Week 3 test review Flashcards
just don't bleed out on the table
Define LOAC
- Collection of laws governing the conduct of armed hostilities
- Derived from international treaties (i.e. Geneva Convention)
- Prohibitive: tells us what we cannot do
- Binding: if violated, US Service Mbrs potentially subjected to jurisdiction of int’l courts
List Principles of LOAC
Military Necessity justifies all measures needed to defeat the enemy as quickly and efficiently as possible
Distinction who/what can we target
Proportionality how much can we damage/destroy in the attack
Unnecessary Suffering does weapon/tactic cause superfluous injury or unnecessary suffering
Relationship between Risk to Mission and Risk to Force
RTM: assoc’d with ability to achieve current mission OBJs
RTF: probability of loss/damage to assets, impacting future campaigns
Inverse proportional = decrease in RTM is likely to increase RTF
How to manage ALR
Accept accept risk within ALR parameters given
Transfer take action to change where/when risk is incurred; who/what incurs it
Reduce decrease consequence/probability; use MOEs/MOPs; use layered/coordinated effects and intel driven; build confidence with intel
Avoid avoid threats and hazards
Abort
difference between SEQUENTIAL and CONCURRENT dynamic targeting
Sequential - one target is prosecuted independent of another
Concurrent - Decision Points (DPs) ID’d for a follow-on tgt w/in prev targets cycle
Difference between Window of Opportunity and Vulnerability Period
Window of Opportunity: ID’d opps CCs can exploit to INFLUENCE THE SITUATION (POSITIVELY) can be weather or induced by friendly action (i.e. deception or jamming)
Vulnerability Period: period of time in which a TARGET IS SUSCEPTIBLE TO DAMAGE, disruption, intrusion, interference, OR OTHER DESIRABLE EFFECT
Types of NKO that are applicable to MISRs
Cyber
Information Operations (IO)
Space
Electromagnetic (EM) Operations
What term generally classifies NKE
D4M: Deny, Degrade, Disrupt, Destroy, Manipulate
Know SEZ, DEZ, and AEZ ranges
Ship Engagement Zone (SEZ): 2 NM around ship (ellipse if multiple ships)
- Small caliber weapons
Dual Engagement Zone (DEZ): 2-5 NM around HVU
- Helos and ships coord efforts
- Fixed Wing can overfly, but not engage
Air Engagement Zone (AEZ): 5-30+ NM around HVU
- Fixed and Rotary Wing coord efforts
Which units are capable of Maritime Air Controller (MAC) role
E-2
E-3
MQ-9
P-8/AAS
MH-60R
surface combatant
Know four functions of Collection Requirement Management (CRM)
EVRP
Establish
Validate
Review
Prioritize
Know four functions of Collection Operations Management (COM)
SSTC
Select
Schedule
Task
Control
Name 3 validation criteria for Request for Collection (RFC)
Legal
Unique (not redundant)
Compliant with applicable standards
Submitted via proper channels
Feasible
Clear and Comprehensive (SIR)
Appropriate (sufficiently important) f/ ISR
Tailored for audience
Properly prioritized
Validation definition from JP 2-0:
Sufficiently important to justify dedication of intel resources; does not duplicate existing requirement; has not previously been satisfied
What are the types of Cyber forces; what do they do
(CMF) Cyber Mission Force refers to the following three elements:
– (CNMF) Cyber National Mission Force: has national level mission to defend against broader cyber attacks
– (CCMF) Cyber Combat Mission Force: OPCON to USCYBERCOM (worldwide AOR)
— includes Cyber Combat Mission Teams (CCMT) most likely to integrate with this element
— Cyber Combat Support Teams (CCST)
– (CPF) Cyber Protection Force
What is a Botnet
Network of compromised computers, linked by malware