-
Essay / Questions and Answers: The purpose of foreign missions...
Question 1: Based on INTSUM, OPREP-3 and warning order for Bangladesh scenario, provide a revised mission statement of a combatant commander. Make sure this statement includes the “who, what, when and why.” (10 points) When requested, USPACOM will conduct foreign humanitarian assistance in concert with coalition partners to support USAID and the Government of Bangladesh to alleviate near-term human suffering and expedite recovery associated with Cyclone Janari. Upon order, USPACOM will establish and deploy forces to forward operating bases to alleviate suffering in devastated areas [CMS, p. 216]. Question 2: Commander's intent identifies the campaign goal, end state, and defines operational risk. Based on INSTUM, OPREP-3 and the warning order provide the combatant commander's initial intent. (10 points) Objective: The objective of foreign humanitarian assistance is to provide mobility capabilities and logistical support to strengthen the host country's efforts in response to the Cyclone Janari crisis. Close coordination with other international military forces, DOS/USAID, the US Embassy, NGOs, PVOs and the Government of Bangladesh will facilitate operations and eliminate duplication of efforts [DoD, p. 152]. End State: At the end state of this operation, success will be defined as a reduction in loss of life and human suffering of displaced people, the scope of the crisis no longer exceeds the capacity of NGOs, PVOs and the government from Bangladesh; and all US personnel are redeployed to their home station [DoD, p. 152]. Operational Risk: Military personnel involved may experience stress and anxiety due to the number of mass casualties. Combat medical and operational stress control... middle of document ...... p. 518]. Cyberspace is used to support communication and information sharing among all branches of the military during military operations [Lesson 8, p. 519]. To support overall military operations in the future, DoD must continue to develop and retain a highly skilled cyber workforce (Lesson 8, p. 526). To help support overall military operations in the future, DoD must continue to secure the “.mil” domain and continue to detect, deter, and deny attempts to hack critical systems [NMS, p. 25]. Works CitedINTSUM. Lesson 1, Reading 1. Department of Defense (DoD), Lesson 3, Reading 1.Course Management System (CMS), Lesson 4, Reading 1.Lesson 5, Reading 3.Lesson 7, Reading 1.Lesson 8, Reading 2 .Lesson 14, Reading 1.O'Connor, C. Lesson 14, Reading 4.Fraser, D., Hertzelle, W. Lesson 14, Reading 8.