WS Flashcards
<!--StartFragment-->
State the reason our adversaries have been able to close the technological gap between our respective militaries<!--EndFragment-->
<!--StartFragment-->
- We assess that highly networked business practices and information technology are providing opportunities for foreign intelligence and security services, trusted insiders, hackers, and others to target and collect sensitive US national security and economic data.
- (We are being hacked)
<!--EndFragment-->
<!--StartFragment-->
State the impact of US efforts against Al-Qa’ida since 2008.
<!--EndFragment-->
<!--StartFragment-->
- Senior personnel losses in 2012, amplifying losses and setbacks since 2008, have degraded core al-Qa’ida to a point that the group is probably unable to carry out complex, large-scale attacks in the West.
- However, the group has held essentially the same strategic goals since its initial public declaration of war against the United States in 1996, and to the extent that the group endures, its leaders will not abandon the aspiration to attack inside the United States.
<!--EndFragment-->
<!--StartFragment-->
State the ways that Transnational Organized Crime (TOC) networks threaten US national interests
<!--EndFragment-->
<!--StartFragment-->
- Drug Activities
- Facilitating Terrorist Attacks (semi-legitimate travel experts, attorneys, and other types of professionals, & corrupt officials)
- Money Laundering (criminals rely on USD)
- Corruption (some countries are narco-states)
- Human Trafficking
- Environmental Crime (illicit trade in wildlife, timber, and marine resources)
<!--EndFragment-->
<!--StartFragment-->
Identify the opportunities created by ungoverned spaces<!--EndFragment-->
<!--StartFragment-->
The struggles of new governments in places like Tripoli (Libya) and Sanaa (Yemen) to extend their writs, as well as the worsening internal conflict in Syria, have created opportunities for extremist groups to find ungoverned space from which to destabilize the new governments and prepare attacks against Western interests inside those countries.
<!--EndFragment-->
<!--StartFragment-->
State the three US interests resulting from the Arab Spring
<!--EndFragment-->
<!--StartFragment-->
Ungoverned spaces.
- The struggles of new governments in places like Tripoli and Sanaa to extend their writs, as well as the worsening internal conflict in Syria, have created opportunities for extremist groups to find ungoverned space from which to destabilize the new governments and prepare attacks against Western interests inside those countries.
Economic Hardships.
- Many states face economic distress—specifically, high rates of unemployment—that is unlikely to be alleviated by current levels of Western aid and will require assistance from wealthy Arab countries as well as reforms and pro-growth policies. Failure to meet heightened popular expectations for economic improvement could set back transitions in places such as Egypt and destabilize vulnerable regimes such as Jordan. Gulf states provide assistance only incrementally and are wary of new governments’ foreign policies and their ability to absorb funds.
Negative Views of the United states.
- Some transitioning governments are more skeptical than their predecessors about cooperating with the United States and are concerned about protecting sovereignty and resisting foreign interference. This has the potential to hamper US counterterrorism efforts and other initiatives to engage transitioning governments.
<!--EndFragment-->
<!--StartFragment-->
State the definition of terrorism according to Joint Publication 3-07.2<!--EndFragment-->
<!--StartFragment-->
- The unlawful use of violence or threat of violence to instill fear and coerce governments or societies.
- Terrorism is often motivated by religious, political, or other ideological beliefs and committed in the pursuit of goals that are usually political.
<!--EndFragment-->
<!--StartFragment-->
Describe the three typologies of terrorists and terror groups<!--EndFragment-->
<!--StartFragment-->
- Political: Force governments to change structure or policies, or to achieve radical societal change
- Religious: Objectives/actions divinely guided; often tied to ethnic and nationalist identities
- Social: “Special interest” (e.g., animal rights)
<!--EndFragment-->
<!--StartFragment-->
List the six possible terrorist objectives as described in the lesson<!--EndFragment-->
<!--StartFragment-->
- Attract attention for cause
- Demonstrate group’s power
- Show government’s lack of power
- Exact revenge
- Obtain logistical support
- Cause a government to overreact
<!--EndFragment-->
<!--StartFragment-->
State the most common terrorist tactic<!--EndFragment-->
Bombing
<!--StartFragment-->
State the four enduring policy principles that guide US counterterrorism strategy<!--EndFragment-->
<!--StartFragment-->
- Make no concessions to terrorists
- Bring terrorists to justice for their crimes
- Isolate and apply pressure on states that sponsor terrorism to force them to change their behavior
- Bolster the counterterrorist capabilities of those countries that work with the United States and require assistance
<!--EndFragment-->
<!--StartFragment-->
Outline the seven-step terrorist planning cycle<!--EndFragment-->
- Broad target selection: Collection of data on large number of potential targets
- Intelligence and surveillance: Information gathering on the targets with greatest possibility of success (e.g., schedules, security, layout, etc.)
- Specific target selection: Decision point!
- Pre-attack surveillance and planning: Quantity and quality of data gathering increases, and usually is gathered over days to weeks
- Attack rehearsal: Often includes relocation to target site, testing of security responsiveness and escape routes, and checking equipment performance
- Action: Generally, goal is to get in, get the job done, and get out before security forces can react
- Escape and exploitation: Escape plans well rehearsed and exploitation of successful attack vital to achieve desired effect
<!--EndFragment-->
<!--StartFragment-->
Describe joint operations<!--EndFragment-->
<!--StartFragment-->
- Key thing: defined by all five of the services as “integrated and synchronized application of all appropriate capabilities for a unified effort.”
- Joint Publication 1 and 3-0
- Contains two or more services from two or more departments. Marines are still under Dept of the Navy.
- (can’t use the word “define” because it is patched from several sources)
<!--EndFragment-->
<!--StartFragment-->
Describe the joint functions<!--EndFragment-->
<!--StartFragment-->
- Joint functions are related capabilities and activities grouped together to help the Joint Force Commander (JFC) integrate, synchronize, and direct joint operations.
- The six functions that are common to joint operations at all levels of war are:
- <!--StartFragment-->
Command and Control (C2)
2. Intelligence 3. Fires (capability of using lethal force) 4. Movement and Maneuver 5. Protection 6. Sustainment.
<!--EndFragment-->
- <!--StartFragment-->
Some functions, such as C2 and Intelligence, apply to all operations. Others, such as Fires, apply as required by the JFC’s mission.
<!--EndFragment-->
<!--EndFragment-->
<!--StartFragment-->
State the range of military operations
<!--EndFragment-->
<!--StartFragment-->
- Crisis Response and Limited Contingency Operations to Major Operations and Campaigns<!--StartFragment-->
- Military Engagement, Security Cooperation, and Deterrence
- <!--StartFragment-->
FPCON Alpha: (checking IDs at the gate) —-> Bravo: Security Cooperation (kevlar etc) & deterrence —> Delta: major operations
<!--EndFragment-->
<!--EndFragment-->
<!--StartFragment-->
Outline the operational joint chain of command from the President to the individual components<!--EndFragment-->
<!--StartFragment-->
- President
- Sec Def (Chuck Hagel)
- Unified CC (General Austin)
- Component CC: Land, Maritime, AFCC, Special Ops
<!--EndFragment-->