ROTC MSIV Midterm

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Operations security process

-ID critical information -analysis of threats -analysis of vulnerabilities -assessment of risk -application of appropriate security measures

five stability tasks in ULO

-establish civil security -establish civil control -restore essential services -support to governance -support to economic & infrastructure dev.

DSCA is provided by...?

-federal military forces -department of defense civilians -contract personnel -DOD component assets -Nat. Guard forces **Authorized by the President and State GOV.

Types of defensive tasks

Area Mobile Retrograde

ARSOF critical capabilities

Special Warfare Surgical Strike

what is under surgical strike?

counter-terrorism counter- proliferation direct action recovery operations

seven characteristics of the defense

disruption flexibility mass & concentration Operations in depth preparation Maneuver Security

Purpose of DSCA

save lives alleviate suffering protect property

DSCA defined is...?

-support provided in response for assistance from civil authorities for domestic emergencies, law enforcement support, special events, other domestic activities

What are the 4 steps in the Battle Analysis format?

1: define the subject 2: review the setting 3: describe the action 4: assess the significance of the action

ARSOF Core activities

Military information support operation (MISO) Civil Affairs Operations (CAO)

stability operation conditions consist of...?

-level of violence -functioning of government -functioning of economic and societal norms -adherence to local laws and norms of behavior

four conditions of the offense

Concentration Audacity Tempo Surprise

SOF truths

Humans are More Important than Hardware. Quality is Better than Quantity. ARSOF Cannot be Mass-Produced. Competent ARSOF Cannot be Created After Emergencies Arise. Most Special Operations Require Non-SOF Support

USSTRATCOM capabilities and components

Mission planning and execution is achieved through sub-unified commands: Ex: ARSTRAT, AFSPC

8 elements of PMESII-PT

Political Military Economic Social Information Infrastructure Physical Environment TIme

Hybrid threats are a combination of..?

Regular forces Irregular forces Terrorist forces Criminal elements

Unified Land Operations (offense)

Simultaneity Depth Synchronization Flexibility

6 Geographic commands

USAFRICOM USCENTCOM USEUCOM USNORTHCOM USPACOM USSOUTHCOM

3 Functional commands

USSOCOM USSTRATCOM USTRANSCOM

what is a Battle?

a set of related engagements that lasts longer and involves larger forces -can affect course of a campaign or major operation -occurs when a division, corps, or army commanders fights one or more sig. objectives

What is an Engagement?

a tactical conflict between lower echelon maneuver forces -brigades and smaller echelons -executed in terms of minutes, hours, days

purpose of stability operations

create conditions so the local populace regards the situation as legitimate, acceptable, predictable

Area defense

deny enemy forces terrain for specific amount of time versus destroying the enemy outright

purpose of the offense

designed to DEFEAT, DESTROY, NEUTRALIZE enemy DECEIVE AND DIVERT to strike enemy where they are not prepared

Purpose of the ULO defense

designed to create conditions for counteroffensive that allows forces to regain the initiative

mobile defense

destruction of the enemy by allowing him to advocate to a position exposing him to a counterattack

What is OPSEC compromise?

disclosure of sensitive/critical information that jeopardizes a units ability to execute: mission, protect personnel/equipment, effects national security

What is a battle analysis?

ensures completeness in examining the critical aspect of a chosen battle

What is critical information?

info important to successful achievement of US objectives and missions

Two forms of potentially dangerous threats

non-state entity possessing weapons of mass destruction nuclear-capable nation-state partnered with one or more non-state actors

retrograde defense

organized movement away from the enemy by delay, withdrawal, or retirement

What is operational security?

process of identifying critical information and analyzing friendly actions attendant to military operations or other activities to: -Identify actions that can be observed by adversaries -Determine vulnerabilities that adversaries can interpret to use against the U.S. -Select and execute measures to bring risk to an acceptable level

What is PMESII-PT?

provides a method to conduct in-depth analysis given to complicated and interconnected nature of the operational variables

USTRANSCOM capabilities and components

provides transportation, sustainment, distribution Diverse force Component Commands: AMC, MSC, SDDC

Defensive operations allow us to...?

retain decisive terrain deny vital areas to enemy attrit or fix the enemy force the enemy to concentrate his forces to increase the enemy's vulnerability

USSOCOM capabilities and components

synchronizes the planning of special operations and provides SOF to support persistent, networked and distributed GCC operations in order to protect and advance our Nation's interests.

what is under special warfare?

unconventional warfare foreign internal defense psychological operations civil-military operations


Set pelajaran terkait

Chapter 13: Equilibrium and Human Movement

View Set

Unit 7D - The Postpartum Woman at Risk (recorded lecture)

View Set

Python In-Labs and HWs for Final

View Set

Erik Erikson's Psychosocial Theory of Development

View Set