These are complementary to the principles of war, also outlined in the doctrine document.
the tenets of air, space and cyber power
Tenets of air, space and cyber power: Any commander has to determine where and when to mass combat forces.
Tenets of air, space and cyber power: Whether in space or cyberspace, the objective is to keep pressure on the enemy and not allow them the time to gather resources to resist.
Tenets of air, space and cyber power: Commanders will need accurate information to determine not only what targets to strike first, but also what air assets should be used against them.
Like nuclear planning, _____ operations cross all arenas when it comes to levels of war and the range of military operations.
____ intelligence is produced by elements of more than one service and consequently relies heavily on the timely and integrated departmental intelligence afforded by national intelligence organizations.
Principles of joint intelligence: Think like the adversary
Principles of joint intelligence: Synchronize intelligence with plans and operations.
Principles of joint intelligence: Remain intellectually honest.
Principles of joint intelligence: Cooperate to achieve a common end state.
Unity of effort
Principles of joint intelligence: Prioritize requirements based on commander's guidance.
Principles of joint intelligence: Strive to achieve the highest standards of quality.
Principles of joint intelligence: Accept the risk of predicting adversary intentions.
Principles of joint intelligence: Remain flexible and adapt to changing situations.
Principles of joint intelligence: Leverage expertise of diverse analytic resources.
Principles of joint intelligence: Exploit all sources of information and intelligence.
There are three levels of war:
- strategic - operational - tactical
(true/false) There are no distinguishing lines or boundaries between the levels of war.
At the this level of war, the US determines national security objectives and guidance and utilizes national resources to accomplish these objectives.
This level of war address issues of why we will fight, what we will fight with, and why the enemy fights against us.
At the ____ level of war, intelligence is also key to research and development, weapons system acquisition, and force protection planning.
Targeting and planning at the _____ level of war determines what we will attack, with what strategy, in what order, and for what duration.
Campaign planners at the ____ level rely on ISR to provide intelligence crucial to understanding an enemy's weaknesses and key nodes that can be affected.
ISR at this level of war also provides the means to assess the effects of current operations.
This is the level of war where individual battles and engagements are fought.
ISR support at the ____ level is focused on threat warning, mission planning, targeting, and assessment.
This term/concept is used inplace of military operations other than war (MOOTW)
Range of Military Operations (ROMO)
These ongoing and specialized capabilities establish, shape, maintain, and refine relations with other nations and domestic civil authorities (e.g., state governors or local law enforcement).
Special military activities
This Special military activity is the routine contact and interaction between individuals or elements of US military forces and those of another nation's armed forces or foreign and domestic civilian authorities or agencies.
This Special military activity involves all DoD interactions with foreign defense establishments to build defense relationships.
______ is a key element of global and theater shaping operations and a pillar of weapons of mass destruction nonproliferation.
When required to achieve national strategic objectives or to protect national interests, the US national leadership may decide to conduct a ________ involving large-scale combat, placing the United States in a wartime state.
major operation or campaign
This is a conflict between governments, nations, or coalitions. Concrete participants can be identified.
_____ warfare is a conflict in which one or more of the participants is a non-state entity and is trying to either overthrow the governing entity or is trying to win over the public.
_____ warfare is conducted using security forces and or regular military personnel and does not use chemical, biological, nuclear, or radiological weaponry.
______ warfare will generally use locals and other guerilla type forces.
______warfare is a conflict between equally capable forces. Each side has similar resources, training, and capabilities across the board.
______ warfare is a conflict between groups that are not equally equipped across the board and each side will throw their strengths at the opponent's weaknesses.
The Cold War is a form of ______ warfare.
The Revolutionary War is an example ______ warfare.
This is a military operation designated by the SECDEF as an operation in which the members of the armed forces are or may become involved in military actions, operations, or hostilities against an enemy of the US.
A contingency operation
As defined by law under US Code, a contingency operation exists when...
the President or Congress declares war or a national emergency.
There are two general planning processes:
- contingency planning (formerly referred to as deliberate planning) - crisis action planning.
_____ test and help improve contingency plans.
The purpose of contingency planning is to...
reduce the time necessary in developing a crisis action plan by having a similar plan developed and in place.
The _____ is a directive issued by the CJCS that initiates development and evaluation of COA by a supported commander and requests a commander's estimate be submitted.
This describes the situation, allocate forces and resources, establish command relationships, provide other initial planning guidance, and initiate subordinate unit mission planning.
A ______does not authorize movement of forces unless specifically stated.
The CJCS can send a ______ to the supported commander to direct execution planning before a COA is formally approved by the SECDEF and President.
______ is normally issued following a decision by the President that conduct of military operations in support of national interests is a distinct possibility.
This order will sufficiently describe the COA to allow the supported commander to begin or continue the detailed planning necessary to deploy forces.
An ____ is a directive issued by a commander to subordinate commanders for the purpose of executing a coordinated operation (e.g., air operations, training exercises, etc.).
_____ is prepared during crisis action planning and can be developed by modifying or expanding an existing ______, or it can be built from scratch.
This order is issued by the authority and direction of the SECDEF through the CJCS and directs the deployment and/or employment of forces.
If the _____ was preceded by a detailed ALERTORD or PLANORD, then the _____ simply directs the deployment and employment of forces.
An ___ is an organizational structure composed of force packages with capabilities providing warfighting commanders with rapid and responsive aerospace power.
Our current AEF is a one baseline construct of ___-day availability periods followed by a __-month reconstitution and training period.
Designed to arrive after the QRF and before the APS, the ____ is organized into seven areas.
Interim brigade combat team (IBCT)
There are currently how many Carrier Strike Groups (CSG) within the US Navy?
A _____ is the Marine Corps concept for military operations. The structure combines air, ground combat, and logistical support elements under one command.
Marine Air Ground Task Force (MAGTF)
Creating and maintaining high tempo operations in multi-national environments may not be possible because of
allied nations' capabilities or because of the slow pace of multi-national consultations.
The JCS defines _____ as the sum of military, diplomatic, and civil efforts to effect the recovery and return of US Military, DoD civilians, and DoD contractor personnel who are isolated or missing while participating in a US government-sanctioned activity or mission in an uncertain or hostile environment, or as determined by the SECDEF.
personnel recovery (PR)
_____ is defined as US military, DoD personnel, or other personnel designated by the President or SECDEF, who have become separated from their unit or organization in an uncertain or hostile environment or otherwise unfriendly areas.
isolated personnel (IP)
Intelligence units with _____ collection capabilities can preemptively monitor friendly distress frequencies and beacons, report on possible PR incidents, and monitor adversary reactions.
When filled in, the ISOPREP card is classified ______.
As a permanent record, it is a vital part of long-term POW or MIA accountability, and individuals must have a completed ______ on file prior to deployment.
_____ is the planned effort necessary to ensure the physical and psychological sustainment of an IP.
This may include establishing two-way communications, morale building, aerial resupply, or suppression of enemy threats to the IP.
Past experience has shown that the chance that a survivor in combat will be successfully rescued is drastically lowered after ___ or more hours.
Ideally, PRO will be able to bring the IP under the control of the recovery force in less than ___ hours; this is a goal, not a strict requirement.
The ______ is a dual-role fighter designed to perform air-to-air and air-to-ground missions.
F-15E Strike Eagle
This fighter aircraft possesses the capability to fight its way to a target over long ranges, destroy enemy ground positions, and fight its way out.
F-15E Strike Eagle
The _______ is the prototypical dogfighter: small, extremely maneuverable, and good combat radius; however, it has evolved over the years into a multi-role aircraft.
F-16 Fighting Falcon
This is a twin-engine, multi-mission, tactical aircraft; capable of performing the following missions: fighter escort, SEAD, reconnaissance, forward air control (FAC), close air support (CAS), and day and night strike missions.
The multi-mission ______ strike fighter is an upgrade to C/D models, and replaces the retired F-14 Tomcat.
F/A-18E/F "Super Hornet"
electronic attack version of the two-seat Super Hornet. It will replace the Navy's EA-6B Prowler.
Its agility and ability to sustain supersonic speeds without the use of afterburner (supercruise) represents an exponential leap in warfighting capabilities.
The ______ is designed specifically to replace USAF A-10s and F-16s, US Navy's F/A-18s (excluding the Super Hornet), and UK Harrier GR7s and Sea Harriers.
F-35 Lightning II
Is the result of the DoD's Joint Strike Fighter program, which sought to build a multi-role fighter optimized for the air-to-ground role with secondary air-to-air capability.
F-35 Lightning II
The primary mission of the _____ is to provide day and night close air support for friendly ground forces, and to act as forward air controller-airborne (FAC-A) to coordinate and direct friendly air support.
A-10 Thunderbolt II
This aircraft, the ___, has a secondary mission of supporting search and rescue, and Special Forces operations, and has a limited capability to perform certain types of interdiction.
A-10 Thunderbolt II
The _____ is a family of second-generation vertical/short takeoff and landing (V/STOL) ground-attack aircraft.
AV-8B Harrier II
The ______ is a single-seat, twin-engine, multi-role aircraft. The aircraft was developed and produced by the partner countries Great Britain, Germany, Italy, and Spain, and has now been exported to Austria and Saudi Arabia.
Euro fighter Typhoon
The ____ is a family of twin-engine combat aircraft which was jointly developed by the United Kingdom, West Germany, and Italy.
The _____ is a French twin-engine, delta-wing highly agile multi-role aircraft.
This single-engine aircraft was designed in the 1970s as a lightweight fighter for the French AF, and evolved into a multi-role aircraft with many different variants.
This aircraft's good maintainability and low support requirements allow a ____ force to generate more sorties than any other aircraft in its class or, alternatively, to achieve the same level of operational tasking but with a smaller force.
The____ is our only supersonic bomber, and is US military's only active variable-sweep wing aircraft.
The _____ is a multi-role, low-observable, bomber capable of delivering both conventional and nuclear munitions.
Some variants been in service since 1955, over 50 years of faithful service. It's capable of flying at high subsonic speeds at altitudes up to 50,000 feet.
The _____ is a heavy-cargo transport designed to provide massive strategic airlift, for deployment and supply of US forces.
Both nose and rear doors open the full width and height of the cargo compartment, allowing drive-through loading and unloading of wheeled and tracked vehicles, and faster, easier loading of bulky equipment.
The ____ primarily performs the light-lift, intra-theater portion of the airlift mission. The aircraft is capable of operating from rough, dirt airstrips, and is the prime transport for dropping troops and equipment into hostile areas.
_____ is a major force multiplier by increasing the range, payload, loiter time, and ultimately the flexibility and versatility of combat, combat support, and mobility aircraft.
Has a fuel load of more than 356,000 pounds of fuel.
The ____ primary mission is to refuel long-range bombers, but it also provides aerial refueling support to our sister service and Allied aircraft.
The _____ electronic warfare aircraft enhances the strike capabilities of not only carrier-based air wings, but of USAF and allied forces as well.
With its jamming and HARM capability, the ____ is a unique national asset that will be deployed from land bases and aircraft carriers.
The _____ is an airborne tactical weapon system using a heavily modified version of the C-130 Hercules airframe.
EC-130H Compass Call
The ______ employs the offensive counter-information and EA capabilities in support of US and coalition tactical air, surface, and special operations forces.
EC-130H Compass Call
The ____ features full integration of the AGM-88 HARM and the HARM Targeting System (HTS) to perform the demanding SEAD mission.
The _____ is an airborne warning and control system (AWACS) aircraft with an integrated command and control battle management, surveillance, target detection, and tracking platform.
The aircraft provides an accurate, real-time picture of the battlespace to the AOC.
Its primary mission is to provide theater ground and air commanders with ground moving target indication (GMTI) to support attack operations, and targeting that contributes to the delay, disruption and destruction of enemy forces.
E-8C Joint Surveillance Target Attack Radar System (JSTARS)
The _____ provides continuous day and night, high-altitude, all-weather surveillance and reconnaissance in direct support of US and allied ground and air forces.
U-2 Dragon Lady
The _______ is equipped with an extensive array of sophisticated intelligence gathering equipment enabling military specialists to monitor the electronic activity of adversaries.
RC-135 V/W Rivet Joint (RJ)
This aircraft is a national and tactical SIGINT collector that exploits and disseminates information regarding the electronic battlefield.
RC-135V/W Rivet Joint
The US Navy's ____ provides the capability to detect and exploit tactically significant ELINT and COMINT information to the appropriate Battle Group Commanders.
EP-3E Aries II
The_____ provides near real-time tactical electronic reconnaissance capability for Battle Group I&W, targeting, SEAD, and strike sorties.
EP-3E Aries II
The _____ is a medium- to low-altitude, twin-engine turboprop aircraft.The primary mission is providing ISR support directly to ground forces.
____ are designed with force attrition in mind as reflected in their relatively low cost per unit, off-the-shelf technology, and automated remote control of the vehicle.
unmanned aerial systems (UAS)
What UAS class category: operational range will be approximately 50 kilometers.
UAS-Close Range (UAS-CR)
What UAS class category: Flight duration of 8-10 hours designed to penetrate into enemy airspace out to a range of 200 kilometers with data link.
UAS-Short Range (UAS-SR)
What UAS class category: minimum of 24 hours of coverage and be capable of performing multiple missions simultaneously.
The _____ primary mission is interdiction and conducting armed reconnaissance against critical, perishable targets. When it is not actively pursuing its primary mission, it augments the JFACC-owned theater asset for reconnaissance, surveillance, and target acquisition in support of the Joint Force commander.
It is a high-altitude, long-endurance UAS with an integrated sensor suite that provides ISR capability worldwide.
RQ-4 Global Hawk
The ____ is the only aircraft that can be completely computer controlled.
RQ-4 Global Hawk
Its primary mission is as a persistent hunter-killer against emerging targets to achieve JFC objectives.
The tactical and short-range air vehicles is hand-launched, weighs less than five pounds, and has an endurance of up to 80 minutes.
Today's current Army doctrine has been in place since 1993 and is called ______
Army Operations (AO)
The basic building block of all Army organizations is the ________.
A small group of Soldiers organized to maneuver and fire is called a _____.
The ____ is the smallest element in the Army organizational structure; normally comprised of 4-10 Soldiers, but can be as large as 16 Soldiers depending on vehicle assignments..
A _____ usually has 16-40 Soldiers, but can have up to 44.
The ______ is the basic unit [Army] capable of maneuvering in the conduct of combat operations and is generally led by a 0-1/0-2
The ______ is a cohesive tactical-sized [Army] unit that can perform a battlefield function on its own; can have 60-200 Soldiers.
The size of a ______ contains 300-1,000 Soldiers. It is a unit [Army] that is tactically and administratively self-sufficient in war fighting.
A _____ can range in size from 1,500 to 5,000 Soldiers; The brigade is normally commanded by a Colonel (O-6).
A _____is made up of 10,000 to 18,000 Soldiers. It performs major tactical operations and can conduct sustained battles and engagements.
A _____ consists of two to five divisions totaling approximately 20,000 to 40,000 Soldiers.
The _____ is the deployable level of command required to synchronize and sustain combat operations. It also provides the framework for multinational operations.
Self-propelled vehicle with armored protection and cross-country capability. Includes armored personnel carriers, armored infantry fighting vehicles, and heavy armament combat vehicles. Example: M2/M3 Bradley.
Armored Combat Vehicles (tracked)
A type of armored fighting vehicle on wheels and with light armor. Their speed and range make them useful for reconnaissance, C2, and communications. Example: Stryker Light Armored Vehicle.
Armored Cars (wheeled)
Lobs projectiles of high explosives or other munitions to places relatively far away and out of sight of the battlefield. Example: M198 towed howitzer.
What Army MOS: Intel Analyst
What Army MOS: Common ground station analyst
What Army MOS: Counter Intel agent
What Army MOS: Cryptologic linguist
What Army MOS: Signals intel analyst
3rd Fleet AOR
Pacific Ocean from CONUS west coast to the international date line.
7th Fleet AOR
52 million square miles of Pacific and Indian Oceans, international date line to waters east of Africa, and from Kuril Islands in the north to Antarctic in the south.
4th Fleet AOR
Caribbean Ocean, Central/South America and surrounding waters.
5th Fleet AOR
Arabian Gulf, Red Sea, Gulf of Oman and parts of the Indian Ocean.
6th Fleet AOR
From the Cape of Norway through the waters of the Baltic and Mediterranean Seas, most of Europe, parts of the Middle East to the Cape of Good Hope in South Africa.
USMC operating forces are provided from:
Marine Forces, Atlantic (MARFORLANT) and Marine Forces, Pacific (MARFORPAC).
Allows mobile projection of Naval air power across the globe.
This US Navy ship type deploys and supports US ground forces in remote locations.
Amphibious Assault Ships
Heavily armed and armored warships designed to engage other warships and provide shore bombardment.
Multi-mission warships capable of engaging multiple simultaneous targets. Employed in force support or independent action.
Warships designed to protect other ships and as anti-submarine warfare combatants.
Capable of underwater operations. Designed to carry out research, rescue, and specific wartime operations.
Analyzes multi-source imagery to detect and report on significant military, industrial, resource, or topographical data. Navy's version of 1N1X1A.
IS-3910 - Imagery Intelligence Analyst
Provide target intelligence expertise and fuse multi-source data into presentations of the battlefield and operational area to support power projection planning. Navy's version of 1N0X1 or 1N1X1B.
IS-3923 - Strike Analyst
Navy Intel Specialty: Conduct Information Operations using foreign language skills to collect, analyze, and exploit enemy communications signals. Navy's 1N3s.
Navy Intel Specialty: Collect, analyze, and exploit signals of interest to identify, locate, and report worldwide threats. Includes COMINT collection operators, Signals Analysts and Reporters, and Senior Collection Supervisors. Most closely resemble our 1N4X1s and 1N2X1s.
Navy Intel Specialty: Collect, analyze, exploiting, and disseminate ELINT. This rating includes ELINT Analysts and Operations Technicians. Navy's 1N5X1s.
USMC Intel MOS: Collect, record, analysis, process, and disseminate of intelligence information.
0231 - Intelligence Specialist
USMC Intel MOS: Perform precision ground control survey operations; conduct and revise military maps and charts.
0261 - Geographic Intelligence Specialist
USMC Intel MOS: Involved in all facets of planning and conducting CI and HUMINT operations and activities.
0211 - Counterintelligence (CI)/HUMINT Specialist
USMC Intel MOS: Process and analyze multi-source imagery.
0241 - Imagery Interpreter
USMC Entry-level SIGINT/Ground Electronic Warfare MOS: Exploit every phase of communications signals and digital network systems by engaging in collection, analysis, active SIGINT, and electronic warfare.
2621 - Special Communications Signals Collection Operator
USMC Entry-level SIGINT/Ground Electronic Warfare MOS: Prepare signals analysis, electronic order of battle (EOB) appraisals, and map overlays as required.
2631 - ELINT Intercept Operator/Analyst
USMC Entry-level SIGINT/Ground Electronic Warfare MOS: Support transmission and receiving of special intelligence via various hardware and software systems.
2651 - Special Intelligence System Administrator/Communicator
Special operations (SO) are inherently _____.
Direct Action: Designed to achieve specific, well-defined and often time-sensitive results.
Raids, Ambushes, & Direct Assaults
Direct Action: To identify and report target locations for approaching aircraft or weapons.
Terminal Attack Control & Terminal Guidance Ops
Direct Action: Conducted to search for, locate, identify, rescue and return personnel, sensitive equipment, or items critical to national security.
Direct Action: Conducted when collateral damage must be minimized.
Precision Destruction Ops
Direct Action: Conducted against adversary maritime surface targets, including combatants.
Special Recon: Conducted to collect and report critical hydrographic, geological, and meteorological information.
Special Recon: Locating and attacking targets of opportunity in general areas or along lines of communication (LOCs).
Special Recon: Conducted to detect, identify, locate, and assess a target to determine the most effective employment of weapons.
Target & Threat Assessment
Special Recon: Conducted for the purpose of gathering information used to measure results of a strike.
Post strike Reconnaissance
Foreign Internal Defense: Provide training, advice, and assistance to protect HN from subversion, lawlessness, and insurgency, and develop indigenous skills.
Host Nation (HN) Military Assistance
Foreign Internal Defense: Provide supervision of HN ops to neutralize, isolate, and destroy insurgents, and protect the civil population.
Unconventional Warfare: Operations conducted by irregular, predominately indigenous forces in adversary-held or hostile territory.
Unconventional Warfare: Operations designed to undermine the military, economic, psychological, or political strength/morale of a regime or nation.
Unconventional Warfare: An act or acts that selectively disrupt, destroy, or neutralize hostile capabilities with a minimum expenditure of manpower or supplies.
Unconventional Warfare: Assess areas of interest ranging from political and military personalities to the military capabilities of friendly and adversary forces.
Unconventional Warfare: Designed to seek out, contact, authenticate, and support personnel as they move from a hostile area to areas under friendly control.
Unconventional Assisted Recovery
Counterterrorism: Collect, exploit, and report information on terrorist organizations, personnel, assets, and/or activities.
Counterterrorism: Preemptive strikes designed to destroy, disorganize, or disarm terrorist organizations before they can strike targets of national interest.
Network & Infrastructure Attacks
Conducted to rescue hostages and/or recover sensitive materiel from terrorist control.
Hostage or Sensitive Materiel Recovery
Actions focused on defeating the ideologies or motivations that spawn terrorism by non-kinetic means.
Special Ops Mission: Counterterrorism Capabilities: