Terms to be familiar with for the COPC as of 14 April 2016

Size: px
Start display at page:

Download "Terms to be familiar with for the COPC as of 14 April 2016"

Transcription

1 Terms to be familiar with for the COPC as of 14 April 2016 Note: * s denote proposals to the COPD for improved clarity of terms. Critical Capability (Ability*) (CC): the primary ability (or abilities) that gives an DFWRU V&entre of Gravity (COG) 1 its strength. What are the primary means that enables the COG to gain and maintain dominant influence over an opponent or situation, such as to threaten or coerce an opponent, or to control a population, wealth distribution, or a political system? (COPD, pg. 4-46, Figure 4.11) To be influenced/denied to an opponent and exploited in a friend. (COPD, pg. 4-46, Figure 4.11) The key word is the verb - WKHDELOLW\WR«&23'SJ-46, Figure 4.11) CC Examples: The ability to deploy forces; the ability to gather intelligence Critical Requirement (CR): specific conditions, components or resources that are essential to sustaining those capabilities. What are those key system elements and essential conditions, FKDUDFWHULVWLFVFDSDELOLWLHVUHODWLRQVKLSDQGLQIOXHQFHVUHTXLUHGWRJHQHUDWHDQGVXVWDLQWKH&2* V critical capabilities, such as specific assets, physical resources, and relationships with other actors? (COPD, pg. 4-46, Figure 4.11) To be denied to an opponent and provided to a friend. Nouns, things. (COPD, pg. 4-46, Figure 4.11) Also referred to as critical operational requirements within the COPD. The COPD goes into further detail about critical operational requirements and for the mission analysis phase the COPD lists several items as critical operational requirements that the JOPG needs to consider throughout Phase 3A to include: Information, Knowledge and Intelligence Requirements, Critical Operational Support and Resource Requirements, Preconditions for Success, Rules of Engagement/Use of Force, Requirements for Interaction with Relevant International and National Actors, Strategic Communication/Information Strategy Requirements, and CRMs. (COPD, para 4-26 (i)) Critical Requirements can also be Force Capabilities (FC), see Force Capabilities (FC) described later in this paper. CR Examples: Fuel, Infrastructure, armour units Critical Vulnerability (CV): exists when a critical requirement is deficient, degraded or missing and exposes a critical capability to damage or loss. What are the weaknesses, gaps or deficiencies in the key system elements and essential conditions, characteristics, capabilities, relationship and influences through which the COG may be influenced or neutralised? (COPD, pg. 4-46, Figure 4.11) To be exploited in an opponent and protected in a friend. A noun with modifiers. (COPD, pg. 4-46, Figure 4.11) The identification of Critical Capabilities (CC) will lead to a need for certain Critical Requirements (CR). Once defining what those CRs are planners will think about the inherent Critical Vulnerabilities (CV) associated with those CRs. CV Examples: Extended LLOCs, Insufficient resupply network, incompatible C2 systems Decisive Condition (DC): A combination of circumstances, effects, or a specific key event, critical factor, or function that, when realised, allows commanders to gain a marked advantage over an opponent or contribute materially to achieving an operational objective. (AJP-01(D), Annex 5A, para 5A1 (e)) 1 More information regarding COGs of actors and COG analysis will be provided later on the course. (Reference COPD, para 4-26 (f) and Figure 4.11 for an immediate questions about COG analysis)

2 DCs will need to be supported by at least two measureable Operational Effects (OE), if there is only one OE that the JOPG can identify as supporting a particular DC then the DC is essentially only the OE written in the context of a DC and planners will need to find or create the associated DC that that OE supports. DCs, Conditions to be Established (CE), and OEs developed at this stage of the planning process will assist the JOPG in the development of the operational framework later on in Phase 3A. DC Example: Freedom of Action for UN/IOs/NGOs, Country X forces combat ineffective Condition to be Established (CE): Conditions that must be established and sustained in the operational area in order to achieve objectives and the desired end state. (no strict definition given in applicable references) The operational objectives will establish the conditions that must be achieved to attain the desired end state. Therefore planners analyse these conditions in the context of the different actor systems and their interaction to determine the conditions that must be established and sustained in the operational area. (AJP 5, para 0327 (a)) Conclusions in mission analysis can be labelled as CE and then later on in developing the operational framework the JOPG can determine it this is a Decisive Condition or an Operational Effect. CE Examples: Reference Decisive Conditions and Operational Effects definitions and examples Operational Effect (OE): 'HILQHGDVµ>D@FKDQJHLQWKHVWDWHRIDV\VWHPRUV\VWHPHOHPHQWWKDW UHVXOWVIURPRQHRUPRUHDFWLRQVRURWKHUFDXVHV 'HULYHGIURPREMHFWLYHVHIIHFWVEULGJHWKHJDS between objectives and actions by describing what changes in a system are required. (COPD, Annex A, para 4 (a)) Generally an effect can be considered a result, outcome or consequence of one or more actions or other causes, that will influence the physical or behavioural state of a system (or system elements) thereby contributing towards the realisation of one or more decisive points (old term terminology for decisive conditions) or conditions. (AJP-01(D), Annex 5A, para 5A1 (e)) OEs are changes in system-states generated through actions that are measureable in nature. Effect statements can be written in two ways: (1) Using the present tense to describe the new state of a system or system element as we wish to see it after it has been changed. (2) Using the passive YRLFHZLWKWKHYHUEµWREH DQGWKHSDUWSDUWLFLSOHRf a verb. At the operational level, where the DC is used, the second approach (using the passive voice) is recommended so as not to cause confusion between effects and DCs. (COPD, Annex A, para 4(d)) OE Examples: Insurgency forces attacks reduced, LLOCs secured Operational Action (OA): Operational actions are required to create the OEs and establish the DCs that are described above. Operational actions will establish the operational requirement for the allocation of military capabilities and the prioritisation of training, exercises, and evaluations; therefore, they can be expressed as joint or single service actions as appropriate. (COPD, para 4-27 (g)) Operational Actions (OA) generate Operational Effects (OE) that supports the future establishment of Decisive Conditions (DC). OA Examples: Conduct COIN operations, Secure SPOD Force Capability (FC): Also referred to as primary military capabilities. Under Appreciate Force Capability Requirements paragraph in the COPD Chapter 4 the following is stated: With the input of liaison/planning elements from the designated component commands, the JOPG should appreciate the adequacy of the primary military capabilities described in the option to conduct the MSAs and create the desired effect, taking into account the possible opposition. (COPD, para 4-19 (h))

3 The joint task force utilizes their Force Capabilities (FC) to conduct Operational Actions (OA) which generate Operational Effects (OE) leading to the future establishment of Decisive Conditions (DC). There is linkage between requirements and force capabilities per the following statement: Requirements, initially stated as force capabilities, are refined during subsequent phases of planning by the Joint Headquarters (JHQ) and designated component/subordinate commands in terms of specific force types. (COPD, para 3-41 (b)) Force Capabilities Required: This is a summary description of the major force capabilities required to execute the planning. A combined joint statement of requirements (CJSOR) may be the formal expression of this requirement. (AJP 5-0, para 022 (b)) A Force Capability (FC) can be a Critical Requirement (CR) but a critical requirement is not always going to be a Force Capability (FC). FC examples: Armour units, Theatre Ballistic Missile Defence Complementary Non-Military Action (CNMA): Complementary military, political, economic and civil actions that will support the creation of desired effects in the operational environment. (no strict definition given in applicable references) Appreciate the Use of Complementary Non-Military Actions. In many cases desired strategic effects cannot be created by military action alone or could be created more effectively by political, economic and civil actions, possibly in conjunction with military means. (COPD, para 4-19 (g)) With respect to CNMAs, those changes that require activities beyond the JOA should be identified as pre-conditions for success. (COPD, para 4-27 (h)) CNMA Example: Support efforts of civil actors to establish public works and education projects Lines of Operation: In a campaign or operation, logical line(s) linking effects and decisive conditions in time to an objective. (proposed definition - COPD, pg 4-56, footnote 74) Lines of operation link effects and DCs to an operational objective, with normally one line of operation per objective. (COPD, para 4-27 (i)) Planners will need to know what makes up an operational design for a number of these terms to be better understand. The figure below depicts an operational design and demonstrates how Decisive Conditions (DC) are established starting with Force Capabilities (FC) conducting Operational Actions (OA) that lead to Operational Effects (OE) which support the achievement of DCs along different Lines of Operations leading to Operational Objectives. Complimentary Non-Military Actions (CNMA) also needs to be taken into account in order to support the establishment of OEs and DCs. Decision Points (DP) are also depicted and more information on DPs is directly below this figure.

4 Decision Point (DP): A point in space and time, identified during the planning process, where it is anticipated that the commander must make a decision concerning a specific course of action. (AAP- 06, pg 2-D-2). They should* be linked to assumptions, CCIRs, branches 2 or sequels 3. They can also be related to a transition between phases of an operation. However, decisions associated with DPs related to transitioning phases are made within the context of conducting assessment over time during the actual execution of an operation to determine if conditions have been meet to transition to the next phase or sub-phase of an operation.* [DPs] identified during planning and included in the synchronisation matrix and the* operational design become a key focus for the Commander during execution, which* normally requires* the creation of a Decision Support* Matrix (see decision support matrix example below) based on Commander agreed criteria. (COPD, para 4-35 (h) (6)) Decision Support Matrix Example (More information on CCIRs later in this paper) When considering DPs, it is important to understand that the operational design is an illustration of the changes from the current set of unacceptable systems states to the acceptable set of system states in accordance with the objectives and end state. These required changes in system states are depicted through the DCs and the OEs along different lines of operation that are achieved as a result of actions conducted over time within the constraints and restraints for the execution of an operation. Based upon this understanding of an operational design planners will need to identify events that can occur that are so significant in nature that the identified DCs and OEs annotated along the lines of operation cannot compensate for such a dramatic change within the operational environment. These events are linked to the assumptions that planners will have to make in order to develop lines of operation based upon their understanding of the operational environment in order to achieve the objectives of the operation. When these significant events happen that prove the assumptions not to be valid for planning an operation, there is a need for a DP and an associated branch or sequel plan. The inherent risk with planning assumptions is that the possibility remains that the assumptions are not going to be valid and therefore planners will need to identify those risks associated with their assumptions and then plan accordingly. See figure on the next page. 2 Branches address the µ š]}v}(^ázš](_m Branches are options within a particular phase of an operation, which are planned and executed in response to anticipated opportunity or reversal within that phase, to provide the Commander with the flexibility to retain the initiative and ultimately achieve the original objective. 3 Sequels address the µ š]}v}(^ázš[ væšm_ Sequels are options for subsequent operations within a campaign or the following phase(s) of an operation. They are planned on the basis of the likely outcome of the current operation or phase, in order to provide the Commander with the flexibility to retain the initiative and/or enhance operational tempo and ultimately achieve the objective.

5 In order to further improve understanding of DPs consider that there should be no DP associated with a change in system state (OE or DC) that is already identified along a line of operation on an RSHUDWLRQDOGHVLJQSULRUWRWKHH[HFXWLRQRIWKHRSHUDWLRQ)RULQVWDQFHLIWKHUHLVD'&RIµ&RXQWU\ ; VIRUFHVDUHFRPEDWLQHIIHFWLYH DOUHDG\RQWKHRSHUDWLRQDOdesign then there should be no need for a '3SULRUWRRSHUDWLRQH[HFXWLRQWKDWVWDWHVµ&RXQWU\; VIRUFHVUHPDLQFRPEDWHIIHFWLYH 7KH reason for this is that prior to execution of the operation the JOPG has planned for all of the elements needed to achieve this DC along a line of operation based upon the current understanding of the system states within the operational environment. Therefore there would be nothing to annotate in association with a branch or sequel plan in relation to not achieving this DC because there is already a line of operation within the operational design that captures those elements needed to achieve that DC. See figure below.

6 For each decision point, there would be associated CCIR(s) to trigger those decisions and PIRs to inform the CCIRs. (COPD, pg. 4-56, footnote 77) DP Example: Hostile activity from Country X against Country Y &RPPDQGHU V&ULWLFDO,QIRUPDWLRQ5HTXLUHPHQW&&,5 CCIRs comprise information required for the commander to make timely decisions as required for mission accomplishment. They identify potential changes in the situation and eventualities that would mandate an operational decision or strategic guidance. The JOPG must consider CCIRs from two aspects: 1) any CCIRs essential to the FRPPDQGHU VGHFLVLRQ-PDNLQJDQGGHYHORSPHQWRIWKHSODQVXFKDVUHODWHGWRDSODQ VDVVXPSWLRQV and 2) those CCIRs related to key decisions for plan execution, including decision points for branches or sequels, the transition between phases or a change to the main effort. (COPD, pg 4-47, footnote 56) Information concerning areas that are either critical to the success of the mission or represent a critical threat are expressed as CCIRs. &&,5VFRYHUDOODVSHFWVRIWKHFRPPDQGHU VFRQFHUQ including Friendly Forces Information Requirements (FFIRs), Essential Elements of Friendly Information (EEFI) and Priority Intelligence Requirements (PIRs). (AJP2A RD2). (COPD, pg 4-48, footnote 57) As mentioned in the COPD, CCIRs are always linked to commander decisions. These commander decisions will result in three different ways in which the plan will then need to be executed. These three different ways are the execution of a branch plan, a sequel plan, or a change to prioritization of effort. The chart below provides examples of different CCIRs connected to decisions that would lead to these changes in the ways that the execution of the campaign is conducted. The commander will also have other information requirements that can be referred to as notification requirements, Serious Incident Reports (SIRs), or significant activities (SIGACTs). They encompass information requirements that are important for the commander to be aware of, but are not CCIRs themselves as they are not information required for the commander to make timely decisions as required for mission accomplishment. Examples of these information requirements are: Death of Soldier, any incident that may create negative media for the mission, loss of communications with C2 node for more than 4 hours. Additional CCIR Examples: Indications of aggression from Country X, indications that Country Y is at a near or failed state status.

7 Information Requirement (IR): In intelligence usage, information regarding an adversary or potentially hostile actors and other relevant aspects of the operational environment that needs to be collected and processed to meet the intelligence requirements of a commander. (AAP-6, pg ) Also referred to as Priority Intelligence Requirements. Priority Intelligence Requirements (PIR). PIRs encompass those intelligence requirements for which a commander has an anticipated and stated priority in his tasking of planning and decisionmaking and normally encompass identification and monitoring of areas that represent opportunities and threats to the mission plan. They are a standing set of requirements that drive the collection and production effort, and provide the focus of the overall intelligence mission. They should be limited in number and should provide comprehensive and coherent groupings of key issues. They may be enduring or limited to a particular phase or situation. (AJP2A SD2). (COPD, pg 4-48, footnote 58) Good PIRs ask only one question, focus on a specific fact, event, or activity, and provide intelligence required to support a single decision. PIR Examples: Which bridges over the Y River are intact?, Will the insurgent forces focus attacks along Route X in the Y valley? Friendly Forces Information Requirements (FFIR): Detail information that the Commander needs to know about his own forces, which might affect the commander's ability to accomplish the mission. (AJP2A SD2). (COPD, pg 4-48, footnote 59) FFIR Example: Any loss of medical evacuation assets Essential Elements of Friendly Information is information the commander wants to hide from the enemy. (only defined here in relation to the reference of EEFI in footnote 57 on pg 4-48 of the COPD associated with establishing CCIRs) Assumption (A): In planning, a supposition made about the current situation and/or the future course of events to complete an estimate of the situation and decide on the course of action. (AAP-6 (2012), pg 2-A-20) In such cases where there are some gaps in knowledge and information, certain assumptions will be made as a basis for further planning. To be valid, an assumption must be logical, realistic and necessary for the planning to continue. Assumptions must never assume away critical problems, such as dealing with the opposing capabilities or assuming unrealistic friendly capabilities or successes. (AJP 5, para 0327 (e)) In addition: (1) Assumptions are used in place of something that is unknown and, to be valid, they must be logical, realistic and necessary. (2) Assumptions should not be made which dismiss adversary capabilities or assumed intentions, alter challenging aspects of the situation or presume our own success. (3) Assumptions are treated as facts and therefore need to be analysed. (4) Once adopted, an assumption will apply throughout planning until verified as fact or discarded. To assist in their verification, assumptions will generate information, knowledge or intelligence requirements. (5) Each assumption needs to have a risk evaluation. (6) Each assumption must be evaluated to determine if the requirement for the development of a branch or sequel exists. (COPD, para 4-26 (h)) Planning assumptions are linked to planning risks. See Operational Risks below. Assumption Examples: Country X will not use chemical weapons on NATO forces, Country Y will not collapse before main forces arrive in theatre.

8 Operational Risk (OR): Risk is a situation involving exposure to danger. It is assessed by the likelihood of its occurrence and the gravity of its impact. (AJP 5, para 0211 (d)) At the operational level, risks typically relate to time, space, forces and information factors within the theatre. (AJP 5, para 0327 (i)) $GLVFRQQHFWEHWZHHQRQH VHQGVDQGPHDQVFUHDWHVDFHUWDLQGHJUHHRIULVN7KHOHYHORIULVNFDQQRW be determined with any degree of confidence; assessing it is mainly a matter of judgment. Risks can RFFXUGXHWRPDQ\IDFWRUVVXFKDVRYHUUDWLQJRQH VRZQ capabilities and underestimating the opposing capabilities. They also can be the result of wilful or unintended faulty strategic assumptions. (AJP 5, para 0211 (d)) OR Examples: Attack on SPOD/APOD, widening of conflict with other regional actors The figure below links Assumptions, Risks, Operational Actions (OA), Information Requirements (IR), &RPPDQGHU V&ULWLFDO,QIRUPDWLRQ5HTXLUHPHQWVCCIR), Priority Information Requirements (PIR), Friendly Forces Information Requirements (FFIR), and Decision Points (DP) in support of understanding these terms. Operational Limitation (OL): 7KHPLVVLRQDQDO\VLVVHHNVWRLGHQWLI\DQ\OLPLWDWLRQVRQWKH-)& V freedom of action in accomplishing the mission. These may be imposed by international law, the mandate, caveats of troop contributing nations (TCNs) or by NATO political or military authorities. However, they may also be determined by operational factors that will dictate the time, space and forces to be used. (AJP 5, para 0327 (h)) Limitations include constraints and restraints. (COPD, para 4-26 (g)) Constraint - A requirement placed on a commander that dictates an action. (COPD, pg 4-47, footnote 53) Restraint - A requirement placed on a commander that prohibits an action. (COPD, pg 4-47, footnote 54) OL Example: Constraint - 1$72IRUFHVZLOORQO\XVH7DQDQD V632'DQG$32'IRUthe deployment of forces into the JOA, NATO forces will have to move maritime assets through the Jansen Strait to access the SPOD; Restraint - NATO forces will not deploy until ACTORD, Tactical ISR assets will not fly within two miles of &RXQWU\; V airspace. Rules of Engagement (ROE): Directives to military forces (including individuals) that define the circumstances, conditions, degree, and manner in which force, or actions which might be construed as provocative, may be applied. (MC 362/1, pg 2, part 2)

9 ROE Example: Detention and/or seizure of designated vessels, aircraft, vehicle(s), personnel, goods, cargoes or equipment in designated circumstances is authorised. (MC 362/1, Annex A, A-8) Precondition for Success (PS): Essential conditions that must be established to allow operational success, but that are beyond the influence of the JFC. (AJP 5-0, para 0327, f(3)) PS Example: Country Y allows the flow of equipment and supplies through their nation to support Joint Task Force Operations in Country X. Crisis Response Measures (CRM): Detailed actions which are available to be immediately implemented at the appropriate levels. These actions are prepared in advance. Detailed implementation procedures apply. (NATO Crisis Response System Manual (NCRSM) 2014, Chp 1, Section II, para 4 (b)) CRM Examples: See NCRSM Annex A (NATO Restricted) for examples C2 Requirements (C2R): The JOPG operations, Communication and Information Services (CIS) and Cyber Defence (CD) staff should work together with the component/subordinate command liaison to establish the basic C2 requirements based on the mission analysis and operational factors. (COPD, para 4-28 (b)) C2 requirements are driven by several factors determined during the mission analysis and the development of the operational framework, including: (1) The geographic dispersion of forces in the theatre and the JOA. (2) The different LoOs and the nature and purpose of military actions in concert with relevant national and international actors. (3) The size and functional composition of the deployed force. (4) Critical liaison and coordination requirements. (5) Span of control. (6) CIS points of presence and information exchange requirements (IER). (7) The possibilities for C2 reach back. (8) CD requirements. (9) Political Decisions* (10) Threat in the operational environment* (COPD, para 4-28 (b)) C2R Examples: Task Force Viper is OPCON to the Land Component Command to ensure synchronization of efforts in the defeat of insurgency forces. Strategic Communication (SC): The coordinated and appropriate use of NATO communications activities and capabilities ± Public Diplomacy, Public Affairs, Military Public Affairs, Information Operations and Psychological Operations ± in support of Alliance policies, operations and activities, and in order to advance NATO's aims. (COPD, Annex L, L-5 cited from PO (2009)0141) SC Example: Promote and push narrative that NATO is here to support the improvement of the situation for ALL of the people of Country Y.

LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW

LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW TASK DESCRIPTION: LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW Learn the differences between planning for a campaign in war and planning

More information

Joint Publication 5-00.1. Joint Doctrine for Campaign Planning

Joint Publication 5-00.1. Joint Doctrine for Campaign Planning Joint Publication 5-00.1 Joint Doctrine for Campaign Planning 25 January 2002 PREFACE 1. Scope This publication provides overarching guidance and principles governing the planning of campaigns at the combatant

More information

NATO UNCLASSIFIED RELEASABLE TO EAPC INTERNATIONAL MILITARY STAFF. ETAT-MAJOR MlLITAIRE INTERNATIONAL

NATO UNCLASSIFIED RELEASABLE TO EAPC INTERNATIONAL MILITARY STAFF. ETAT-MAJOR MlLITAIRE INTERNATIONAL NATO OTAN INTERNATIONAL MILITARY STAFF ETAT-MAJOR MlLITAIRE INTERNATIONAL Vi*S^!^ ^XvU^ March 2003 MC 402/1 (Military Decision) SECRETARY GENERAL, NORTH ATLANTIC TREATY ORGANISATION MILITARY DECISION ON

More information

FM 2-0 INTELLIGENCE MAY 2004. DISTRIBUTION RESTRICTION: Approved for public release, distribution is unlimited HEADQUARTERS DEPARTMENT OF THE ARMY

FM 2-0 INTELLIGENCE MAY 2004. DISTRIBUTION RESTRICTION: Approved for public release, distribution is unlimited HEADQUARTERS DEPARTMENT OF THE ARMY FM 2-0 INTELLIGENCE MAY 2004 DISTRIBUTION RESTRICTION: Approved for public release, distribution is unlimited HEADQUARTERS DEPARTMENT OF THE ARMY *FM 2-0 Field Manual No. 2-0 Headquarters Department of

More information

Joint Publication 3-0. Doctrine for Joint Operations

Joint Publication 3-0. Doctrine for Joint Operations Joint Publication 3-0 Doctrine for Joint Operations 10 September 2001 This revised edition of JP 3-0, Doctrine for Joint Operations, represents the latest in a series of updates to joint doctrine. It reflects

More information

NATO UNCLASSIFIED Releasable to the Public MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE GOVERNMENT OF THE REPUBLIC OF FINLAND AND

NATO UNCLASSIFIED Releasable to the Public MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE GOVERNMENT OF THE REPUBLIC OF FINLAND AND MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE GOVERNMENT OF THE REPUBLIC OF FINLAND AND HEADQUARTERS, SUPREME ALLIED COMMANDER TRANSFORMATION AS WELL AS SUPREME HEADQUARTERS ALLIED POWERS EUROPE REGARDING

More information

Summary Report for Individual Task 805C-42B-6117 Conduct Human Resources (HR) Planning Using Military Decision Making Process (MDMP) Status: Approved

Summary Report for Individual Task 805C-42B-6117 Conduct Human Resources (HR) Planning Using Military Decision Making Process (MDMP) Status: Approved Report Date: 17 Nov 2014 Summary Report for Individual Task 805C-42B-6117 Conduct Human Resources (HR) Planning Using Military Decision Making Process (MDMP) Status: Approved Distribution Restriction:

More information

ADP50 MAY201 HEADQUARTERS,DEPARTMENTOFTHEARMY

ADP50 MAY201 HEADQUARTERS,DEPARTMENTOFTHEARMY ADP50 THEOPERATI ONSPROCESS MAY201 2 DI STRI BUTI ONRESTRI CTI ON: Appr ov edf orpubl i cr el eas e;di s t r i but i oni sunl i mi t ed. HEADQUARTERS,DEPARTMENTOFTHEARMY This publication is available at

More information

The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015

The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 I. Defense Cooperation and the Aim of the Guidelines In order to ensure Japan s peace and security under any circumstances, from peacetime

More information

SECURITY / INTELLIGENCE / CONSULTING

SECURITY / INTELLIGENCE / CONSULTING SECURITY / INTELLIGENCE / CONSULTING Hayes Group International (HGI) is a global security and intelligence consulting and advisory firm specializing in emerging and frontier markets. Focused on development

More information

Summary 1. Module scope and objectives 2. Terms, definitions and abbreviations 3. Introduction 4. The military component

Summary 1. Module scope and objectives 2. Terms, definitions and abbreviations 3. Introduction 4. The military component 4.40 UN Military Roles and Responsibilities Contents Summary... 1 1. Module scope and objectives... 1 2. Terms, definitions and abbreviations... 2 3. Introduction... 2 4. The military component... 2 4.1.

More information

Safety Regulation Group SAFETY MANAGEMENT SYSTEMS GUIDANCE TO ORGANISATIONS. April 2008 1

Safety Regulation Group SAFETY MANAGEMENT SYSTEMS GUIDANCE TO ORGANISATIONS. April 2008 1 Safety Regulation Group SAFETY MANAGEMENT SYSTEMS GUIDANCE TO ORGANISATIONS April 2008 1 Contents 1 Introduction 3 2 Management Systems 2.1 Management Systems Introduction 3 2.2 Quality Management System

More information

NATO STANDARD AJP-3.10.1 ALLIED JOINT DOCTRINE FOR PSYCHOLOGICAL OPERATIONS

NATO STANDARD AJP-3.10.1 ALLIED JOINT DOCTRINE FOR PSYCHOLOGICAL OPERATIONS NATO STANDARD AJP-3.10.1 ALLIED JOINT DOCTRINE FOR PSYCHOLOGICAL OPERATIONS Edition B Version 1 WITH UK NATIONAL ELEMENTS SEPTEMBER 2014 NORTH ATLANTIC TREATY ORGANIZATION ALLIED JOINT PUBLICATION Published

More information

Objective Oriented Planning Module 1. Stakeholder Analysis

Objective Oriented Planning Module 1. Stakeholder Analysis III. Stakeholder Analysis Stakeholders are people, groups, or institutions, which are likely to be affected by a proposed project (either negatively or positively), or those which can affect the outcome

More information

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the

More information

Design: Tools of the Trade

Design: Tools of the Trade Design: Tools of the Trade by Dr. Jack D. Kem U.S. Army Command and General Staff College U.S. Army Combined Arms Center Fort Leavenworth, Kansas Design: Tools of the Trade by Dr. Jack D. Kem U.S. Army

More information

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY

More information

RESTRICTED CHAPTER 11 INTRODUCTION TO THE ESTIMATE PROCESS INTRODUCTION

RESTRICTED CHAPTER 11 INTRODUCTION TO THE ESTIMATE PROCESS INTRODUCTION CHAPTER 11 INTRODUCTION TO THE ESTIMATE PROCESS INTRODUCTION 1. An estimate is a logical process of reasoning by which a commander, faced with an ill-structured problem, arrives at a decision in order

More information

Joint Publication 3-13.3. Operations Security

Joint Publication 3-13.3. Operations Security Joint Publication 3-13.3 Operations Security 04 January 2012 PREFACE 1. Scope This publication provides joint doctrine for planning, executing, and assessing operations security in joint operations. 2.

More information

DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE

DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:

More information

Annex 1: Assesing risk: threats, vulnerabilities and capacities

Annex 1: Assesing risk: threats, vulnerabilities and capacities Annex 1: Assesing risk: threats, vulnerabilities and capacities There is no widely accepted definition of risk, but we can say that risk refers to possible events, however uncertain, that result in harm.

More information

Safety Management Systems (SMS) guidance for organisations

Safety Management Systems (SMS) guidance for organisations Safety and Airspace Regulation Group Safety Management Systems (SMS) guidance for organisations CAP 795 Published by the Civil Aviation Authority, 2014 Civil Aviation Authority, CAA House, 45-59 Kingsway,

More information

AJP-9 NATO CIVIL-MILITARY CO-OPERATION (CIMIC) DOCTRINE

AJP-9 NATO CIVIL-MILITARY CO-OPERATION (CIMIC) DOCTRINE -9 NATO CIVIL-MILITARY CO-OPERATION (CIMIC) DOCTRINE Chapter 1 AJP-9 NATO CIVIL-MILITARY CO-OPERATION (CIMIC) DOCTRINE (JUNE, 2003) i ii AJP Chapter 1 Chapter 1 RECORD OF CHANGES Change Date Date Entered

More information

SEMS/NIMS MANAGEMENT SYSTEM REVISED SEPTEMBER 2007

SEMS/NIMS MANAGEMENT SYSTEM REVISED SEPTEMBER 2007 SEMS/NIMS MANAGEMENT SYSTEM REVISED SEPTEMBER 2007 SEMS/NIMS - SYSTEM (ICS) is the model tool for command, control, and coordination of a response and provides a means to coordinate the efforts of individual

More information

Section A: Introduction, Definitions and Principles of Infrastructure Resilience

Section A: Introduction, Definitions and Principles of Infrastructure Resilience Section A: Introduction, Definitions and Principles of Infrastructure Resilience A1. This section introduces infrastructure resilience, sets out the background and provides definitions. Introduction Purpose

More information

The Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York

The Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York The Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York Introduction: the role of economics Economists are not usually associated with debates about wars. Such

More information

ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DPC/D(67)23. DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session

ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DPC/D(67)23. DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session Note by the Chairman I attach for your information a list of the decisions

More information

Planning for Action: Campaign Concepts and Tools

Planning for Action: Campaign Concepts and Tools Planning for Action: Campaign Concepts and Tools by Dr. Jack D. Kem U.S. Army Command and General Staff College U.S. Army Combined Arms Center Fort Leavenworth, Kansas Planning for Action: Campaign Concepts

More information

OPERATIONAL RISK MANAGEMENT B130786 STUDENT HANDOUT

OPERATIONAL RISK MANAGEMENT B130786 STUDENT HANDOUT UNITED STATES MARINE CORPS THE BASIC SCHOOL MARINE CORPS TRAINING COMMAND CAMP BARRETT, VIRGINIA 22134-5019 OPERATIONAL RISK MANAGEMENT B130786 STUDENT HANDOUT Basic Officer Course (ORM) Introduction Importance

More information

Training NATO for an uncertain future: An interview with Major General Erhard Bühler

Training NATO for an uncertain future: An interview with Major General Erhard Bühler 25 Neil Webb Training NATO for an uncertain future: An interview with Major General Erhard Bühler In facing potential threats, being lean and agile will be critical. Wolff Sintern Major General Erhard

More information

Army Doctrine Update

Army Doctrine Update Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near

More information

5. The Model Strategies and Practical Measures are aimed at providing de jure and de

5. The Model Strategies and Practical Measures are aimed at providing de jure and de MODEL STRATEGIES AND PRACTICAL MEASURES ON THE ELIMINATION OF VIOLENCE AGAINST WOMEN IN THE FIELD OF CRIME PREVENTION AND CRIMINAL JUSTICE 1. The multifaceted nature of violence against women suggests

More information

Integrating Continuity of Operations (COOP) into the Enterprise Architecture

Integrating Continuity of Operations (COOP) into the Enterprise Architecture Volume 1, Issue 2 August 2007 Continuity of Operations Leadership Series for Government Integrating Continuity of Operations (COOP) into the Enterprise Architecture Pillar COOP Leadership Series for Government

More information

A PLANNING MODEL FOR ABET ENGINEERING CRITERIA 2000

A PLANNING MODEL FOR ABET ENGINEERING CRITERIA 2000 A PLANNING MODEL FOR ABET ENGINEERING CRITERIA 2000 M. Dayne Aldridge and Larry Benefield College of Engineering Auburn University, AL 36849 Introduction ABET Engineering Criteria 2000 provides a new basis

More information

USAR Nepal Earthquake Response Technical Evaluation

USAR Nepal Earthquake Response Technical Evaluation USAR Nepal Earthquake Response Technical Evaluation KEY FINDINGS 1. Positive contributions were made by smaller, lighter teams and nonclassified teams and this should be further strengthened. 2. The revised

More information

Joint Publication 2-0. Joint Intelligence

Joint Publication 2-0. Joint Intelligence Joint Publication 2-0 Joint Intelligence 22 October 2013 This revised edition of JP 2-0, Joint Intelligence, reflects the current guidance for conducting joint and multinational intelligence activities

More information

ADP 3-0 UNIFIED LAND OPERATIONS. OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.

ADP 3-0 UNIFIED LAND OPERATIONS. OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. ADP 3-0 UNIFIED LAND OPERATIONS OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army

More information

Hybrid Warfare & Cyber Defence

Hybrid Warfare & Cyber Defence Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency

More information

Public Law 113 283 113th Congress An Act

Public Law 113 283 113th Congress An Act PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au

More information

PSYOP Campaign Planning

PSYOP Campaign Planning CHAPTER 4 PSYOP Campaign Planning PSYOP campaign development and Implementation are used to modify the behavior of various target audiences in support of U. S. objectives. In practice, the scope of PSYOP

More information

Position Classification Flysheet for Logistics Management Series, GS-0346

Position Classification Flysheet for Logistics Management Series, GS-0346 Position Classification Flysheet for Logistics Management Series, GS-0346 Table of Contents SERIES DEFINITION... 2 SERIES COVERAGE... 2 EXCLUSIONS... 4 DISTINGUISHING BETWEEN LOGISTICS MANAGEMENT AND OTHER

More information

APPROVED BY INTERACTION S BOARD ON JUNE 14, 2006. Suggested Guidance for Implementing InterAction s Minimum Operating Security Standards

APPROVED BY INTERACTION S BOARD ON JUNE 14, 2006. Suggested Guidance for Implementing InterAction s Minimum Operating Security Standards APPROVED BY INTERACTION S BOARD ON JUNE 14, 2006 Suggested Guidance for Implementing InterAction s Minimum Operating Security Standards This document seeks to assist InterAction members in the incorporation

More information

COMMAND AND CONTROL OF DETAINEE OPERATIONS

COMMAND AND CONTROL OF DETAINEE OPERATIONS FMI 3-63.6 COMMAND AND CONTROL OF DETAINEE OPERATIONS September 2005 Expires September 2007 HEADQUARTERS, DEPARTMENT OF THE ARMY DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.

More information

The National Intelligence Estimative Product

The National Intelligence Estimative Product Iran: Nuclear Intentions and Capabilities November 2007 OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE The Director of National Intelligence serves as the head of the Intelligence Community (IC), overseeing

More information

Financial Planner Competency Profile

Financial Planner Competency Profile Financial Planner Competency Profile TABLE OF CONTENTS FPSB s Financial Planner Competency Profile...2 Financial Planning Knowledge...3 Financial Planning Knowledge Framework...3 Financial Planning Knowledge

More information

Emergency Support Function (ESF) #5. Emergency Management

Emergency Support Function (ESF) #5. Emergency Management Emergency Support Function (ESF) #5 Emergency Management Lead Agency: Support Agencies: Cleburne County Emergency Management Agency Cleburne County Commission I. Introduction A. Purpose B. Scope ESF #5

More information

Joint Publication 3-60. Joint Targeting

Joint Publication 3-60. Joint Targeting Joint Publication 3-60 Joint Targeting 13 April 2007 1. Scope PREFACE This publication provides fundamental principles and doctrinal guidance for the conduct of joint targeting across the range of military

More information

RISK MANAGEMENT POLICY

RISK MANAGEMENT POLICY RISK MANAGEMENT POLICY Regd. Office: Nanubhai Amin Marg, Industrial Area, P.O. Chemical Industries, Vadodara 390 003 CIN: L36990GJ1943PLC000363 1. BACKGROUND Risk Management Policy Jyoti Ltd. (the Company)

More information

Financial Planning Practice Standards

Financial Planning Practice Standards Financial Planning Practice Standards Financial Planning Practice Standards The Financial Planning Practice Standards have been adopted by the Board of the Institute of Financial Planning (IFP) to provide

More information

Integrated Inventory Management for Maintenance, Repair and Operations (MRO) Materials By Doug Wallace 1. Introduction

Integrated Inventory Management for Maintenance, Repair and Operations (MRO) Materials By Doug Wallace 1. Introduction Integrated Inventory Management for Maintenance, Repair and Operations (MRO) Materials By Doug Wallace As appeared in the July-August 07 issue of Reliable Plant 1. Introduction From an operational perspective,

More information

NATO UNCLASSIFIED. 27 February 2012 DOCUMENT C-M(2012)0014 Silence Procedure ends: 16 Mar 2012 16:00

NATO UNCLASSIFIED. 27 February 2012 DOCUMENT C-M(2012)0014 Silence Procedure ends: 16 Mar 2012 16:00 27 February 2012 DOCUMENT Silence Procedure ends: 16 Mar 2012 16:00 Directive on the Management of Records Generated on Operational Deployment Note by the Secretary General 1. In June 2011 the NATO Records

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations

More information

Releasability: There are no releasability restrictions on this publication. Approved for public release; distribution is unlimited.

Releasability: There are no releasability restrictions on this publication. Approved for public release; distribution is unlimited. This is the Third Edition of the Commander s Critical Information Requirements (CCIRs) Insights and Best Practices Focus Paper, written by the Deployable Training Division (DTD) of the Joint Staff J7 and

More information

The Emergency Operations Plan provides guidance for managing emergency communications resources.

The Emergency Operations Plan provides guidance for managing emergency communications resources. Emergency Support Function #2 - Communication ESF # 2 Primary Agency Office of Emergency Preparedness Information Technology University Relations 911 Centers Secondary/Support Agencies Law Enforcement

More information

Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc.

Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc. Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc. Executive Summary IFONE provides securable private cellular networks. It presents this paper

More information

4.1 Identify what is working well and what needs adjustment. 4.1.1 Outline broad strategies that will help to effect these adjustments.

4.1 Identify what is working well and what needs adjustment. 4.1.1 Outline broad strategies that will help to effect these adjustments. (Overview) Step 1 Prepare 1.1 Identify specific issues or choices that the planning process should address. 1.2 Develop an organizational profile. 1.3 Identify any information that must be collected to

More information

Risk Management Handbook

Risk Management Handbook Risk Management Handbook 1999 Introduction Risk management is the process of selecting and implementing countermeasures to achieve an acceptable level of risk at an acceptable cost. The analytical risk

More information

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010 1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue

More information

The Defence Strategy of the Slovak Republic

The Defence Strategy of the Slovak Republic The Defence Strategy of the Slovak Republic approved by the National Council of the Slovak Republic 23 September 2005 TABLE OF CONTENTS Introduction I II III IV V Slovak Republic in the Changing Security

More information

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012 GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental

More information

DoD Strategy for Defending Networks, Systems, and Data

DoD Strategy for Defending Networks, Systems, and Data DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July

More information

ALLIED JOINT LOGISTIC DOCTRINE AJP-4(A)

ALLIED JOINT LOGISTIC DOCTRINE AJP-4(A) ALLIED JOINT LOGISTIC DOCTRINE AJP-4(A) DECEMBER 2003 AJP-4(A) ALLIED JOINT LOGISTIC DOCTRINE DECEMBER 2003 I RECORD OF CHANGES AJP-4(A) Change Date Date Entered Effective Date By Whom Entered iv CHAPTER

More information

Cyberspace Situational Awarness in National Security System

Cyberspace Situational Awarness in National Security System Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl

More information

STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices

STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices A S I S I N T E R N A T I O N A L Supply Chain Risk Management: Risk Assessment A Compilation of Best Practices ANSI/ASIS/RIMS SCRM.1-2014 RA.1-2015 STANDARD The worldwide leader in security standards

More information

Defense Security Service

Defense Security Service Defense Security Service Defense Security Service Cybersecurity Operations Division Counterintelligence UNCLASSIFIED Defense Security Service DSS Mission DSS Supports national security and the warfighter,

More information

The Value of Automated Penetration Testing White Paper

The Value of Automated Penetration Testing White Paper The Value of Automated Penetration Testing White Paper Overview As an information security and the security manager of the company, I am well aware of the difficulties of enterprises and organizations

More information

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST

More information

A BROAD DEFINITION OF INTEROPERABILITY

A BROAD DEFINITION OF INTEROPERABILITY Chapter Two A BROAD DEFINITION OF INTEROPERABILITY Interoperability would seem to be a straightforward concept. Put simply, is a measure of the degree to which various organizations or individuals are

More information

Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016

Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016 Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016 NATO is anything but obsolete. It is needed more now than at any point since the end

More information

Bio-inspired cyber security for your enterprise

Bio-inspired cyber security for your enterprise Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t

More information

How to achieve excellent enterprise risk management Why risk assessments fail

How to achieve excellent enterprise risk management Why risk assessments fail How to achieve excellent enterprise risk management Why risk assessments fail Overview Risk assessments are a common tool for understanding business issues and potential consequences from uncertainties.

More information

Security Management Training Course Notes

Security Management Training Course Notes Security Management Training Course Notes SECURITY MANAGEMENT Security Management Framework Context Analysis Who are we? Mission Values People Political stance Where are we? Historical background Political

More information

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013 State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council

More information

Rear Detachment Commander. Computer-Based Training. Module 10: Training Management

Rear Detachment Commander. Computer-Based Training. Module 10: Training Management Rear Detachment Commander Computer-Based Training Module 10: Training Management Table of Contents 1. TRAINING MANAGEMENT... 1 1.1. IMPLEMENTING A TRAINING PLAN... 1 1.1.1. Principles Of Training... 2

More information

Does NATO s Article V Genuinely Protect Its Members?

Does NATO s Article V Genuinely Protect Its Members? Does NATO s Article V Genuinely Protect Its Members? NATO has been the most successful alliance of history. We repeat this truth quite frequently, especially now that we celebrate 60 years of its successful

More information

European airlines and the Asian market. A Lufthansa Consulting outlook towards the middle of the next decade

European airlines and the Asian market. A Lufthansa Consulting outlook towards the middle of the next decade European airlines and the Asian market A Lufthansa Consulting outlook towards the middle of the next decade Lufthansa Consulting GmbH Von-Gablenz-Str. 2-6 50679 Köln Germany Registration: Local Court of

More information

Appendix D Logistics Support Element MISSION ORGANIZATION

Appendix D Logistics Support Element MISSION ORGANIZATION Logistics Support Element Effective force projection logistics require a seamless logistics system operating across the strategic, operational, and tactical levels. Elements from CONUS and the theater

More information

10721/16 GSC/lt 1 DGB 2B

10721/16 GSC/lt 1 DGB 2B Council of the European Union Brussels, 28 June 2016 (OR. en) 10721/16 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 28 June 2016 To: Delegations No. prev. doc.: 10320/16 REV 1 Subject:

More information

LAWRENCE COUNTY, KENTUCKY EMERGENCY OPERATIONS PLAN ESF-13

LAWRENCE COUNTY, KENTUCKY EMERGENCY OPERATIONS PLAN ESF-13 LAWRENCE COUNTY, KENTUCKY EMERGENCY OPERATIONS PLAN LAW ENFORCEMENT AND SECURITY ESF-13 Coordinates and organizes law enforcement and security resources in preparing for, responding to and recovering from

More information

ALLIED MARITIME COMMAND

ALLIED MARITIME COMMAND ALLIED MARITIME COMMAND MARCOM/N350/NSC Vision Iss 1 01 Oct 2015 The NATO Shipping Centre Strategic Vision THE NATO SHIPPING CENTRE (NSC) STRATEGIC VISION OCT 2015 I. Background The NATO Shipping Centre

More information

SUCCESSFUL INTERFACE RISK MANAGEMENT FROM BLAME CULTURE TO JOINT ACTION

SUCCESSFUL INTERFACE RISK MANAGEMENT FROM BLAME CULTURE TO JOINT ACTION SUCCESSFUL INTERFACE RISK MANAGEMENT FROM BLAME CULTURE TO JOINT ACTION SUMMARY Axel Kappeler, Principal James Catmur, Director Interfaces are important because they are everywhere. However, interfaces

More information

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013 2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

US Casualties: The Trends in Iraq and Afghanistan

US Casualties: The Trends in Iraq and Afghanistan 18 K Street, NW Suite 4 Washington, DC 26 Phone: 1.22.775.327 Fax: 1.22.775.3199 Web: www.csis.org/burke/reports US Casualties: The Trends in Iraq and Afghanistan Anthony H. Cordesman Arleigh A. Burke

More information

Purpose of the Governor s strategy. Guiding Principles

Purpose of the Governor s strategy. Guiding Principles Purpose of the Governor s strategy The Governor s initiative to develop and implement a State of Tennessee program to counter terrorism within the State is outlined in this document. The primary purpose

More information

V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI

V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI Recommendation: The Executive Branch should provide for a central planning and coordination mechanism (likely within an existing entity)

More information

The Five Most Common Cyber-Attack Myths Debunked

The Five Most Common Cyber-Attack Myths Debunked cybereason The Five Most Common Cyber-Attack Myths Debunked 2016 Cybereason. All rights reserved. 1 Cyber attacks show no sign of decreasing any time soon. If anything, hackers have expanded the type of

More information

How to Conduct A SWOT Analysis. Dr. E. J. Keeley Executive Director, Institutional Effectiveness and Research

How to Conduct A SWOT Analysis. Dr. E. J. Keeley Executive Director, Institutional Effectiveness and Research How to Conduct A SWOT Analysis Dr. E. J. Keeley Executive Director, Institutional Effectiveness and Research 1 Purpose To provide an overview of environmental scanning and SWOT analysis To develop an understanding

More information

The Army Universal Task List

The Army Universal Task List Change No. 7 FM 7-15, C7 Headquarters Department of the Army Washington, D.C., 20 May 2011 The Army Universal Task List 1. Change 7 to FM 7-15, 27 February 2009, updates the tasks with civil affairs and

More information

Tallinn Airport Ltd. Conditions of infrastructure use for ground handling service providers. Valid since 01.11.2010. Lennart Meri Tallinn Airport

Tallinn Airport Ltd. Conditions of infrastructure use for ground handling service providers. Valid since 01.11.2010. Lennart Meri Tallinn Airport Authorised with the 01 October 2010 Directive of the Chairman of the Management Board no 48 Tallinn Airport Ltd. Conditions of infrastructure use for ground handling service providers Valid since 01.11.2010

More information

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Subject: Critical Infrastructure Identification, Prioritization, and Protection For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

Achieve. Performance objectives

Achieve. Performance objectives Achieve Performance objectives Performance objectives are benchmarks of effective performance that describe the types of work activities students and affiliates will be involved in as trainee accountants.

More information

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency

More information

Ten steps to better requirements management.

Ten steps to better requirements management. White paper June 2009 Ten steps to better requirements management. Dominic Tavassoli, IBM Actionable enterprise architecture management Page 2 Contents 2 Introduction 2 Defining a good requirement 3 Ten

More information

Innovation. Performance. Security. SMARTSCAN man-portable land EW solutions. target. up-to-the-minute situational intelligence

Innovation. Performance. Security. SMARTSCAN man-portable land EW solutions. target. up-to-the-minute situational intelligence Innovation. Performance. Security SMARTSCAN man-portable land EW solutions target up-to-the-minute situational intelligence The increasing demands of Electronic Warfare As the digital era takes hold, the

More information

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

December 17, 2003 Homeland Security Presidential Directive/Hspd-7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

2016 OCR AUDIT E-BOOK

2016 OCR AUDIT E-BOOK !! 2016 OCR AUDIT E-BOOK About BlueOrange Compliance: We specialize in healthcare information privacy and security solutions. We understand that each organization is busy running its business and that

More information

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be

More information

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests

More information