Week 3 test review Flashcards

just don't bleed out on the table

1
Q

Define LOAC

A
  • Collection of laws governing the conduct of armed hostilities
  • Derived from international treaties (i.e. Geneva Convention)
  • Prohibitive: tells us what we cannot do
  • Binding: if violated, US Service Mbrs potentially subjected to jurisdiction of int’l courts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List Principles of LOAC

A

Military Necessity justifies all measures needed to defeat the enemy as quickly and efficiently as possible
Distinction who/what can we target
Proportionality how much can we damage/destroy in the attack
Unnecessary Suffering does weapon/tactic cause superfluous injury or unnecessary suffering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Relationship between Risk to Mission and Risk to Force

A

RTM: assoc’d with ability to achieve current mission OBJs
RTF: probability of loss/damage to assets, impacting future campaigns

Inverse proportional = decrease in RTM is likely to increase RTF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How to manage ALR

A

Accept accept risk within ALR parameters given
Transfer take action to change where/when risk is incurred; who/what incurs it
Reduce decrease consequence/probability; use MOEs/MOPs; use layered/coordinated effects and intel driven; build confidence with intel
Avoid avoid threats and hazards
Abort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

difference between SEQUENTIAL and CONCURRENT dynamic targeting

A

Sequential - one target is prosecuted independent of another

Concurrent - Decision Points (DPs) ID’d for a follow-on tgt w/in prev targets cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Difference between Window of Opportunity and Vulnerability Period

A

Window of Opportunity: ID’d opps CCs can exploit to INFLUENCE THE SITUATION (POSITIVELY) can be weather or induced by friendly action (i.e. deception or jamming)

Vulnerability Period: period of time in which a TARGET IS SUSCEPTIBLE TO DAMAGE, disruption, intrusion, interference, OR OTHER DESIRABLE EFFECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of NKO that are applicable to MISRs

A

Cyber
Information Operations (IO)
Space
Electromagnetic (EM) Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What term generally classifies NKE

A

D4M: Deny, Degrade, Disrupt, Destroy, Manipulate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Know SEZ, DEZ, and AEZ ranges

A

Ship Engagement Zone (SEZ): 2 NM around ship (ellipse if multiple ships)
- Small caliber weapons

Dual Engagement Zone (DEZ): 2-5 NM around HVU
- Helos and ships coord efforts
- Fixed Wing can overfly, but not engage

Air Engagement Zone (AEZ): 5-30+ NM around HVU
- Fixed and Rotary Wing coord efforts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which units are capable of Maritime Air Controller (MAC) role

A

E-2
E-3
MQ-9
P-8/AAS
MH-60R
surface combatant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Know four functions of Collection Requirement Management (CRM)

A

EVRP
Establish
Validate
Review
Prioritize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Know four functions of Collection Operations Management (COM)

A

SSTC
Select
Schedule
Task
Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name 3 validation criteria for Request for Collection (RFC)

A

Legal
Unique (not redundant)
Compliant with applicable standards
Submitted via proper channels
Feasible
Clear and Comprehensive (SIR)
Appropriate (sufficiently important) f/ ISR
Tailored for audience
Properly prioritized

Validation definition from JP 2-0:
Sufficiently important to justify dedication of intel resources; does not duplicate existing requirement; has not previously been satisfied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the types of Cyber forces; what do they do

A

(CMF) Cyber Mission Force refers to the following three elements:

(CNMF) Cyber National Mission Force: has national level mission to defend against broader cyber attacks

(CCMF) Cyber Combat Mission Force: OPCON to USCYBERCOM (worldwide AOR)
— includes Cyber Combat Mission Teams (CCMT) most likely to integrate with this element
— Cyber Combat Support Teams (CCST)

(CPF) Cyber Protection Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Botnet

A

Network of compromised computers, linked by malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Malware

A

Umbrella term describing any malicious program or code

16
Q

What is a Measure of Effectiveness

A

MOE - a criterion used to assess changes in the system behavior, capability, or operational environment that is tied to measuring the attainment of an end state, achievement of an OBJ, or creation of an effect.

“Are we doing the right job?”

Measures progress towards achieving objectives.

17
Q

What is Measure of Performance

A

Criterion used to assess friendly actions that is tied to measuring task accomplishment (i.e. were the actions taken completed according to the standard?)

“Are we doing things right?”

Measures task performance

18
Q

What is Low Probability of Intercept

A

LPI - spread spectrum communications over a wide band of frequencies

19
Q

What is Low Probability of Detect

A

LPD - non-detectable comms due to a signal to noise ratio below the detecting system’s capes

20
Q

What are the different sources of HUMINT

A

Recruited Assets - assessed placement and access; continuing relationship (most reliable)

Non-recruited Sources - without placement and access; may or may not have a continuing relationship (less reliable)

21
Q

What are the type of HUMINT reports

A

Intelligence Info Report (IIR) HUMINT reporting

SPOT Report - walk-in or time-sensitive

H-TACREP - 5Ws/H; a version of IIR

Notice of Intelligence Potential (NIP) - advertisement of future collection

22
Q

What are the steps of the Joint Planning Process (JPP)

A

1 Planning Initiation
2 Mission Analysis
3 COA Development
4 COA Analysis and Wargaming
5 COA Comparison
6 COA Approval
7 Plan/Order Development

23
Q

What are COA validity criteria

A

Suitable
- Does it accomplish the mission, intent, and tasks
- Does it meet the conditions for relevant end states
- Does it take into consideration friendly and enemy COAs

Feasible
- Can the mission be accomplished w/ available time/space/resource constraints

Acceptable
- Does it contain unaccepted risk
- Does it take into account constraints, restraints, physical, and authority limitations
- Are COAs reconciled w/ external limitations (US, Int’l law, ROE, ALR)

Distinguishable
- Must be sufficiently different from other COAs in focus of main effort, scheme of maneuver, primary mechanism for mission accomplishment, task org, and use of reserves

Complete
- Does it answer the 5Ws/H

24
Q

What are the 4 T’s

A

Problem solving framework

TASKS
- What are we being tasked to do?
- What must we do to spt the CC’s intent?

TARGETS
- What must be exploited/targeted?
- How are these targets perceived by the pkg?

THREATS
- What RED/GREEN/BLUE factors could inhibit the mission or hark our forces?
- How are these risks managed?

TACTICS
- What specific actions must be conducted to fulfill CC’s intent?

25
Q

What are the core meetings of the 3-3 IPE MPC meeting flow

A

1 (DIM) Design Initiation Mtg:
- MC/MPCC digests info and formulates a plan for guidance f/ MPC
- Begin problem solving framework with focus on big picture plan, phasing, OBJs, and tactical problems

2 (MAM) Mission Analysis Mtg:
- MC presents msn OBJs, big picture plan, phasing, and tactical problems
- MC provides guidance to TLs and PCs

3 (GPSM) Game Plan Sync Mtg:
- Integrate the teams/pkgs

4 (GPAW) Game Plan Analysis and Wargaming Mtg:
- Compare BLUE plan vs RED reactions
- Develop mitigation measures vs RED
- Refine Game Plan
- Address Contingencies
- Finalize Contracts
- Conduct ROC Drill

5 (GCAM) Game Plan Comparison and Approval Mtg:
- MC presents the game plan for approval by CC
- Clearly present any deviations from CC’s guidance that require approval (i.e. ALR, RTM, RTF)

26
Q

Define each step of the F2T2EA process

A

FIND Initial detection of emerging threat

FIX Determine location of the potential target

TRACK Observe and monitor target activity and movement

TARGET Determine engagement asset and coordinate the target engagement

ENGAGE Take action against the target

ASSESS Determine if desired effects have been met