SKT Flashcards
Objective
Direct every military operation toward a clearly defined, decisive, and attainable objective.
Unity of command
To ensure unity of effort under one responsible commander for every objective
Offensive
To seize, retain, and exploit the initiative. Offense action is the most effective and decisive way to attain a clearly defined objective and is the means by which a military force seizes and holds the initiative while maintaining freedom of actions and achieving decisive results.
Mass
To concentrate the effects of combat power at the place and time to achieve decisive results.
Maneuver
To move the enemy I’m a position of disadvantage through the flexible application of combat power.
Enemy of force
To allocate minimum essential combat power to secondary efforts.
Security
To never permit the enemy to acquire unexpected advantage
Surprise
To strike the enemy at a time or place in a manner for which it is unprepared
Simplicity
To prepare clear, uncomplicated plans and concise orders to ensure thorough understanding.
Aggressive defense
Achieved by employment of firepower and patrolling. Getting to near nuclear resources/inflict casualties on the enemy.
Defense in depth
Defensive fighting positions positioned to absorb and progressively weaken and attack. Should extend outward by patrols or observation post (op) to else the attacks. Gives commander room to maneuver forces
Kill zones
When the defense extends too much and weakens close and critical resources
Key terrain
Any area that gives a marked advantage to the force it controls. Forces can dominate from key terrain. Include in defensive plan
All ground defense
Organized to defend against an attack from a specific direction.
Integrated defense
Application of active and passive defense measures, employed across legally-defined ground dimension of the operational environment to mitigate potential risks and fled fear adversary threats to AF ops.
Base defense forces
Positioned laterally and in depth to provide mutual support
Gaps in defense
Must be mutually supported and controlled by surveillance devices, obstacles, planned direct and indirect fire, and defense forces such as patrol and observation patrols/listening posts (op/lap).
ID battle space
Encompasses flightlines, PL resources, personnel, cantoent areas, base facilities, accommodation areas, extends beyond pusillanimous perimeter to include area from which base may be vulnerable from standoff weapons (mortars, rockets, and manportable air defense systems MANPADS). Divided into distinct areas, bade boundary and base security zone
Base boundary
Defines the base as a line that delineates the surface area of a vase for the purpose of facilitating coordination and deconfliction of operations between adjacent units, formations, or areas. Not necessary base perimeter, based upon the factors mission.
Base security zone
Area outside of base perimeter from which base may be vulnerable from standoff threats. Installation commander identifies BSZ via operational chain of command with local, state, federal agencies (CONUS) or host nation (HN) or area commander (OCONUS) for BSZ to be identified as the Base Boundary
ID effects
Anticipate, deter, detect,assess, warn, defeat, delay, defend, and recover
ID efforts
Focus on criminal activity and pre-occupational terrorist planning that may affect our people, resources, and readiness
Effects-based approach to operations (EBAO)
Actions take. Against enemy systems designed to achieve specific effects to contribute directly to desire military and political outcomes
Capability based integrated defense
Based on risk management principles, to achieve the commander desired effect
ID risk authority
Installation/site commander assumes identified risk for assigned, attached, or transient Air Forces personnel assets
Integrated defense enterprise lead
Security forces is the Air Force enterprise leader for ID operations
ID CONOPS 2020
Integrated base defense includes all airman-total force
COVERED WAGON
Unusual incident affecting PL resources 1-3. Give to installation CP in OPREP 3 format (Operational Reporting). Cancelled by installation commander
BENT Spear
To identify and report a nuclear weapon significant incident involving a nuclear weapon or warhead, nuclear components, or nuclear vehicle when nuclear loaded
BROKEN Arrow
Used to identify an accident involving a nuclear weapon or warhead or nuclear component
MEDEVAC
Evacuation and assignment made by senior military person present. Correct assignments of precedence cannot be overemphasized, over classification remain a continuing problem. Patients will be picked up ASAP consistent with available resources and pending missions. 2 types of evacs
Categories of precedence for MEDEVAC
Urgent: 2 hours/save life and limb
Urgent-surg: surgical intervention
Priority: sick and wounded
Routine: sick and wounded not to deteriorate significantly. Evac in 24
Convenience: evac by vehicle is a matter of medical convenience
Line 6 Evac
Changed to number and type of wound, injury, or illness. If serious bleeding get blood type
Line 9 evac
Changed to description of terrain. Include relationship of landing area to prime isn’t terrain features. Need to call in 5 lines before helicopter gets off the ground
9 line IED
Improvised explosive device report in 9 line SALT REPORT
Casualty evacuation
Used by non medical units to refer the movement of casualties aboard non medical vehicles or aircraft
Initial response
Is crisis in US territory natural or handmade or deliberate attack, IS joint forces will conduct civil support and home land defense operations
Scope
Limited in range and size of op and are conducted to achieve a specific goal
Political aspects
Objective avoids actions that may have adverse effects, commanders should remain aware of changes not only in operational situations but also political objectives
Non-combatant evac ops
NEOs may include citizens from HN as well as citizens from other countries
Peace operations
To support diplomatic efforts to reach a long term political settlement and are categorized as peace keeping operations
Foreign humanitarian assistance
Conducted to relieve or reduce the results of natural, or man made disasters or other endemic conditions.
Recovery operations
Locate, identify, rescue, and return personnel or human remains, sensitive equipment, or items to national security
Consequence management
Planning actions and preparations taken to identify, organize, equip, and train emergency response forces, implement plans in response to radiological accidents or weapons of mass destruction, actions taken following such an accident to mitigate and recover from effects of the accident
Homeland defense and civil support
Had is to protect against and mitigate the impact of incursions or attacks on sovereign territory , domestic population, critical defense structures. CS includes armed forces and DOD personnel, contractors, and assets for domestic emergencies and law enforcement.
Human intelligence
HUMINT can supplement other forms of intelligence and information collection to produce the most accurate intelligence products
Force protection
Wide range of non conventional threats such as terrorism, exotic disease, criminal enterprises, environmental hazards, and hackers
Education and training
To ensure that individuals and units have the necessary skills given operation and the staffs can plan, control, and support the operation
Terrorism
Calculated use of violence to inculcate fear. Intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological
Lead agency concept
Established to decentralize command and control over terrorist incident investigations and activities
US coast guard
Responsible for AT planning in US ports and implementation of a foreign port assessment program to determine the vulnerability to terrorist attacks
Assassination
Target often predictable, invariably, the terrorism claim responsibility
Bombing
Most common due to being cheap and easy to produce. Difficult to detect and trace after event
Robbery
Not robbery but way to get funds
Terrorist organizations
Involves criminal act, symbolic in nature, intended to influence an audience beyond immediate victims
Non state supported
Operates autonomously, receiving no significant support from any government
State supported
Operates independently of, but receives support from one or more governments
State directed
Operates as a ahem of the government receiving substantial intelligence, logistic, and operational support from sponsoring government
Structural period or terrorism
Hardcore leadership
Active cadre
Active supporter
Passive supporter
Emotionally disturbed people
Obtain some level of joy from terrorism. Used by terror groups
Domestic terrorism
May be cause by open political system letting people voice opinions
Eagle eyes
Defensive program creates to enhance the collection of threat information by educating members of the total force and off base citizens on nature of terrorist attack planning activities
FPCON Alpha
General threat
FPCON Bravo
Increased and more predictable threat
FPCON Charlie
Incident occurs or intelligence was received of incident
FPCON Delta
In the immediate area where an attack has occured
FPCON Normal
Warrants only routine security posture
Low (TTL)
No group is detected
Moderate (TTL)
Present but no indication of anti-US activity. Favors host nations
Significant (TTL)
Present and attack personnel as their method of operation or group uses large casualty producing attacks as method but has limited operational activity. Operating environment neutral
High (TTL)
Operational active and use large casualty producing attacks as method. Sos presence and operating environment favors terrorist
Insurgency
An organized movement aimed at the overthrow of a constituted government through use of subversion and armed conflict
Counterinsurgency
Involves all political, economic, military, paramilitary, psychological, and civic actions that can be taken by a government to defeat insurgency
Success in counterinsurgency
Requires small unit leaders agile enough to transition among many types of missions and able to adapt to change
COIN operations
Relies heavily on broad range of joint forces capabilities and requires a different mod of offensive, defensive and stability operations from that expected in major combat operations
Intergovernmental organizations
Formed to protect and promote national interests shared by member states
English alphabet
Combatants command wide standard for spelling names
Predeployment
Helps keep your life in order and allows you to deploy with peace of mind that everything at hole is taken care of
Employment
US forces deployed to foreign nation are subject to law of that nation, international law, and UCMJ
Staff control tools
Assign responsibilities, coordinate fire and maneuver, provide updated information, and ensure safety
Charts and forms
Used by S Taff to keep DFC and FLs informed on vital integrated defense information using standard military symbology
Base sectorization overlay
Divides base into clear defined boundaries, defines groups, areas which integrated defense forces are responsible and allows a coordinated decentralized execution
Map overlays
- Defense fighting positions (DFP)
- Fire plan overlay
- Support weapons placement overlay
- Integrated detection, obstacle and routine patrol overlay
- Service and support over lay
- Enemy activity overlay
Base defense reports
Provide key information to the DFC and S Staff I’m specific integrated defense activities in order to make decisions and develop and implement tactical plans and orders
Connecting cables and antennas
Use air compressor or electrical degreaser spray to clean
TASS
Tactical automated security system. Not certified for protection of priority resources. 3 functions (detection, annunciation and assessment) 2 support functions (communications and power). Provides integrated security system to collect, process, and display time critical info
Selection of position
Offers maximum visibility of the area while affording cover and concealment
Target indicators
Anything you, friendly forces, or the enemy does or fails to do that reveals a position
Tactical miniature sensors (TMS)
Corsair of sensors, repeaters and hand held display monitor. Small stand alone economical 9 volt battery. Has seismic magnet, active and passive infrared beam, or break wire sensors
Indentifyimg targets
Process of locating, making prioritizing and determining the range to combat targets
Improper camo
Reveals the majority of targets detected on battlefield
Range determination
Process of finding the distance between two points