Term
Authority often provides both the permission to do something as well as defining those actions that cannot be taken. |
|
Definition
|
|
Term
The Capstone Concept for Joint Operations or CCJO, identifies the concept of Globally Integrated Operations as a means of addressing future challenges to national security. There are eight key elements of Globally Integrated Operations, which are listed here. • Mission command • Seize, retain and exploit the initiative • Global agility • Partnering • Flexibility in establishing Joint Forces • Cross-domain synergy • Use of flexible, low-signature capabilities • Increasingly discriminate to minimize unintended consequences |
|
Definition
Mission Command:
1. Operationalizing mission command requires delegation of authority, where appropriate, in order to drive approval levels down and speed decision-making. Achieving a common and shared understanding of authorities horizontally as well as vertically is necessary to ensure that decisions are in keeping with Commander’s guidance and help achieve Commander’s intent. A common and shared understanding of authorities is therefore also critical to fostering trust and confidence among commanders.
Seize, retain and exploit the initiative:
2. Globally integrated operations must provide the ability to seize, retain, and exploit the initiative in time and across domains. Controlling the pace of operations is a key part of maintaining military advantage. Especially in a conflict that plays out in multiple domains, operational campaign design must enable us to decide and direct faster than our adversaries. This fast pace of decision-making and action will rely heavily of clearly stated and understood authorities.
Partnering:
3. Non-DoD organizations bring disparate authorities to bear on military operations. Because of this, integrating subject matter experts and mission partner representatives into the planning process and maintaining awareness of authorities through the use of a matrix will assist in identifying, developing, and understanding the authorities necessary to accomplish the mission. |
|
|
Term
Authority for the U.S. forces comes from what sources |
|
Definition
Constitution, Written statutes, and judicial decisions the fifty numbered titles of the united states code. |
|
|
Term
OPCON is the authority to perform certain functions of command over subordinate forces and includes which of the following? |
|
Definition
assigning tasks, designating objectives, and organizing and employing commands and forces. |
|
|
Term
OPCON is the authority to perform certain functions of command over subordinate forces and does not include |
|
Definition
Authoritative direction for logistics or administration Discipline Internal organization Unit training |
|
|
Term
|
Definition
Is inherent in OPCON Can be delegated to subordinate commanders Is limited to the detailed local direction and control of movements or maneuvers |
|
|
Term
military commander authority is extended beyond unit forces to include contractors. |
|
Definition
|
|
Term
The authority to protect the resilience and redundancy of critical military infrastructure resides with DoD under Title 10; the authority to protect the resilience and redundancy of critical civilian infrastructure resides with the National Security Agency (NSA) under Title 50.
In addition to maintaining and protecting military systems and infrastructure, DoD has a vital interest in the continued availability of communications and other civilian infrastructure. |
|
Definition
1. Domestic cyber operations are restrained by what laws?
The Posse Comitatus Act generally prohibits active participation of the military in enforcing civilian laws. This limits the ability of the military to take action to protect civil infrastructure. Cyber operations are also further constrained for both the military and civilian agencies by privacy laws and civil liberties. However, under current authorities, DoD can and does work with other U.S. Government agencies by exchanging information on cyber activities and planning for wartime and emergency protection of infrastructure.
2. What international authorities exist for cyber operations?
Customary practices are not yet recognized for international cyber operations. NATO’s Cooperative Cyber Defence Centre of Excellence recently released the Tallinn Manual, setting forth the view of internationally recognized cyber subject matter experts on standards that reflect customary international law as it relates to cyberspace. |
|
|
Term
International law springs from which of the following? |
|
Definition
customary law of nations practiced over time, international agreements, and treaties |
|
|
Term
The authority to protect the resilience and redundancy of critical military infrastructure resides with the National Security Agency (NSA) under Title 50. |
|
Definition
|
|
Term
The authority to protect the resilience and redundancy of critical civilian infrastructure resides with the National Security Agency (NSA) under which U.S. Title Code? |
|
Definition
|
|
Term
Which of the following are some of the resources for identifying intelligence authorities? |
|
Definition
DoD Directive 5240.1-R, the foreign intelligence surveillance act, and national disclosure policy 1 |
|
|
Term
the definition of ROE is stated in Joint Doctrine is, "Directives issued by competent military authority that delineate the circumstances and limitations under which United States forces will initiate and/or continue combat engagement with other forces encountered." |
|
Definition
|
|
Term
Developing ROE and managing ROE measures are functions of which joint staff directorate? |
|
Definition
|
|
Term
the commander's guidance and intent are often provided in which of the following? |
|
Definition
fragmentary orders (FRAGOs) |
|
|
Term
Staffs that are proactive in generation of appropriate and robust supplemental ROE measures and requisite justifications stay ahead of operational requirements and minus vulnerabilities. |
|
Definition
|
|
Term
One type of authority common to virtually every military operation is the authority to use force. The use of force is governed by the international law principles of the Law of War, national and coalition ROE, and guidance and intent from superior commanders. The authority to use force begins with an understanding of the four principles, or pillars, of the use of force under the Law of War. These principles are: •Military Necessity •Unnecessary Suffering •Distinction •Proportionality
Choose two of the above principles, and discuss what would be considered a violation of the Law of War, as well as what could happen to an operation if the Law of War is violated. |
|
Definition
Military Necessity
A violation of military necessity would include the intentional targeting of protected persons (civilians, hostile personnel who have surrendered or are otherwise "out of combat," etc.) and places (objects or places that are used for purely civilian purposes, such as hospitals, schools, and cultural property that have not been converted to or for military/hostile use). This is because these protected persons and places do not constitute legitimate military objectives in furtherance of the accomplishment of the mission.
Unnecessary Suffering
While DoD weapons and ammunition are designed to generally comply with the principle of avoiding unnecessary suffering, they must not be used in such a manner as to cause injury in a way that is disproportionate to the military advantage to be gained from its use.
Distinction
Closely linked to military necessity, parties to a conflict must draw a distinction between military and non-military objectives, directing their operations only against military objectives. Military objectives are combatants and those objects which by their nature, location, purpose, or use make an effective contribution to military action and whose total or partial destruction, capture or neutralization, in the circumstances ruling at the time, offer a definitive military advantage.
Proportionality
This principle is only applicable when an attack may possibly affect civilians or civilian objects, and thereby result in collateral damage. A military commander must assess his or her obligations as to the principle of distinction, while avoiding actions that are indiscriminate |
|
|
Term
Three factors that influence both the mission assigned to the joint force and the rules of engagement (ROE) are _____. |
|
Definition
|
|
Term
Authority often provides both the permission to do something as well as providing guidance and limitations on how it should be done |
|
Definition
|
|
Term
Understanding disparate authorities among coalition partners is _ |
|
Definition
essential to taking full advantage of the capabilities within a coalition and avoiding wasted planning effort |
|
|
Term
The concept of mission command is an entirely new concept. |
|
Definition
|
|
Term
Operations conducted with coalition partners will bring to bear _____. (Select all that apply.) |
|
Definition
different national capabilities
different national policies
different national limitations or caveats
different national laws |
|
|
Term
) In non-combat situations during non-combatant evacuation or personnel recovery operations, requests for rules of engagement (ROE) permitting the use of riot control agents can be requested at the last minute? |
|
Definition
|
|
Term
The authority to protect the resilience and redundancy of critical civilian infrastructure resides with the National Security Agency (NSA) under which U.S. Code? |
|
Definition
|
|
Term
Efforts by Congress in recent years to extend Federal criminal jurisdiction over deployed contractors has included the _____. |
|
Definition
Military Extraterritorial Jurisdiction Act |
|
|
Term
) International law springs from which of the following? (Select all that apply.) |
|
Definition
treaties customary law of nations practiced over time
international agreements |
|
|
Term
For U.S. forces, domestic sources of authority include which of the following? (Select all that apply.) |
|
Definition
U.S. Constitution written statutes judicial decisions |
|
|
Term
What are the main sources of authority in planning and conducting a mission? (Select all that apply.) |
|
Definition
legitimacy in the means of conducting the mission
legitimacy in the mission itself
legitimacy in the results of the mission |
|
|
Term
A best practice in organizing advisory support to the planning process is development of which one of the following? |
|
Definition
battle rhythm coverage plan |
|
|