Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
220 Cards in this Set
- Front
- Back
Discuss the concept of ORM |
A decision making tool used by personnel at all levels to increase effectiveness by identifying, assessing, and managing risk. |
|
What are the 5 steps of ORM |
I-identify hazard: list of all associated with each step A-assess hazard: probability and severity (determine level of risk) M- make risk decisions: decide if benefits outweigh the cost. I-implement controls: engineering, administrative, ppe S- supervise: monitor any changes that might present a new hazard |
|
What governs safety and mishap reporting? |
OPNAVINST 51-2.1D |
|
What is RAC |
Risk Assement Code- the RAC is an expression of risk, which combines the elements of hazard severity and mishap probability. The RAC is expressed as a single Arabaic number that can be used to help determine overall risk. |
|
State the objectives of first aid? |
1. Save lives 2. Prevent further injures 3. Limit infection |
|
What are the 3 methods of controlling bleeding? |
1. Direct pressure 2. Elevation 3. Pressure points |
|
What are some of the symptoms of shock and how is it treated? |
Sx: confusion, anxiety, decrease blood pressure, cold skin, weak and rapid pulse, loss of consciousness. Tx: keep person lying down and warm, head below feet to help blood flow to the brain, no food/drink, loosen clothes |
|
Difference between open & closed fracture? |
Open- bone is protruding through skin Closed- bone is cracked but did not break skin |
|
Define HERO HERP HERF |
HERO- Hazards of electromagnetic radiation to ordnance HERP- Hazards of electromagnetic radiation to personnel. HERF- hazards of electromagnetic radiation to fuel. |
|
What are the 6 areas of naval doctrine? |
1. C2 2. Operations 3. Warfare 4. Logistics 5. Intelligence 6. Planning COWLIP |
|
What are the 7 principles of naval logistics? |
1. Flexibility 2. Responsiveness 3. Economy 4. Attain ability 5. Simplicity 6. Sustainability 7. Survivability FREASSS |
|
Who was the first enlisted man to have a ship named after him and why? |
GM1 Osmond Ingram. First person killed in combat during WW1 |
|
When was the USS Osmond launched? |
1919 |
|
Discuss the conditions that led to the formation of the U.S. Navy |
2nd continental congress authorized the purchase of 2 ships to protect US merchant valleys from the British |
|
What three classes of naval vessels existed at the inception of the U.S. Navy? |
Ships of the line, frigates, sloops of war. |
|
What significance did the battle of midway have on WWII and to information dominance warfare? |
Americans were able to decimate the Japanese fleet by breaking the communication encryption code used by Japan |
|
What is the significance of the battle of coral sea |
The battle was fought entirely by aircraft launched from aircraft carriers |
|
What is the significance of the on-the-roof-gang? |
Due to the limited personnel qualified to assist in intercept of Japanese radio traffic, a radio operator school was created to instruct personnel on intercept operations. |
|
Describe the historical significance of the Navajo Code Talkers |
They served 1942-45 in six marine divisions to transmit messages in native language |
|
Explain when ONI (office of naval intelligence) was established and by whom it was founded? |
March 23 1882 by william H Hunt Secretary of the navy |
|
Name the two departments that were combined to form the ONI? (Office of naval intelligence) |
Department library and office of intelligence |
|
State 3 levels of war |
Strategic, tactical, and operational |
|
What is the significance of the national security act of 1947? |
Signed by president Truman to establish CIA, NSC (national security council), Air Force and the DoD. |
|
State when and why the navy core values were established? |
By CNO Admiral Kelso in 92' in response to the tail hook incident of 91' |
|
State when and why the sailor's creed was developed? |
Written by a "blue ribbon recruit training panel" in 93' at the direction of CNO admiral Kelso to describe every sailor from E-1 to O-10. Sailor first. |
|
State RADM Grace Hopper's contributions to the U.S. Navy? |
Conceptualized machine programming languages which led to the development of Common Business-Orieted Language (COBOL). She was said to have also coined the terms "computer bug" and "debugging" |
|
State the name of the first computer and where it was located? |
Electronic Numerical Integrator and Computer (ENIAC) located at the university of Pennsylvania |
|
Explain the impact of the John walker espionage case |
He began spying for the Soviet Union in December 67' damage is unknown, let to the formation of two person integrity. |
|
Describe what ONI (office of naval intelligence) is who and when it was established and what organizations where combined to form it? |
23mar1882 by secretary of the navy WILLIAM hunt, it is the oldest intelligence organization in the sun, it was formed by combining the Department Library and the office of intelligence |
|
State the first CIO/DNI? |
First chief intelligence officer/ director of naval intelligence was Theodorus Bailey-Myers-Mason. |
|
What is the mission of the navy |
Maintain, train, and equip combat-ready naval forces, deter aggressive movements, maintain freedom of the seas. |
|
What two components make up the national command authority |
President of the US and Sec of Defense |
|
Describe the function of the following: COCOM Navy COCOM FLTCOM TYCOM |
Combatant commander- non transferable command authority over assigned forces Command authority over Atlantic fleet, pacific fleet, navy forces Europe, navy forces central. Fleet commander- overall responsibility for the operations of the fleet and their AOR. There are 7 fleets Type commander- responsible for the mission and component commands, which consist of personnel, training, and logistics. |
|
What the the fleet numbers and operatoring areas? |
2-Norfolk va- western Atlantic and continental us 3- San Diego, ca- eastern and North Pacific 4- may port fl-Caribbean and central/eastern s. America 5- Manama Bahrain-Indian ocean, Suez Canal, Red Sea, Arabian gulf 6- Naples Italy- eastern Atlantic Ocean, Mediterranean and northern sea 7- Yokosuka Japan- western pacific, north of Antarctic 10- ft. Meade MD- cyber domain |
|
How is a TF,TG,TU,TE broke down |
Task force-56 Task group-56.1 Task unit-56.1.2 Task element-56.1.2.3 |
|
State the location, mission, and component commands of the following naval and computer telecommunication area master stations (NCTAMS) |
NCTAMS Lant-Norfolk va- provide C4I (command, control, communicotiana, computers, and Intel) for Atlantic NCTAMS pac wahiawa, hi- c4I for pacific fleet |
|
Define C4SR |
Command, control, communications, computers, intelligence surveillance and reconnaissance. |
|
Explain mission of DISA |
Defense information system agency- provide C2 while assuring global net-centric enterprise in direct support to full spectrum of operations |
|
explain the mission of NASIC |
Naval air and space intelligence center- Intel directly to military units development and sustainment of us air,space, and cyber capabilities. |
|
State the mission of NCDOC |
Naval cover defense operations command- coordinate, monitor, and oversees defense of navy computer networks and systems as assigned by commander us 10th fleet-USCYBERCOM |
|
COC |
Commander in Cheif- Pres Barrack Obama
VP- Mr. Joseph Biden Sec of def.- Ash Carter Sec of Navy-ray mabus Chairman JCoS- Army General Joseph Dunford CNO- ADM. John Richardson MCPO- MCPON Mike Stevens NECC- RADM Frank Morneau Force Master Chief- FORCM Lance Kitchens 3rd fleet- Vice ADM Nora Tyson 3rd fleet Master chief- CMDCM Loran Bather Group 1 CO- CPT Christopher Merwin Group 1 CMC- EODCM Peter Neville |
|
EDVR ODCR AMD |
EDVR-Enlisted Distribution & Verification report ODCR- Officer Distribution Control Report AMD- Activity manpower Document |
|
Eval Fitness Concurrent |
Eval- e-6 below Fitness- E7 above Concurrent- 90day |
|
Purpose of sitrep and what are its categories? |
Situational report to provide timely informations to higher authority on critical situations and military operations. Pinnacle- national interest Navy blue- high navy interest Unit sitrep- operational commander level of interest. |
|
Discuss the importance of the IG? |
Inspector general conduct and supervises audits/investigations relating to the programs and operations of the DoD |
|
Name the programs under the Brilliant on the basics? |
S- Sponsorship A- assigned mentors I- indoc L- leadership (CDB) O- ombudsman R- recognition |
|
What is DPAS |
Defense Priorities & allocations systems. Track life cycles of assets |
|
What is a casrep and 4 cats |
I- used only @ training commands II- Deficiency exists- causes minor degradation III- deficiency exist- Major degradation IV- deficiency exist- Loss of primary asset |
|
What is CHRIMP |
Consolidated hazardous material re-utilization and inventory management program |
|
Identify clearance levels and how often they need to be renewed |
TS/SCI- every 5 years S- 10yr C- indefinitely |
|
Identify SAER and its function |
Security Access Eligibiltiy Report- to identify or change eligibility of a sec clearance |
|
SF700- SF701 SF702 SF703 SF153 SR312 |
700- Security container information for safes/spaces 701- activity security checklist 702- container checklist-names and times open 703- T/S cover sheet 153- CMS report- accountability for comsec mat 312- classified information non-disclosure agreement |
|
DCS |
Defense courier service |
|
Procedures for transportation of classified material via DCS and Hand carry items |
DCS- Standard to-line addressing with no classifications marking inside double wrapped box with brown paper. Hand-carry- use cover sheet. Double wrap when carrying outside |
|
Difference between security violation and a practice dangerous to security? |
Violation- loss or compromise of classified info. Practice- possibility to jeopardize security or comsec materials. |
|
Color codes for classifications |
T/s orange S- red C-blue Unclassified-green |
|
If t/s or s info is disclosed it could lead to? |
T/s- grave damage to national security S- cause serious damage to national security |
|
What is CSM and who can be CSMCommand Securtiy Manager |
Officer or civilian employee GS-11 or above and us citizen |
|
JPAS |
Joint Personnel Adjudication System- DoD personnel security migration system for checking and updating security clearances |
|
SCIF Vs TSCIF |
SCIF-Sensitive compartmented information facility TSCIF- Temporary |
|
Define IA |
Measures that protect and defend information and information systems through |
|
5 attributes of IA |
C- confidentiality I- integrity A- availability N- non-repudiation A- authentication |
|
List the 9 categories of computer incidents |
1. Root 2. User 3. Unsuccessful attempt 4. Denial of service 5. Poor security 6. Scan/probe 7. Malicious logic 8. Investigating 9. Explained anomaly |
|
Draw the OSI and TCP Models |
OSI-TCP 7-Application-------application 6-presentation-----application 5-session-------------application 4-transport----------transport 3-network------------internet 2-data-link-----------network interface 1-physical------------network interface |
|
Name 2 protocols associated with the datalink layer |
Mac- Media access control LLC- Logical link control |
|
Name 2 protocols associated with the transport layer |
Tcp Udp Icmp |
|
What is ATO |
Authority to Operate issued by the DAA or PAA |
|
Define the following: IAVA: IAVB: IAVT: |
IAVA: IA vulnerability alert address sever network vulnerabilities resulting in immediate and protectively severe threats to DON systems and information. IAVB: Information Assurance vulnerability bulletins address new vulnerabilities that do not pose an immediate risk to DON systems, but are significant enough that noncompliance with the corrective action could escalate the risk. IAVT: Information assurance vulnerability technical advisory- vulnerability notifications. |
|
What is a service pack |
A collection of updates, fixes and/or enhancements to a software program delivers in the form of a single installable package. |
|
What is the use/purpose of a firewall? |
It is a hardware/software system designed to hide nodes from external networks. |
|
What is network topology? |
It is the logical layout of the network (bus, ring, mesh, star) mesh usually used to connect segments of a LAN. A hub is a common connection point for devices in a network |
|
LAN |
Local area network is a computer network covering a small physical area. I.E. Home, office, small group of building such as a school, airport |
|
WAN |
Wide area network- is a computer network that covers a broad area. I.E. Metropolitan, regional, or national boundaries |
|
MAN |
Metropolitan area network |
|
GAN |
Global area network |
|
NIPR- |
Non-Secure Internet protocol router |
|
SIPR |
Secure internet protocol router |
|
JWICS |
Joint worldwide intelligence communications system. I |
|
DODN |
DoD information network |
|
DISN |
Defense information systems network |
|
NMCI |
Navy marine corps intranet |
|
ONENET |
NMCI like connectivity for OCONUS |
|
IT21 |
Ship to shore networks |
|
Virus |
Infects another executable and uses a carrrier program to spread itself. |
|
Worm |
Similar to a virus but does not require a carrier program or user interaction to spread form host to host; self-propagates |
|
Trojan |
Malicious program disguised as something benign. Can allow a hacker access to a computer or be used as a denial or service attack |
|
Backdoor |
Program that a hacker installs on a target system to allow access at a later time |
|
Phishing |
Social engineering attack involving email posing as a legitimate business or entity re question seemingly nessary personally identifiable information |
|
Network Enumeration attack |
The process of scanning and compiling pertinent information of the layout of a network and its users |
|
Buffer overflow attack |
DoS attack that overloads a system's input capacity thereby crashing the system or preventing the user from accessing its resources |
|
SQL injection attack |
Overloads the input sector of an SQL database and allows the ability to execute arbitrary code forcing the database to divulge its contents |
|
Dictionary attack |
Attempts to crack passwords based on a list of words or values |
|
Privilege escalation attack |
The ability to escalate privileges to a level allowing teh intruder to access or execute programs or data at a level higher then the original intrusion perspective |
|
Brute force attack |
Physically inputting a users credentials until access is granted to a system when credentials are unknown. |
|
Social engineering attack |
The ability to get the user to divulge their credentials or other useful information about themselves or their organizations. |
|
PKI |
Public Key Infrastructure- is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revolk digital certificates. |
|
ADNS |
Automated digital networking system- the primary function is to connect Navy shop board networks to other ship and shore network for transferring internet protocol data of various classification levels |
|
Cudixs |
Common user digital information exchange subsystem- the suites have the capability to both send and receive narrative shipboard message traffic. |
|
Verdin |
VLF digital information network- a broadcast system that provides a highly reliable and secure system for worldwide delivery of operational, tactical, Dan administrative messages front eh fleet submarine broadcast system (FSBS) and minimum essential emergency communications network (MEECN) |
|
Explain Gingerbread |
An intruder on the net- stated by anyone who believes that communications have been compromised only appropriate response is "Roger OUT" |
|
What does the acronym EEFI represent |
Essential Elements of Friendly Information |
|
Explain Bead Window |
Last transmission potentially disclosed unauthorized information (PCOEPCC) 1. Position 2. Capabilities 3. Operations 4. Electronic warefare 5. Personnel 6. Comsec 7. Wrong circuit |
|
Explain "river city" |
Varying degrees of RF restriction to limit incoming and outgoing communications to the ship for the purpose of OPSec and force protection |
|
What is "MEACONING" |
A system of receiving radio beacon signals and rebroadcasting them on the same frequency to confuse navigation |
|
What is "intrusion" |
Intentional insertion of EM energy into transmission paths with the objective of deceiving operators |
|
What is "Jamming" |
The deliberate radiation, re-radiation or reflection of EM energy to reduce or eliminate an enemy's ability to communicate |
|
What are the message precedents? |
R- Routine-6hrs P- Priority-3hrs O- Immediate-30min Z- flash-10min/ASAP W- white pinnable- 10min/ASAP |
|
What is "OPTASK COMMS" |
Operational tasking communication also known as commplan |
|
What is the purpose of commplan |
Listing of frequencies, comsec, prowords and procedures for an units comms network for an exercise or operation |
|
What is a "comspot" |
A report indicative of issues, expected outages, or an outage lasting more than :30min. Goes to NCTAMS and DISA |
|
What is "EMCON" |
Emissions control prevents an enemy from detecting, identifying and locating friendly forces. An official bill or instruction put into action to control the electromagnetic/acoustic emissions from a ship which, if not controlled, could give away position and/or specific platform type to the enemy. (Minimizes EM interference of friendly forces) |
|
Explain DTG |
2 digits rep the day of the month 4 digits rep the military time code 1 letter representing time zone 1 letter month code 2 digit year code "DTMY" |
|
What is the purpose of EKMS |
Electronic key management system governs the issuing, accounting, handling, disposing of comsec material |
|
Describe tempest |
What code name is given to the investigation, study, and control of compromising emanations from telecommunications |
|
Define the following warfares; ASW SUW IW AW STW NSW |
ASW- anti submarine warfare SUW- surface warfare IW- information warfare AW- aviation warfare STW- strike warfare NSW- navy special warfare |
|
Discuss IO core Capabilities |
SYOPS, MILDEC, EW, CNO- principle means of influencing an adversary and other targets by maintaining freedom of operation in the information environment |
|
What are the roles of navy blue and red teams |
Blue- system security and CND ensures US Navy networks meet IAVA and system configuration compliance; provides assistance prior to and during inspections to remedy discrepancies Red- CNA and CNE attempt to exploit weaknesses in our own networks |
|
Explain the purpose of FES |
Fleet Electronics Support- Maintains operational readiness of EW Systmes |
|
What is US Title 10? |
Establishes the DoD and outlines the roles of the US Armed Forces, Basically "the DoDs charter" |
|
What is US Title 50? |
Outlines the role of war and National Defense in the US Code. |
|
Define "CRITIC" |
the reporting of critical information in short, specially formatted messages that go directly to the NCA message. Highest priority, to be sent within 10min |
|
What is MOC |
Maritime Operations center |
|
State the purpose of the following: CCOP |
Cryptologic Carry-on Program- is sponsored by R&D: DCP O&MN, OPN: CNO (N20). It provides carry-on cryptologic exploitation capability by augmenting existing SSES capabilities and providing capabilities where no SSES exist. |
|
Define OPSEC |
Process that identifies critical information to determine if friendly actions can be observed by adversary intelligence systems. |
|
In what year did President Reagan establish a national OPSEC program |
1988 |
|
What are the 5 steps of opsec? |
1. Identify Critical information 2. Threat assessment 3. Vulnerability analysis 4. Risk assessment 5. Measures/countermeasures |
|
What is the 5 step planning process |
1. Planning & Direction 2. Collection 3. Processing 4. Production 5. Dissemination |
|
Define "WRA" |
Web Risk Assessments- review command's website through the eyes of an adversary looking for critical information that reveals sensitive operations and technical data |
|
Define "EEFI" |
Essential Elements of Friedly Information |
|
Define "Critical Information" |
Core secrets of the organization |
|
Discuss the responsibilities of the command OPSEC Officer |
Administers the Command's OPSEC program. Responsible for the delvelopment, organization, and administration of an OPSEC program. Provides guidance and oversight for all OPSEV Programs and Coordinates OPSEC actions under the command's OPSEC program. The OPSEC officer will be assigned in writing. OPSEC Officer maitains instructions and supporting documents, conducts OPSEC training and runs the command OPSEC program by reviewing plans, OPORD's and exercise scenarios, the CO actively advocates, supports, and implements OPSEC. |
|
State the purpose of naval intelligence? |
Supports all aspects of naval operations |
|
Define the 5 steps of intelligence |
Plan and Direct Collection Processs Production Dissemination (PCPPD) |
|
What are the 3 types of navy intelligence |
Strategic Tactical Operational (STO) |
|
Define CCIR |
Commanders Critical Information Requiremnt Its a list of information requirements identified by teh CO as being critical in facilitating timely information management and decision making |
|
Define PIR |
Priority Intelligence Requirement This intelligence requirement for which a commander has an anticipated and stated priority in the task of planning and decision making |
|
Explain the function of an intelligence fusion cell? |
Combines in-real-time national strategic intelligence and local tactical intelligence |
|
What are 3 example of intelligence briefs |
Current intelligence Deployment Pre-deployment Situation Mission Theater Debriefing Aircrew Port Strike support Platforms Country |
|
Define Frequency |
Variations of cycles in a given amount of time |
|
Wavelength |
Distance of a radio wave |
|
Ducting |
Trapping an RF wave between two layers of atmosphere |
|
Refraction |
Change in direction of RF when density changes |
|
Multiplexing |
Transmitting multiple frequencies over a single carrier wave |
|
Modulation/demodulation |
Transmit and receive data over radio frequencies |
|
Bandwidth |
Differences between highest and lowest point of a usable wave |
|
Keyang |
Relays used in radio transmitters for circuits using crypto |
|
Azimuth |
Clockwise measurement in the horizontal plane from true north |
|
Elevation |
Angle between horizontal plane and line-of-sight |
|
Layers |
Regions of the atmosphere |
|
Frequency |
The number of vibrations or cycles or a wave train in a unit of time |
|
Radio waves |
A EM wave generated by a transmitter |
|
Propagation |
Waves traveling through a medium |
|
Azimuth angle |
Angular measurement isn't eh horizontal plan in a clockwise direction |
|
PRI |
Pulse Repetition interval- Duration of time between the point on the pulse to the identical point on the next pulse |
|
PRF- |
Pulse repetition Frequency- The rate at which pulses are transmitted, given the hertz or pulses per second. Reciprocal of puls repetition time (PRT) |
|
RF- |
Radio Frequency- Frequency of the carrier wave which is being modulate to form the pulse train. |
|
BW- |
Beam Width- When the half-power points are connected to the antenna by a curve, the resulting angular width of the curve. |
|
PW- |
Pulse width- The duration of the pulse |
|
Scan- |
Systematic movement of a radar beam to voter a definite pattern or area in space. The type and method of scanning used depends on the purpose and type of radar and on the antenna size and design |
|
Half duplex- |
Send and receive on same frequency, but not simultaneously |
|
Full duplex- |
Simultaneous transmit and receive on same frequency |
|
Simplex |
Only sends or receives on a specific frequency (one-way communication) |
|
What does the RADAR |
Radio Detection and Ranging |
|
What are the inherent disadvantages of using lower frequencies in communications? |
Requires significantly more power and antenna size |
|
What is the difference between and FM signal and AM signal? |
FM Modulates the frequency of a signal while am modulates the amplitude |
|
What target information is provided by a 3-D radar vs a 2-d radar? |
3-d provides range, azimuth, and elevation while 2-d only provides 2 or the 3. |
|
HF,VHF,UHF,SHF |
HF 3-30 MHz Point to point, Ship/shore, ground/air VHF 30-300 MHz LOS, Amphibious assault UHF 300-3 GHz LOS, Tactical b/tw ships SHF 3-30 GHz Radar, SATCOM |
|
GOES- |
Geostationary Operational Environmental Satellite- Orbit the earth at a specific geo-sync orbit at 22,300 miles above the equator. |
|
POES- |
Polar operational environmental satellite- Orbit the earth at an altitude of 450 miles cover the entire surface of the earth every few days |
|
Discuss how visibility affect military operations |
Affects shipboard and shore flight operations as well as amphibious assault and spec op missions. |
|
Discuss how precipitation affects military operations? |
Radar performance |
|
What is bioluminescence |
Emission of light from an organism or biochemical systems |
|
What is Ebb tide condition known as |
Period between high water and the succeeding low water |
|
Which 3 factors effect soil damage speed in seawater |
Temperature, pressure, salinity |
|
How is sea wave height measured |
Distance in elevation between crest and accompanying wave trouh |
|
How is a sea wave period determined |
Period is the time it takes for 2 consecutive crest to pass a given point. |
|
Describe the associated weather criteria for a local wind advisory? |
sustained surface winds of over 25 MPH are occurring or forecasted |
|
Define restricted visibility |
When environmental conditions reduce visibility to a distance less than a distrace predetermined by the Ships Master. this is usually a distance of 3 nautical miles. |
|
Define relative humidity |
The ratio of water vapor currently isn't the air compared to how much the atmoshere can potentially be hold at the current temperature and pressure |
|
Define lunar illumination |
Is the amount of light given off by the moon |
|
Define a tropical depression |
A tropical mass of thunderstorms with a cyclonic wind circulation between 20-34 knots. |
|
Define a tropical storm |
Once a tropical depression has intensified to the point where its maximum sustained winds are between 35-64 knots. It becomes a tropical storm. Its is at this time that is assigned a name. During this time, the storm itself becomes more organized and begins to become more circular in shape--- resembling a hurricane. |
|
Define hurrican/typhoon |
Is an intense rotating oceanic weather system that prossesses maximum sustained winds exceeding 64 knots. Typhoon is a name used in east Asia for a hurricane. It is a type of cyclone occurring int eh western regions of the pacific ocean |
|
How does the following affect military operations: visibility, precepitation, winds, cloud cover, temperature and humidity. |
In your own words |
|
Tropical cyclone conditions of readiness |
COR1-12 hrs COR2- 24 hrs COR3- 48 hrs COR4- 72 hrs COR5- 96 hrs |
|
What is the first space mission? |
Space support- includes space lift operations (launching and deploying sat.), sat operations (maintaining, sustaining, and rendezvous and proximity ops) and reconstitution of space forces (replenishing lost or diminished sat) |
|
What is the second space mission? |
Space control- freedom of action in space for friendly forces, and when directed, denies it to an adversary. It consists of offensive space control (OSC), defensive space control (DSC), and SSA. Mission areas of space control: prevention, protection, negation and SSA |
|
What is the third space mission? |
Space force enhanacement- ops increase joint force effectiveness by increasing the combat potential of that force, enhancing operational awareness, and providing needed joint force monitoring, sat comm and PNT. |
|
What is the fourth space mission? |
Space force application- Combat ops in, through, and from space to influence the course and outcome of conflict by holding terrestrial targets at risk. This mission area is incorporated into national space policy as well. Specific responsibilities can be found in DoD instruction 3100.13, space force application |
|
What is LEO |
Low Earth Orbit- Approx 150-800 miles above the earth surface. :90 period, small field of view |
|
What is MEO |
Medium earth Orbit- GPS, Altitude of approx 10,800 NM. 12hr period, orbit allows a user to receive signals from more than one sat at a time |
|
What is HEO |
Highly elliptical orbit- commonly referred to as a Molniya orbit, nearly equivalent to the geosynchronous altitude and an inclination of approximately 63-64 deg. Provides comms for the northern hemisphere |
|
What is GEO |
Geosynchronous orbit- average altitude of approximately 19,300 NM, period 1 day, 70deg N/S limits |
|
What is polar Orbit |
Passes over the entire surface of the Earth, has an inclination of 90Deg and is usually circular. |
|
Where are the two main space launch facilities located in the US? |
Kennedy space center in Cape Canaveral FL Vandenberg Air Force base in Ca |
|
Describe the Global Positioning System |
Spaced-bases radio positioning system that provide 24 hour 3-D position, Velocity and time information to suitably equipped users anywhere on or near the surface of the earth. |
|
What are some advantages/Disadvantages of space based ISR? |
AD- provides systematic and focused coverage of AOIs, sometimes without detection. Dis- Satellite systems may be affected by atmospheric disturbances such as: fog, smoke, electrical storms, and precipitation and clouds, which affect the ability of imaging systems. |
|
Define Apogee |
In an elliptical orbit, a point on the orbit farthest from the center of the earth |
|
Define Perigee |
The point in orbit closest to the center of the earth |
|
How does sun, solar winds, solar cycle effect comms? |
To include other natural phenomena in space create changes that can affect communications, navigation accuracy, performance of sensors and cause electronic failures. |
|
How does Van Allen Radiation Belt effect comms? |
Are two concentric, donut-shaped regions of stable, trapped charged participles that exist because the geomagnetic field near the earth is strong and field lines are closed. These radiation belts can have serious impact on satellite operations due to physical damage caused by charged particles. |
|
How does Atmospheric Drag effect comms? |
Energy deposited in the Earth's upper atmosphere by charged particles bombardment which heats the atmosphere, causing it to expand outward over a period of time. This produces more frictional drag on a sat then expected and decreases its altitude while increasing its speed. Consequently, the sat will be some distance below and ahead of its expected position when a ground radar or optical telescope attempts to locate it. Sat in LEO are the most susceptible |
|
Describe Navy UHF Follow-on (UFO) |
Constellation of sat to replace the aging FLTSAT's; features higher power transmitters designed to improve service, reliability, and dependability. The UFO sat are mixed with the FLTSATCOM legacy system. |
|
Describe Defense satellite communications systems? (DSCS) |
A night capacity, SHF sat based subsystem of the defense comms system (DCS)- provides worldwide, jam-resistant, secure voice and high data rate communications. |
|
Discuss Global broadcast service? (GBS) |
Provides high-volume data and video information products to military tactical terminals. Naval space command has been designated the manager for GBS on UFO sat and ensures the GBS payload is optimally configured to support the joint user community. |
|
Discuss Wideband Global Satcom? (WGS) |
Designed to replace aging DSCS sat. |
|
Role of precise time in Global Positioning system (GPS) and Geo-location |
Timing error smaller then one nanosecond can reduce GPS accuracy by hundreds of meters |
|
Role of precise time in Network Synchronization |
Timing is essential for synchronizing the clocks of computer systems over packet-switched, variable-latency data networks for connectivity |
|
What is the mission of EOD Groups |
Comprised of EODGRU1 in SD and 2 in Virginia Beach, VA. They provide deployable C2 for expeditionary/combat EOD and salvage operations as joint naval or combined task force commanders. |
|
What is the mission of mobile units |
Provide deployable C2 for expeditionary/combat EOD and salvage operations in support of joint naval or combined TF Commanders. Each EOD/MDS mobile unit deploys several companies and platoons for mission specific worldwide deployments.. In addition, EOD mobile units are responsible for several shore-based EOD detachments supporting key naval installations |
|
What is the mission of TEU |
Specialized traingig units located on both US coast. They provide advanced unit level and mobility skill training for deploying forces. There are 4 type of skill set taught at the training units: core EOD, Salvage, core mobility, and expeditionary skills |
|
What is the mission of ESU |
Provide optimized logistics support for all EOD and diving salvage units. Specifically they are responsible for supply, boat and vehicle maintenance, arms, ammunition and explosives, transportation and movement, dive locker support, tactical communications support, and hazardous material handling. In additions, they provide rapidly deployable forces as tailored expeditionary support elements. |
|
What is the mission of EOD Co's / Platoons & Dets? |
They are called upon to refer safe explosive hazards to include improvised explosive devices (IED), undersea mines, and weapons of mass destruction (WMD), often simultaneously engaging enemy forces. Companies and platoons conduct joint operations with all US and coalition forces |
|
What is the IDC function for EOD Commands? |
Provides timely/relevant support, specifically tailored to meet EOD needs. Capable of independently deploying field comm centers for integrated command post tactical and long haul comms in combat in all weather conditions on land, surface, and subsurface to include chemical, biological, or radiological environments. |
|
What does a IS do- |
Provides comprehensive intelligence support to SOF and Expeditionary Warfare Operations (EWO). Performs analysis using standardized procedures in support of special ops and Exped forces. |
|
What does a IS-T do? |
Coordinates frequencies for use within area of responsibility. Maintains frequency employment files. Intimates action as appropriate to prevent and correct harmful interference. Makes recommendations for changes in frequencies affected by propagation and in-resolvable harmful interference |
|
What does a ET do? |
Possesses the basic knowledge and skills required to facilitate operations and maintenance of mobile systems at the organizational level. Performs initial system setup, basic administration, and operational checks |
|
What does a CT do? |
Performs test, measurements. And analysis of EMI-related signals using antenna and transmission line test sets, arc detector test sets, radiation hazard monitoring, instrumentation and inter modulation interference (IMI) test sets |
|
What does a AM do? Aerographers mate |
Interprets environmental observations and data, meteorological satellite information and numerical environmental products. Prepares analyses and prognoses of meteorological/oceanographic parameters for display and transmission. Forcast meteorological and oceanographic conditions and issues warning of severe and hazardous conditions. Conducts environmental briefings/debriefings for combat, ops and trading ops |
|
What are the 4 types of skill sets taught at the training units? |
Core EOD Salvage Core Mobility Expeditionary skills |