EIWS Master Flashcards

(588 cards)

1
Q

What does ORM stand for in safety fundamentals?

A

Operational Risk Management

ORM involves a process to identify, assess, and control risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the five steps of the ORM process.

A
  • Identify hazards
  • Assess hazards
  • Make risk decisions
  • Implement controls
  • Supervise

These steps help in managing risks effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Risk Assessment Matrix used for?

A

Combines severity with probability to determine the risk assessment code (RAC)

Expressed as a single Arabic number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define mishap probability and list its four subcategories.

A
  • A - Frequent to occur
  • B - Likely to occur
  • C - Occasionally will occur
  • D - Seldom may occur
  • E - Unlikely it will occur

These categories measure the likelihood of a hazard occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does RAC stand for?

A

Risk Assessment Code

It combines hazard severity and mishap probability into a single letter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the five RACs.

A
  • Extremely High (E)
  • High (H)
  • Medium (M)
  • Low (L)

Each RAC indicates the level of risk associated with a hazard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the timeliness requirement for filing mishap investigation reports?

A

All mishap reports must be submitted within 30 days of mishap occurrence

Timely reporting is crucial for effective risk management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the four required mishap reportable items.

A
  • On duty DoD civilians and all on and off-duty military
  • Department of The Navy on duty civilian fatalities
  • Exposure to laser and radio frequency radiation
  • Navy and Marine Corps ordnance related explosive mishaps

These items must be reported to ensure safety and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of a HAZREP message?

A

To report a hazard or hazardous condition before a mishap occurs

It allows units to communicate risks proactively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define HERO.

A

Hazards of Electromagnetic Radiation to Ordnance

This term refers to risks associated with electromagnetic radiation affecting ordnance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the general characteristics of respirators?

A
  • User must be medically screened
  • Trained and fit-tested
  • Two types: Air purifying and Air supplied

Respirators are essential for protecting against airborne hazards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the goal of the U.S. Navy’s Hearing Conservation Program?

A

To prevent occupational hearing loss and assure auditory fitness for duty

Noise-induced hearing loss is a significant health hazard in the fleet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of the Personnel Security Program?

A

Manage risk of staff exploiting access for unauthorized purposes

Established under executive order (EO) 12968.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Top Secret (TS) classification.

A

Expected to cause exceptionally grave damage to national security

Identified by the color ORANGE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain need to know.

A

Restriction of access to sensitive data necessary for one’s job

Access is not granted solely based on security clearance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does SCI stand for?

A

Sensitive Compartmented Information

It protects national intelligence derived from intelligence sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the Continuous Evaluation Program (CEP)?

A

Modernizes personnel security practices by continuously assessing eligibility for security clearances

Implemented by the ODNI in December 2016.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Who has overall authority of a SCIF?

A

The Special Security Officer (SSO)

The SSO manages the security control and use of the SCIF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of the Defense Courier Service (DCS)?

A

Secure distribution of highly classified and sensitive material

Established under USTRANSCOM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What items are prohibited in a SCIF?

A
  • Devices that transmit, receive, record or store data
  • Photography without approval

These restrictions help maintain security integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Differentiate between a security violation and an infraction.

A
  • Security Violation: Non-compliance that could lead to loss of classified material
  • Security Infraction: Non-compliance that does not likely result in compromise

Violations require investigation, while infractions do not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a security violation?

A

Failing to comply with security policies and procedures, which could result in the loss or compromise of classified material. Requires an investigation.

Security violations are serious breaches that necessitate formal inquiry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a security infraction?

A

Failing to comply with security regulations, procedures, or guidelines that does not result in, nor is likely to result in, a compromise of classified information.

Infractions are less severe than violations and do not require an investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the accreditation concerns for a SCIF?

A
  • Must be accredited by the Senior Officials of the Intelligence Community (SOIC)
  • Must have a TEMPEST accreditation
  • Must have completed a Physical Security Inspection
  • Must have had a recent Security Assistance visit conducted
  • Space must be ‘hardened’ and approved through the accreditation process

These concerns ensure the security and integrity of the SCIF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are the **physical construction concerns** for a **SCIF**?
* Floor plans * Diagrams of electrical communications * HVAC connections * Security equipment layout ## Footnote These elements are crucial for the physical security of the SCIF.
26
What is a **T-SCIF**?
An accredited area used for actual or simulated war operations for a specified period. ## Footnote Permanent-type facilities are preferred, but other structures may be used under field conditions.
27
What are the duties of a **Special Security Officer (SSO)**?
* Serves as the focal point for the receipt, control & accountability of SCI * Maintains applicable SCI directives, regulations, manuals, and guidelines * Ensures all SCI is properly accounted for, controlled, transmitted, transported, packaged, and safeguarded * Ensures SCI is disseminated only to authorized persons with a need-to-know ## Footnote The SSO plays a critical role in managing sensitive compartmented information.
28
Who can be a **Command Security Manager (CSM)**?
* Can be an Officer or civilian employee * GS-11 or above * Must be a U.S. citizen * Must have a favorably adjudicated SSBI completed within the previous 5 years ## Footnote The CSM must have sufficient authority and staff to manage the security program.
29
What are the responsibilities of a **CSM**?
* Implements the Information Security Program (ISP) * Principal advisor to the commanding officer on classified information * Develops written command security instruction * Conducts command security education program ## Footnote The CSM ensures compliance with security policies and procedures.
30
What is **DISS**?
Defense Information System for Security. ## Footnote It is an automated system of record for personnel security management within the DoD.
31
What are the responsibilities of **DCSA**?
* Safeguarding national security * Overseeing and managing counterintelligence and security efforts * Ensuring protection from espionage and sabotage ## Footnote DCSA is vital for maintaining the security of U.S. defense operations.
32
How long can a **Commanding Officer** suspend access before DCSA revokes a security clearance?
Suspension of SCI access will not exceed 90 days without express consent of the SOIC or designee. ## Footnote This measure is to safeguard sensitive classified information.
33
What must be done with **removable storage media** containing classified information?
Must be conspicuously marked with the highest level of classification stored on the device. ## Footnote This ensures proper handling and security of classified data.
34
What is the purpose of a **Red Cross message**?
An emergency message used to notify a service member of emergency health situations of a family member. ## Footnote AMCROSS messages are critical for timely communication in emergencies.
35
What does **ADNS** stand for and its function?
Automated Digital Network System. Connects Navy shipboard networks to other ship and shore networks to IP data of various classification levels. ## Footnote ADNS enhances communication capabilities within the Navy.
36
What is the importance of **standardization** in naval messages?
Ensures effective, efficient, and secure communication within the Navy and across allied forces. ## Footnote Standardized messages enhance clarity and interoperability.
37
Define **RIVER CITY**.
Operational security condition implemented to restrict or control communications. ## Footnote It enhances operational security by limiting external communication channels.
38
What is **TEMPEST**?
Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions. ## Footnote TEMPEST controls compromising emanations from telecommunications systems.
39
What is the purpose of **EMCON**?
Control of all electromagnetic and acoustic radiations to avoid detection by hostile forces. ## Footnote EMCON minimizes electromagnetic radiation during sensitive operations.
40
What is **OPTASK COMMS**?
Operational Tasking Communications Message. Disseminates afloat communications plans. ## Footnote It assigns portions of the frequency spectrum to systems and transmitters.
41
What does **COMMPLAN** stand for?
Communications Plan. A multi-step process for developing and implementing communications in support of missions. ## Footnote It details frequency assignments for specific units.
42
What is **OTAT**?
Over the Air Key Transfer. ## Footnote It transmits electronic KEYMAT material directly to crypto devices.
43
What is a **hub** in networking?
A device used to connect segments of a LAN, operating at Layer 1 of the OSI model. ## Footnote Hubs copy incoming packets to all ports for network communication.
44
What is a **switch** in networking?
A small hardware device that joins multiple computers within one LAN and contains more intelligence than a hub. ## Footnote Switches improve network efficiency by directing data to specific devices.
45
What is an **Application Server**?
A software framework that allows applications to run. ## Footnote Application servers provide an environment for applications to execute and manage their operations.
46
What is the function of a **Hub** in networking?
Connects segments of a LAN, operates at Layer 1 (Physical Layer) of the OSI model. ## Footnote Hubs copy incoming packets to all ports, allowing all segments to see all packets.
47
What distinguishes a **Switch** from a Hub?
Switches inspect data packets, determine source and destination, and forward them appropriately. ## Footnote Switches operate at Layer 2 (Data Link Layer) of the OSI model and conserve bandwidth.
48
What is the primary role of a **Router**?
Forwards data packets between networks, operates at Layer 3 (Network Layer) of the OSI model. ## Footnote Routers read address information in packets to direct them to their destination.
49
What does **WAP** stand for?
Wireless Application Protocol ## Footnote A protocol suite for interoperability of WAP equipment and software with various network technologies.
50
What is a **Proxy Server**?
Acts as an intermediary for requests from clients seeking resources from other servers. ## Footnote It controls client access to the internet.
51
Define a **Firewall**.
Device or set of devices that permit or deny network transmissions based on rules. ## Footnote Firewalls protect networks from unauthorized access while allowing legitimate communications.
52
What is a **VPN Concentrator**?
A hardware device that manages multiple, simultaneous VPN connections. ## Footnote It enables secure communication between remote users and a central network.
53
What is the purpose of a **Back-up**?
Copies of data used to restore the original after a data loss event. ## Footnote Back-ups are essential for data recovery.
54
What does a **Repeater** do?
Regenerates incoming electrical, wireless, or optical signals. ## Footnote Repeaters extend the distance over which data can travel without degradation.
55
What is an **Access Router**?
Located at customer sites, optimized for low cost. ## Footnote Access routers are used in small office/home office (SOHO) environments.
56
What is the role of a **Distribution Router**?
Aggregates traffic from multiple access routers and enforces quality of service. ## Footnote Distribution routers have considerable memory and processing intelligence.
57
What is a **Core Router**?
Provides a 'collapsed backbone' interconnecting distribution tier routers. ## Footnote Core routers are optimized for high bandwidth.
58
Define **LAN**.
Local Area Network, a group of computers sharing a common communications line. ## Footnote LANs typically cover a small geographic area, like an office building.
59
Define **WAN**.
Wide Area Network, spans a large geographic area connecting multiple smaller networks. ## Footnote The Internet is the most popular WAN.
60
What is a **MAN**?
Metropolitan Area Network, interconnects several LANs using high-capacity backbone technology. ## Footnote MANs usually span a city or large campus.
61
What does **GAN** stand for?
Global Area Network, composed of interconnected WANs covering unlimited geographical areas. ## Footnote GANs facilitate global connectivity.
62
Describe **Bus Topology**.
Network architecture where clients connect via a shared communications line. ## Footnote It may have collision handling mechanisms to manage simultaneous transmissions.
63
What is a **Star Topology**?
Network topology with one central switch or hub acting as a conduit for messages. ## Footnote Star networks are common due to their simplicity and reliability.
64
Define **Ring Topology**.
Network architecture where each node connects to two others, forming a continuous pathway. ## Footnote Data travels from node to node, but a single link failure can disrupt the network.
65
What is **Mesh Topology**?
Network architecture where each node acts as an independent router. ## Footnote Mesh networks allow for continuous connections and reconfiguration around broken paths.
66
What is a **VLAN**?
Virtual LAN, a broadcast domain partitioned and isolated at the data link layer. ## Footnote VLANs enhance network management and security.
67
What does **OSI** stand for?
Open Systems Interconnection Model, a way of sub-dividing a communications system into layers. ## Footnote The OSI model has 7 layers, each providing specific services.
68
What is the **TCP/IP Model**?
A set of protocols for network communication, consisting of 4 layers. ## Footnote TCP/IP is the most widely used network protocol.
69
What is the difference between **IPv4** and **IPv6**?
IPv4: 32-bit address, ~4.3 billion addresses. IPv6: 128-bit address, virtually unlimited addresses. ## Footnote IPv6 was developed to address IPv4 address exhaustion.
70
What is **NIPRNET**?
Non-classified Internet Protocol Router Network for exchanging sensitive but unclassified information. ## Footnote It provides users access to the internet.
71
Define **SIPRNET**.
Secret Internet Protocol Router Network for transmitting classified information securely. ## Footnote Used by the U.S. DoD and DoS.
72
What is **JWICS**?
Joint Worldwide Intelligence Communications Systems for transmitting classified information. ## Footnote Operates securely over TCP/IP.
73
What does **CANES** stand for?
Consolidated Afloat Networks and Enterprise Services for modernizing shipboard and shore-based networks. ## Footnote It enhances command, control, communications, and intelligence capabilities.
74
What is the purpose of an **Operating System**?
Regulates how application software uses computer hardware. ## Footnote It provides a user interface and manages system resources.
75
What are **Applications**?
Computer software designed to help users perform specific tasks. ## Footnote Applications can be standalone or integrated with other software.
76
What is **FTP**?
File Transfer Protocol, used to transfer large amounts of data. ## Footnote Operates on ports 20/21.
77
What does **SSH** stand for?
Secure Shell, a protocol for encrypted connections. ## Footnote Operates on port 22.
78
What is **Telnet**?
Telecommunications Network protocol for remote access. ## Footnote Operates on port 23.
79
What is **SMTP**?
Simple Mail Transfer Protocol for sending and receiving email. ## Footnote Operates on port 25.
80
What does **DNS** stand for?
Domain Name Service, required for connecting to remote computers by domain name. ## Footnote Operates on port 53.
81
What is **DHCP**?
Dynamic Host Configuration Protocol for assigning IP addresses. ## Footnote Operates on ports 67/68.
82
What is the difference between **TCP** and **UDP**?
TCP: Reliable, ensures data integrity. UDP: Unreliable, faster transmission. ## Footnote TCP operates at the Transport layer, while UDP is a connectionless protocol.
83
Define **MAC**.
Mandatory Access Controls, the strictest level of control. ## Footnote Access is controlled by settings defined by the system administrator.
84
What is **DAC**?
Discretionary Access Controls, allows users to control access to their own data. ## Footnote Typically has an Access Control List (ACL) associated with it.
85
What does **RBAC** stand for?
Role Based Access Controls, assigns permissions based on job functions. ## Footnote Users are assigned to roles that have specific permissions.
86
What is **NAT**?
Network Address Translation, modifies IP addresses in packet headers. ## Footnote Allows multiple devices to share a single public IP address.
87
What is **PAT**?
Port Address Translation, allows multiple devices to share a single public IP with unique port numbers. ## Footnote Also known as NAT Overload.
88
Define **DMZ**.
Demilitarized Zone, isolates publicly accessible services from the internal network. ## Footnote Acts as a buffer zone for added security.
89
What is **Virtualization**?
Creating virtual instances of computing resources rather than using physical hardware. ## Footnote It improves efficiency and resource management.
90
What is the purpose of **Active Directory**?
Manages users, devices, and resources within a Windows network environment. ## Footnote Active Directory is essential for network administration.
91
What is the purpose of a **firewall**?
Acts as a buffer zone between the public internet and a private network, adding an extra layer of security ## Footnote Firewalls help protect internal networks from external threats.
92
Define **virtualization**.
Process of creating virtual instances of computing resources rather than using dedicated physical hardware ## Footnote Improves efficiency, scalability, and resource management.
93
What does **Active Directory** manage?
* Users * Devices * Resources ## Footnote Centralized management within a Windows network environment.
94
What are the main functions of **Active Directory**?
* Centralized User and Device Management * Authentication and Authorization * Group Policy Management * Single Sign-On (SSO) * Improved Security * Scalability and Organization ## Footnote Each function enhances network management and security.
95
Define **cybersecurity**.
The practice of protecting networks, systems, devices, and data from cyber threats, attacks, and unauthorized access ## Footnote Involves ensuring confidentiality, integrity, and availability (CIA) of information.
96
What is the role of an **ISSM**?
Responsible for ensuring that all cybersecurity components have completed the appropriate evaluation and configuration processes ## Footnote ISSM stands for Information Systems Security Manager.
97
What does an **ISSO** do?
Assists the ISSM and implements cybersecurity policies and procedures ## Footnote ISSO stands for Information System Security Officer.
98
Define **backdoor**.
Method of bypassing normal authentication to secure remote access to a computer ## Footnote Often remains undetected while allowing unauthorized access.
99
What is a **worm** in cybersecurity?
Self-replicating malware that uses a network to send copies of itself to other computers ## Footnote Can spread without user intervention.
100
Define a **Trojan**.
Malware that appears to perform a desirable function but facilitates unauthorized access ## Footnote Often disguised as legitimate software.
101
What is a **virus**?
Computer program that can copy itself and infect a computer ## Footnote Spreads through executable code.
102
What is **phishing**?
An attempt to acquire sensitive information by masquerading as a trustworthy entity ## Footnote Commonly targets usernames, passwords, and credit card details.
103
Define **dictionary attack**.
A password-cracking technique that systematically tries common words and phrases ## Footnote Targets weak passwords that users often choose.
104
What is **privilege escalation**?
Exploiting flaws to gain higher access privileges than originally granted ## Footnote Includes vertical and horizontal escalation.
105
Define **brute force attack**.
A trial-and-error method where an attacker tries all possible combinations of passwords ## Footnote Often time-consuming and resource-intensive.
106
What is **network enumeration**?
A reconnaissance technique that identifies active hosts and services using scanning tools ## Footnote Helps attackers map out a target's network.
107
Define **rainbow table**.
A precomputed table of hashed passwords used to reverse hashed passwords quickly ## Footnote Allows attackers to find matches without brute-forcing.
108
What is **social engineering**?
Manipulating people into revealing confidential information ## Footnote Methods include phishing and baiting.
109
Define **buffer overflow**.
Occurs when a program writes more data into a buffer than it can hold ## Footnote Can lead to arbitrary code execution or system crashes.
110
What is a **Denial of Service (DoS)** attack?
Overloads a system with excessive traffic, making it unavailable to legitimate users ## Footnote Uses a single attack source.
111
Define **Distributed Denial of Service (DDoS)**.
A DoS attack using multiple compromised devices to flood a target with traffic ## Footnote More powerful than a standard DoS attack.
112
What is **SQL Injection**?
A code injection attack that exploits vulnerabilities in web applications ## Footnote Allows attackers to manipulate databases and retrieve sensitive data.
113
Define the **cybersecurity risk management process**.
Identification, assessment, and prioritization of risks followed by coordinated application of resources ## Footnote Aims to minimize and control the impact of unfortunate events.
114
What is **confidentiality** in cybersecurity?
Ensures sensitive data is accessible only to authorized users ## Footnote Examples include encryption and access control mechanisms.
115
Define **integrity**.
Ensures data remains accurate and unaltered unless modified by authorized personnel ## Footnote Examples include hashing algorithms and digital signatures.
116
What is **availability**?
Ensures systems and data are accessible whenever needed by authorized users ## Footnote Examples include redundant servers and disaster recovery plans.
117
Define **non-repudiation**.
Ensures an entity cannot deny sending or modifying data after the fact ## Footnote Examples include digital signatures and log files.
118
What is **authenticity**?
Ensures users and data sources are verified before access is granted ## Footnote Examples include biometric authentication and two-factor authentication.
119
Define **PKI**.
Public Key Infrastructure, a framework that manages digital keys and certificates ## Footnote Provides secure communication and authentication.
120
What is **PKC**?
Public Key Cryptography, a method using two mathematically linked keys ## Footnote Ensures secure data transmission and prevents man-in-the-middle attacks.
121
What are the procedures for **high-to-low data transfers**?
Sanitize and redact classified content, apply downgraded marking, and log the transaction ## Footnote Ensures compliance with security protocols.
122
What are the procedures for **low-to-high data transfers**?
Vet files through a one-way guard, scan for malware, and enforce file-type policies ## Footnote Only compliant data is admitted into the higher domain.
123
What is the **electromagnetic spectrum**?
Complete range of electromagnetic frequencies from 3 kHz to beyond 300,000 THz ## Footnote Audio frequencies (15 Hz-20 kHz) are not electromagnetic energy and are not included.
124
Define **Radio Waves**.
* Wavelength: More than 1 mm * Frequency: Less than 300 GHz * Energy: Lowest in the spectrum ## Footnote Used for long-distance communication.
125
Define **Microwaves**.
* Wavelength: 1 mm - 1 m * Frequency: 300 MHz - 300 GHz * Energy: Higher than radio waves but still low ## Footnote Commonly used in communication and cooking.
126
Define **Infrared (IR) Waves**.
* Wavelength: 700 nm - 1 mm * Frequency: 300 GHz - 430 THz * Energy: Lower than visible light ## Footnote Used in remote controls and thermal imaging.
127
Define **Visible Light**.
* Wavelength: 400 nm - 700 nm * Frequency: 430 THz - 770 THz * Energy: Medium, allows vision ## Footnote The only part of the electromagnetic spectrum visible to the human eye.
128
Define **Ultraviolet (UV) Light**.
* Wavelength: 10 nm - 400 nm * Frequency: 770 THz - 30 PHz * Energy: Higher than visible light; can cause chemical reactions ## Footnote Responsible for sunburns and sterilization.
129
Define **X-Rays**.
* Wavelength: 0.01 nm - 10 nm * Frequency: 30 PHz - 30 EHz * Energy: Very high; penetrates soft tissues ## Footnote Commonly used in medical imaging.
130
Define **Gamma Rays**.
* Wavelength: Less than 0.01 nm * Frequency: More than 30 EHz * Energy: Highest in the spectrum; can damage cells ## Footnote Used in cancer treatment and nuclear reactions.
131
What are the frequency ranges for **ELF**?
3 Hz - 30 Hz ## Footnote Used for long-range signals to submarines.
132
What are the frequency ranges for **SLF**?
30 Hz - 300 Hz ## Footnote Used for long-range signals to submarines.
133
What are the frequency ranges for **ULF**?
300 Hz - 3 kHz ## Footnote Used for long-range signals to submarines.
134
What are the frequency ranges for **VLF**?
3 kHz - 30 kHz ## Footnote Used for long-range signals and message traffic to submarines.
135
What are the frequency ranges for **LF**?
30 kHz - 300 kHz ## Footnote Used for fleet multi-channel broadcast systems.
136
What are the frequency ranges for **MF**?
300 kHz - 3 MHz ## Footnote Used for AM radio and international distress frequencies.
137
What are the frequency ranges for **HF**?
3 MHz - 30 MHz ## Footnote Used for long-distance communications.
138
What are the frequency ranges for **VHF**?
30 MHz - 300 MHz ## Footnote Used for line-of-sight communications.
139
What are the frequency ranges for **UHF**?
300 MHz - 3 GHz ## Footnote Used for tactical voice transmissions.
140
What are the frequency ranges for **SHF**?
3 GHz - 30 GHz ## Footnote Used for SATCOM and modern radars.
141
What are the frequency ranges for **EHF**?
30 GHz - 300 GHz ## Footnote Used for experimental radars and SATCOM.
142
Define **Refraction**.
The bending of a wave as it passes from one medium to another with a different density ## Footnote Causes a change in speed and direction.
143
Define **Reflection**.
The bouncing back of a wave when it encounters a surface or boundary that does not absorb its energy ## Footnote Important in radar and communication.
144
Define **Diffraction**.
The spreading of waves when they encounter obstacles or pass through narrow openings ## Footnote Allows radio signals to bend around buildings.
145
Define **Multiplexing**.
A technique that allows multiple signals to share the same transmission medium ## Footnote Separates them in time, frequency, or code.
146
Define **Bandwidth**.
The range of frequencies that a transmission channel can carry ## Footnote Higher bandwidth allows for faster data transmission.
147
Define **Keying**.
Modulation technique where digital signals are transmitted by varying properties of a carrier wave ## Footnote Common types include ASK, FSK, and PSK.
148
Define **Polarization**.
The orientation of the electric field of an electromagnetic wave ## Footnote Crucial in radio communication to reduce interference.
149
Define **Doppler Effect**.
The change in frequency or wavelength of a wave relative to an observer moving towards or away from the wave source ## Footnote Observed in sound and electromagnetic waves.
150
Define **Ground Waves**.
Radio waves that travel along the Earth's surface ## Footnote Effective for long distances, especially at low frequencies.
151
Define **Sky Waves**.
Radio waves that are reflected or refracted back to Earth by the ionosphere ## Footnote Enable long-distance communication beyond the horizon.
152
Define **Space Waves**.
Radio waves that travel directly through the atmosphere or space ## Footnote Used in satellite communication.
153
Define **Surface Waves**.
Type of ground wave that propagates along the Earth's surface ## Footnote Effective at very low frequencies.
154
Define **Skip Zone**.
A region where a transmitted radio signal does not reach ## Footnote Results in a communication gap between the transmitter and receiver.
155
Define the **Troposphere**.
Lowest atmospheric layer, extending from the surface to roughly 8-15 km altitude ## Footnote Contains most of the Earth's weather phenomena.
156
Define the **Stratosphere**.
Spans from the top of the troposphere up to about 50 km altitude ## Footnote Has a more stable temperature and minimizes interference.
157
Define the **Ionosphere**.
Electrically charged region of the upper atmosphere, extending roughly from 60 km to 1,000 km altitude ## Footnote Reflects or refracts high-frequency radio waves.
158
What is **Weather**'s impact on wave propagation?
Conditions like rain, snow, fog, and storms can affect wave propagation ## Footnote Causes scattering, absorption, and refraction of signals.
159
Define **Attenuation**.
The gradual reduction in signal strength as it travels through a medium ## Footnote Significant in high-frequency communication.
160
Define **Fading**.
The variation in signal strength at the receiver due to interference ## Footnote Caused by reflection, refraction, or atmospheric conditions.
161
Define **Sun Spots**.
Temporary dark regions on the Sun's surface that increase ionospheric activity ## Footnote Can enhance or disrupt radio wave propagation.
162
Define **Ducting/Temperature Inversion**.
Occurs when a temperature inversion traps radio waves between layers of the atmosphere ## Footnote Allows them to travel longer distances.
163
Define **Ionization**.
The process where solar radiation energizes atmospheric gases, creating charged particles ## Footnote Affects wave propagation and enables long-distance HF communication.
164
Define **Solar Flares**.
Intense bursts of radiation from the Sun that release large amounts of charged particles ## Footnote Can cause radio blackouts and GPS errors.
165
Define **Modulation**.
The process of modifying a carrier wave's properties to encode information for transmission ## Footnote Essential for effective communication.
166
Define **Demodulation**.
The reverse process of modulation, where the original information signal is extracted ## Footnote Critical for receiving transmitted information.
167
What does **USB** stand for?
Upper Sideband ## Footnote A form of Amplitude Modulation (AM).
168
What does **LSB** stand for?
Lower Sideband ## Footnote The opposite of USB in amplitude modulation.
169
Define **CW**.
Continuous Wave ## Footnote A form of modulation for long-distance communication.
170
What is **Phase** in modulation?
Refers to the position of a waveform relative to time ## Footnote Varying phase encodes data.
171
Define **AM**.
Amplitude Modulation ## Footnote Commonly used in aircraft communication and emergency broadcasts.
172
Define **FM**.
Frequency Modulation ## Footnote Provides better noise resistance for short-range communication.
173
Define **SSB**.
Single Side Band ## Footnote A form of AM that reduces bandwidth usage.
174
Define **DSB**.
Double Side Band ## Footnote Transmits both upper and lower sidebands along with the carrier.
175
Define **PM**.
Phase Modulation ## Footnote Varies the phase of the carrier wave to encode information.
176
Define **Pulse Modulation**.
Varies pulse amplitude, width, or position to encode information ## Footnote Commonly used in radar and encrypted military communication.
177
Define **Half-Duplex**.
Allows data transmission in both directions, but only one direction at a time ## Footnote A device must wait for the other to finish.
178
Define **Full-Duplex**.
Allows data transmission simultaneously in both directions ## Footnote Improves efficiency.
179
Define **Semi-Duplex**.
Allows for automatic switching between transmitting and receiving ## Footnote Without manual intervention.
180
Define **Simplex**.
One-way only, where information flows from the sender to the receiver ## Footnote Without a response.
181
Define **Broadcast**.
Sends a signal from one source to multiple receivers ## Footnote One way, with no expectation for a reply.
182
Define **PRI/PRT**.
Pulse Repetition Interval/Pulse Repetition Time ## Footnote Determines the radar's range.
183
Define **PRF**.
Pulse Repetition Frequency ## Footnote Number of radar pulses transmitted per second.
184
What does **RF** stand for?
Radio Frequency ## Footnote Frequency of the radar signal used for detecting targets.
185
Define **BW**.
Bandwidth ## Footnote Affects radar's ability to distinguish between objects.
186
Define **CW** in radar.
Continuous Wave ## Footnote Increases effectiveness for speed measurement.
187
Define **PW**.
Pulse Width ## Footnote Determines the radar's range resolution.
188
What is **Scan** in radar?
The radar's movement pattern as it sweeps an area ## Footnote Different scan types determine how quickly targets are located.
189
Define **Azimuth**.
The horizontal angle or direction from the radar's position to a target ## Footnote Measured in degrees relative to true north.
190
Define **Bearing Resolution**.
The radar's ability to distinguish between closely spaced targets ## Footnote Higher resolution enables precise tracking.
191
Define **Elevation Angle**.
The vertical angle between the radar and the target ## Footnote Crucial for airborne target tracking.
192
What is the purpose of **Naval Intelligence**?
Ensures superior situational awareness and informed decision-making ## Footnote Protects national and allied maritime interests.
193
What is the first step of the **intelligence cycle**?
Planning & Direction ## Footnote Establishes intelligence requirements based on mission needs.
194
What is the **Elevation Angle** in radar systems?
The vertical angle between the radar and the target relative to the horizon ## Footnote It is crucial for airborne target tracking, missile guidance, and weather radar systems.
195
State the purpose of **Naval Intelligence**.
Ensures superior situational awareness, informed decision-making, and the protection of national and allied maritime interests in peacetime and conflict ## Footnote This is essential for effective military operations.
196
Define the **six steps of the intelligence cycle**.
* Planning & Direction * Collection * Processing & Exploitation * Analysis & Production * Dissemination & Integration * Evaluation & Feedback ## Footnote These steps guide the intelligence process from requirement to actionable insights.
197
What is **Data** in the context of intelligence?
Raw, unprocessed facts and figures collected from various sources ## Footnote Data has no inherent meaning until it is organized and analyzed.
198
What is the difference between **Information** and **Intelligence**?
* Information: Processed data that provides meaning * Intelligence: Analyzed information that provides insights and assessments ## Footnote Intelligence answers why something is happening and its implications.
199
Describe **intelligence oversight**.
Policies, procedures, and regulations ensuring intelligence activities are conducted legally and ethically ## Footnote It is designed to prevent abuses of power and protect civil liberties.
200
Define a **U.S. person** according to intelligence oversight.
A citizen of the U.S., an alien resident lawfully admitted for permanent residence, or a corporation incorporated in the U.S. ## Footnote This definition is crucial for legal intelligence operations.
201
Describe the difference between **Title 10** and **Title 50** authorities.
* Title 10: Governs military operations * Title 50: Governs intelligence and national security activities ## Footnote Title 10 is military-focused, while Title 50 deals with intelligence operations.
202
What is the role of intelligence in **Tactical Warfare**?
Provides real-time threat assessments and supports target acquisition ## Footnote Utilizes SIGINT, IMINT, and HUMINT for operational advantage.
203
What are **Intelligence Requirements**?
Questions or requests that drive intelligence collection and analysis ## Footnote Derived from information requirements and focus on what must be collected.
204
Define **FFIR**.
Friendly Forces Information Requirement ## Footnote Refers to information a commander needs about friendly forces to conduct operations.
205
What does **GEOINT** stand for?
Geospatial Intelligence ## Footnote Collects and analyzes imagery and geospatial data from various sources.
206
What is the purpose of **intelligence fusion**?
Integrating, analyzing, and synthesizing information from multiple sources ## Footnote Aims to improve decision-making by providing comprehensive intelligence.
207
Describe the purpose of **Warning Intelligence**.
Provides early warning of potential threats or impending attacks ## Footnote Allows decision-makers to take preventive measures.
208
What is the role of the **JIOC**?
Ensures Combatant Commanders have the intelligence needed for effective mission execution ## Footnote Facilitates real-time threat analysis and interagency coordination.
209
What are the **four steps of the Joint Intelligence Preparation of the Operating Environment**?
* Define the Operating Environment * Describe the Impact of the Operating Environment * Evaluate the Adversary * Determine Adversary Courses of Action ## Footnote This process helps analyze and understand the operational environment.
210
What does **COP** stand for?
Common Operational Picture ## Footnote A real-time visualization of the operational environment integrating various activities.
211
What is the purpose of **ISR management**?
Planning, coordination, and execution of Intelligence, Surveillance, and Reconnaissance ## Footnote Key components include CONOP and PED.
212
What is **F2T2EA**?
Find, Fix, Track, Target, Engage, and Assess ## Footnote A process used to locate and neutralize enemy threats.
213
What does **F2T2EA** stand for in the Joint Targeting Cycle?
Find, Fix, Track, Target, Engage, Assess ## Footnote It is a process used to locate and neutralize enemy threats, particularly time-sensitive targets.
214
What is the purpose of **ICD 203**?
Establishes standards for intelligence analysis ## Footnote Ensures accuracy, objectivity, and integrity in intelligence products.
215
What does **ICD 204** establish?
National Intelligence Priorities Framework (NIPF) ## Footnote Aligns intelligence collection and resources with critical national security needs.
216
What is the focus of **ICD 206**?
Sourcing Requirements for Disseminated Analytic Products ## Footnote Establishes standards for properly citing sources in intelligence analysis.
217
What does **ICD 207** define?
Tradecraft Standards for the Intelligence Community ## Footnote Establishes common standards for conducting intelligence analysis across all IC agencies.
218
What is the **3-M Program**?
Maintenance and Material Management Program ## Footnote A U.S. Navy-wide system designed to ensure efficient maintenance and material readiness.
219
What are the **four maintenance levels** in the Navy?
* Organizational-Level Maintenance (TA-4) * External Support at Sea (TA-3) * Shore-Based Repair Facilities (TA-2) * Full Overhaul & Major Repairs (TA-1) ## Footnote Each level has specific responsibilities and resources.
220
What is the objective of the **Planned Maintenance System (PMS)**?
Ensure Navy equipment remains operational and mission-ready ## Footnote Aims to prevent equipment failures, increase lifespan, and reduce downtime.
221
What does the **Automated Work Request 4790/2K** document do?
Reports equipment malfunctions and maintenance actions ## Footnote Used for requests that exceed routine preventive maintenance.
222
What is the purpose of the **HAZMAT User Guide**?
Provides safety precautions for hazardous materials ## Footnote Essential for safe handling during maintenance.
223
What does **MRC** stand for?
Maintenance Requirement Card ## Footnote Provides step-by-step instructions for conducting maintenance.
224
What is the **Tag-Out Program**?
Safety system to prevent accidental operation of equipment ## Footnote Uses tags and locks to indicate equipment must not be operated.
225
What does **TCPED** stand for?
Tasking, Collection, Processing, Exploitation, Dissemination ## Footnote An operating concept for organizing and processing environmental data.
226
What is the mission of the **NAVO**?
Optimize sea power through oceanographic knowledge ## Footnote Supports U.S. National Security by providing forecast battlespace.
227
What does the **FNMOC** do?
Generates and delivers numerical weather and oceanographic forecasts ## Footnote Critical for naval operations and tactical support.
228
What is the mission of the **USNO**?
Provides precise astronomical data and timekeeping services ## Footnote Critical for navigation and operational systems.
229
What is the mission of the **FWC-NOR**?
Provide maritime forecasts and warnings for various regions ## Footnote Supports 2nd, 4th, and 6th fleet operations.
230
What is the mission of the **FWC-SD**?
Keep the Fleet safe from hazardous weather ## Footnote Provides timely and accurate weather forecasts and recommendations.
231
What is the mission of the **Fleet Weather Center San Diego**?
* Keep the Fleet safe from hazardous weather * Enable effective operations and planning decisions * Provide timely and accurate aviation, maritime, and installation weather forecasts, warnings, and recommendations ## Footnote Supports 3rd, 5th, and 7th fleet.
232
What does **ADCON** stand for in the context of CNMOC and USFF?
Administrative Control ## Footnote CNMOC is administratively managed by USFF, responsible for personnel, training, resource allocation, and readiness.
233
What does **OPCON** stand for and who does CNMOC fall under?
Operational Control ## Footnote CNMOC falls under the operational control of NAVIFOR, integrating its products and services into tactical and operational planning.
234
What does **CTG 80.7** provide for ISR missions?
* Environmental intelligence * METOC intelligence ## Footnote Supported through SCIF capable units like NAVO, FNMOC, and JTWC.
235
What is the focus of the **Joint Typhoon Warning Center (JTWC)**?
Monitoring and forecasting tropical cyclones in the Pacific and Indian Oceans ## Footnote Supports broader warning systems for events that could trigger tsunami conditions.
236
What is the role of the **Pacific Tsunami Warning Center (PTWC)**?
* Monitors the Pacific Ocean for tsunami-generating events * Issues warnings to international partners, maritime interests, and coastal communities ## Footnote Focuses on undersea earthquakes and volcanic eruptions.
237
What does the **National Tsunami Warning Center (NTWC)** provide?
Tsunami warnings specifically for U.S. coastal areas ## Footnote Ensures timely alerts for local authorities and the public.
238
What is the cooperative relationship between **FWC-NOR** and the **National Hurricane Center**?
* FWC-NOR provides localized meteorological data * NHC supplies broader forecasts and warnings ## Footnote Supports tropical operations in the Atlantic.
239
What does a **Significant Tropical Weather Advisory** message provide?
* Initial outlook on disturbed weather areas * Geographic coordinates * Current movement * Atmospheric and oceanic conditions * Assessment of development potential ## Footnote Updates typically every 6 hours.
240
What does a **Tropical Cyclone Formation Alert** indicate?
A tropical disturbance is organizing and likely to form a cyclone within 24 hours ## Footnote Issued to alert about potential cyclone formation.
241
What does a **Tropical Cyclone Warning** provide?
* Detailed information about the storm * Storm characteristics * Estimated path * Hazard information * Safety recommendations ## Footnote Updated as the storm evolves.
242
What does **Condition V** indicate during hurricane season?
Hurricane season is active; TCCOR 5 is maintained ## Footnote Indicates that any storm/hurricane is greater than 72 hours away.
243
What does **Condition IV** signify?
Destructive force winds are possible within 72 hours ## Footnote Indicates a heightened state of alert.
244
What does **Condition III** indicate?
Destructive force winds are possible within 48 hours ## Footnote Further escalates the alert status.
245
What does **Condition II** mean?
Destructive force winds are anticipated within 24 hours ## Footnote Signals imminent threat.
246
What does **Condition I** indicate?
Destructive force winds are imminent within 12 hours ## Footnote Represents the highest level of alert.
247
Define the wind criteria for a **Tropical Depression**.
Maximum sustained winds are less than 34 knots (approximately 39 mph) ## Footnote Represents the weakest classification of tropical systems.
248
Define the wind criteria for a **Tropical Storm**.
Maximum sustained winds range from 34 to 63 knots (roughly 39 to 73 mph) ## Footnote Indicates a stronger tropical system.
249
Define the wind criteria for a **Typhoon**.
Maximum sustained winds are at least 64 knots (74 mph) but below super typhoon threshold ## Footnote Represents a significant tropical cyclone.
250
Define the wind criteria for a **Super Typhoon**.
Maximum sustained winds reach 130 knots (about 150 mph) or higher ## Footnote Represents the most intense tropical cyclones.
251
What does a **Tsunami Warning** indicate?
A destructive tsunami is imminent or already occurring ## Footnote Poses a significant threat to life and property.
252
What does a **Tsunami Advisory** alert indicate?
A tsunami is expected but likely smaller and less damaging than in a warning scenario ## Footnote Provides a cautionary alert.
253
What does a **Tsunami Watch** signify?
Potential for tsunami development that could affect certain areas ## Footnote Does not confirm an immediate threat.
254
What is an **Information Statement** regarding tsunamis?
Provides additional context, status updates, or clarifications about ongoing tsunami events ## Footnote Does not convey a direct call to action.
255
What are the roles of oceanographers in **USFF**?
* Develop and disseminate meteorological, oceanographic, and hydrographic forecasts * Inform operational planning and training ## Footnote Essential for fleet readiness.
256
What is the role of oceanographers in **PACFLT**?
Deliver region-specific environmental assessments ## Footnote Support operational decision-making with ocean conditions analysis.
257
What do oceanographers provide in **SUBLANT**?
* Underwater acoustics * Sound propagation * Hydrographic information ## Footnote Essential for submarine stealth and navigation.
258
What is the focus of oceanographers in **SUBPAC**?
Analyze the Pacific's unique underwater environment ## Footnote Deliver data on factors influencing sonar performance.
259
What does **INDOCPACOM** do regarding oceanography?
Integrate environmental intelligence into operational planning ## Footnote Assess ocean dynamics, climate, and hydrographic conditions.
260
What is the role of oceanographers in **AFRICOM**?
Perform environmental assessments to support naval operations ## Footnote Identify hazards and optimize navigational routes.
261
What is the role of oceanographers in **STRATCOM**?
Ensure environmental conditions are factored into deterrence and planning ## Footnote Provide data for long-range planning asset use.
262
How does **climatology** affect the Military Planning Process?
Provides environmental context for long-range planning and operational readiness ## Footnote Studies long-term weather trends and patterns.
263
Define the **Navy Planning Process**.
A systematic, iterative process for analyzing missions and developing courses of action ## Footnote Translates decisions into planned actions.
264
What is METOC's role in the Navy Planning Process?
* METOC Estimate: Assessment of environmental conditions * Environmental Analysis: Identifies impacts on operations * Recommendations: Advises on utilizing the environment ## Footnote Essential for effective mission planning.
265
What is the role of the **Navy Space Command**?
* Supports developing, integrating, and conducting full-spectrum space domain operations * Advocates for the Fleet to obtain space capabilities * Establishes requirements for training and integration of space capabilities * Provides space planning and operations expertise to the Fleet ## Footnote The Navy Space Command operates as the Navy service component to United States Space Command.
266
Define **Space Domain Awareness**.
* Tracking, cataloging, and characterizing all objects in Earth orbit * Uses a network of sensors such as radar and optical systems ## Footnote Maintains a picture of the space environment.
267
What are the focuses of **Offensive Operations** in space?
* Disrupt adversary space systems * Degrade adversary space capabilities * Deny adversary access to space systems ## Footnote These operations are conducted when necessary.
268
What does **Positioning, Navigation, and Timing** rely on?
* Satellite constellations (e.g., GPS) ## Footnote Delivers precise location and time data globally.
269
What is the purpose of **Intelligence, Surveillance, and Reconnaissance** in space?
* Collect imagery, signals, and other data * Supports national security and strategic planning ## Footnote Monitors adversary activities and environmental conditions.
270
What does **Satellite Communications** provide?
* Continuous, secure communication links * Essential for command and control ## Footnote Ensures military forces maintain connectivity even in remote areas.
271
What is involved in **Environmental Monitoring**?
* Observing space weather phenomena * Predicting and mitigating potential adverse effects on satellites ## Footnote Includes monitoring solar flares and geomagnetic storms.
272
What is the function of **Missile Warning**?
* Detect missile launches worldwide * Track trajectories in real time ## Footnote Critical for early threat detection.
273
Define **Nuclear Detonation Detection**.
* Detect electromagnetic signatures and particulate matter from nuclear explosions ## Footnote Supports treaty compliance and global nuclear monitoring.
274
What are the characteristics of **Low Earth Orbit**?
* Ranges from 160 km to 2,000 km above Earth * Orbital period of 90 - 120 minutes * Reduced signal delay and higher resolution for imaging ## Footnote More atmospheric drag requiring occasional orbital adjustments.
275
What is the **Geosynchronous Orbit**?
* Approximately 35,786 km above the equator * Period approximately equal to one day ## Footnote Geostationary satellites remain fixed over one point on the equator.
276
Define the **Space Segment** in Space Operations.
* Encompasses satellites and spacecraft in orbit * Includes payloads and communication links ## Footnote Essential for the operation of space systems.
277
What are the benefits of access to space?
* Enhanced Intelligence, Surveillance, and Reconnaissance (ISR) * Reliable Communications * Precise Navigation and Positioning * Environmental Monitoring * Deterrence and Strategic Advantage ## Footnote These benefits support military operations and national security.
278
What are **Natural Space Environment Hazards**?
* Space Debris * Micrometeoroids * Vacuum of space ## Footnote These hazards pose risks to spacecraft and life support systems.
279
What are the **Offensive Space Operations**?
* Target adversary's space capabilities * Use reversible and nonreversible means ## Footnote Operations may include actions to deceive, disrupt, or destroy adversary capabilities.
280
What is the mission of **NAVIFOR**?
* Generate agile and technically superior IW forces ## Footnote Ensures Navy can decisively deter, compete, and win.
281
What are the three core capabilities of **NAVIFOR**?
* Assured Command and Control * Integrated Fires * Battlespace Awareness ## Footnote These capabilities ensure effective operations across multiple domains.
282
What historical event led to improvements in operational security for IW assets?
Attack on USS LIBERTY ## Footnote The attack emphasized the need for better integration of intelligence and operational awareness.
283
What was the significance of the **Battle of Midway**?
* Critical turning point in the Pacific Theater * Demonstrated the value of timely, accurate intelligence ## Footnote Led to the establishment of the Information Warfare Community.
284
What was the **outcome** of the ship capture involving 83 crew members?
* One killed during the attack * Rest held captive for 11 months ## Footnote This incident highlighted vulnerabilities in U.S. cryptologic and intelligence systems.
285
What major breach occurred due to the ship capture?
* Breach of U.S. cryptologic and intelligence systems * Forced overhaul of communications security procedures * Development of the Emergency Destruction Plan (EDP) ## Footnote These changes were crucial for improving national security.
286
What is known as **Operation Overlord**?
The D-Day landing on June 6th, 1944 ## Footnote It was the largest amphibious invasion in history aimed at liberating Western Europe from Nazi occupation.
287
What was the purpose of **Operation Bodyguard**?
* Deceive Germans about invasion location * Use false radio traffic * Employ double agents and dummy equipment ## Footnote Specifically, it aimed to convince the Germans that the invasion would occur at Pas de Calais.
288
What significant advantage did Allied codebreakers gain during D-Day?
* Broke the German Enigma code * Gained insights into German troop movements and defenses ## Footnote This intelligence was critical for the success of the invasion.
289
What was the **Purple Code**?
Allied codename for a Japanese diplomatic cipher machine ## Footnote It was used for diplomatic communications and revealed Japanese intentions before and during WWII.
290
Who led the American cryptologists that reverse-engineered the **Purple Code**?
William Friedman ## Footnote They broke the code in 1940, prior to the attack on Pearl Harbor.
291
What does the term **On-the-Roof Gang** refer to?
A group of U.S. Navy radiomen and cryptologists ## Footnote They were trained in radio intercept and communications intelligence, marking the foundation of U.S. Navy cryptologic warfare.
292
What is the purpose of the **Command Language Program of the Year** award?
Recognizes exceptional Command Language Program (CLP) enhancing mission readiness ## Footnote Criteria include effective resource use, innovation, and demonstrated improvement in language readiness.
293
What are the criteria for the **Language Professional of the Year** award?
* Significant contributions to curriculum development * Exceptional performance in managing language programs * Innovation in language education * Mentorship of linguists * Impact on mission readiness ## Footnote This award honors outstanding language program managers or instructors.
294
What does the **Linguist of the Year** award recognize?
An individual linguist demonstrating exceptional skills and contributions ## Footnote Criteria include superior performance on language tests and contributions to mission success.
295
What is the purpose of the **Foreign Language Excellence Award**?
Acknowledges excellence in foreign language proficiency ## Footnote Criteria include high proficiency scores and significant contributions using language skills.
296
What ratings comprise the **Information Warfare Community (IWC)**?
* CTN (Cryptologic Technician - Networks) * CTR (Cryptologic Technician - Collection) * CTI (Cryptologic Technician - Interpretive) * CTM (Cryptologic Technician - Maintenance) * CTT (Cryptologic Technician - Technical) * IS (Intelligence Specialist) * IT (Information Systems Technician) * AG (Aerographer's Mate) ## Footnote Each rating focuses on specific aspects of information warfare.
297
What officer communities comprise the **IWC**?
* 1800 – Oceanography Officer * 1810 – Cryptologic Warfare (CW) Officer * 1820 – Information Professional (IP) Officer * 1830 – Intelligence Officer * 1840 – Cyber Warfare Engineer (CWE) ## Footnote Includes both officer and warrant officer designators.
298
What languages are included in **Group 1 - Highest Priority Languages**?
* Arabic (NEC 9ARB) * Chinese (Mandarin) (NEC 9CBA / 9CBM) * Korean (NEC 9KMP) * Persian-Farsi (NEC 9PTR) * Russian (NEC 9RUS) ## Footnote These languages are critical for national defense and intelligence missions.
299
What is the mission of the **Naval Information Warfare Development Center (NIWDC)**?
Advance Information Warfare (IW) readiness ## Footnote It develops, integrates, and standardizes IW tactics, techniques, and procedures.
300
What is the role of the **Naval Communications Security Material System (NCMS)**?
Central Office of Record for Communications Security (COMSEC) accounts ## Footnote It oversees handling, distribution, and compliance with cryptographic security policies.
301
What is the mission of the **Navy and Marine Corps Spectrum Center (NMSC)**?
Central authority for electromagnetic spectrum management ## Footnote It ensures compliance with spectrum regulations and supports operational readiness.
302
Who was the first **AGCM**?
Lee Rork in 1958 ## Footnote This marked a significant milestone in the history of the Aerographer's Mate rating.
303
When were the first known aerograph flights in U.S. Navy meteorology conducted?
July 1919 ## Footnote This was an early step in integrating meteorology into naval operations.
304
What are some ways data is collected in the **Naval Oceanography Operating Concept**?
* Survey ships and research vessels * Buoys and drifting floats * Unmanned systems (UUVs/USVs/AUVs) * Space-based remote sensing (Satellites) * Shipboard and airborne METOC observations * Deployable expeditionary teams ## Footnote These methods ensure comprehensive environmental data collection.
305
What is the role of the **United States Naval Observatory (USNO)**?
Determines positions and motions of celestial objects ## Footnote It provides astronomical data and maintains the Master Clock for the United States.
306
When was the **Office of Naval Intelligence (ONI)** established?
March 23rd, 1882 ## Footnote It was created to collect and disseminate information to support naval modernization.
307
Who founded the **ONI**?
Navy Lieutenant Theodorus Bailey Myers Mason ## Footnote He was the first Chief Intelligence Officer of ONI.
308
When was the **ONI** established?
March 23rd 1882 ## Footnote The ONI was created to serve as an intelligence office for the U.S. Navy.
309
What was the purpose of establishing the **ONI**?
To collect and disseminate information on technological developments abroad to support the modernization of the US Navy and increase naval superiority ## Footnote It is the oldest member of the U.S. Intelligence Community.
310
Who founded the **ONI**?
Navy Lieutenant Theodorus Bailey Myers Mason ## Footnote He was the founder and first Chief Intelligence Officer of ONI.
311
Who officially established the **ONI** through General Order No. 292?
William H. Hunt ## Footnote His actions formalized the establishment of the ONI.
312
What does the term **'dual-hatted'** refer to in the context of the ONI Commander?
Serving in two distinct capacities: * Commander of Naval Intelligence * Director of Naval Intelligence ## Footnote This individual leads both the naval intelligence community and serves as the principal intelligence advisor to the Chief of Naval Operations.
313
What is the function of the **Farragut Technical Analysis Center**?
Provides strategic scientific and technical intelligence (S&TI) analysis of: * Foreign technologies * Sensors * Weapons * Platforms * Combat systems * C4ISR * Cyber capabilities ## Footnote Named for Admiral David Farragut, it conducts ONI's foreign materiel exploitation and signal intelligence analysis.
314
What does the **Hopper Global Communications Center** provide?
Information services that support global maritime and intelligence operations ## Footnote Named for Rear Admiral Grace Hopper, it assists in the integration, testing, fielding, and maintenance of advanced technologies utilized by ONI.
315
What is the role of the **Kennedy Maritime Analysis Center**?
Provides intelligence on potential threats posed by asymmetrical warfare to: * Navy Special Warfare * Navy Expeditionary Combat Command forces ## Footnote Named for President John F. Kennedy.
316
What is the responsibility of the **Nimitz Warfare Analysis Center**?
Responsible for: * Maritime Domain Awareness (MDA) * Global Maritime Intelligence Integration (GMII) ## Footnote Named for Fleet Admiral Chester W. Nimitz, it maintains the U.S. Navy's warfighting superiority.
317
What does the **Brooks Center for Maritime Engagement** do?
Assimilates subject matter expertise with publicly available information to address strategic priorities concerning: * Security threats to the global maritime environment ## Footnote Named for Rear Admiral Thomas A. Brooks.
318
When was the **FCC** established?
January 29, 2010 ## Footnote Created to deter and defeat aggression and ensure freedom of action in cyberspace.
319
What was the original establishment date of **Cl OF**?
May 20th, 1943 ## Footnote Cl OF was initially created during World War II.
320
What was **ClOF's mission during World War II**?
* Global anti-submarine warfare coordination * Focused on destruction of enemy submarines * Provided targeting data for anti-submarine operations ## Footnote Primarily operated in the Atlantic and Indian Oceans.
321
Why was the modern **Cl OF** recommissioned?
* Serve as the numbered fleet for U.S. Fleet Cyber Command * Exercise operational control of naval forces * Coordinate with naval, coalition, and Joint Task Forces ## Footnote To execute cyber, electronic warfare, information operations, and signal intelligence missions.
322
What is the mission of **U.S. FCC**?
Plan, coordinate, integrate, synchronize, direct, and conduct cyberspace operational activities ## Footnote Ensure freedom of action across Navy warfighting domains and deny it to adversaries.
323
What are the **ADCON** and **OPCON** responsibilities of **FCC**?
* ADCON over naval cyber forces * Handles organizing, training, and equipping * Dual-hatted as CIOF controlling OPCON ## Footnote They are the same person.
324
What is the mission of **Cl OF**?
Plan, coordinate, integrate, synchronize, direct, and conduct cyberspace operational activities ## Footnote Ensure freedom of action across Navy's warfighting domains.
325
What is **Cl OF's role** regarding Cryptologic Signals Intelligence operations?
Primary organization for directing, executing, and supporting SIGINT operations across all AORs ## Footnote Part of the National Security Agency/Central Security Service.
326
Identify **CTF 1010** and its role under **Cl OF**.
CTF 1010 - NAVNETWARCOM (NNWC) ## Footnote Role: Operate, secure, and maintain information systems technology.
327
Identify **CTF 1020** and its role under **Cl OF**.
CTF 1020 - Navy Cyber Defense Operations Command - NCDOC ## Footnote Role: Provide threat-informed network-centric defensive operations.
328
Identify the locations and roles of **CTF 1040** and **CTF 1050** under **Cl OF**.
CTF 1040 - NIOC Texas, Joint Base San Antonio-Lackland, Texas, US Southern Command (SOUTHCOM) * CTF 1050 - NIOC Georgia, Fort Gordon, Georgia, US Central Command (CENTCOM) ## Footnote Each CTF supports specific combatant commands.
329
Identify the location and role of **CTG 101** under **Cl OF**.
CTG 101 - NIOC Colorado, Buckley Space Force Base, Aurora, Colorado ## Footnote Hosts the Navy Integrated Fires Element (NIFE) and the Navy Unmanned Systems Team (NUST).
330
What is the mission of **JFHQ-C**?
To operate and defend networks, data, and weapons systems ## Footnote Deliver integrated offensive and defensive cyberspace effects.
331
What is the purpose of the **MOC**?
Support commander's decision-making and operational command and control ## Footnote A warfighting capability belonging to the Navy component commander.
332
Define the role of **CNIFR** as an Echelon III command.
Headquartered in Suffolk, VA, provides skilled, trained, and ready Information Warfare capabilities ## Footnote Operates under the direct authority of US Fleet Forces Command.
333
What is the **Reserve Employment Readiness Program**?
Helps military personnel and families find and prepare for employment ## Footnote Provides resources for job searching and career planning.
334
What is the focus of **Junior Enlisted Professional Development**?
Equipping pay grades E-1 to E-4 with skills and knowledge ## Footnote Emphasizes continuous learning and achieving occupational proficiency.
335
What is the purpose of **NROWS**?
Official system for issuing and managing Navy Reserve orders ## Footnote Particularly for Annual Training (AT), Active Duty for Training (ADT), and Individual Duty Training Travel (IDTT).
336
What is an **Embed Sailor**?
A Reserve Sailor assigned to an active duty command ## Footnote Helps maintain the command's readiness and operations.
337
What is the primary mission of a **WDC**?
Develop and integrate innovative solutions to naval warfare challenges ## Footnote Enhance current and future warfighting capabilities.
338
What is the **Mobilization Command** in the Navy Reserve?
Navy Reserve Region-level headquarters overseeing multiple NRCs ## Footnote Ensures regional mobilization readiness and provides support to Fleet commanders.
339
What is the primary mission of a **Warfighting Development Center (WDC)**?
Develop and integrate innovative solutions to complex naval warfare challenges ## Footnote Enhances current and future warfighting capabilities.
340
What is the mission of **NIWDCHQ**?
Optimizes Information Warfare (IW) by delivering IW planning expertise ## Footnote Located in Norfolk, Virginia, it is an Echelon III command under NAVIFOR.
341
What is the mission of **NIWDC West**?
Provides tailored IW expertise and training support to fleet commanders in the Pacific theater ## Footnote Located in San Diego, CA.
342
What is the mission of **NIWTG**?
Train, support, and deploy Naval Forces to execute the IW mission ## Footnote Headquartered in Norfolk, it manages subordinate commands and fleet intelligence detachments.
343
What is the mission of **EWD**?
Conduct R&D in support of the Navy's tactical EW requirements ## Footnote Located in Washington DC, it comprises various branches focused on electronic warfare.
344
What role does **NIWDC** play in operational support?
Embeds IW subject matter experts with fleet and joint commanders ## Footnote Provides expertise during exercises and real-world operations.
345
What is the **Warfare Tactics Instructor** program?
A ten-week advanced training course for Information Warfare Tactics Instructors (WTIs) ## Footnote Run by NIWDC's Naval Information Warfare Advanced Weapons School.
346
What is the role of the **Navy Warfare Library**?
Centralized repository for all U.S. Navy doctrinal and tactics publications ## Footnote Ensures doctrine and TTPs are authoritative and accessible.
347
Define **NDP**.
Naval Doctrine Publication describing integrated force operations ## Footnote Bridges strategic and operational levels of warfare.
348
What does **NWP** stand for?
Navy Warfare Publications containing service doctrine focused on force employment ## Footnote Provides guidance on warfare areas and mission areas.
349
What are **NTTP/MTTP**?
Navy Tactics, Techniques, and Procedures and Multi-Service Tactics, Techniques, and Procedures ## Footnote Provide specific guidance for naval missions.
350
What is the purpose of **NTRP**?
Navy Tactical Reference Publications containing data and principles supporting doctrine ## Footnote Intended for planners, operators, and technicians.
351
What does **FLTNOC** stand for?
Fleet Network Operations Center ## Footnote Provides critical IP services to the Fleet and acts as regional gateways.
352
What is the function of **DISA**?
Defense Information Systems Agency acting as a technical advisor to the DOD CIO ## Footnote Provides IA protective measures and capabilities.
353
What does **NCDOC** do?
Navy Cyber Defense Operations Command coordinates defense of Navy networks ## Footnote Responsible for Computer Network Defense (CND) missions.
354
What is the role of **GNOC**?
Global Network Operations Center directs operations and security of Navy's DoD Information Network ## Footnote Supports strategic, operational, and tactical missions.
355
What is the purpose of **NCTAMS/NCTS**?
Provide C4I support and Navy IT infrastructure for voice and data communications ## Footnote Strategically located globally within specific Areas of Responsibility.
356
What should be done in the event of **electronic spillage**?
Inform SSO, ISSO, ISSM, and then CSSP (NCDOC) ## Footnote This ensures proper handling of the incident.
357
What is **ARPANET**?
Advanced Research Projects Agency Network developed to create a resilient computer network ## Footnote Launched in 1969, it facilitated the sharing of resources among research institutions.
358
Who is **RADM Grace Hopper**?
Rear Admiral who invented the compiler and contributed to COBOL ## Footnote Coined the terms 'bug' and 'debug'.
359
What does **UHF (DAMA/MUOS)** provide for tactical users?
* Narrowband voice circuits * TTY circuits * Support for submarines and expeditionary forces ## Footnote UHF is essential for communication in tactical environments.
360
What type of communication does **SHF (DSCS/WGS)** support?
* High-data-rate IP trunks * NIPR/SIPR * JWICS * Strike-group C2 * Video teleconferencing ## Footnote SHF is crucial for high-bandwidth communication needs.
361
What are the characteristics of **EHF I AEHF**?
* Protected links * Anti-jam capabilities * Low-probability-of-intercept * Designed for nuclear-hardened strategic communications ## Footnote EHF is vital for secure military communications.
362
What does **NCTAMS** manage?
* Satellite access requests (SARs/SAAs) * Channel assignments * Troubleshooting ## Footnote NCTAMS plays a key role in satellite communication management.
363
What types of **phone services** are provided?
* DSN/DRSN trunks for secure voice * Non-secure voice * Ship-Shore Phone Patch (SSPP) ## Footnote SSPP converts RF circuits into dial-tone when SATCOM is down.
364
What is **ONE-NET**?
* OCONUS Navy Enterprise Network * Common and secure IT infrastructure * Based on Navy-Marine Corps Intranet (NMCI) architecture ## Footnote ONE-NET is designed for interoperability with various IT systems.
365
What does **NMCI** stand for?
Navy Marine Corps Intranet ## Footnote NMCI supports strategic objectives and transitions the Navy to a net-centric environment.
366
What is the purpose of **IT21**?
* Security posture for IT-21 FLTNOC * Independently administered * Centrally governed by CNO/NETWARCOM ## Footnote IT21 focuses on maintaining a secure network environment.
367
What is the role of **FSET**?
* Deployable senior systems engineers * Embedded with ships, strike groups, and shore commands * Keep C4I systems operational ## Footnote FSET is crucial for maintaining communication systems at sea.
368
What does **PMW** stand for?
Program Manager Warfare ## Footnote PMW ensures project success and meets operational needs throughout the lifecycle.
369
What is the role of **DISA**?
* Operate & defend the DoD Information Network * Acquire & deliver enterprise IT/Cyber solutions * Provide 24/7 cyber-defense & network operations ## Footnote DISA is essential for maintaining the integrity of military communications.
370
List the services provided by **DISA** to DOD/DON.
* DISN IP/MPLS circuits * SATCOM & Teleport gateways * Joint Regional Security Stacks (JRSS) * Classified & Unclassified VoIP * VTC Services * Enterprise ICAM & DoD PKI root ## Footnote These services support various communication needs within the Department of Defense.
371
When was the **Navy Cyber Defense Operations Command (NCDOC)** established?
2006 ## Footnote NCDOC was formed from NAVCERT, which became a 24/7 operation in 2000.
372
What is the **mission statement** of NCDOC?
Coordinate, monitor, and oversee the defense of Navy computer networks and systems ## Footnote Provide Cyber Security Service Provider (CSSP) services and execute Defensive Cyberspace Operations (DCO).
373
List the **responsibilities** of NCDOC.
* Warning Intelligence * Vulnerability Assessment and Assistance * Attack Sensing and Warning (AS&W) * Endpoint Protection and Forensic Analysis * Countermeasures * Mission Optimization and Automation * Incident Handling * Incident Response (IR) * Cyberspace Threat Hunting * Cyber Threat Emulation (CTE) * Defensive Cyberspace Operations Fleet Support * Planning and Policies * Capability Sustainment ## Footnote These responsibilities ensure the cybersecurity of Navy networks.
374
NCDOC is tasked by **USCYBERCOM** to maintain what posture?
DCO posture for the Navy within the DoDIN ## Footnote NCDOC executes DCO as assigned by Commander, US Fleet Cyber Command.
375
What is the **location** of CTG 1020.1?
Suffolk, VA ## Footnote CTG 1020.1 conducts a 24/7 watch floor and continuous monitoring of Department of the Navy Networks.
376
What does NCDOC monitor?
* Next Generation Enterprise Networks (NGEN) * OCONUS Navy Enterprise Network (ONE-NET) * Afloat (IT-21) * Bureau of Medicine and Surgery (BUMED) * Systems Commands (SYSCOMs) * Excepted (legacy) networks * Naval War College * U.S. Naval Academy * Naval Postgraduate School ## Footnote NCDOC oversees the defense of various Navy networks, systems, applications, and data.
377
What is the role of the **Battle Watch Captain**?
Represents the NCDOC Commanding Officer when the CO is not in the building ## Footnote Reports to the Operations Director on operational matters for CTF 1020.
378
What are the **capabilities** of the Navy Red Team?
* Emulate adversary exploitations * Highlight vulnerabilities * Demonstrate operational impact ## Footnote This helps improve joint operations in cyberspace and the cybersecurity posture of the DoDIN.
379
Define **JETDS**.
Joint Electronics Type Designation System ## Footnote A standardized military system used to identify electronic equipment.
380
What is the function of a **Signals Descriptor File/Signal Identification Module**?
Stores technical fingerprints of known emitters and matches incoming signals ## Footnote This helps identify what is being received.
381
What is the role of **AN/SSX-1**?
Ultra-fine 'fingerprint' collection of radar/comm emitters ## Footnote Supports threat attribution and lawful intercept.
382
What does the **PCMS** stand for?
Passive Counter-Measures System ## Footnote It is a radar-absorbent tile kit used on various naval platforms.
383
What is the **mission** of the Navy Cyberspace Defense Team?
Proactively search for indications of compromise to prevent or minimize damage ## Footnote This is based on available intelligence or signs of potential future threats.
384
What are the **limitations** of the Signals Descriptor File?
* Accuracy depends on descriptor currency and quality * Library growth increases storage and search time * Closely related emitters can be misclassified ## Footnote These limitations affect the effectiveness of the system.
385
What is the **MK53** used for in USN surface ships?
Trainable launcher for Nulka (Mk 234) active RF decoy ## Footnote Costly and takes a lot of deck space; used on CGs, DDGs, LHD/LHA.
386
What does the **MK59** system consist of?
IDS-300 inflatable radar reflector ## Footnote Sea-state >4 reduces effect; used on DDGs.
387
Describe the **MK 234 NULKA**.
Rocket-hovering RF repeater, effective compared to seeker ECCM ## Footnote The rounds are launched as decoys to trick incoming missiles.
388
What is the role of the **JTT - Joint Tactical Terminal**?
Integrated Broadcast Service (IBS) transmit/receive of threat, ISR and Blue-Force data ## Footnote Platforms include all Aegis CG/DDG, CVN, LHD, P-8A, EP-3E, E-2D.
389
What does **GCCS-M - Global C2 System-Maritime** do?
Correlate, fuse, maintain track info and displays as a tactical picture (COP) ## Footnote Shows the location of air, sea, land units anywhere in the world.
390
What are the capabilities of **DCGS-N**?
* Multi-INT fusion * Automated tasking * Containerized apps * Cloud deployable ## Footnote Platforms include CVN, LHD, CG, DDG, Intel sites ashore.
391
What is the **AN/SSQ-137 SSEE Increment E** used for?
Modular SIGINT/ESM suite replacing outboard receivers ## Footnote Platforms include DDGs, CGs, LSDs.
392
What does the **AN/SSQ-130 SSEE Increment F** add to the system?
Automatic geolocation and targeting ## Footnote Full benefit requires cooperative ships/air assets for triangulation.
393
What is the purpose of **RADIANT MERCURY**?
Cross-Domain Solution (guard) for moving data between TS/SCI, Secret and Unclass enclaves ## Footnote Embedded in GCCS-M, DCGS-N, CVN LANs.
394
What is the role of **AN/BLQ-10**?
Organic ES/ESM for subs ## Footnote Detects, classifies, geolocates radar and comms emitters.
395
What does **RADIANT VALKYRIE LITE** do?
Lightweight cross-domain / data-movement appliance ## Footnote Bridges TS/SCI BLQ-10 or other SIGINT feeds to Secret and coalition enclaves.
396
What is the **ENTR - Embedded National Tactical Receiver**?
Hand-sized IBS receiver for mobile crews ## Footnote Receives up to four UHF SATCOM channels.
397
What are the components of the **CHROMATIC REAPER I KRAKEN I SIREN / SHADE** system?
* REAPER: Data-wrangler * KRAKEN: High-fidelity recorder * SIREN: Anomaly detector * SHADE: Playback viewer ## Footnote Extends BLQ-10 into a cloud-like analytics environment.
398
What is the role of **AN/ALQ-190**?
Expendable RF counter-measure ## Footnote Lays wide radar-opaque clouds for self-screening.
399
What does **AN/ALQ-142** do?
Helicopter ESM to extend shipboard SLQ-32 coverage ## Footnote Passively detects/ IDs radar emitters.
400
What is the purpose of **AN/ALQ-210**?
Modern airborne ESM I RWR for multi-mission helos ## Footnote 360° DF with BLINT-quality pararnetrics.
401
What does **AN/ALQ-218** detect?
Passive RWR/ESM/ELINT sensor ## Footnote Works with Next-Gen Jammer.
402
What is the function of **AN/ALE-43**?
In-flight 'cut-to-length' chaff dispenser ## Footnote Affects radar only.
403
What does the **STORY BOOK Joint Signal Processor** do?
Special-signals acquisition, fusion and fast SIGINT cueing for EP-3E ## Footnote Collects 'pro-forma/emit-specific' signals.
404
What is the role of **DMSS (Deployable Mission Support System)**?
Roll-on cyber-operations 'hunt-kit' for CPT detachments ## Footnote Self-contained rack of servers & sensors.
405
What does **DRT - Digital Receiver Technology** provide?
Portable SDR/IF capture receivers for COMINT/ELINT ## Footnote Requires external laptops for analysis.
406
What is the purpose of **GALE - Generic Area Limitation Environment**?
All-source SIGINT mapping and geo-analysis toolkit ## Footnote Fuses ELINT parametrics with SATRAN/IBS.
407
What does **CCOP** stand for?
Cryptologic Carry-On Program ## Footnote Provides on-demand SIGINT/ESM capability.
408
Define **EW**.
Electromagnetic Warfare. Military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy. ## Footnote EW is crucial for gaining and maintaining information superiority on the battlefield.
409
What are the **three roles** of EW in military operations?
* Electronic attack * Electronic protection * Electronic support ## Footnote These roles enhance situational awareness and disrupt enemy capabilities.
410
State the objective of EW **afloat**.
Ensure spectrum superiority at sea by degrading or denying adversary sensors and communications while protecting the ship's own systems. ## Footnote This preserves maneuver and battle-space awareness.
411
State the objective of EW **ashore**.
Establish and maintain electromagnetic spectrum control in the littoral and shore-based environment. ## Footnote This protects critical networks and supports joint force operations.
412
What is the role of the **IWC**?
Oversees and integrates all information warfare functions, including EW, cyber, OPSINT, and IO. ## Footnote Allocates IW assets and ensures coordination across domains.
413
What does the **EW Control Ship** do?
Serves as the afloat focal point for EW planning and execution. ## Footnote Manages ship-board EW sensors and directs EW teams during operations.
414
What is the function of **Quebec Control**?
Acts as the tactical net control station for EW operations. ## Footnote Assigns frequencies and monitors spectrum to prevent fratricide.
415
What is the role of the **Jamming Control Authority**?
Authorizes, schedules, and terminates jamming missions. ## Footnote Evaluates requests against ROE and issues clearance to jamming units.
416
Define **ES**.
Electronic Support. ## Footnote Involves detecting, intercepting, and analyzing electromagnetic emissions.
417
What are the objectives of **ES**?
* Detect and Intercept * Identify and Classify * Locate and Geolocate * Provide Threat Warning & Spectrum Awareness * Enable and Support EW/Cyber Operations ## Footnote These objectives support both offensive and defensive operations.
418
True or false: **ES** is a real-time, tactical subset of EW.
TRUE ## Footnote ES focuses on immediate detection and reporting for jamming and force protection.
419
What does the term **Racket** refer to in EW voice reports?
Voice report indicating an intercepted radar emitter. ## Footnote Includes basic radar parameters needed to classify the radar.
420
What does the term **Rent** refer to in EW voice reports?
Report of intercepted communications-type emissions. ## Footnote Covers frequency, modulation, and identifying aspects.
421
What does the term **Volcano** signify in EW voice reports?
Voice brevity code for a detected hostile anti-ship missile. ## Footnote Used to warn of an inbound missile threat.
422
What is the primary ES system used on **Air** platforms?
AN/ALQ-218(V) on EA-18G Growlers. ## Footnote Detects, identifies, and geolocates threat radar and communications emitters.
423
What is the primary ES system used on **Surface** platforms?
AN/SLQ-32(V) suite. ## Footnote Scans HF through SHF bands to warn of incoming missile-guidance and surveillance radars.
424
Define **EA**.
Electronic Attack. ## Footnote Offensive use of electromagnetic energy to degrade or destroy adversary systems.
425
What is **electromagnetic jamming**?
Deliberate emission of radiofrequency energy to interfere with an adversary's radar or communications. ## Footnote Raises the noise floor or introduces false signals.
426
What is the difference between **disruption** and **denial** in EA?
* Disruption: Temporary degradation of capability * Denial: Complete prevention of use of the spectrum ## Footnote Disruption forces reduced performance, while denial prevents use entirely.
427
What does **SEAD** stand for?
Suppression of Enemy Air Defenses. ## Footnote Operations aimed at neutralizing adversary surface-to-air missile systems.
428
What are the **objectives of EP**?
* Maintain Availability * Enhance Resilience * Prevent Detection * Support Deconfliction * Enable Mission Continuity ## Footnote EP actions safeguard friendly use of the electromagnetic spectrum.
429
What are **ASCMs**?
Anti-Ship Cruise Missiles. ## Footnote Many ASCMs incorporate EP features to maintain effectiveness under enemy jamming.
430
What are the **EP capabilities** within **radar systems**?
* Frequency agility * Spread-spectrum techniques * Pulse-compression techniques * Low-sidelobe antennas ## Footnote These features help radar systems maintain effectiveness under enemy jamming.
431
What are the **EP features** of **Anti-Ship Cruise Missiles (ASCMs)**?
* Built-in EP to defeat jamming * Frequency-hopping * Wideband receivers * Home-on-jam (HOJ) modes ## Footnote These features allow ASCMs to follow targets despite enemy jamming efforts.
432
Define the **Physical-Network** layer in **Cyberspace Operations**.
Consists of IT devices and infrastructure providing storage, transport, and processing of information ## Footnote Includes hardware and infrastructure essential for cyberspace operations.
433
Define the **Logical-Network** layer in **Cyberspace Operations**.
Elements of the network abstracted from the physical network, based on logic programming ## Footnote Relationships are not tied to specific physical links but to logical addressing.
434
What is a **Cyberspace-Persona**?
Digital representations of actor or entity identity in cyberspace ## Footnote Consists of network user accounts and their relationships, complicating attribution of actions.
435
What are the **mission areas** of **Cyberspace Operations**?
* Department of Defense Information Network Operations * Defensive Cyberspace Operations (DCO) * Offensive Cyberspace Operations ## Footnote These areas encompass the security and operational aspects of cyberspace.
436
What does **DCO** stand for in **Cyberspace Operations**?
Defensive Cyberspace Operations ## Footnote Aims to defend blue cyberspace from imminent or active threats.
437
What are the two forms of **DCO** missions?
* DCO-Internal Defensive Measures * DCO-Response Actions ## Footnote Each form has distinct operational contexts and permissions.
438
Define **Cyberspace Security**.
Actions taken to reduce vulnerability to malicious cyberspace activity ## Footnote Includes preventing unauthorized access and ensuring system integrity.
439
What is **Cyberspace Exploitation**?
Actions that do not create attack effects but prepare for future military operations ## Footnote Includes access creation and intelligence activities.
440
What is a **Cyberspace Attack**?
Actions that create noticeable denial effects in cyberspace ## Footnote Includes actions to deny, degrade, disrupt, or destroy.
441
What are **CPCONs**?
Cyberspace protection conditions that employ risk-informed decision making ## Footnote Focus on protecting capabilities vital to operational readiness.
442
What is the focus of **Title 10** in cyberspace operations?
National defense with a role in cybersecurity ## Footnote Key to manning, training, and equipping US forces for military operations.
443
What does **CCMF** stand for?
Cyber Combat Mission Force ## Footnote Conducts cyberspace operations to support combatant commanders.
444
What is the role of the **Cyber Protection Force (CPF)**?
Conducts cyberspace operations for internal defense of the DODIN ## Footnote Comprises cyberspace protection teams organized to defend assigned cyberspace.
445
Define **Defense in Depth**.
A cybersecurity strategy employing multiple overlapping security controls ## Footnote Aims to enhance overall security through redundancy.
446
What is an **Advanced Persistent Threat (APT)**?
A prolonged cyberattack where an unauthorized user remains undetected ## Footnote Typically carried out by well-funded, state-sponsored groups.
447
What is **Mission Relevant Terrain Cyber**?
Portions of cyberspace impacting a specific mission ## Footnote Critical for identifying cyber assets that must be defended.
448
What does **CCIR** stand for?
Commander's Critical Information Requirements ## Footnote Information needed for timely and effective decision-making.
449
What is **Cyber Operations**?
Actions conducted in cyberspace to achieve military objectives ## Footnote Includes offensive, defensive, and intelligence operations.
450
What is a **Cyber effect**?
The result of an action taken in cyberspace impacting information or systems ## Footnote Can include disruption, degradation, or manipulation of data.
451
What is the role of **Fleet Cyber Command**?
Coordinates and conducts activities for DODIN security and operations ## Footnote Provides situational awareness against foreign cyberspace threats.
452
What does **NAVSPACE** manage?
Navy space capabilities in support of maritime operations ## Footnote Ensures availability and security of critical space-based systems.
453
What is the role of **USCYBERCOM**?
Provide direct support expertise and reachback capability ## Footnote USCYBERCOM operates under the supervision of CCMD-associated joint force headquarters.
454
What does **NNWC** stand for?
Naval Network Warfare Command ## Footnote NNWC provides command and control of Navy networks, delivering secure and reliable network services to warfighters.
455
What is the primary function of **DISA**?
Executes DODIN operations and defensive cyberspace operations-internal defensive measures (DCO-IDM) ## Footnote DISA operates at the global and enterprise level within DISA-operated portions of the DODIN.
456
What does **MOC** integrate into maritime planning?
Cyberspace operations ## Footnote MOCs ensure cyber considerations are embedded in operational plans, especially during joint and naval missions.
457
What is the function of **NCDOC**?
Detects, monitors, analyzes, and responds to cyber threats against Navy networks ## Footnote NCDOC conducts defensive cyberspace operations to protect Navy information systems and ensure mission assurance.
458
What does **NSA** provide?
SIGINT and cybersecurity support ## Footnote NSA helps develop cryptologic capabilities and partners with military cyber units.
459
What is the role of **CNO** in Navy cyber operations?
Establishes Navy cyber priorities, resources, and strategic alignment ## Footnote CNO coordinates with national and joint cyber efforts.
460
What is the **mission** of Fleet Cryptology?
* Deliver competitive outcomes in all domains of warfare * Support and defend US interests * Operate as part of the Information Warfare Community * Optimize combat power through Assured Command and Control, Battlespace Awareness, and Integrated Fires ## Footnote The mission emphasizes the integration of Cyberspace Operations, Signals Intelligence, and Electronic Warfare.
461
What is the **vision** of Fleet Cryptology?
* Deliver Outcomes * Maximize Lethality * Maneuver Danger Close * Integrate * Operate Forward * Create and Control Maneuver Advantage * Manage Risk * Be Bold * Be Force Multipliers * Be Exceptional * Be Resilient * Build Relevant Expertise * Aggressively Manage Our Talent ## Footnote The vision outlines the strategic goals and operational principles for Fleet Cryptology.
462
What are the roles and responsibilities of the **Fleet Commander**?
* Supports intel requirements within AOR * Responsible for supporting intel requirements of forces assigned for operations ## Footnote The Fleet Commander plays a crucial role in ensuring that intelligence needs are met for operational success.
463
What does a **Numbered Fleet Cryptologist** do?
* Assigns, tasks, prioritizes, and maintains cryptologic resources * Provides technical direction to subordinate task force CRCs ## Footnote This role is essential for managing cryptologic support effectively.
464
What is the responsibility of a **Numbered Fleet CRC**?
* Manages all aspects of cryptologic asset tasking * Oversees coverage plans, personnel augmentation, and direct support operations ## Footnote The CRC ensures that cryptologic operations are aligned with mission objectives.
465
What is the role of the **Information Warfare Commander**?
* Serves as the single staff lead for all cryptologic, electronic warfare, cyber, and OPINT activities * Reports to the CSG/ARG Commander ## Footnote This position is critical for coordinating various information warfare efforts.
466
What does the **Assured C2 Officer** ensure?
* Integrity, availability, and resilience of command-and-control networks * Implements electromagnetic protection measures ## Footnote This role is vital for safeguarding communication networks against electronic attacks.
467
What is the purpose of the **Cryptologic Concept of Operations Plan (CCP)**?
A strategic document outlining how cryptologic capabilities will be employed in support of fleet operations ## Footnote The CCP defines roles, responsibilities, and resource allocation for effective operations.
468
Define **Threat Warning**.
Time-sensitive intelligence that alerts forces to immediate or imminent threats ## Footnote Threat warnings enable rapid defensive or evasive action.
469
Define **Finished Intelligence Reports**.
Fully analyzed, validated, and contextualized products providing a deeper understanding of adversary capabilities ## Footnote These reports support long-term decision-making and strategic planning.
470
What is the difference between **Threat Warning** and **Finished Intelligence Reports**?
* Threat Warning: Urgent and tactical, focused on real-time protection * Finished Intelligence: Broader and strategic, supporting long-term decision-making ## Footnote Both types of intelligence support Maritime Indications and Warning (I&W).
471
What does the **SPECEVAL** team do?
* Validates and tunes the aircraft's SIGINT/ELINT suites * Ensures accurate data for missions ## Footnote SPECEVAL operators play a crucial role in preparing aircraft for effective intelligence collection.
472
What is the role of the **Battle Watch Captain (BWC)**?
* Responsible for overall supervision of the watch floor * Coordinates tasking and ensures timely, accurate reporting of SIGINT/ELINT ## Footnote The BWC serves as the primary point of contact for fleet cryptologic requests.
473
What does **RFS** stand for?
Request for Forces ## Footnote It is a formal request for personnel with unique capabilities for planned missions.
474
What is the **Daily Intention Message**?
A short-term operational message providing specific cryptologic tasking and guidance for a 24-hour period ## Footnote This message ensures alignment with fleet objectives and updated intelligence priorities.
475
What is the purpose of **Fleet Electronic Support teams**?
* Coordinate installation, calibration, and upkeep of Electronic Support Packages * Provide trained cryptologic technicians and electronic-warfare specialists ## Footnote These teams ensure continuous, accurate spectrum monitoring and operational readiness.
476
What does **BFEA** stand for and what is its role?
Battle Force Electronic Attack; plans and directs organic jamming and electronic deception missions ## Footnote BFEA plays a critical role in suppressing or misleading enemy sensors.
477
What is the purpose of **intelligence** in planning, directing, conducting, and assessing operations?
To provide critical information for effective decision-making ## Footnote Intelligence is essential for commanders and staffs at all levels.
478
What are the **three levels of intelligence**?
* Strategic * Operational * Tactical ## Footnote These levels help in understanding the scope and focus of intelligence activities.
479
Define **National Disclosure Policy**.
Guidelines on sharing classified military and intelligence information with foreign entities ## Footnote It ensures protection of U.S. national security interests.
480
What does the **Department of Defense Information Network (DODIN)** include?
* Communications and computing systems * Software applications * Data and security services ## Footnote DODIN facilitates intelligence sharing and supports all DoD missions.
481
List the **functional support and production responsibilities** of the Combatant Command J-2.
* Manage shared production program * Identify, consolidate, and validate command intelligence requirements * Represent command in production forums * Coordinate tasking and assignment of production responsibilities * Submit production requirements * Develop command intelligence architecture * Oversee command production center ## Footnote J-2 is the intelligence directorate of a Joint Staff.
482
What are the **five COA criteria** in JIPOE Step 4?
* Suitability * Feasibility * Acceptability * Uniqueness * Consistency with adversarial doctrine ## Footnote These criteria help evaluate potential adversary courses of action.
483
Explain the purpose of **Joint Intelligence Preparation of the Operational Environment (JIPOE)**.
To provide a comprehensive understanding of adversary capabilities and operational factors ## Footnote JIPOE supports planning by identifying threats and opportunities.
484
What are the **four steps of the JIPOE process**?
* Define the operational environment * Describe the impact of the operational environment * Evaluate the threat and other relevant actors * Determine threat and other relevant actor courses of action ## Footnote Each step builds on the previous to create a thorough analysis.
485
What is the difference between **JIPOE** and **Intelligence Preparation of the Battlespace**?
JIPOE is strategic-level; Intelligence Preparation of the Battlespace is tactical-level ## Footnote JIPOE assesses the operational environment broadly, while the latter focuses on direct combat planning.
486
Define **information operations**.
Integrated employment of information-related capabilities to influence adversaries ## Footnote Aims to disrupt or corrupt decision-making while protecting friendly operations.
487
What are **information-related capabilities**?
Tools, techniques, or activities affecting the information environment ## Footnote These capabilities are essential for effective information operations.
488
List the **six phases of the joint targeting cycle**.
* Define End State & Commander’s Objectives * Target Development & Prioritization * Capabilities Analysis * Commander’s Decision & Force Assignment * Mission Planning & Force Execution * Assessment ## Footnote Each phase is crucial for successful targeting and operational effectiveness.
489
What is the objective of **joint planning**?
To determine how to implement strategic guidance using military capabilities ## Footnote Joint planning translates national guidance into specific operational activities.
490
What is **warning intelligence**?
Intended to detect and report time-sensitive intelligence information on foreign developments ## Footnote It forewarns of hostile actions against U.S. interests.
491
What does **counterintelligence** involve?
Activities to protect against espionage and intelligence activities by foreign entities ## Footnote It aims to disrupt or deceive adversarial intelligence efforts.
492
What is the **maintenance of countermeasures** aimed at?
Protecting the physical resources of an organization ## Footnote This includes the physical protection of people, hardware, and supporting system elements related to information management.
493
Define **Military-to-military engagements**.
* Activities for military engagement * Security cooperation * Deterrence objectives * Joint MISO applications ## Footnote Includes FID, security force assistance, humanitarian assistance, antiterrorism, and more.
494
What is **foreign intelligence disclosure**?
Authorized sharing of classified military information with foreign governments or organizations ## Footnote This process is crucial for international military cooperation.
495
Define the **Physical** category of the information environment.
Composed of command and control systems and supporting infrastructure ## Footnote Enables operations across air, land, sea, and space.
496
Define the **Informational** category of the information environment.
Information that is collected, processed, stored, disseminated, displayed, and protected ## Footnote Essential for command and control of military forces.
497
Define the **Cognitive** category of the information environment.
The mind of the decision maker and target audience ## Footnote Influenced by leadership, morale, training, and public opinion.
498
How do **rules** affect the cognitive domain of the information environment?
They tell people what is allowed and punishable ## Footnote Rules influence attention to approved information and discourage forbidden content.
499
How do **norms** influence behavior in the cognitive domain?
Guide behavior through peer approval or shame ## Footnote Norms affect what people share, trust, or ridicule online.
500
What role do **beliefs** play in the cognitive domain?
Filter new facts or rumors based on personal or cultural convictions ## Footnote Belief alignment is key to persuasion in the information space.
501
What is the role of the **IO element** in a strike group?
Acts as the non-kinetic fires coordinator ## Footnote Ensures influence, cyber, EW, and deception effects are planned and executed in coordination with kinetic operations.
502
What is the function of the **E-2C Hawkeye**?
* Early warning C2 platform * Surveillance * Coordination * Strike and interceptor control ## Footnote Acts as a communications relay with radar and detection systems.
503
What capabilities does the **P-SA Poseidon** provide?
* Maritime patrol * Anti-submarine warfare * Multi-INT sensors ## Footnote Contributes to SIGINT and MASINT collection.
504
What is the purpose of the **EP-3E**?
Signals-intelligence reconnaissance aircraft ## Footnote Intercepts and analyzes adversary radar and communications emissions.
505
What does the **MQ-4C Triton** do?
High-altitude, long-endurance ISR UAV ## Footnote Provides broad-area maritime surveillance with multi-sensor payloads.
506
What is the role of the **RC-135**?
Strategic SIGINT platform ## Footnote Collects and processes electronic emissions to support intelligence requirements.
507
What is the function of the **MQ-1A Predator**?
Medium-altitude ISR UAV ## Footnote Offers real-time video and limited signals collection for persistent surveillance.
508
What does the **EC-130H Compass Call** do?
Electronic attack aircraft ## Footnote Jams adversary command-and-control systems to disrupt enemy coordination.
509
What is the purpose of the **U-2**?
High-altitude reconnaissance aircraft ## Footnote Carries sensors for detailed imagery and electronic order-of-battle data.
510
What capabilities does the **EA-18G** provide?
* Stand-off jamming * Escort jamming * Electronic deception ## Footnote Supports SEAD operations.
511
What is the role of **CVN** in a strike group?
Flagship afloat C2 node ## Footnote Hosts a full air wing for integrated IO planning and execution.
512
What does **CG** stand for in naval operations?
Aegis-equipped surface combatant ## Footnote Supports fleet air defense and EW operations.
513
What is the function of a **DDG**?
Multi-mission warship ## Footnote Contributes to ISR and electronic protection within the carrier strike group.
514
What does **LCC** provide?
Afloat command-and-control for expeditionary forces ## Footnote Integrates IO planning and coordinates EW, cyber, and deception efforts.
515
What is the role of **LHA/LHD**?
Embarks aviation and landing forces ## Footnote Provides organic C2 and EW capabilities for amphibious operations.
516
What does **LPD** do?
Transports Marines and equipment ## Footnote Offers limited C2 and EW support for littoral IO.
517
What is the function of **LSD**?
Provides well-deck support for landing craft ## Footnote Serves as a platform for command and communications nodes.
518
What does **PC** refer to in naval operations?
Small surface combatant conducting littoral surveillance ## Footnote Equipped with EW receivers and communications intercept capability.
519
What is the role of **special operations craft**?
Covert insertion platforms ## Footnote Equipped with tactical communications and EW gear for clandestine missions.
520
What does **SSN** stand for?
Stealthy undersea platform ## Footnote Uses passive acoustic sensors for SIGINT and MASINT collection.
521
What is the purpose of **SSGN**?
Strike-capable submarine ## Footnote Supports special operations and precision fires.
522
What are **special mission aircraft**?
Tailored platforms equipped for specific ISR, SIGINT, or EW missions ## Footnote Provide dedicated support for IO objectives.
523
What is **NRO-collected/commercial imagery** used for?
Supplies strategic and tactical GEOINT ## Footnote Enables target development and battle damage assessment.
524
What is the mission of **USSOCOM**?
Develops and employs SOF for global operations ## Footnote Supports U.S. policies and objectives against state and non-state actors.
525
List the **seven theater special operation commands** subordinate to USSOCOM.
* SOCEUR (Europe) * SOCAFRICA (Africa) * SOCCENT (Central) * SOCPAC (Pacific) * SOCNORTH (Northern) * SOCKOR (Korea) * SOCSOUTH (South) ## Footnote These commands operate within their respective geographic areas.
526
Describe the relationship between **TSOC**, **GCC**, and **USSOCOM**.
* USSOCOM oversees SOF and TSOCs * GCCs exercise operational control over SOF through TSOCs * USSOCOM maintains combatant command over TSOCs ## Footnote This structure ensures coordinated operations.
527
What is the **Naval Special Warfare Mission**?
Recruit, organize, train, equip, and deploy NSW forces ## Footnote Aims to accomplish special warfare missions aligned with national policy.
528
Discuss the history of **intelligence support to Naval Special Warfare**.
* Tactical Cryptologic Support * Support Activity 1/2 * NSWG 10/8 * Mission Support Center * Cultural Engagement Center ## Footnote Evolved from manual intercepts to integrated intelligence support.
529
Who was **CTRCS David McLendon**?
A service member who died in a helicopter crash in Afghanistan ## Footnote His death occurred during vital intelligence work.
530
What happened to **CTR1 Michael J. Strange**?
Killed in a helicopter attack during a mission in Afghanistan ## Footnote This incident marked the deadliest single loss for U.S. forces in that war.
531
What is the role of **CTTC Christian M. Pike**?
Provided advance warning before being mortally wounded in battle ## Footnote His actions exemplified the risks faced by intelligence personnel.
532
What happened to **CTICS Shannon M. Kent**?
Killed by an IED while deployed in Syria ## Footnote Involved in special operations against the Islamic State.
533
Define **Direct Action** in SOF mission areas.
Short-duration, high-intensity raids or strikes ## Footnote Aims to seize, capture, exploit, or destroy enemy targets.
534
What is **Special Reconnaissance**?
Covert collection of multi-disciplinary intelligence in hostile territory ## Footnote Essential for gathering actionable intelligence.
535
What does **Counterterrorism** involve?
Offensive measures to deter or eliminate terrorist networks ## Footnote Includes actions like hostage rescue and cyber pursuit.
536
What is the goal of **Countering Weapons of Mass Destruction**?
Locate, secure, and neutralize adversary capabilities ## Footnote Prevents the use or proliferation of WMDs.
537
Define **Unconventional Warfare**.
Support insurgent or resistance movements ## Footnote Aims to disrupt or overthrow adversarial governments.
538
What is the purpose of **Foreign Internal Defense**?
Train and advise partner-nation security forces ## Footnote Strengthens governance and reduces U.S. military footprint.
539
What are **Military Information Support Operations**?
Plan and deliver tailored messaging to influence foreign audiences ## Footnote Aims to support friendly objectives and undermine adversaries.
540
What does **Security Force Assistance** entail?
Institutional mentoring of partner nations' defense ministries ## Footnote Develops logistics, doctrine, and military education.
541
What is **Counterinsurgency**?
Blends kinetic, political, economic, and informational efforts ## Footnote Aims to defeat insurgent movements and address root causes.
542
What is the role of **Foreign Humanitarian Assistance**?
Rapid response to disasters abroad ## Footnote Delivers medical aid and restores critical infrastructure.
543
What do **Civil Affairs Operations** involve?
Engage local authorities to identify needs and coordinate resources ## Footnote Act as military diplomats bridging gaps with civil society.
544
What is **Irregular Warfare**?
Employs various missions to influence state and non-state actors ## Footnote Integrates all core mission areas for strategic effects.
545
How does **IW** support SOF mission areas?
Provides encrypted pathways, sensing reach, and decision-quality intel ## Footnote Enhances the effectiveness of small teams.
546
What are the **capabilities** of **National SIGINT**?
* Global coverage * High intelligence processing power * Cross-domain integration ## Footnote These capabilities support national security objectives.
547
What are the **limitations** of **National SIGINT**?
* Latency & prioritization * Overwhelming volume of information * Policy constraints ## Footnote These factors can hinder effective intelligence gathering.
548
What are the **capabilities** of **Theater SIGINT**?
* Tailored coverage * Integrated processing * Joint dissemination ## Footnote Provides focused intelligence support for specific regions.
549
What are the **limitations** of **Theater SIGINT**?
* Finite range * Competition for assets * Low bandwidth possibilities ## Footnote These limitations can affect operational effectiveness.
550
What are the **capabilities** of **Tactical SIGINT**?
* Immediate threat warnings * Local access ## Footnote Critical for real-time operational support.
551
What are the **limitations** of **Tactical SIGINT**?
* Limited range * Smaller analytic footprint * Equipment vulnerabilities ## Footnote These factors can restrict tactical intelligence operations.
552
What is **SOTA** in the context of intelligence support to NSW?
SIGINT Operational Tasking Authority ## Footnote Allows operational commanders to direct SIGINT sensors for specific missions.
553
What is the **Tactical Information Operations Program**?
Embeds cryptologic sailors with SEAL and Special Reconnaissance Teams ## Footnote Provides on-scene SIGINT and electronic attack capabilities.
554
What does **CCIR** stand for?
Commander's Critical Information Requirement ## Footnote Specific facts the commander must know to make decisions.
555
What does **PIR** stand for?
Priority Intelligence Requirement ## Footnote A concise question about the enemy or environment that needs answering.
556
What is the **F3EAD** methodology?
Find, Fix, Finish, Exploit, Analyze, and Disseminate ## Footnote An intelligence cycle used in targeting operations.
557
What is involved in the **Find** phase of F3EAD?
Identifying potential targets using available intelligence ## Footnote Focuses on answering the 'Who, What, When, Where, Why' questions.
558
What is the **Fix** phase of F3EAD?
Verifying and confirming identified targets ## Footnote Transforms initial intelligence into actionable evidence.
559
What occurs during the **Finish** phase of F3EAD?
Imposing will on the verified target ## Footnote Based on the evidence gathered in the Fix phase.
560
What does the **Find** phase of F3EAD involve?
Identifying potential targets using available intelligence and answering the 'Who, What, When, Where, Why' questions ## Footnote It is about 'picking up the scent' of the target.
561
What is the focus of the **Fix** phase in F3EAD?
Verifying and confirming identified target(s) through triangulation and other methods ## Footnote It transforms initial intelligence into evidence for subsequent actions.
562
What happens during the **Finish** phase of F3EAD?
The commander decides to impose their will on the target, often through direct action ## Footnote This is based on verified evidence.
563
What is the purpose of the **Exploit** phase in F3EAD?
Analyzing the target after it's been 'finished' to extract valuable information and evidence ## Footnote This phase is crucial for understanding the target's context.
564
What does the **Analyze** phase of F3EAD entail?
Fusing extracted information with the wider intelligence picture for comprehensive understanding ## Footnote This helps in contextualizing the target.
565
What is the goal of the **Disseminate** phase in F3EAD?
Sharing analyzed information with key stakeholders ## Footnote Ensures that everyone has the necessary context.
566
What are the characteristics of **Kinetic End States**?
* Achieved through physical force * Visible and immediate results * Measured in geographic control, combat-power attrition, or battle-damage assessment (BDA) ## Footnote These end states involve direct physical actions.
567
What defines **Non-Kinetic End States**?
* Achieved through information, influence, cyber, economic pressure, diplomacy * Intangible effects * Measured in narrative dominance, cyber uptime/downtime, polling data ## Footnote These end states focus on shaping perceptions and long-term outcomes.
568
What does NAI stand for and what is its purpose?
Named Area of Interest; used for focused data collection and decision making ## Footnote Characteristics include specificity, time-bound nature, and observable indicators.
569
What types of **ISR platforms** support NSW operations?
* National and commercial satellites * Theater manned ISR (P-8/EP-3, Rivet Joint) * Group-5 drones (MQ-9, Triton) * Ship-launched UAS (RQ-21, MQ-8C) * Backpack drones (Black Hornet, Puma) ## Footnote These platforms provide various intelligence-gathering capabilities.
570
What is the role of **HUMINT** at the National level?
Strategic agencies cultivate long-term sources inside foreign governments, providing insight into adversary intentions ## Footnote These networks require years to develop and are vulnerable to political blow-back.
571
What is the focus of **Theater HUMINT**?
Controls case officers and regional sources, tuned to campaign objectives ## Footnote Collection can be retasked in days but is constrained by force-protection rules.
572
What does **Tactical HUMINT** involve?
Gathering on-scene information through leader engagements and patrol debriefs ## Footnote Provides near-real-time atmospherics and threat warnings.
573
What is **GEOINT** and its role in NSW?
Geospatial Intelligence; provides precise 'digital terrain' for infiltration and strikes ## Footnote High-resolution products help plan routes and assess landing sites.
574
What are the three elements of **GEOINT**?
* Imagery: raw pixel data * IMINT: analytic product from imagery * Geospatial information: precise positional data ## Footnote These elements support operational planning and targeting.
575
Define **NEO** as it applies to NSW operations.
Non-Combatant Evacuation Operation; a rapid mission to extract U.S. citizens and designated foreign nationals ## Footnote Often crisis-driven.
576
What does **SR** stand for in NSW operations?
Special Reconnaissance; covert collection of multi-INT data inside denied territory ## Footnote Focuses on gathering intelligence without detection.
577
What is **DA** in the context of NSW?
Direct Action; short-duration, high-intensity raids or precision strikes ## Footnote Aimed at seizing, destroying, capturing, or exploiting objectives.
578
What does **OPE** refer to?
Operational Preparation of the Environment; non-kinetic activities that set conditions for future missions ## Footnote Essential for mission success.
579
What is **JIPOE**?
Joint Intelligence Preparation of the Operational Environment; a systematic four-step process for analyzing adversary capabilities ## Footnote Steps include defining, describing, evaluating, and determining.
580
What is an **AFSB**?
Afloat Forward Staging Base; provides facilities within striking distance of littoral objectives ## Footnote Supports operational readiness.
581
What role does **METOC** play in NSW mission planning?
Models tides, surf zones, currents, and other environmental factors for planning ## Footnote Ensures safe and effective insertion and extraction.
582
How does **GEOINT** support targeting?
Provides trusted coordinates for weaponeering and measures structures over time ## Footnote Fuses satellite, airborne, and lidar imagery with terrain data.
583
What is the significance of **HUMINT** in targeting?
Reveals intent and schedules through recruited sources and debriefings ## Footnote Enables target validation and collateral-damage estimation.
584
What does **MASINT** stand for?
Measurement & Signature Intelligence; collects unique physical signatures for target confirmation ## Footnote Refines aim-points and weapon fusing.
585
What is the role of **SIGINT** in targeting?
Intercepts communications to geolocate enemy nodes and provide real-time timing for strikes ## Footnote Post-strike collection verifies kill effects.
586
What does **ACINT** refer to?
Acoustic Intelligence; uses underwater data to track and classify maritime forces ## Footnote Essential for targeting submarines or surface ships.
587
What is **OSINT**?
Open-Source Intelligence; uses publicly available information to fill gaps and corroborate classified sources ## Footnote Important for identifying time-sensitive opportunities.
588
What does **SAP/STO** stand for?
Special Access Program / Special Technical Operations; highly classified tools for targeting ## Footnote Often involves cyber or space-based capabilities.