ROTC MSIV Midterm
Operations security process
-ID critical information -analysis of threats -analysis of vulnerabilities -assessment of risk -application of appropriate security measures
five stability tasks in ULO
-establish civil security -establish civil control -restore essential services -support to governance -support to economic & infrastructure dev.
DSCA is provided by...?
-federal military forces -department of defense civilians -contract personnel -DOD component assets -Nat. Guard forces **Authorized by the President and State GOV.
Types of defensive tasks
Area Mobile Retrograde
ARSOF critical capabilities
Special Warfare Surgical Strike
what is under surgical strike?
counter-terrorism counter- proliferation direct action recovery operations
seven characteristics of the defense
disruption flexibility mass & concentration Operations in depth preparation Maneuver Security
Purpose of DSCA
save lives alleviate suffering protect property
DSCA defined is...?
-support provided in response for assistance from civil authorities for domestic emergencies, law enforcement support, special events, other domestic activities
What are the 4 steps in the Battle Analysis format?
1: define the subject 2: review the setting 3: describe the action 4: assess the significance of the action
ARSOF Core activities
Military information support operation (MISO) Civil Affairs Operations (CAO)
stability operation conditions consist of...?
-level of violence -functioning of government -functioning of economic and societal norms -adherence to local laws and norms of behavior
four conditions of the offense
Concentration Audacity Tempo Surprise
SOF truths
Humans are More Important than Hardware. Quality is Better than Quantity. ARSOF Cannot be Mass-Produced. Competent ARSOF Cannot be Created After Emergencies Arise. Most Special Operations Require Non-SOF Support
USSTRATCOM capabilities and components
Mission planning and execution is achieved through sub-unified commands: Ex: ARSTRAT, AFSPC
8 elements of PMESII-PT
Political Military Economic Social Information Infrastructure Physical Environment TIme
Hybrid threats are a combination of..?
Regular forces Irregular forces Terrorist forces Criminal elements
Unified Land Operations (offense)
Simultaneity Depth Synchronization Flexibility
6 Geographic commands
USAFRICOM USCENTCOM USEUCOM USNORTHCOM USPACOM USSOUTHCOM
3 Functional commands
USSOCOM USSTRATCOM USTRANSCOM
what is a Battle?
a set of related engagements that lasts longer and involves larger forces -can affect course of a campaign or major operation -occurs when a division, corps, or army commanders fights one or more sig. objectives
What is an Engagement?
a tactical conflict between lower echelon maneuver forces -brigades and smaller echelons -executed in terms of minutes, hours, days
purpose of stability operations
create conditions so the local populace regards the situation as legitimate, acceptable, predictable
Area defense
deny enemy forces terrain for specific amount of time versus destroying the enemy outright
purpose of the offense
designed to DEFEAT, DESTROY, NEUTRALIZE enemy DECEIVE AND DIVERT to strike enemy where they are not prepared
Purpose of the ULO defense
designed to create conditions for counteroffensive that allows forces to regain the initiative
mobile defense
destruction of the enemy by allowing him to advocate to a position exposing him to a counterattack
What is OPSEC compromise?
disclosure of sensitive/critical information that jeopardizes a units ability to execute: mission, protect personnel/equipment, effects national security
What is a battle analysis?
ensures completeness in examining the critical aspect of a chosen battle
What is critical information?
info important to successful achievement of US objectives and missions
Two forms of potentially dangerous threats
non-state entity possessing weapons of mass destruction nuclear-capable nation-state partnered with one or more non-state actors
retrograde defense
organized movement away from the enemy by delay, withdrawal, or retirement
What is operational security?
process of identifying critical information and analyzing friendly actions attendant to military operations or other activities to: -Identify actions that can be observed by adversaries -Determine vulnerabilities that adversaries can interpret to use against the U.S. -Select and execute measures to bring risk to an acceptable level
What is PMESII-PT?
provides a method to conduct in-depth analysis given to complicated and interconnected nature of the operational variables
USTRANSCOM capabilities and components
provides transportation, sustainment, distribution Diverse force Component Commands: AMC, MSC, SDDC
Defensive operations allow us to...?
retain decisive terrain deny vital areas to enemy attrit or fix the enemy force the enemy to concentrate his forces to increase the enemy's vulnerability
USSOCOM capabilities and components
synchronizes the planning of special operations and provides SOF to support persistent, networked and distributed GCC operations in order to protect and advance our Nation's interests.
what is under special warfare?
unconventional warfare foreign internal defense psychological operations civil-military operations