• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/220

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

220 Cards in this Set

  • Front
  • Back

Discuss the concept of ORM

A decision making tool used by personnel at all levels to increase effectiveness by identifying, assessing, and managing risk.

What are the 5 steps of ORM

I-identify hazard: list of all associated with each step


A-assess hazard: probability and severity (determine level of risk)


M- make risk decisions: decide if benefits outweigh the cost.


I-implement controls: engineering, administrative, ppe


S- supervise: monitor any changes that might present a new hazard



What governs safety and mishap reporting?

OPNAVINST 51-2.1D

What is RAC

Risk Assement Code- the RAC is an expression of risk, which combines the elements of hazard severity and mishap probability. The RAC is expressed as a single Arabaic number that can be used to help determine overall risk.

State the objectives of first aid?

1. Save lives


2. Prevent further injures


3. Limit infection



What are the 3 methods of controlling bleeding?

1. Direct pressure


2. Elevation


3. Pressure points



What are some of the symptoms of shock and how is it treated?

Sx: confusion, anxiety, decrease blood pressure, cold skin, weak and rapid pulse, loss of consciousness.


Tx: keep person lying down and warm, head below feet to help blood flow to the brain, no food/drink, loosen clothes

Difference between open & closed fracture?

Open- bone is protruding through skin


Closed- bone is cracked but did not break skin



Define HERO


HERP


HERF

HERO- Hazards of electromagnetic radiation to ordnance


HERP- Hazards of electromagnetic radiation to personnel.


HERF- hazards of electromagnetic radiation to fuel.

What are the 6 areas of naval doctrine?

1. C2


2. Operations


3. Warfare


4. Logistics


5. Intelligence


6. Planning


COWLIP



What are the 7 principles of naval logistics?

1. Flexibility


2. Responsiveness


3. Economy


4. Attain ability


5. Simplicity


6. Sustainability


7. Survivability




FREASSS

Who was the first enlisted man to have a ship named after him and why?



GM1 Osmond Ingram. First person killed in combat during WW1



When was the USS Osmond launched?

1919

Discuss the conditions that led to the formation of the U.S. Navy

2nd continental congress authorized the purchase of 2 ships to protect US merchant valleys from the British

What three classes of naval vessels existed at the inception of the U.S. Navy?

Ships of the line, frigates, sloops of war.

What significance did the battle of midway have on WWII and to information dominance warfare?

Americans were able to decimate the Japanese fleet by breaking the communication encryption code used by Japan

What is the significance of the battle of coral sea

The battle was fought entirely by aircraft launched from aircraft carriers

What is the significance of the on-the-roof-gang?

Due to the limited personnel qualified to assist in intercept of Japanese radio traffic, a radio operator school was created to instruct personnel on intercept operations.

Describe the historical significance of the Navajo Code Talkers

They served 1942-45 in six marine divisions to transmit messages in native language

Explain when ONI (office of naval intelligence) was established and by whom it was founded?

March 23 1882 by william H Hunt Secretary of the navy

Name the two departments that were combined to form the ONI? (Office of naval intelligence)

Department library and office of intelligence

State 3 levels of war

Strategic, tactical, and operational

What is the significance of the national security act of 1947?

Signed by president Truman to establish CIA, NSC (national security council), Air Force and the DoD.

State when and why the navy core values were established?

By CNO Admiral Kelso in 92' in response to the tail hook incident of 91'

State when and why the sailor's creed was developed?

Written by a "blue ribbon recruit training panel" in 93' at the direction of CNO admiral Kelso to describe every sailor from E-1 to O-10. Sailor first.

State RADM Grace Hopper's contributions to the U.S. Navy?

Conceptualized machine programming languages which led to the development of Common Business-Orieted Language (COBOL). She was said to have also coined the terms "computer bug" and "debugging"

State the name of the first computer and where it was located?

Electronic Numerical Integrator and Computer (ENIAC) located at the university of Pennsylvania

Explain the impact of the John walker espionage case

He began spying for the Soviet Union in December 67' damage is unknown, let to the formation of two person integrity.

Describe what ONI (office of naval intelligence) is who and when it was established and what organizations where combined to form it?

23mar1882 by secretary of the navy WILLIAM hunt, it is the oldest intelligence organization in the sun, it was formed by combining the Department Library and the office of intelligence

State the first CIO/DNI?

First chief intelligence officer/ director of naval intelligence was Theodorus Bailey-Myers-Mason.

What is the mission of the navy

Maintain, train, and equip combat-ready naval forces, deter aggressive movements, maintain freedom of the seas.

What two components make up the national command authority

President of the US and Sec of Defense

Describe the function of the following:


COCOM


Navy COCOM


FLTCOM


TYCOM

Combatant commander- non transferable command authority over assigned forces


Command authority over Atlantic fleet, pacific fleet, navy forces Europe, navy forces central.


Fleet commander- overall responsibility for the operations of the fleet and their AOR. There are 7 fleets


Type commander- responsible for the mission and component commands, which consist of personnel, training, and logistics.

What the the fleet numbers and operatoring areas?

2-Norfolk va- western Atlantic and continental us


3- San Diego, ca- eastern and North Pacific


4- may port fl-Caribbean and central/eastern s. America


5- Manama Bahrain-Indian ocean, Suez Canal, Red Sea, Arabian gulf


6- Naples Italy- eastern Atlantic Ocean, Mediterranean and northern sea


7- Yokosuka Japan- western pacific, north of Antarctic


10- ft. Meade MD- cyber domain

How is a TF,TG,TU,TE broke down

Task force-56


Task group-56.1


Task unit-56.1.2


Task element-56.1.2.3

State the location, mission, and component commands of the following naval and computer telecommunication area master stations (NCTAMS)

NCTAMS Lant-Norfolk va- provide C4I (command, control, communicotiana, computers, and Intel) for Atlantic




NCTAMS pac wahiawa, hi- c4I for pacific fleet

Define C4SR

Command, control, communications, computers, intelligence surveillance and reconnaissance.

Explain mission of DISA

Defense information system agency- provide C2 while assuring global net-centric enterprise in direct support to full spectrum of operations

explain the mission of NASIC

Naval air and space intelligence center- Intel directly to military units development and sustainment of us air,space, and cyber capabilities.

State the mission of NCDOC

Naval cover defense operations command- coordinate, monitor, and oversees defense of navy computer networks and systems as assigned by commander us 10th fleet-USCYBERCOM

COC

Commander in Cheif- Pres Barrack Obama

VP- Mr. Joseph Biden


Sec of def.- Ash Carter


Sec of Navy-ray mabus


Chairman JCoS- Army General Joseph Dunford


CNO- ADM. John Richardson


MCPO- MCPON Mike Stevens


NECC- RADM Frank Morneau


Force Master Chief- FORCM Lance Kitchens


3rd fleet- Vice ADM Nora Tyson


3rd fleet Master chief- CMDCM Loran Bather


Group 1 CO- CPT Christopher Merwin


Group 1 CMC- EODCM Peter Neville

EDVR


ODCR


AMD

EDVR-Enlisted Distribution & Verification report


ODCR- Officer Distribution Control Report


AMD- Activity manpower Document

Eval


Fitness


Concurrent

Eval- e-6 below


Fitness- E7 above


Concurrent- 90day

Purpose of sitrep and what are its categories?

Situational report to provide timely informations to higher authority on critical situations and military operations.


Pinnacle- national interest


Navy blue- high navy interest


Unit sitrep- operational commander level of interest.

Discuss the importance of the IG?

Inspector general conduct and supervises audits/investigations relating to the programs and operations of the DoD

Name the programs under the Brilliant on the basics?

S- Sponsorship


A- assigned mentors


I- indoc


L- leadership (CDB)


O- ombudsman


R- recognition

What is DPAS

Defense Priorities & allocations systems.


Track life cycles of assets

What is a casrep and 4 cats

I- used only @ training commands


II- Deficiency exists- causes minor degradation


III- deficiency exist- Major degradation


IV- deficiency exist- Loss of primary asset

What is CHRIMP

Consolidated hazardous material re-utilization and inventory management program

Identify clearance levels and how often they need to be renewed

TS/SCI- every 5 years


S- 10yr


C- indefinitely

Identify SAER and its function

Security Access Eligibiltiy Report- to identify or change eligibility of a sec clearance

SF700-


SF701


SF702


SF703


SF153


SR312

700- Security container information for safes/spaces


701- activity security checklist


702- container checklist-names and times open


703- T/S cover sheet


153- CMS report- accountability for comsec mat


312- classified information non-disclosure agreement

DCS

Defense courier service

Procedures for transportation of classified material via DCS and Hand carry items

DCS- Standard to-line addressing with no classifications marking inside double wrapped box with brown paper.


Hand-carry- use cover sheet. Double wrap when carrying outside

Difference between security violation and a practice dangerous to security?

Violation- loss or compromise of classified info.


Practice- possibility to jeopardize security or comsec materials.

Color codes for classifications

T/s orange


S- red


C-blue


Unclassified-green

If t/s or s info is disclosed it could lead to?

T/s- grave damage to national security


S- cause serious damage to national security

What is CSM and who can be CSMCommand Securtiy Manager

Officer or civilian employee GS-11 or above and us citizen

JPAS

Joint Personnel Adjudication System- DoD personnel security migration system for checking and updating security clearances

SCIF Vs TSCIF

SCIF-Sensitive compartmented information facility


TSCIF- Temporary

Define IA

Measures that protect and defend information and information systems through

5 attributes of IA

C- confidentiality


I- integrity


A- availability


N- non-repudiation


A- authentication

List the 9 categories of computer incidents

1. Root


2. User


3. Unsuccessful attempt


4. Denial of service


5. Poor security


6. Scan/probe


7. Malicious logic


8. Investigating


9. Explained anomaly

Draw the OSI and TCP Models

OSI-TCP


7-Application-------application


6-presentation-----application


5-session-------------application


4-transport----------transport


3-network------------internet


2-data-link-----------network interface


1-physical------------network interface

Name 2 protocols associated with the datalink layer

Mac- Media access control


LLC- Logical link control

Name 2 protocols associated with the transport layer

Tcp


Udp


Icmp

What is ATO

Authority to Operate issued by the DAA or PAA

Define the following:


IAVA:


IAVB:


IAVT:

IAVA: IA vulnerability alert address sever network vulnerabilities resulting in immediate and protectively severe threats to DON systems and information.


IAVB: Information Assurance vulnerability bulletins address new vulnerabilities that do not pose an immediate risk to DON systems, but are significant enough that noncompliance with the corrective action could escalate the risk.


IAVT: Information assurance vulnerability technical advisory- vulnerability notifications.

What is a service pack

A collection of updates, fixes and/or enhancements to a software program delivers in the form of a single installable package.

What is the use/purpose of a firewall?

It is a hardware/software system designed to hide nodes from external networks.

What is network topology?

It is the logical layout of the network (bus, ring, mesh, star) mesh usually used to connect segments of a LAN.


A hub is a common connection point for devices in a network

LAN

Local area network is a computer network covering a small physical area. I.E. Home, office, small group of building such as a school, airport

WAN

Wide area network- is a computer network that covers a broad area. I.E. Metropolitan, regional, or national boundaries

MAN

Metropolitan area network

GAN

Global area network

NIPR-

Non-Secure Internet protocol router

SIPR

Secure internet protocol router

JWICS

Joint worldwide intelligence communications system. I

DODN

DoD information network

DISN

Defense information systems network

NMCI

Navy marine corps intranet

ONENET

NMCI like connectivity for OCONUS

IT21

Ship to shore networks

Virus

Infects another executable and uses a carrrier program to spread itself.

Worm

Similar to a virus but does not require a carrier program or user interaction to spread form host to host; self-propagates

Trojan

Malicious program disguised as something benign. Can allow a hacker access to a computer or be used as a denial or service attack

Backdoor

Program that a hacker installs on a target system to allow access at a later time

Phishing

Social engineering attack involving email posing as a legitimate business or entity re question seemingly nessary personally identifiable information

Network Enumeration attack

The process of scanning and compiling pertinent information of the layout of a network and its users

Buffer overflow attack

DoS attack that overloads a system's input capacity thereby crashing the system or preventing the user from accessing its resources

SQL injection attack

Overloads the input sector of an SQL database and allows the ability to execute arbitrary code forcing the database to divulge its contents

Dictionary attack

Attempts to crack passwords based on a list of words or values

Privilege escalation attack

The ability to escalate privileges to a level allowing teh intruder to access or execute programs or data at a level higher then the original intrusion perspective

Brute force attack

Physically inputting a users credentials until access is granted to a system when credentials are unknown.

Social engineering attack

The ability to get the user to divulge their credentials or other useful information about themselves or their organizations.

PKI

Public Key Infrastructure- is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revolk digital certificates.

ADNS

Automated digital networking system- the primary function is to connect Navy shop board networks to other ship and shore network for transferring internet protocol data of various classification levels

Cudixs

Common user digital information exchange subsystem- the suites have the capability to both send and receive narrative shipboard message traffic.

Verdin

VLF digital information network- a broadcast system that provides a highly reliable and secure system for worldwide delivery of operational, tactical, Dan administrative messages front eh fleet submarine broadcast system (FSBS) and minimum essential emergency communications network (MEECN)

Explain Gingerbread

An intruder on the net- stated by anyone who believes that communications have been compromised only appropriate response is "Roger OUT"

What does the acronym EEFI represent

Essential Elements of Friendly Information

Explain Bead Window

Last transmission potentially disclosed unauthorized information (PCOEPCC)

1. Position

2. Capabilities

3. Operations

4. Electronic warefare

5. Personnel

6. Comsec

7. Wrong circuit

Explain "river city"

Varying degrees of RF restriction to limit incoming and outgoing communications to the ship for the purpose of OPSec and force protection

What is "MEACONING"

A system of receiving radio beacon signals and rebroadcasting them on the same frequency to confuse navigation

What is "intrusion"

Intentional insertion of EM energy into transmission paths with the objective of deceiving operators

What is "Jamming"

The deliberate radiation, re-radiation or reflection of EM energy to reduce or eliminate an enemy's ability to communicate

What are the message precedents?

R- Routine-6hrs

P- Priority-3hrs

O- Immediate-30min

Z- flash-10min/ASAP

W- white pinnable- 10min/ASAP

What is "OPTASK COMMS"

Operational tasking communication also known as commplan

What is the purpose of commplan

Listing of frequencies, comsec, prowords and procedures for an units comms network for an exercise or operation

What is a "comspot"

A report indicative of issues, expected outages, or an outage lasting more than :30min. Goes to NCTAMS and DISA

What is "EMCON"

Emissions control prevents an enemy from detecting, identifying and locating friendly forces. An official bill or instruction put into action to control the electromagnetic/acoustic emissions from a ship which, if not controlled, could give away position and/or specific platform type to the enemy. (Minimizes EM interference of friendly forces)

Explain DTG

2 digits rep the day of the month


4 digits rep the military time code


1 letter representing time zone


1 letter month code


2 digit year code


"DTMY"

What is the purpose of EKMS

Electronic key management system governs the issuing, accounting, handling, disposing of comsec material

Describe tempest

What code name is given to the investigation, study, and control of compromising emanations from telecommunications

Define the following warfares;


ASW


SUW


IW


AW


STW


NSW

ASW- anti submarine warfare


SUW- surface warfare


IW- information warfare


AW- aviation warfare


STW- strike warfare


NSW- navy special warfare

Discuss IO core Capabilities

SYOPS, MILDEC, EW, CNO- principle means of influencing an adversary and other targets by maintaining freedom of operation in the information environment

What are the roles of navy blue and red teams

Blue- system security and CND ensures US Navy networks meet IAVA and system configuration compliance; provides assistance prior to and during inspections to remedy discrepancies


Red- CNA and CNE attempt to exploit weaknesses in our own networks

Explain the purpose of FES

Fleet Electronics Support- Maintains operational readiness of EW Systmes

What is US Title 10?

Establishes the DoD and outlines the roles of the US Armed Forces, Basically "the DoDs charter"

What is US Title 50?

Outlines the role of war and National Defense in the US Code.

Define "CRITIC"

the reporting of critical information in short, specially formatted messages that go directly to the NCA message. Highest priority, to be sent within 10min

What is MOC

Maritime Operations center

State the purpose of the following: CCOP

Cryptologic Carry-on Program- is sponsored by R&D: DCP O&MN, OPN: CNO (N20). It provides carry-on cryptologic exploitation capability by augmenting existing SSES capabilities and providing capabilities where no SSES exist.

Define OPSEC

Process that identifies critical information to determine if friendly actions can be observed by adversary intelligence systems.

In what year did President Reagan establish a national OPSEC program

1988

What are the 5 steps of opsec?

1. Identify Critical information


2. Threat assessment


3. Vulnerability analysis


4. Risk assessment


5. Measures/countermeasures

What is the 5 step planning process

1. Planning & Direction


2. Collection


3. Processing


4. Production


5. Dissemination

Define "WRA"

Web Risk Assessments- review command's website through the eyes of an adversary looking for critical information that reveals sensitive operations and technical data

Define "EEFI"

Essential Elements of Friedly Information

Define "Critical Information"

Core secrets of the organization

Discuss the responsibilities of the command OPSEC Officer

Administers the Command's OPSEC program. Responsible for the delvelopment, organization, and administration of an OPSEC program. Provides guidance and oversight for all OPSEV Programs and Coordinates OPSEC actions under the command's OPSEC program. The OPSEC officer will be assigned in writing. OPSEC Officer maitains instructions and supporting documents, conducts OPSEC training and runs the command OPSEC program by reviewing plans, OPORD's and exercise scenarios, the CO actively advocates, supports, and implements OPSEC.

State the purpose of naval intelligence?

Supports all aspects of naval operations

Define the 5 steps of intelligence


Plan and Direct


Collection


Processs


Production


Dissemination


(PCPPD)

What are the 3 types of navy intelligence

Strategic


Tactical


Operational


(STO)

Define CCIR

Commanders Critical Information Requiremnt


Its a list of information requirements identified by teh CO as being critical in facilitating timely information management and decision making

Define PIR

Priority Intelligence Requirement


This intelligence requirement for which a commander has an anticipated and stated priority in the task of planning and decision making

Explain the function of an intelligence fusion cell?

Combines in-real-time national strategic intelligence and local tactical intelligence

What are 3 example of intelligence briefs

Current intelligence


Deployment


Pre-deployment


Situation


Mission


Theater


Debriefing


Aircrew


Port


Strike support


Platforms


Country



Define Frequency

Variations of cycles in a given amount of time

Wavelength

Distance of a radio wave



Ducting

Trapping an RF wave between two layers of atmosphere

Refraction

Change in direction of RF when density changes

Multiplexing

Transmitting multiple frequencies over a single carrier wave

Modulation/demodulation

Transmit and receive data over radio frequencies

Bandwidth

Differences between highest and lowest point of a usable wave

Keyang

Relays used in radio transmitters for circuits using crypto

Azimuth

Clockwise measurement in the horizontal plane from true north

Elevation

Angle between horizontal plane and line-of-sight

Layers

Regions of the atmosphere

Frequency

The number of vibrations or cycles or a wave train in a unit of time

Radio waves

A EM wave generated by a transmitter

Propagation

Waves traveling through a medium

Azimuth angle

Angular measurement isn't eh horizontal plan in a clockwise direction

PRI

Pulse Repetition interval-


Duration of time between the point on the pulse to the identical point on the next pulse

PRF-

Pulse repetition Frequency-


The rate at which pulses are transmitted, given the hertz or pulses per second. Reciprocal of puls repetition time (PRT)

RF-

Radio Frequency-


Frequency of the carrier wave which is being modulate to form the pulse train.

BW-

Beam Width-

When the half-power points are connected to the antenna by a curve, the resulting angular width of the curve.

PW-

Pulse width-


The duration of the pulse

Scan-

Systematic movement of a radar beam to voter a definite pattern or area in space. The type and method of scanning used depends on the purpose and type of radar and on the antenna size and design

Half duplex-

Send and receive on same frequency, but not simultaneously

Full duplex-

Simultaneous transmit and receive on same frequency

Simplex

Only sends or receives on a specific frequency (one-way communication)

What does the RADAR

Radio Detection and Ranging

What are the inherent disadvantages of using lower frequencies in communications?

Requires significantly more power and antenna size

What is the difference between and FM signal and AM signal?

FM Modulates the frequency of a signal while am modulates the amplitude

What target information is provided by a 3-D radar vs a 2-d radar?

3-d provides range, azimuth, and elevation while 2-d only provides 2 or the 3.

HF,VHF,UHF,SHF

HF 3-30 MHz Point to point, Ship/shore, ground/air


VHF 30-300 MHz LOS, Amphibious assault


UHF 300-3 GHz LOS, Tactical b/tw ships


SHF 3-30 GHz Radar, SATCOM

GOES-

Geostationary Operational Environmental Satellite- Orbit the earth at a specific geo-sync orbit at 22,300 miles above the equator.

POES-

Polar operational environmental satellite-


Orbit the earth at an altitude of 450 miles cover the entire surface of the earth every few days



Discuss how visibility affect military operations

Affects shipboard and shore flight operations as well as amphibious assault and spec op missions.

Discuss how precipitation affects military operations?

Radar performance

What is bioluminescence

Emission of light from an organism or biochemical systems

What is Ebb tide condition known as

Period between high water and the succeeding low water

Which 3 factors effect soil damage speed in seawater

Temperature, pressure, salinity

How is sea wave height measured

Distance in elevation between crest and accompanying wave trouh

How is a sea wave period determined

Period is the time it takes for 2 consecutive crest to pass a given point.

Describe the associated weather criteria for a local wind advisory?

sustained surface winds of over 25 MPH are occurring or forecasted

Define restricted visibility

When environmental conditions reduce visibility to a distance less than a distrace predetermined by the Ships Master. this is usually a distance of 3 nautical miles.

Define relative humidity

The ratio of water vapor currently isn't the air compared to how much the atmoshere can potentially be hold at the current temperature and pressure

Define lunar illumination

Is the amount of light given off by the moon

Define a tropical depression

A tropical mass of thunderstorms with a cyclonic wind circulation between 20-34 knots.

Define a tropical storm

Once a tropical depression has intensified to the point where its maximum sustained winds are between 35-64 knots. It becomes a tropical storm. Its is at this time that is assigned a name. During this time, the storm itself becomes more organized and begins to become more circular in shape--- resembling a hurricane.

Define hurrican/typhoon

Is an intense rotating oceanic weather system that prossesses maximum sustained winds exceeding 64 knots. Typhoon is a name used in east Asia for a hurricane. It is a type of cyclone occurring int eh western regions of the pacific ocean

How does the following affect military operations: visibility, precepitation, winds, cloud cover, temperature and humidity.

In your own words

Tropical cyclone conditions of readiness

COR1-12 hrs


COR2- 24 hrs


COR3- 48 hrs


COR4- 72 hrs


COR5- 96 hrs

What is the first space mission?

Space support- includes space lift operations (launching and deploying sat.), sat operations (maintaining, sustaining, and rendezvous and proximity ops) and reconstitution of space forces (replenishing lost or diminished sat)

What is the second space mission?

Space control- freedom of action in space for friendly forces, and when directed, denies it to an adversary. It consists of offensive space control (OSC), defensive space control (DSC), and SSA. Mission areas of space control: prevention, protection, negation and SSA

What is the third space mission?

Space force enhanacement- ops increase joint force effectiveness by increasing the combat potential of that force, enhancing operational awareness, and providing needed joint force monitoring, sat comm and PNT.

What is the fourth space mission?

Space force application- Combat ops in, through, and from space to influence the course and outcome of conflict by holding terrestrial targets at risk. This mission area is incorporated into national space policy as well. Specific responsibilities can be found in DoD instruction 3100.13, space force application

What is LEO

Low Earth Orbit- Approx 150-800 miles above the earth surface. :90 period, small field of view

What is MEO

Medium earth Orbit- GPS, Altitude of approx 10,800 NM. 12hr period, orbit allows a user to receive signals from more than one sat at a time

What is HEO

Highly elliptical orbit- commonly referred to as a Molniya orbit, nearly equivalent to the geosynchronous altitude and an inclination of approximately 63-64 deg. Provides comms for the northern hemisphere

What is GEO

Geosynchronous orbit- average altitude of approximately 19,300 NM, period 1 day, 70deg N/S limits

What is polar Orbit

Passes over the entire surface of the Earth, has an inclination of 90Deg and is usually circular.

Where are the two main space launch facilities located in the US?

Kennedy space center in Cape Canaveral FL


Vandenberg Air Force base in Ca

Describe the Global Positioning System

Spaced-bases radio positioning system that provide 24 hour 3-D position, Velocity and time information to suitably equipped users anywhere on or near the surface of the earth.



What are some advantages/Disadvantages of space based ISR?

AD- provides systematic and focused coverage of AOIs, sometimes without detection.


Dis- Satellite systems may be affected by atmospheric disturbances such as: fog, smoke, electrical storms, and precipitation and clouds, which affect the ability of imaging systems.

Define Apogee

In an elliptical orbit, a point on the orbit farthest from the center of the earth

Define Perigee

The point in orbit closest to the center of the earth

How does sun, solar winds, solar cycle effect comms?

To include other natural phenomena in space create changes that can affect communications, navigation accuracy, performance of sensors and cause electronic failures.

How does Van Allen Radiation Belt effect comms?

Are two concentric, donut-shaped regions of stable, trapped charged participles that exist because the geomagnetic field near the earth is strong and field lines are closed. These radiation belts can have serious impact on satellite operations due to physical damage caused by charged particles.

How does Atmospheric Drag effect comms?

Energy deposited in the Earth's upper atmosphere by charged particles bombardment which heats the atmosphere, causing it to expand outward over a period of time. This produces more frictional drag on a sat then expected and decreases its altitude while increasing its speed. Consequently, the sat will be some distance below and ahead of its expected position when a ground radar or optical telescope attempts to locate it. Sat in LEO are the most susceptible

Describe Navy UHF Follow-on (UFO)

Constellation of sat to replace the aging FLTSAT's; features higher power transmitters designed to improve service, reliability, and dependability. The UFO sat are mixed with the FLTSATCOM legacy system.

Describe Defense satellite communications systems? (DSCS)

A night capacity, SHF sat based subsystem of the defense comms system (DCS)- provides worldwide, jam-resistant, secure voice and high data rate communications.

Discuss Global broadcast service? (GBS)

Provides high-volume data and video information products to military tactical terminals. Naval space command has been designated the manager for GBS on UFO sat and ensures the GBS payload is optimally configured to support the joint user community.

Discuss Wideband Global Satcom? (WGS)

Designed to replace aging DSCS sat.

Role of precise time in Global Positioning system (GPS) and Geo-location

Timing error smaller then one nanosecond can reduce GPS accuracy by hundreds of meters

Role of precise time in Network Synchronization

Timing is essential for synchronizing the clocks of computer systems over packet-switched, variable-latency data networks for connectivity

What is the mission of EOD Groups

Comprised of EODGRU1 in SD and 2 in Virginia Beach, VA. They provide deployable C2 for expeditionary/combat EOD and salvage operations as joint naval or combined task force commanders.

What is the mission of mobile units

Provide deployable C2 for expeditionary/combat EOD and salvage operations in support of joint naval or combined TF Commanders. Each EOD/MDS mobile unit deploys several companies and platoons for mission specific worldwide deployments.. In addition, EOD mobile units are responsible for several shore-based EOD detachments supporting key naval installations

What is the mission of TEU

Specialized traingig units located on both US coast. They provide advanced unit level and mobility skill training for deploying forces. There are 4 type of skill set taught at the training units: core EOD, Salvage, core mobility, and expeditionary skills

What is the mission of ESU

Provide optimized logistics support for all EOD and diving salvage units. Specifically they are responsible for supply, boat and vehicle maintenance, arms, ammunition and explosives, transportation and movement, dive locker support, tactical communications support, and hazardous material handling. In additions, they provide rapidly deployable forces as tailored expeditionary support elements.

What is the mission of EOD Co's / Platoons & Dets?

They are called upon to refer safe explosive hazards to include improvised explosive devices (IED), undersea mines, and weapons of mass destruction (WMD), often simultaneously engaging enemy forces. Companies and platoons conduct joint operations with all US and coalition forces

What is the IDC function for EOD Commands?

Provides timely/relevant support, specifically tailored to meet EOD needs. Capable of independently deploying field comm centers for integrated command post tactical and long haul comms in combat in all weather conditions on land, surface, and subsurface to include chemical, biological, or radiological environments.

What does a IS do-

Provides comprehensive intelligence support to SOF and Expeditionary Warfare Operations (EWO). Performs analysis using standardized procedures in support of special ops and Exped forces.

What does a IS-T do?

Coordinates frequencies for use within area of responsibility. Maintains frequency employment files. Intimates action as appropriate to prevent and correct harmful interference. Makes recommendations for changes in frequencies affected by propagation and in-resolvable harmful interference

What does a ET do?

Possesses the basic knowledge and skills required to facilitate operations and maintenance of mobile systems at the organizational level. Performs initial system setup, basic administration, and operational checks

What does a CT do?

Performs test, measurements. And analysis of EMI-related signals using antenna and transmission line test sets, arc detector test sets, radiation hazard monitoring, instrumentation and inter modulation interference (IMI) test sets

What does a AM do? Aerographers mate

Interprets environmental observations and data, meteorological satellite information and numerical environmental products. Prepares analyses and prognoses of meteorological/oceanographic parameters for display and transmission. Forcast meteorological and oceanographic conditions and issues warning of severe and hazardous conditions. Conducts environmental briefings/debriefings for combat, ops and trading ops

What are the 4 types of skill sets taught at the training units?

Core EOD


Salvage


Core Mobility


Expeditionary skills