Condition 1 of a ship
General Quarters. All hands at battle stations and all weapon systems maned. Threat is imminent. Combat ship’s primary mission area threat/multiple threats.
Condition 2 of a ship
Damage Control, Anti-sub warfare, STRIKE. A modified GQ watch, readiness requirements are heightened for specific missions or conditions.
Condition 3 of a ship
Wartime, heightened readiness. Requires sufficient personnel to man a limited number of weapon systems to combat a single warfare area threat. Must be able to repel an urgent attack while the ship mans GQ.
Condition 4 of a ship
Requires adequate personnel for the safe and efficient operation of the ship.
Location: MacDill Air Force Base (AFB), FL
Established January 1, 1983
Area of Responsibility (AOR): Middle East, Central Asia, Egypt
Formed to strengthen US interest in the area due to hostage situations in Iran and the Soviet invasion of Afghanistan
Began as Rapid Deployment Joint Task Force (RDJTF)
Established under President Carter in March 1980
Became a permanent unified command under President Reagan
Work with national and international partners to:
- Promote development and cooperation
- Respond to crises (Humanitarian assistance and disaster relief)
- Deter and defeat state and transnational aggression
- Establish regional security and stability
Location: Kelley Barracks, Stuttgart, Germany
Established October 1, 2007
AOR: All of Africa except Egypt
Mission is to work with African nations and organizations to build regional security and crisis-response capability in service of US government efforts in Africa.
CENTCOM maintains its traditional relationship with Egypt, but AFRICOM coordinates with Egypt on issues relating to the security of the African continent.
Location: Stuttgart, Germany Established 1947, origins in WWII AOR: Europe, Russia, Greenland, Israel Mission is to conduct military operations, international military partnering, and interagency partnering to enhance transatlantic security Mil-to-Mil Engagement Ballistic Missile Defense NATO Support
Location: Peterson AFB, CO
Established: October 1, 2002
AOR: US, Alaska, Puerto Rico, Canada, Mexico
Origins in attacks on September 11, 2001
NORTHCOM partners to conduct homeland defense, civil support and security cooperation to defend and secure the United States and its interests.
Location: Honolulu, HI
Established 1947, origins in WWII
AOR: Indo-Asia-Pacific Region
PACOM, with its partners and allies, work to enhance stability in the Asia-Pacific region by promoting security cooperation, encouraging peaceful development, responding to contingencies, deterring aggression, and fighting to win.
Location: Miami, FL Established 1947 as CARIBCOM, re-designated in 1963 AOR: Central and South America, Caribbean Mission includes: Humanitarian assistance/disaster relief Countering transnational organized crime Support peacekeeping operations Multinational training and exercises Human Rights
US Special Operations Command
Location: MacDill AFB, FL
Established 1987 to revitalize special operations forces
Providing combat-ready special operations forces to other Combatant Commanders
Developing strategy, doctrine and tactics
Training special forces
Exercising command of selected special operations missions, if directed by POTUS or SECDEF
US Strategic Command
ocation: Omaha, NE
Established 1992, absorbed SPACECOM in 2002
Unified Navy and Air Force strategic forces under one command
Global Strike (conventional and nuclear)
Integrated Missile Defense
DOD Information Ops
Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR)
Computer Network Attack (CNA) / Computer Network Defense (CND)
Plan for and develop requirements for space operations
US Transportation Command
Location: Scott AFB, Ill
Mission is to provide transportation, sustainment and distribution in support of DOD assets through a seamless and synchronized deployment and distribution system
In an average week, TRANSCOM conducts over 1,900 air missions, with 25 ships underway and 10,000 ground shipments operating in 75% of the world’s countries
US Cyber Command
Location: Fort Meade, Md.
Established 2010, made COCOM in 2017
USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries
US Fleet Forces (task force 80)
Western half of the Atlantic ocean. (Formerly 2nd fleet)
The Caribbean, and surrounding waters of Central and South America
Effective July 1, 2008
Eastern half of the Pacific Ocean
Western half of the Pacific Ocean and most of the Indian Ocean
Arabian Gulf, Red Sea, Gulf of Oman, and part of the Indian Ocean
Eastern half of the Atlantic Ocean and the Adriatic, Baltic, Barents, Black, Caspian, Mediterranean, and North Seas
Location: Fort Meade, MD
Established in 2010 as US Fleet Cyber Command/10th Fleet
Origins from WWII and anti-submarine warfare
Responsible for the Navy’s cyber warfare programs, subordinate to USCYBERCOM
Has operational control over Navy information, computer, cryptologic and space forces
Information Security (INFOSEC)
protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction of the information.
Communication Security (COMSEC)
he designator “CRYPTO” identifies all COMSEC documents and keying material which are used to protect or authenticate classified or controlled unclassified government or government-derived information.
Network Security (NETSEC)
protecting the computer networks associated with the Department of Defense.
measures taken to provide a physical barrier between intruders and classified information.
Includes safes, access, forms, CAC, PKI, PII.
computer domains that are used to store data
The Navy’s unclassified computer network
The Navy’s computer network classified up to Secret
Global Information Grid
Protected Key Infrastructure
Information Systems Security Manager
- Overall responsible for the operation and management of the command’s Information Assurance Policy
- Designated in writing by the CO
- E7 or above recommended with NEC 2779
Information Assurance Officer
Responsible to the ISSM for Command’s Information Security program
Negligent Discharge of Cyber Material
information released above the classification of the computer.
- Formerly Electronic Spillage
- eg: ship schedule going out on NIPR
Cross Domain Violation
connecting a computer to a network that is of a different classification.
-eg: SIPR computer connected to the NIPR Network
attempt to conduct malicious cyber attack at a command
series of coordinated events designed to maliciously attack a command or the DoD
Removable Media Control in the DOD
USB devices are not authorized in the DoD!
- This includes USB chargers for personal devices such as cell phones or MP3 players.
- Devices which use USBs to communicate, but have no storage capabilities, such as keyboard, mouse, or visual aide panel remotes, are authorized at the discretion of the CO.
- Waivers available for mission essential external hard drives and USBs if signed by the CO.
Other removable media must be inventoried and controlled.
-Must include tags for classification.
Long Range Training Plan
Used to manage scope of training and to plan for satisfaction of requirements
in the long term (12 months)
The Training Officer and Department Heads (DH) are responsible for developing and maintaining the Long Range Training Plan (LRTP). The Division Officer (DivO) will push inputs up to the DH for review.
The Training Officer then forwards these plans to the Executive Officer (XO)
for review and the Commanding Officer for approval.
The Training Officer is responsible for keeping the plan up to date, and he or
she should receive updates on status and progress at each Planning Board for
Short Range Training Plan
SRTP is used to schedule training topics, derived from the LRTP
This training plan is broken down into the following three sub-plans:
Presented to PB4T at least one month before the quarter to ensure
there are no conflicts with training teams
Once approved, departments will add specific department training to
not interfere with ship wide training
Inputs from divisions/training teams compiled by DH to present at
PB4T one week prior to the month
Will have times and locations for all divisional/team training
DivO, Chief and Training PO responsible for the proper execution and recording of training.
5 steps to ORM Process
1) Identify hazards
2) Assess hazards
3) Make risk decisions
4) Implement controls
FP CON NORMAL
Applies when there is no discernible threat of possible terrorist activity.
FP CON ALPHA
Applies when there is a general threat of terrorist activity against the installation and the personnel
The nature and extent are unpredictable
FP CON BRAVO
Applies when an increased and more predictable threat of terrorist activity exists
FP CON CHARLIE
Applies when incident occurs or when intelligence indicates that some form of terrorist action against the installation or it the personnel is imminent.
FP CON DELTA
Highest level of threat conditions
Applies to the immediate area where a terrorist attack has occurred or when intelligence indicates terrorist action against a specific location or person is likely.
6 factors that determine FPCON
Existence Capability Intentions History Targeting Security Environment
What is a carcass?
A broken but repairable componant that must be turned in when a new componant is ordered. Doing so lets the ship get a discount on the new part equal to the value of the carcass, freeing up funds for other uses.
Example: Replacing a $10,000 part will cost the ship $10,000 unless they turn in the carcass of the old part. In this case, if the carcass is $3,000, the ship will only pay $7,000.
What is a maintenance assistance module (MAM)?
Replaceable assemblies required to
execute an approved maintenance plan,
identifying faults by swapping known-good
assemblies for potentially bad ones.
MAMs are NOT spare parts and should NOT be left in
equipment to repair casualties.
MAM accountability lies with the Department Head
who has custody
What is a Quality Deficiency Report (QDM)?
The purpose of initiating a QDR is to provide feedback to
activities responsible for design, development, purchasing, production, supply, maintenance, contract administration and other functions so that action can be taken to determine cause, take corrective action, and prevent recurring deficiencies.
Initiating a QDR also accomplishes several other important issues such as segregating and purging defective material from the supply system, issuing credit to the QDR originator to balance financial records and to adjust planned overhauls and repairs to carcasses.
The reporting of defective material also allows the Navy to record each event in their database for trend analysis and monitoring of failures.
What is a casualty?
Equipment malfunction which can not be corrected within 48 hours and:
- Reduces unit’s ability to perform a primary mission
- Reduces unit’s ability to perform a secondary mission
- Reduces a training command’s ability to perform its mission (n/a for sea commands)
CASREP Category 2
- Minor degradation in primary mission
- Major degradation or total loss of secondary mission
- Transmitted Priority (P) Precedence
- Updates must be submitted every 30 days
CASREP Category 3
- Major degradation in primary or secondary
- Transmitted Immediate (O) Precedence
- Updates must be submitted every 10 days
CASREP Category 4
- Total loss of primary mission
- Transmitted Immediate (O) Precedence
- Updates must be submitted every 72 hours