Term
| How are national decisions defined? |
|
Definition
| Content of grand strategy and resources available to implement strategy. Decisions are products of political processes within Govenrment |
|
|
Term
| What elements comprise the coordination of military strategy? |
|
Definition
- Employment
- Development
- Deployment
|
|
|
Term
| Explain the coordination process |
|
Definition
| Geared on relationships between instruments of power a the grand strategy level. Strategists coordinate the elements of military strategy, considering elements such as risks, preparations for worst case, and can one prepare for both possibilities or would it raise specter of not being prepared for either. |
|
|
Term
| How does Major Regional Conflict affect National Security? |
|
Definition
| Pose heavy demand on US forces and drives force requirements. |
|
|
Term
| Identify the 4 phases of Department planning Framework for Major Regional Conflict |
|
Definition
- Halting the invasion
- force buildup
- Counteroffensive
- Ensure Postwar Stability
|
|
|
Term
| When does regional conflict exist? |
|
Definition
| Any time the use of military power by force is contemplated or activated |
|
|
Term
|
Definition
| the systematic use of terror or unpredictable violence against governments, publics, or individuals to attain a political objective. used by political organizations with rightist and leftist objectives, by nationalistic and ethnic groups, revolutionaries, armies and secret police of governments themselves. |
|
|
Term
| Identify two terrorist groups: |
|
Definition
- Baader-Meinhof Gang West Germany
- Red Army (Japan)
- Red Brigades (Italy)
- FALN (Puerto Rican)
- al-Fatah (Palestine)
- Shining Path (Peru)
- Direct Action (France)
- Ku Klux
- Al Qaida
|
|
|
Term
| How do terrorist groups finance their violent activities? |
|
Definition
| Drug trafficking, robbery, extortion, kidnapping, blackmailing and arms smuggling. |
|
|
Term
| What is the responsibility of the HIDTA Program? |
|
Definition
| Reducing the reproduction, manufacturing, distribution, transportation and chronic use of illegal drugs, money laundering. |
|
|
Term
| Which drug doe sthe intellligence community believes has been the primary narcotics threat since 1985. |
|
Definition
|
|
Term
| Which drug is most widely abused and readily available, illicit drug in the United States? |
|
Definition
|
|
Term
| How does international organized crime negatively impact our nation? |
|
Definition
| chokes natural resources, banks, and financial institutions, moves illegal monies, places US in extremely vulnerable position. |
|
|
Term
| What is the fundamental purpose of the US nuclear arsenal? |
|
Definition
| deter enemies use of nuclear arsenal or WMD |
|
|
Term
| What three interrelated factors are viewed as the formula that produces deterrence? |
|
Definition
Capability Will (intent) perception |
|
|
Term
| "one which has manufactured and exploded a nuclear weapon or other nuclear explosive device prior to January 1967" would be the definition of what key nuclear deterrence concept? |
|
Definition
| the Non Proliferation Treaty defines this as a Nuclear Weapon State |
|
|
Term
| Weapon system reliability and individual reliability are two key components of reliability when referring to nuclear weapons. How are each of these components implemented in the AF? |
|
Definition
Weapons System Reliability: combination of mechanical means, security programs, and rules based on capabilities. Individual reliability: two programs to enhance nuclear surety; PRP |
|
|
Term
| What does Information Warfare consist of? |
|
Definition
| Actions taken to achieve information superiority by affecting adversary IS and protecting our own IS. encompasses all levels of war: tactical to strategic / peacetime and wartime. |
|
|
Term
| Describe the emphasis of Offensive Information Warfare |
|
Definition
| Manipulation of enemy IS to influence perceptions and behavior; disabling military/civilian TeleCom; infiltration; use if direct broadcast satellits, commercial media and visual stimulus/illusion |
|
|
Term
| What does defensive information warfare entail? |
|
Definition
| req's ability to detect and thwart attempts to tamper with IS; Ensure integrity of C2; protect civilian infrastructure |
|
|
Term
| What is the American information infrastructure vulnerable to? |
|
Definition
| infiltration and sabotage |
|
|
Term
| Identify the nine critical issue areas of an infrastructure? |
|
Definition
Fragmentation of responsibility technology architectureal framework people facilities databases network control threat and risk security in a global infrastructure |
|
|
Term
| What are the three keys to protecting the nation's information infrastructure? |
|
Definition
provide ability to to protect system detect events when occur be able to detect attack (false positives) react to event and minimize impact restore and maintain capability Protect Detect React |
|
|
Term
| How does MOOTW (Military Operations Other Than War) support National Security? |
|
Definition
| Deters war, resolving conflict, promoting peace and supporting civil authorities during crisis |
|
|
Term
| What does Combat Operations of MOOTW include? |
|
Definition
| protection of shipping; enforcement of exclusion zones; counter air interdiction; combat peace enforcement |
|
|
Term
| What is the goal of MOOTW during noncombat? |
|
Definition
| achieve national objectives quickly and favorably; MOOTW changes... |
|
|
Term
| When is overlapping operations of MOOTW prevalent? |
|
Definition
| simultaneous combat and noncombat MOOTW |
|
|
Term
| How do space operations support National Security? |
|
Definition
| By eliminating the use of hostile forces ability to disrupt navigation signals. |
|
|
Term
| What responsibilities lie within space systems structure? |
|
Definition
| Military leaders, operators adn planners ; services that are essential in rapid dominance of battle space; |
|
|