activated
1 JUL 1995
Fleet in charge of Persian Gulf during 1st Gulf War
7th Fleet
Task Force created to supervise tankers and oilers in the Persian Gulf
Task Force 126
What U.S. Command was established in Bahrain, when it achieved independence?
Administrative Support Group
Boundary between USCENTCOM AND USPACOM
Strait of Hormuz
Task Force in charge of USCENTCOM AND USPACOM Boundary
Joint Task Force Middle East est. 20 SEPT 1987
Commander, Expeditionary Strike Group 5
Rear Admiral William Lescher
Chief of Staff, U.S. Naval Forces Central Command
CAPT Ed Cashman
Maritime Operations Center Director, US Naval Forces CENTCOM
CAPT Rich rogers
Chief of Staff, Combined Maritime Forces
CAPT John P. Carter
US Naval forces CENTCOM/5th Fleet CMC
CMC James Delozir
US Naval forces CENTCOM, staff CMC
CMC Mark Tomlinson
PSP
Partnership Strength and Presence
Pakistan Capital and President
Islamabad, Asif Ali Zadari
Afghanistan capital and President
Kabul, Hamid darzai
Three Terrorist groups operating in Afghanistan
- Taliban
- Al-quida
- Hezbullah
Ireaq Capital and Prime Minister
Baghdad, Jalal Talabani
2 Iraqi Oil Platforms
Al Basrah Oil Terminal (ABOT)
Khawr Al Amaya Oil terminal (KAAOT)
Yemen Capital and President
Sana'a, Abd Rabuh Mansur al-Hadi
Syria Capital and President
Damascus, Bashar Al-Assad
Saudi Arabia capital and King
Amman, Abdullah II
Bahrain Capital and King
Manama, Hamad Bin Isa Al Khalifa
Iran Capital and President
Tehran, Mahmoud Ahmadinejad
MSO
Maritime Security Operations
CTF-465
European Union, OP ATLANTA
CTF-508
NATO, OP OCEAN SHIELD
3 existing Somali States
- Somaliland
- Puntland (openly against piracy)
- Somalia Proper (piracy thrives)
Counter-piracy mission
Deter, disstupt, and suppress piracy
Counter-proliferation mission
Prevent movement of sanctioned cargo
IRTC
International Recommended Transit corridor
CT/SAVE
Counter terrorism/ Struggle Against violent Extremism
EO
Electro Optical
IR
Infrared
SAR
Synthic Appature Report
IPIR
Initial Phase Interpretation Report
NGA
National Geospatioal Intelligence Agency
PTW
Precision Targeting Workstation
DCGS-N
Distributed Common Ground System (Navy)
3 Levels of Electronic warfare
1 - Electronic Attack
2 - Electronic Protection
3 - Electronic Wartime Support
5 Core capabilities of IO
1 - Military Deception (MILDEC)
2 - Military Information Support Operations (MISO)
3 - Electronic warfare (EW)
4 - Computer Network Operations (CNO)
5 - Operational Security (OPSEC)
3 levels of computer network operations
1 - Computer Network Attack (CAN)
2 - Computer Network Defense (CND)
3 - Computer Network Exploitation (CNE)
3 methods of MILDEC
1 - Physical
2 - Technical
3 - Administrative
NOST
Naval OPSEC Support Team
IOSS
Intra-agency OPSEC support Team
JCMA
Joint COMSEC Monitoring Agency
NCIS
Naval Criminal Investigation Service
COOP
Continuity of Operations Plan
-The capability of continuous Mission Essential Functions (MEF) without unacceptable interruptions during an emergency or interruption of command central
JMAST
Joint Maritime Ashore Support Team
Defense-In-Depth
Information Security Strategy integrating people, tech and OP capabilities to establish variable barriers across layers and missions of the organization
IDS
Intrusion Detection System
-2 types, Active and Passive
Malicious Code
Piece of software that can damage or alter data and programs on a system without the permission and notice of the user
Dropper
Install a virus, Trojan Horse, etc
Logic bomb
Smart malicious code that executes only when certain conditions are met
Trojan Horse
Seemly harmless program that contains malicious code
Virus
Needs to be executed by user before it can do damage
Worm
Self-replicating, can spread on its own
Zombie
Compromised computer that can act remotely
Bot
Malware that alows attacker to gain complete control of a zombie computer
Back door
Allow unauthorized access to a remote user
Zero Day Exploit
takes advantage of security vulnerability on same day as exploit
Spyware
Collects info about user without their knowledge
Keyloggers
Tracks every keystroke
Privilege escalators
Allows unauthorized increase in rights
White Hat
Hackers with goal of improving security or improving awareness
Black Hat
Hackers with motivation of recognition and various criminal intentions
Gray Hat
Black Hat hackers turned to White Hat
Script Kiddie
Wannabees
Denial of Service
Objective is to modify or destroy information to prevent usage
Exploit
Attack on computer system taking advantage of vulnerability
Global Information Grid
i.e. internet
Mitigation
Reducing an attack
s effectiveness
Penetration
bypassing security
Probe
Learn about security and state of the network
Port Scan
Message sent by possible attacker to learn computer network services
Non-repudation
Proof of delivery and ID of sender to recipient
What instruction governs COMUSNAVCENT'S reponse to spillage
COMUSNAVCENTINST 2201.1A
DADMS
DoN Application and Database Management System
VoIP
Voice Over Internet Protocol
DSN
Defense Switched Network
DRSN
Defense Red Switch Network
POTS
Plain Old telephone Service
STE
Secure Terminal Equipment
CENTRIXS
Combined enterprise Regional Information Exchange System