Security Flashcards

1
Q

Principals of control

A
Rule of Law
Use of Force (ROE)
Population focus
Information
Resource the Main Effort
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Considerations for Cordon and Search

A

Security
ISTAR
Use of force

Consider:
FRV
TCP
Outer cordon (estab first then face out): VCPs
Civ holding Area, IDP area
CSST (CL 1,3,5,10, AXP, R2E, Tpt, GS Engrs)
Inner cordon
QRF point, routes, LOE
ISR screens, NAI
EAs for wdr
Direction of search / Time of search
CT boundaries
En CDPs: WDR, re-enforce
FF CDPs: Commit QRF, rotation plan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AO Classifications

A

Geography (LoC, centers, key terrain) - Rural, town, city, complex
Adversary
Population (density)- Red, Amber, Green

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IA effects

A
PROMOTE
DETER
UNDERMINE
ENCOURAGE
INFROM
REASSURE
EXPOSE
COERCE
COMPEL
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tactical techniques in security

A
Cordon and search
KPP
Patrolling
Route security
VCP / TCP
Curfew
Crowd control
Mass cas (QRF w/ med spt)
BPC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Potential Prelim Tasks

A

Estab LO network (deploy early - needs assessment)
KLE (tribal leaders, govt leaders, NGO, OGA)
Estab ISR screens
Occupy FOBs
Secure lines of communication
IO: Inform CIVPOP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RAM tactics

A
Harassment ambush
Annihilating ambush
Raid
Assassination
Theft
Riot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RAM decisions

A

Transition Open / Incipient insurgency
Resupply
Relocate cache / try camp / DA cell loc
Conduct attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FF CDPs

A

Commit QRF (interdict, mass cas, respond to riot, spt DE)
HOTO to HNSF
Trigger C&S
Transition phases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Techniques for supporting elections

A
Route security
IO campaign: ENCOURAGE voter turnout, REASSURE CIVPOP
Escort UN - infil/exfil 
Secure polling booth
Patrol D-3 to D-day
LO to UN (maintain neutrality)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Length of search for Cordon and Search - what is rare of search

A

1 hour per house for EHCT

12 hour work day = 12 hrs per day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CIMIC effects

A
ESTABLISH
PROVIDE
DEVELOP
ENHANCE
DELIVER
TRAIN
ADVISE
SUPPORT
PARTNER
COORDINATE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Length of search for Cordon and Search - what is rare of search

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CIMIC effects

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RAM vulnerabilities

A
  1. Reliant on unencrypted comms for C2 vuln to detection and geolocation by RRT
  2. Reliant on predictable x-border smuggling routes for proliferation vuln to interdiction by ISR and partnered border patrols
  3. DA cells operate in rural townships vuln to isolation from population centers (curfew, VCP)
  4. Reliant on leadership cell to co-ord spectacular attacks vuln to disruption if key leaders are neutralized.
  5. Reliant on IEDs to conduct annhialation ambushes and mass cas events vuln to disruption if bombmaker is neutralized.
  6. Has predictable planning cycle vuln to targeting in known locations once detected.
  7. Is unable to match FF tempo, vuln to losing initiative when multiple capabilities are targeted simultaneously (IO, bombmaker,leadership, caches)
  8. Reliant on FoM within CIVPOP to conduct ops vuln to being undermined by CIMIC and IO campaign (public switching tacit consent to FF vs RAM).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TIA vulnerabilities

A
  1. Significantly overmatched by FF making them vuln to COERCION to comply. (Using RAM as example)
  2. SoM tgts undefended govt sites, vuln to disruption through KPP and patrolling
  3. SoM tgts human suffering for IO campaign vuln to disruption through spt to NGOs and CIMIC ops
17
Q

How you using intelligence

A

Employing local agencies early IOT get a startstate and minimize the time spent developing a picture

Use:
OSINT
SIGINT: geolocation to minimize search time
HUMINT
UAS
4WMR
to layer over tgt areas, estab POL and set conditions for strike

TSE will be used on exploit to spt int cycle. DOCEX , CELLEX

18
Q

Priorities

A
Secure firm base for force
Prevent immediate loss of life
Limit human suffering
LO network: NGO, govt leaders, tribal ldrs 
Secure key infrastructure 
Isolate threats