Term
How are national decisions defined? |
|
Definition
Content of grand strategy and resources available to implement strategy. Decisions are products of political processes within Govenrment |
|
|
Term
What elements comprise the coordination of military strategy? |
|
Definition
- Employment
- Development
- Deployment
|
|
|
Term
Explain the coordination process |
|
Definition
Geared on relationships between instruments of power a the grand strategy level. Strategists coordinate the elements of military strategy, considering elements such as risks, preparations for worst case, and can one prepare for both possibilities or would it raise specter of not being prepared for either. |
|
|
Term
How does Major Regional Conflict affect National Security? |
|
Definition
Pose heavy demand on US forces and drives force requirements. |
|
|
Term
Identify the 4 phases of Department planning Framework for Major Regional Conflict |
|
Definition
- Halting the invasion
- force buildup
- Counteroffensive
- Ensure Postwar Stability
|
|
|
Term
When does regional conflict exist? |
|
Definition
Any time the use of military power by force is contemplated or activated |
|
|
Term
|
Definition
the systematic use of terror or unpredictable violence against governments, publics, or individuals to attain a political objective. used by political organizations with rightist and leftist objectives, by nationalistic and ethnic groups, revolutionaries, armies and secret police of governments themselves. |
|
|
Term
Identify two terrorist groups: |
|
Definition
- Baader-Meinhof Gang West Germany
- Red Army (Japan)
- Red Brigades (Italy)
- FALN (Puerto Rican)
- al-Fatah (Palestine)
- Shining Path (Peru)
- Direct Action (France)
- Ku Klux
- Al Qaida
|
|
|
Term
How do terrorist groups finance their violent activities? |
|
Definition
Drug trafficking, robbery, extortion, kidnapping, blackmailing and arms smuggling. |
|
|
Term
What is the responsibility of the HIDTA Program? |
|
Definition
Reducing the reproduction, manufacturing, distribution, transportation and chronic use of illegal drugs, money laundering. |
|
|
Term
Which drug doe sthe intellligence community believes has been the primary narcotics threat since 1985. |
|
Definition
|
|
Term
Which drug is most widely abused and readily available, illicit drug in the United States? |
|
Definition
|
|
Term
How does international organized crime negatively impact our nation? |
|
Definition
chokes natural resources, banks, and financial institutions, moves illegal monies, places US in extremely vulnerable position. |
|
|
Term
What is the fundamental purpose of the US nuclear arsenal? |
|
Definition
deter enemies use of nuclear arsenal or WMD |
|
|
Term
What three interrelated factors are viewed as the formula that produces deterrence? |
|
Definition
Capability Will (intent) perception |
|
|
Term
"one which has manufactured and exploded a nuclear weapon or other nuclear explosive device prior to January 1967" would be the definition of what key nuclear deterrence concept? |
|
Definition
the Non Proliferation Treaty defines this as a Nuclear Weapon State |
|
|
Term
Weapon system reliability and individual reliability are two key components of reliability when referring to nuclear weapons. How are each of these components implemented in the AF? |
|
Definition
Weapons System Reliability: combination of mechanical means, security programs, and rules based on capabilities. Individual reliability: two programs to enhance nuclear surety; PRP |
|
|
Term
What does Information Warfare consist of? |
|
Definition
Actions taken to achieve information superiority by affecting adversary IS and protecting our own IS. encompasses all levels of war: tactical to strategic / peacetime and wartime. |
|
|
Term
Describe the emphasis of Offensive Information Warfare |
|
Definition
Manipulation of enemy IS to influence perceptions and behavior; disabling military/civilian TeleCom; infiltration; use if direct broadcast satellits, commercial media and visual stimulus/illusion |
|
|
Term
What does defensive information warfare entail? |
|
Definition
req's ability to detect and thwart attempts to tamper with IS; Ensure integrity of C2; protect civilian infrastructure |
|
|
Term
What is the American information infrastructure vulnerable to? |
|
Definition
infiltration and sabotage |
|
|
Term
Identify the nine critical issue areas of an infrastructure? |
|
Definition
Fragmentation of responsibility technology architectureal framework people facilities databases network control threat and risk security in a global infrastructure |
|
|
Term
What are the three keys to protecting the nation's information infrastructure? |
|
Definition
provide ability to to protect system detect events when occur be able to detect attack (false positives) react to event and minimize impact restore and maintain capability Protect Detect React |
|
|
Term
How does MOOTW (Military Operations Other Than War) support National Security? |
|
Definition
Deters war, resolving conflict, promoting peace and supporting civil authorities during crisis |
|
|
Term
What does Combat Operations of MOOTW include? |
|
Definition
protection of shipping; enforcement of exclusion zones; counter air interdiction; combat peace enforcement |
|
|
Term
What is the goal of MOOTW during noncombat? |
|
Definition
achieve national objectives quickly and favorably; MOOTW changes... |
|
|
Term
When is overlapping operations of MOOTW prevalent? |
|
Definition
simultaneous combat and noncombat MOOTW |
|
|
Term
How do space operations support National Security? |
|
Definition
By eliminating the use of hostile forces ability to disrupt navigation signals. |
|
|
Term
What responsibilities lie within space systems structure? |
|
Definition
Military leaders, operators adn planners ; services that are essential in rapid dominance of battle space; |
|
|